IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5c68b29bb6b465bad180a68d35c62438a01da7_fff46f69_e2794727-8ca4-4633-a11b-7ed1282769e2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC938.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Nov 29 18:19:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB1D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB5C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rnCMinwLHbrEjcomyVjl.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3024 --field-trial-handle=2836,i,7408341316538118312,15543901461963207991,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 1300
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
home.fvtekx5pt.top
malicious
fvtekx5pt.top
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
http://home.fvtekx5pt.top/RrlNvinfLqYZQoxgChZr17
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://home.fvtekx5pt.top/RrlNvinfLqYZQoxgChZr1732768478
141.8.197.146
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en4
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fvtekx5pt.top
141.8.197.146
www.google.com
172.217.21.36
httpbin.org
18.208.8.205
home.fvtekx5pt.top
141.8.197.146

IPs

IP
Domain
Country
Malicious
18.208.8.205
httpbin.org
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
141.8.197.146
fvtekx5pt.top
Russian Federation
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{3f0f177e-874d-8703-2d22-f2aa90b9e3c0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
491C02628000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02EDC000
trusted library allocation
page read and write
491C02F74000
trusted library allocation
page read and write
491C02E74000
trusted library allocation
page read and write
6671000
heap
page read and write
491C024A4000
trusted library allocation
page read and write
23061406000
heap
page read and write
540000
heap
page read and write
491C0295E000
trusted library allocation
page read and write
491C02AB0000
trusted library allocation
page read and write
23061406000
heap
page read and write
10A0000
heap
page read and write
1290000
direct allocation
page read and write
230613F4000
heap
page read and write
491C02401000
trusted library allocation
page read and write
6671000
heap
page read and write
4882FFE000
unkown
page readonly
6671000
heap
page read and write
123C000
stack
page read and write
230613F3000
heap
page read and write
23068150000
trusted library section
page read and write
458400274000
trusted library allocation
page read and write
14F5000
heap
page read and write
6D50000
direct allocation
page execute and read and write
9FD000
stack
page read and write
4886FFE000
unkown
page readonly
7C00284000
direct allocation
page read and write
7C00234000
direct allocation
page read and write
6D50000
direct allocation
page execute and read and write
230613F4000
heap
page read and write
7C00201000
direct allocation
page read and write
230613E5000
heap
page read and write
491C02AD4000
trusted library allocation
page read and write
230680B6000
trusted library section
page read and write
491C02958000
trusted library allocation
page read and write
230613EE000
heap
page read and write
39BC00238000
trusted library allocation
page read and write
491C01001000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
7698000
heap
page read and write
491C024A4000
trusted library allocation
page read and write
491C024CA000
trusted library allocation
page read and write
230619CD000
heap
page read and write
75F6000
heap
page read and write
23061403000
heap
page read and write
12B4000
heap
page read and write
23067F81000
trusted library section
page read and write
6671000
heap
page read and write
458400278000
trusted library allocation
page read and write
491C02E68000
trusted library allocation
page read and write
491C024AE000
trusted library allocation
page read and write
6671000
heap
page read and write
2305FB00000
trusted library section
page readonly
1F1000
unkown
page readonly
491C03088000
trusted library allocation
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
491C02F18000
trusted library allocation
page read and write
491C02548000
trusted library allocation
page read and write
23061406000
heap
page read and write
491C030D8000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
23061403000
heap
page read and write
1520000
heap
page read and write
491C02F64000
trusted library allocation
page read and write
77B8000
heap
page read and write
6671000
heap
page read and write
23067F70000
trusted library section
page read and write
491C0284C000
trusted library allocation
page read and write
39BC0085C000
trusted library allocation
page read and write
23061403000
heap
page read and write
491C02CCC000
trusted library allocation
page read and write
39BC00330000
trusted library allocation
page read and write
230613F4000
heap
page read and write
230613FA000
heap
page read and write
23061406000
heap
page read and write
230613F2000
heap
page read and write
6671000
heap
page read and write
48FAFFE000
unkown
page readonly
458400238000
trusted library allocation
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
491C00A01000
trusted library allocation
page read and write
48827FB000
stack
page read and write
23061A02000
heap
page read and write
230613F5000
heap
page read and write
1521000
heap
page read and write
DB0000
heap
page read and write
230613FA000
heap
page read and write
491C02C0C000
trusted library allocation
page read and write
6671000
heap
page read and write
7061000
heap
page read and write
7742000
heap
page read and write
75F4000
heap
page read and write
39BC00210000
trusted library allocation
page read and write
1F1000
unkown
page readonly
23061406000
heap
page read and write
39BC00718000
trusted library allocation
page read and write
491C0253C000
trusted library allocation
page read and write
230613F4000
heap
page read and write
6671000
heap
page read and write
1240000
heap
page read and write
75F8000
heap
page read and write
7722000
heap
page read and write
7160000
heap
page read and write
1EE000
unkown
page write copy
23067792000
trusted library section
page read and write
491C02C30000
trusted library allocation
page read and write
230613FA000
heap
page read and write
6671000
heap
page read and write
1526000
heap
page read and write
491C02710000
trusted library allocation
page read and write
491C02F28000
trusted library allocation
page read and write
491C02D78000
trusted library allocation
page read and write
1760000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
491C0306C000
trusted library allocation
page read and write
458400230000
trusted library allocation
page read and write
6671000
heap
page read and write
771F000
heap
page read and write
23061406000
heap
page read and write
4584002BC000
trusted library allocation
page read and write
23061406000
heap
page read and write
12B4000
heap
page read and write
48E47EF000
stack
page read and write
230613F2000
heap
page read and write
491C02FE8000
trusted library allocation
page read and write
230613EE000
heap
page read and write
491C02293000
trusted library allocation
page read and write
39BC00374000
trusted library allocation
page read and write
1E1000
unkown
page execute read
6671000
heap
page read and write
150A000
heap
page read and write
23061403000
heap
page read and write
7785000
heap
page read and write
4892FFE000
unkown
page readonly
23061400000
heap
page read and write
6671000
heap
page read and write
23061403000
heap
page read and write
779C000
heap
page read and write
77A0000
heap
page read and write
14F5000
heap
page read and write
76D3000
heap
page read and write
230613EB000
heap
page read and write
39BC00694000
trusted library allocation
page read and write
12B4000
heap
page read and write
491C02801000
trusted library allocation
page read and write
6D50000
direct allocation
page execute and read and write
491C028D9000
trusted library allocation
page read and write
491C02ED7000
trusted library allocation
page read and write
491C02D6C000
trusted library allocation
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
11FC000
stack
page read and write
39BC002ED000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02FC8000
trusted library allocation
page read and write
1512000
heap
page read and write
4891FFE000
unkown
page readonly
48837FE000
stack
page read and write
491C02E60000
trusted library allocation
page read and write
14E8000
heap
page read and write
491C02490000
trusted library allocation
page read and write
23061400000
heap
page read and write
39BC006CC000
trusted library allocation
page read and write
491C0286C000
trusted library allocation
page read and write
23061A1A000
heap
page read and write
6D50000
direct allocation
page execute and read and write
491C029DC000
trusted library allocation
page read and write
75F3000
heap
page read and write
6671000
heap
page read and write
491C02418000
trusted library allocation
page read and write
1E0000
unkown
page readonly
75F2000
heap
page read and write
2305DD90000
heap
page read and write
6671000
heap
page read and write
491C02B20000
trusted library allocation
page read and write
23061406000
heap
page read and write
2306838E000
trusted library section
page read and write
491C02EEC000
trusted library allocation
page read and write
29F0000
heap
page read and write
6671000
heap
page read and write
230613EE000
heap
page read and write
6671000
heap
page read and write
230613F2000
heap
page read and write
23061400000
heap
page read and write
48907FC000
stack
page read and write
23061B57000
unclassified section
page read and write
23061400000
heap
page read and write
39BC00688000
trusted library allocation
page read and write
48F0FFE000
unkown
page readonly
491C02DB8000
trusted library allocation
page read and write
76B1000
heap
page read and write
6671000
heap
page read and write
1E1000
unkown
page execute read
230619BE000
heap
page read and write
14A7000
heap
page read and write
14F1000
heap
page read and write
23061400000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
6D50000
direct allocation
page execute and read and write
23061400000
heap
page read and write
151C000
heap
page read and write
6671000
heap
page read and write
1EE000
unkown
page read and write
488FFFE000
unkown
page readonly
6770000
trusted library allocation
page read and write
2306779E000
trusted library section
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
230613F4000
heap
page read and write
230613F4000
heap
page read and write
230619BA000
heap
page read and write
230613ED000
heap
page read and write
23061403000
heap
page read and write
48F4FFE000
unkown
page readonly
7C00217000
direct allocation
page read and write
23061406000
heap
page read and write
B57000
heap
page read and write
23061406000
heap
page read and write
491C024A8000
trusted library allocation
page read and write
6671000
heap
page read and write
48F27FE000
stack
page read and write
48EBFFE000
unkown
page readonly
6C208000
unkown
page readonly
23061403000
heap
page read and write
491C0013C000
trusted library allocation
page read and write
48877FE000
stack
page read and write
794E000
heap
page read and write
4DC000
stack
page read and write
230613FA000
heap
page read and write
39BC006D0000
trusted library allocation
page read and write
1580000
heap
page read and write
230613F4000
heap
page read and write
6671000
heap
page read and write
491C02A0C000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
6671000
heap
page read and write
2306141C000
heap
page read and write
491C0277D000
trusted library allocation
page read and write
491C02254000
trusted library allocation
page read and write
7C00215000
direct allocation
page read and write
2D90000
heap
page read and write
491C02530000
trusted library allocation
page read and write
2305E01A000
heap
page read and write
10FE000
stack
page read and write
6671000
heap
page read and write
75F1000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
17F0000
heap
page read and write
39BC006E4000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02CB0000
trusted library allocation
page read and write
2DE0000
heap
page read and write
75F8000
heap
page read and write
6671000
heap
page read and write
39BC00744000
trusted library allocation
page read and write
23061406000
heap
page read and write
458400235000
trusted library allocation
page read and write
491C02958000
trusted library allocation
page read and write
491C03118000
trusted library allocation
page read and write
6671000
heap
page read and write
23061403000
heap
page read and write
23061406000
heap
page read and write
491C03014000
trusted library allocation
page read and write
23061640000
heap
page read and write
491C02324000
trusted library allocation
page read and write
14F1000
heap
page read and write
39BC006AC000
trusted library allocation
page read and write
230613FA000
heap
page read and write
39BC00668000
trusted library allocation
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
230613FB000
heap
page read and write
1290000
direct allocation
page read and write
230613FA000
heap
page read and write
491C02F50000
trusted library allocation
page read and write
491C02820000
trusted library allocation
page read and write
491C02A1C000
trusted library allocation
page read and write
48F17FA000
stack
page read and write
6671000
heap
page read and write
7C002E4000
direct allocation
page read and write
39BC00620000
trusted library allocation
page read and write
4890FFE000
unkown
page readonly
491C02F48000
trusted library allocation
page read and write
6671000
heap
page read and write
230619D1000
heap
page read and write
75F8000
heap
page read and write
7707000
heap
page read and write
48917FE000
stack
page read and write
2305DEE0000
trusted library allocation
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
491C03017000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02201000
trusted library allocation
page read and write
6671000
heap
page read and write
491C00001000
trusted library allocation
page read and write
230613FA000
heap
page read and write
6D50000
direct allocation
page execute and read and write
76CF000
heap
page read and write
491C0295E000
trusted library allocation
page read and write
491C02398000
trusted library allocation
page read and write
491C02644000
trusted library allocation
page read and write
23061400000
heap
page read and write
6671000
heap
page read and write
23061403000
heap
page read and write
488B7FE000
stack
page read and write
23061400000
heap
page read and write
491C02C30000
trusted library allocation
page read and write
6671000
heap
page read and write
7824000
heap
page read and write
491C0226C000
trusted library allocation
page read and write
491C02F24000
trusted library allocation
page read and write
4584002B0000
trusted library allocation
page read and write
12B4000
heap
page read and write
6671000
heap
page read and write
48F3FFE000
unkown
page readonly
491C02EC4000
trusted library allocation
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
491C0229F000
trusted library allocation
page read and write
48E77FE000
stack
page read and write
48867FC000
stack
page read and write
491C02EC4000
trusted library allocation
page read and write
14A8000
heap
page read and write
75FB000
heap
page read and write
491C02D0C000
trusted library allocation
page read and write
6671000
heap
page read and write
230613F4000
heap
page read and write
48F67FE000
stack
page read and write
491C0309C000
trusted library allocation
page read and write
491C023F8000
trusted library allocation
page read and write
23061A0D000
heap
page read and write
6671000
heap
page read and write
23061A37000
heap
page read and write
230613F4000
heap
page read and write
39BC002F4000
trusted library allocation
page read and write
23061406000
heap
page read and write
48E57FE000
unkown
page read and write
491C030E4000
trusted library allocation
page read and write
230613FA000
heap
page read and write
3010000
heap
page read and write
230619D8000
heap
page read and write
4888FFE000
unkown
page readonly
491C024B4000
trusted library allocation
page read and write
23061403000
heap
page read and write
6671000
heap
page read and write
491C02420000
trusted library allocation
page read and write
230619C6000
heap
page read and write
23061403000
heap
page read and write
6671000
heap
page read and write
230613F4000
heap
page read and write
48FB7FD000
stack
page read and write
23061995000
heap
page read and write
488D7FE000
stack
page read and write
491C02E98000
trusted library allocation
page read and write
491C024FC000
trusted library allocation
page read and write
12B4000
heap
page read and write
39BC006B8000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02B58000
trusted library allocation
page read and write
491C02998000
trusted library allocation
page read and write
23061400000
heap
page read and write
7C00274000
direct allocation
page read and write
39BC00248000
trusted library allocation
page read and write
39BC002D4000
trusted library allocation
page read and write
6671000
heap
page read and write
48F07FC000
stack
page read and write
491C0220C000
trusted library allocation
page read and write
48E87FE000
stack
page read and write
491C029C8000
trusted library allocation
page read and write
23067FAE000
trusted library section
page read and write
230613F4000
heap
page read and write
149E000
heap
page read and write
23061406000
heap
page read and write
75F1000
heap
page read and write
75F8000
heap
page read and write
6671000
heap
page read and write
1EE000
unkown
page read and write
491C02E18000
trusted library allocation
page read and write
23061403000
heap
page read and write
491C0256C000
trusted library allocation
page read and write
23061406000
heap
page read and write
23061406000
heap
page read and write
491C02AFC000
trusted library allocation
page read and write
2305DE80000
heap
page read and write
6671000
heap
page read and write
6F51000
heap
page read and write
491C02779000
trusted library allocation
page read and write
777000
unkown
page write copy
230613F4000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
1E0000
unkown
page readonly
20BF000
stack
page read and write
39BC00424000
trusted library allocation
page read and write
6671000
heap
page read and write
491C0308C000
trusted library allocation
page read and write
48FA7FB000
stack
page read and write
6D50000
direct allocation
page execute and read and write
491C02989000
trusted library allocation
page read and write
48F2FFE000
unkown
page readonly
75F6000
heap
page read and write
491C0295E000
trusted library allocation
page read and write
491C02888000
trusted library allocation
page read and write
12B4000
heap
page read and write
491C03001000
trusted library allocation
page read and write
48817FD000
stack
page read and write
491C02EFC000
trusted library allocation
page read and write
230613F4000
heap
page read and write
491C02528000
trusted library allocation
page read and write
491C02550000
trusted library allocation
page read and write
230613FF000
heap
page read and write
230619A3000
heap
page read and write
230613F4000
heap
page read and write
23061403000
heap
page read and write
491C026A0000
trusted library allocation
page read and write
491C023B4000
trusted library allocation
page read and write
10B0000
heap
page read and write
491C028FC000
trusted library allocation
page read and write
48E67FF000
stack
page read and write
23065C4C000
heap
page read and write
23065C48000
heap
page read and write
1EA000
unkown
page readonly
6671000
heap
page read and write
491C02B9C000
trusted library allocation
page read and write
39BC00230000
trusted library allocation
page read and write
23061406000
heap
page read and write
23061400000
heap
page read and write
48847FD000
stack
page read and write
109E000
stack
page read and write
39BC00404000
trusted library allocation
page read and write
491C02958000
trusted library allocation
page read and write
6C20C000
unkown
page readonly
23065C46000
heap
page read and write
39BC00601000
trusted library allocation
page read and write
23063C00000
trusted library allocation
page read and write
6671000
heap
page read and write
154F000
stack
page read and write
491C02BC8000
trusted library allocation
page read and write
1EA000
unkown
page readonly
3230000
direct allocation
page read and write
230613F3000
heap
page read and write
23061A40000
trusted library section
page read and write
39BC0060C000
trusted library allocation
page read and write
23061B67000
unclassified section
page read and write
6671000
heap
page read and write
491C02910000
trusted library allocation
page read and write
230680DD000
trusted library section
page read and write
1521000
heap
page read and write
230613FA000
heap
page read and write
48EFFFE000
unkown
page readonly
491C02F40000
trusted library allocation
page read and write
23061403000
heap
page read and write
2D8E000
stack
page read and write
7692000
heap
page read and write
491C030C8000
trusted library allocation
page read and write
39BC00320000
trusted library allocation
page read and write
6671000
heap
page read and write
39BC0069C000
trusted library allocation
page read and write
6671000
heap
page read and write
48857FE000
stack
page read and write
230613E5000
heap
page read and write
491C02A6C000
trusted library allocation
page read and write
23061403000
heap
page read and write
48F97FE000
stack
page read and write
491C02CD0000
trusted library allocation
page read and write
6671000
heap
page read and write
12B4000
heap
page read and write
39BC00758000
trusted library allocation
page read and write
230677F3000
trusted library section
page read and write
491C02EC4000
trusted library allocation
page read and write
6671000
heap
page read and write
48ECFFE000
unkown
page readonly
76ED000
heap
page read and write
491C02730000
trusted library allocation
page read and write
230613ED000
heap
page read and write
48F37FE000
stack
page read and write
23061403000
heap
page read and write
230613FA000
heap
page read and write
491C02580000
trusted library allocation
page read and write
488AFFE000
unkown
page readonly
230613FA000
heap
page read and write
12B4000
heap
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
1EE000
unkown
page read and write
14E8000
heap
page read and write
39BC00320000
trusted library allocation
page read and write
39BC00714000
trusted library allocation
page read and write
4584002BC000
trusted library allocation
page read and write
CDC000
stack
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
39BC00724000
trusted library allocation
page read and write
12B4000
heap
page read and write
23061406000
heap
page read and write
491C0261C000
trusted library allocation
page read and write
23061406000
heap
page read and write
39BC00614000
trusted library allocation
page read and write
491C02878000
trusted library allocation
page read and write
23061AD0000
trusted library section
page read and write
1F1000
unkown
page readonly
48FBFFE000
unkown
page readonly
491C02770000
trusted library allocation
page read and write
230613FA000
heap
page read and write
488C7FE000
stack
page read and write
75FD000
heap
page read and write
12B4000
heap
page read and write
23061400000
heap
page read and write
39BC002CC000
trusted library allocation
page read and write
2306195B000
heap
page read and write
1EA000
unkown
page readonly
23067623000
heap
page read and write
491C024AA000
trusted library allocation
page read and write
23061406000
heap
page read and write
23061406000
heap
page read and write
1E0000
unkown
page readonly
1E0000
unkown
page readonly
3230000
direct allocation
page read and write
23061403000
heap
page read and write
11FC000
stack
page read and write
6D50000
direct allocation
page execute and read and write
491C02D44000
trusted library allocation
page read and write
12B4000
heap
page read and write
488BFFE000
unkown
page readonly
491C02220000
trusted library allocation
page read and write
76D0000
heap
page read and write
1188000
heap
page read and write
7221000
direct allocation
page read and write
491C02B84000
trusted library allocation
page read and write
143C000
stack
page read and write
23067852000
trusted library section
page read and write
23061403000
heap
page read and write
230613FA000
heap
page read and write
23061406000
heap
page read and write
6D50000
direct allocation
page execute and read and write
6671000
heap
page read and write
491C02508000
trusted library allocation
page read and write
2305DEB0000
heap
page read and write
6671000
heap
page read and write
4584002A0000
trusted library allocation
page read and write
491C0275C000
trusted library allocation
page read and write
491C023A0000
trusted library allocation
page read and write
491C02587000
trusted library allocation
page read and write
2305E01D000
heap
page read and write
6D30000
direct allocation
page execute and read and write
23061403000
heap
page read and write
14F1000
heap
page read and write
230613F4000
heap
page read and write
23061400000
heap
page read and write
491C030F4000
trusted library allocation
page read and write
491C0255C000
trusted library allocation
page read and write
6671000
heap
page read and write
7C00280000
direct allocation
page read and write
491C0256C000
trusted library allocation
page read and write
230613F4000
heap
page read and write
488A7FD000
stack
page read and write
23067780000
trusted library section
page read and write
BFC000
stack
page read and write
14EE000
heap
page read and write
1480000
heap
page read and write
2305FB30000
heap
page read and write
491C02424000
trusted library allocation
page read and write
39BC00734000
trusted library allocation
page read and write
230613E8000
heap
page read and write
7223000
direct allocation
page read and write
6671000
heap
page read and write
23065624000
trusted library allocation
page read and write
6D50000
direct allocation
page execute and read and write
6C1BF000
unkown
page readonly
230613C0000
heap
page read and write
75F8000
heap
page read and write
230619CB000
heap
page read and write
488CFFE000
unkown
page readonly
7897000
heap
page read and write
491C02601000
trusted library allocation
page read and write
491C0253C000
trusted library allocation
page read and write
6671000
heap
page read and write
23061400000
heap
page read and write
4584002BC000
trusted library allocation
page read and write
48F47FD000
stack
page read and write
491C0295E000
trusted library allocation
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
39BC00250000
trusted library allocation
page read and write
230613F3000
heap
page read and write
75F3000
heap
page read and write
4584002B0000
trusted library allocation
page read and write
491C0307C000
trusted library allocation
page read and write
491C0260C000
trusted library allocation
page read and write
76D5000
heap
page read and write
48F87FE000
stack
page read and write
491C0234C000
trusted library allocation
page read and write
12B4000
heap
page read and write
23061400000
heap
page read and write
2305DEF0000
trusted library allocation
page read and write
230613FA000
heap
page read and write
4893FFE000
unkown
page readonly
23061406000
heap
page read and write
75F1000
heap
page read and write
48F5FFE000
unkown
page readonly
6671000
heap
page read and write
39BC00610000
trusted library allocation
page read and write
23067836000
trusted library section
page read and write
491C0267C000
trusted library allocation
page read and write
230613E9000
heap
page read and write
23061406000
heap
page read and write
23061403000
heap
page read and write
39BC00704000
trusted library allocation
page read and write
6671000
heap
page read and write
6D50000
direct allocation
page execute and read and write
491C027B0000
trusted library allocation
page read and write
491C023B4000
trusted library allocation
page read and write
7867000
heap
page read and write
23061406000
heap
page read and write
14FD000
heap
page read and write
230619A6000
heap
page read and write
4584002F0000
trusted library allocation
page read and write
491C030B8000
trusted library allocation
page read and write
491C02B48000
trusted library allocation
page read and write
39BC00320000
trusted library allocation
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
23067F90000
trusted library section
page read and write
491C02334000
trusted library allocation
page read and write
179F000
stack
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
23065C5A000
heap
page read and write
39BC00368000
trusted library allocation
page read and write
491C02F94000
trusted library allocation
page read and write
1F1000
unkown
page readonly
491C024A4000
trusted library allocation
page read and write
39BC0033C000
trusted library allocation
page read and write
75F6000
heap
page read and write
491C02F6C000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02D28000
trusted library allocation
page read and write
23061403000
heap
page read and write
491C02E54000
trusted library allocation
page read and write
7757000
heap
page read and write
6671000
heap
page read and write
F40000
heap
page read and write
39BC00644000
trusted library allocation
page read and write
12B4000
heap
page read and write
39BC00658000
trusted library allocation
page read and write
39BC0075C000
trusted library allocation
page read and write
6671000
heap
page read and write
75F1000
heap
page read and write
7C00303000
direct allocation
page read and write
230618F0000
trusted library section
page read and write
491C02958000
trusted library allocation
page read and write
1EA000
unkown
page readonly
4883FFE000
unkown
page readonly
491C023CC000
trusted library allocation
page read and write
23061403000
heap
page read and write
784B000
heap
page read and write
491C02530000
trusted library allocation
page read and write
6671000
heap
page read and write
491C024AC000
trusted library allocation
page read and write
6671000
heap
page read and write
230619C9000
heap
page read and write
230613FB000
heap
page read and write
6D50000
direct allocation
page execute and read and write
491C02514000
trusted library allocation
page read and write
6671000
heap
page read and write
2306141C000
heap
page read and write
491C024C4000
trusted library allocation
page read and write
491C02DC1000
trusted library allocation
page read and write
491C0256C000
trusted library allocation
page read and write
76E0000
heap
page read and write
6D50000
direct allocation
page execute and read and write
230613ED000
heap
page read and write
491C02E01000
trusted library allocation
page read and write
39BC002B0000
trusted library allocation
page read and write
23061A0B000
heap
page read and write
491C02A94000
trusted library allocation
page read and write
1E0000
unkown
page readonly
6671000
heap
page read and write
491C0310C000
trusted library allocation
page read and write
39BC00698000
trusted library allocation
page read and write
39BC00380000
trusted library allocation
page read and write
23067FE0000
trusted library section
page read and write
39BC006B0000
trusted library allocation
page read and write
39BC00640000
trusted library allocation
page read and write
6671000
heap
page read and write
75F8000
heap
page read and write
491C0241C000
trusted library allocation
page read and write
23061406000
heap
page read and write
13A0000
heap
page read and write
23061400000
heap
page read and write
39BC00750000
trusted library allocation
page read and write
39BC00288000
trusted library allocation
page read and write
491C00601000
trusted library allocation
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
230613FA000
heap
page read and write
785A000
heap
page read and write
6671000
heap
page read and write
23061992000
heap
page read and write
4889FFE000
unkown
page readonly
75F8000
heap
page read and write
491C02D18000
trusted library allocation
page read and write
491C00401000
trusted library allocation
page read and write
6671000
heap
page read and write
491C029AC000
trusted library allocation
page read and write
491C02414000
trusted library allocation
page read and write
4584002BC000
trusted library allocation
page read and write
6671000
heap
page read and write
39BC003EC000
trusted library allocation
page read and write
6671000
heap
page read and write
230613FA000
heap
page read and write
491C02FA0000
trusted library allocation
page read and write
40000
unkown
page readonly
491C0235C000
trusted library allocation
page read and write
491C02B78000
trusted library allocation
page read and write
491C030AC000
trusted library allocation
page read and write
70BE000
direct allocation
page read and write
491C02720000
trusted library allocation
page read and write
491C02FB8000
trusted library allocation
page read and write
1EA000
unkown
page readonly
6671000
heap
page read and write
491C0279C000
trusted library allocation
page read and write
4584002A0000
trusted library allocation
page read and write
6671000
heap
page read and write
230613F4000
heap
page read and write
6671000
heap
page read and write
4584002BC000
trusted library allocation
page read and write
1050000
heap
page read and write
230613F4000
heap
page read and write
230613F4000
heap
page read and write
1EE000
unkown
page write copy
7C002D0000
direct allocation
page read and write
491C028D4000
trusted library allocation
page read and write
491C02BD0000
trusted library allocation
page read and write
3250000
direct allocation
page execute and read and write
12B4000
heap
page read and write
48F9FFE000
unkown
page readonly
6D50000
direct allocation
page execute and read and write
1290000
direct allocation
page read and write
48897FE000
stack
page read and write
2306140B000
heap
page read and write
491C03018000
trusted library allocation
page read and write
39BC00664000
trusted library allocation
page read and write
491C02C3C000
trusted library allocation
page read and write
6671000
heap
page read and write
1EA000
unkown
page readonly
6671000
heap
page read and write
6D50000
direct allocation
page execute and read and write
491C02650000
trusted library allocation
page read and write
491C02594000
trusted library allocation
page read and write
15AE000
heap
page read and write
23061406000
heap
page read and write
4584002A0000
trusted library allocation
page read and write
76F7000
heap
page read and write
491C026A8000
trusted library allocation
page read and write
39BC00730000
trusted library allocation
page read and write
6671000
heap
page read and write
23061400000
heap
page read and write
6671000
heap
page read and write
23065C50000
heap
page read and write
491C025A4000
trusted library allocation
page read and write
6671000
heap
page read and write
294D000
stack
page read and write
2305DE70000
heap
page readonly
491C0295D000
trusted library allocation
page read and write
1EA000
unkown
page readonly
78EC000
heap
page read and write
1E0000
unkown
page readonly
4584002C0000
trusted library allocation
page read and write
4584002C0000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
7C00290000
direct allocation
page read and write
230613F4000
heap
page read and write
491C02260000
trusted library allocation
page read and write
6C0E1000
unkown
page execute read
491C0304C000
trusted library allocation
page read and write
6671000
heap
page read and write
230619C6000
heap
page read and write
491C02968000
trusted library allocation
page read and write
1E1000
unkown
page execute read
23061400000
heap
page read and write
23061406000
heap
page read and write
491C023E0000
trusted library allocation
page read and write
4584002E4000
trusted library allocation
page read and write
23061400000
heap
page read and write
4584002F8000
trusted library allocation
page read and write
14DF000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
39BC00248000
trusted library allocation
page read and write
48E97FE000
stack
page read and write
230613E9000
heap
page read and write
230619F0000
heap
page read and write
6671000
heap
page read and write
75F6000
heap
page read and write
39BC0033C000
trusted library allocation
page read and write
230613F4000
heap
page read and write
23067FA2000
trusted library section
page read and write
230613FA000
heap
page read and write
488DFFE000
unkown
page readonly
1E0000
unkown
page readonly
458400270000
trusted library allocation
page read and write
491C02838000
trusted library allocation
page read and write
76BD000
heap
page read and write
6D40000
direct allocation
page execute and read and write
6671000
heap
page read and write
6671000
heap
page read and write
491C02ED4000
trusted library allocation
page read and write
23061400000
heap
page read and write
491C02740000
trusted library allocation
page read and write
48EDFFE000
unkown
page readonly
6671000
heap
page read and write
7C00210000
direct allocation
page read and write
230613FB000
heap
page read and write
48807FC000
stack
page read and write
75F9000
heap
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
39BC007C8000
trusted library allocation
page read and write
775D000
heap
page read and write
491C02CE8000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
491C030BC000
trusted library allocation
page read and write
458400294000
trusted library allocation
page read and write
4584002C0000
trusted library allocation
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
7784000
heap
page read and write
6671000
heap
page read and write
230613FA000
heap
page read and write
39BC0020C000
trusted library allocation
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
230613F3000
heap
page read and write
491C02EB8000
trusted library allocation
page read and write
1E1000
unkown
page execute read
48E8FFE000
unkown
page readonly
23061400000
heap
page read and write
77EC000
heap
page read and write
23061403000
heap
page read and write
230613FB000
heap
page read and write
230613F4000
heap
page read and write
491C03034000
trusted library allocation
page read and write
23061400000
heap
page read and write
23065C91000
heap
page read and write
491C02784000
trusted library allocation
page read and write
491C02F84000
trusted library allocation
page read and write
1F1000
unkown
page readonly
230619CB000
heap
page read and write
1E1000
unkown
page execute read
775C000
heap
page read and write
48E5FFE000
unkown
page readonly
491C02FEC000
trusted library allocation
page read and write
39BC006E8000
trusted library allocation
page read and write
23061406000
heap
page read and write
7C00220000
direct allocation
page read and write
6671000
heap
page read and write
491C02DBC000
trusted library allocation
page read and write
12B4000
heap
page read and write
7782000
heap
page read and write
491C02528000
trusted library allocation
page read and write
230613D0000
heap
page read and write
491C03150000
trusted library allocation
page read and write
230613F2000
heap
page read and write
7883000
heap
page read and write
23061403000
heap
page read and write
39BC006C4000
trusted library allocation
page read and write
23067FF0000
trusted library section
page read and write
7729000
heap
page read and write
491C02860000
trusted library allocation
page read and write
23061406000
heap
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
15A0000
heap
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
1516000
heap
page read and write
48FC7FC000
stack
page read and write
75F3000
heap
page read and write
23061406000
heap
page read and write
230619D8000
heap
page read and write
491C024F0000
trusted library allocation
page read and write
12B4000
heap
page read and write
1290000
direct allocation
page read and write
1EE000
unkown
page write copy
6671000
heap
page read and write
75FF000
heap
page read and write
D30000
heap
page read and write
230613FA000
heap
page read and write
491C027EC000
trusted library allocation
page read and write
6671000
heap
page read and write
491C023B4000
trusted library allocation
page read and write
491C026B8000
trusted library allocation
page read and write
39BC00364000
trusted library allocation
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
1EE000
unkown
page read and write
491C024B8000
trusted library allocation
page read and write
23065642000
trusted library allocation
page read and write
39BC002E4000
trusted library allocation
page read and write
39BC0035C000
trusted library allocation
page read and write
23061406000
heap
page read and write
491C0300C000
trusted library allocation
page read and write
39BC00624000
trusted library allocation
page read and write
14F5000
heap
page read and write
23061400000
heap
page read and write
230619C9000
heap
page read and write
1EA000
unkown
page readonly
7C002AC000
direct allocation
page read and write
230613FA000
heap
page read and write
1509000
heap
page read and write
491C02DF8000
trusted library allocation
page read and write
6671000
heap
page read and write
491C0261E000
trusted library allocation
page read and write
491C02C20000
trusted library allocation
page read and write
2306199D000
heap
page read and write
39BC0035C000
trusted library allocation
page read and write
7695000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
230619CF000
heap
page read and write
39BC00320000
trusted library allocation
page read and write
7879000
heap
page read and write
48EEFFE000
unkown
page readonly
39BC00310000
trusted library allocation
page read and write
39BC0080C000
trusted library allocation
page read and write
230613F4000
heap
page read and write
23061403000
heap
page read and write
491C03060000
trusted library allocation
page read and write
2305DF28000
heap
page read and write
6671000
heap
page read and write
6C209000
unkown
page read and write
174F000
stack
page read and write
39BC002B8000
trusted library allocation
page read and write
6D50000
direct allocation
page execute and read and write
1E0000
unkown
page readonly
491C024D0000
trusted library allocation
page read and write
23068110000
trusted library section
page read and write
491C023B4000
trusted library allocation
page read and write
6671000
heap
page read and write
2305DF20000
heap
page read and write
2305DFD3000
heap
page read and write
298A000
stack
page read and write
4584002BC000
trusted library allocation
page read and write
12B4000
heap
page read and write
7C00294000
direct allocation
page read and write
7C00230000
direct allocation
page read and write
23061403000
heap
page read and write
230613FA000
heap
page read and write
48FF7FB000
stack
page read and write
14F5000
heap
page read and write
230613F4000
heap
page read and write
230613F2000
heap
page read and write
23068013000
trusted library section
page read and write
23061406000
heap
page read and write
230613E9000
heap
page read and write
39BC00348000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
230613F2000
heap
page read and write
23061406000
heap
page read and write
491C02594000
trusted library allocation
page read and write
491C027D0000
trusted library allocation
page read and write
2D0E000
unkown
page read and write
491C02871000
trusted library allocation
page read and write
230613FA000
heap
page read and write
6671000
heap
page read and write
39BC00310000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02E30000
trusted library allocation
page read and write
4584002D8000
trusted library allocation
page read and write
491C024F0000
trusted library allocation
page read and write
1970000
heap
page read and write
775F000
heap
page read and write
6671000
heap
page read and write
560000
heap
page read and write
6671000
heap
page read and write
23061400000
heap
page read and write
6E70000
trusted library allocation
page read and write
75FD000
heap
page read and write
230613F2000
heap
page read and write
491C02E0C000
trusted library allocation
page read and write
6671000
heap
page read and write
48E7FFE000
unkown
page readonly
23061406000
heap
page read and write
23061400000
heap
page read and write
491C028E4000
trusted library allocation
page read and write
230613FA000
heap
page read and write
491C02CFF000
trusted library allocation
page read and write
2305FB33000
heap
page read and write
48F77FE000
stack
page read and write
1E1000
unkown
page execute read
23065C40000
heap
page read and write
23061406000
heap
page read and write
39BC007CC000
trusted library allocation
page read and write
6671000
heap
page read and write
6E70000
trusted library allocation
page read and write
FFC000
stack
page read and write
491C02A88000
trusted library allocation
page read and write
491C024A4000
trusted library allocation
page read and write
39BC00401000
trusted library allocation
page read and write
230613F4000
heap
page read and write
7733000
heap
page read and write
491C023F4000
trusted library allocation
page read and write
6671000
heap
page read and write
491C024F0000
trusted library allocation
page read and write
6671000
heap
page read and write
23061400000
heap
page read and write
230613F4000
heap
page read and write
39BC0027C000
trusted library allocation
page read and write
76B1000
heap
page read and write
2305DFB4000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
458400250000
trusted library allocation
page read and write
39BC00784000
trusted library allocation
page read and write
23061400000
heap
page read and write
23061406000
heap
page read and write
14E8000
heap
page read and write
7818000
heap
page read and write
2D4E000
unkown
page read and write
4584002F4000
trusted library allocation
page read and write
48F1FFE000
unkown
page readonly
6671000
heap
page read and write
491C03028000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
6671000
heap
page read and write
2DDF000
stack
page read and write
48937FE000
stack
page read and write
491C0251C000
trusted library allocation
page read and write
75FD000
heap
page read and write
78C5000
heap
page read and write
491C02B08000
trusted library allocation
page read and write
D5C000
stack
page read and write
230680D2000
trusted library section
page read and write
23061403000
heap
page read and write
39BC007B4000
trusted library allocation
page read and write
39BC006C8000
trusted library allocation
page read and write
230613F4000
heap
page read and write
491C03128000
trusted library allocation
page read and write
230613FA000
heap
page read and write
23061407000
heap
page read and write
7C00260000
direct allocation
page read and write
230613FA000
heap
page read and write
1E1000
unkown
page execute read
E4F000
stack
page read and write
23060580000
unkown
page read and write
230613EB000
heap
page read and write
23061406000
heap
page read and write
230613FA000
heap
page read and write
491C02FD4000
trusted library allocation
page read and write
491C02F30000
trusted library allocation
page read and write
39BC0039C000
trusted library allocation
page read and write
491C02DC1000
trusted library allocation
page read and write
D40000
heap
page read and write
230619B7000
heap
page read and write
491C0237C000
trusted library allocation
page read and write
41000
unkown
page execute and write copy
48927FE000
stack
page read and write
23061406000
heap
page read and write
1E1000
unkown
page execute read
14D2000
heap
page read and write
230613F4000
heap
page read and write
491C023DC000
trusted library allocation
page read and write
491C02A44000
trusted library allocation
page read and write
491C00801000
trusted library allocation
page read and write
23061406000
heap
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
230619B3000
heap
page read and write
6671000
heap
page read and write
230613F3000
heap
page read and write
488EFFE000
unkown
page readonly
1E1000
unkown
page execute read
230619CD000
heap
page read and write
75FE000
heap
page read and write
6671000
heap
page read and write
491C02ED4000
trusted library allocation
page read and write
491C02DC8000
trusted library allocation
page read and write
4887FFE000
unkown
page readonly
458400288000
trusted library allocation
page read and write
491C03058000
trusted library allocation
page read and write
39BC00754000
trusted library allocation
page read and write
23061406000
heap
page read and write
39BC006EC000
trusted library allocation
page read and write
23061403000
heap
page read and write
1EE000
unkown
page read and write
23061400000
heap
page read and write
491C0240C000
trusted library allocation
page read and write
230619BE000
heap
page read and write
491C0278C000
trusted library allocation
page read and write
6671000
heap
page read and write
23061971000
heap
page read and write
491C02390000
trusted library allocation
page read and write
DFE000
stack
page read and write
6671000
heap
page read and write
230613FA000
heap
page read and write
6671000
heap
page read and write
23061403000
heap
page read and write
230613F4000
heap
page read and write
6D50000
direct allocation
page execute and read and write
230613FA000
heap
page read and write
4885FFE000
unkown
page readonly
491C02528000
trusted library allocation
page read and write
491C0290C000
trusted library allocation
page read and write
39BC00201000
trusted library allocation
page read and write
230619D1000
heap
page read and write
12D0000
heap
page read and write
491C030D8000
trusted library allocation
page read and write
7C00270000
direct allocation
page read and write
230613FA000
heap
page read and write
1F1000
unkown
page readonly
491C023E8000
trusted library allocation
page read and write
23061400000
heap
page read and write
2305DEB5000
heap
page read and write
39BC006E0000
trusted library allocation
page read and write
491C00E80000
trusted library allocation
page read and write
23061406000
heap
page read and write
39BC00418000
trusted library allocation
page read and write
45840020C000
trusted library allocation
page read and write
230613F4000
heap
page read and write
491C00C01000
trusted library allocation
page read and write
23067457000
unclassified section
page read and write
39BC006B4000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02E88000
trusted library allocation
page read and write
1E1000
unkown
page execute read
491C02EC4000
trusted library allocation
page read and write
23061403000
heap
page read and write
48F6FFE000
unkown
page readonly
491C02468000
trusted library allocation
page read and write
2305DFB8000
heap
page read and write
75F4000
heap
page read and write
23061406000
heap
page read and write
23065C75000
heap
page read and write
6F51000
heap
page read and write
7802000
heap
page read and write
491C024AA000
trusted library allocation
page read and write
773C000
heap
page read and write
75F6000
heap
page read and write
6671000
heap
page read and write
39BC007D0000
trusted library allocation
page read and write
770F000
heap
page read and write
7779000
heap
page read and write
1EA000
unkown
page readonly
7C00250000
direct allocation
page read and write
491C009E6000
trusted library allocation
page read and write
491C023AC000
trusted library allocation
page read and write
491C02C30000
trusted library allocation
page read and write
491C02AE8000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
491C023D8000
trusted library allocation
page read and write
230613F4000
heap
page read and write
491C00201000
trusted library allocation
page read and write
7712000
heap
page read and write
491C02E40000
trusted library allocation
page read and write
75F7000
heap
page read and write
23065C44000
heap
page read and write
491C02BE8000
trusted library allocation
page read and write
230613ED000
heap
page read and write
23061406000
heap
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
48F8FFE000
unkown
page readonly
6671000
heap
page read and write
6671000
heap
page read and write
23061403000
heap
page read and write
491C023C4000
trusted library allocation
page read and write
491C02DD8000
trusted library allocation
page read and write
6D50000
direct allocation
page execute and read and write
7C0020C000
direct allocation
page read and write
230613F4000
heap
page read and write
1F1000
unkown
page readonly
1EE000
unkown
page write copy
6671000
heap
page read and write
230613FA000
heap
page read and write
6D50000
direct allocation
page execute and read and write
23065C9D000
heap
page read and write
6671000
heap
page read and write
771E000
heap
page read and write
491C02EAC000
trusted library allocation
page read and write
491C02978000
trusted library allocation
page read and write
491C022B4000
trusted library allocation
page read and write
491C02DBC000
trusted library allocation
page read and write
75F8000
heap
page read and write
39BC00390000
trusted library allocation
page read and write
23061400000
heap
page read and write
4584002C0000
trusted library allocation
page read and write
39BC00654000
trusted library allocation
page read and write
23068380000
trusted library section
page read and write
7688000
heap
page read and write
75F1000
heap
page read and write
48FDFFE000
unkown
page readonly
491C029BC000
trusted library allocation
page read and write
23061400000
heap
page read and write
6671000
heap
page read and write
23061962000
heap
page read and write
2306198E000
heap
page read and write
6671000
heap
page read and write
48887FD000
stack
page read and write
491C02958000
trusted library allocation
page read and write
48FEFFE000
unkown
page readonly
39BC0078C000
trusted library allocation
page read and write
458400264000
trusted library allocation
page read and write
5AE000
stack
page read and write
230613F3000
heap
page read and write
491C024F0000
trusted library allocation
page read and write
230613FA000
heap
page read and write
12B4000
heap
page read and write
78FC000
heap
page read and write
491C02845000
trusted library allocation
page read and write
491C02D50000
trusted library allocation
page read and write
491C0236C000
trusted library allocation
page read and write
39BC00760000
trusted library allocation
page read and write
48EF7FB000
stack
page read and write
491C02F08000
trusted library allocation
page read and write
23061403000
heap
page read and write
6671000
heap
page read and write
4884FFE000
unkown
page readonly
491C02E25000
trusted library allocation
page read and write
23061403000
heap
page read and write
491C0280C000
trusted library allocation
page read and write
23061407000
heap
page read and write
48ED7FE000
stack
page read and write
48F57FE000
stack
page read and write
2E68000
heap
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
23061403000
heap
page read and write
491C02A58000
trusted library allocation
page read and write
23061406000
heap
page read and write
23061400000
heap
page read and write
776E000
heap
page read and write
491C02874000
trusted library allocation
page read and write
75FC000
heap
page read and write
6EE1000
heap
page read and write
6C1BD000
unkown
page read and write
48FD7FB000
stack
page read and write
23061400000
heap
page read and write
14A0000
heap
page read and write
6671000
heap
page read and write
7C002A8000
direct allocation
page read and write
491C028BC000
trusted library allocation
page read and write
48F7FFE000
unkown
page readonly
491C02D58000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02D90000
trusted library allocation
page read and write
491C03104000
trusted library allocation
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
491C02410000
trusted library allocation
page read and write
6671000
heap
page read and write
491C030E4000
trusted library allocation
page read and write
491C022DC000
trusted library allocation
page read and write
6671000
heap
page read and write
491C0242C000
trusted library allocation
page read and write
491C02428000
trusted library allocation
page read and write
23061952000
heap
page read and write
39BC00630000
trusted library allocation
page read and write
6671000
heap
page read and write
230613F2000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
39BC00408000
trusted library allocation
page read and write
7C002DC000
direct allocation
page read and write
75F3000
heap
page read and write
230613FA000
heap
page read and write
1F1000
unkown
page readonly
491C023AC000
trusted library allocation
page read and write
76BE000
heap
page read and write
23061A18000
heap
page read and write
1470000
heap
page read and write
48FFFFE000
unkown
page readonly
6671000
heap
page read and write
75F2000
heap
page read and write
230613FA000
heap
page read and write
491C02CFC000
trusted library allocation
page read and write
B50000
heap
page read and write
491C02E9C000
trusted library allocation
page read and write
6671000
heap
page read and write
39BC00678000
trusted library allocation
page read and write
458400260000
trusted library allocation
page read and write
230613FD000
heap
page read and write
14F5000
heap
page read and write
230613FA000
heap
page read and write
23061406000
heap
page read and write
491C02C64000
trusted library allocation
page read and write
491C02C6C000
trusted library allocation
page read and write
AF2000
unkown
page execute and write copy
230613FA000
heap
page read and write
135E000
stack
page read and write
6671000
heap
page read and write
23061990000
heap
page read and write
491C03040000
trusted library allocation
page read and write
6671000
heap
page read and write
39BC00788000
trusted library allocation
page read and write
75F0000
heap
page read and write
23065C53000
heap
page read and write
6671000
heap
page read and write
2306815E000
trusted library section
page read and write
12B4000
heap
page read and write
779B000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
39BC0025C000
trusted library allocation
page read and write
491C028AC000
trusted library allocation
page read and write
2306785D000
trusted library section
page read and write
D90000
heap
page read and write
7C0023C000
direct allocation
page read and write
230613FA000
heap
page read and write
491C0240C000
trusted library allocation
page read and write
7C0024C000
direct allocation
page read and write
6671000
heap
page read and write
14F5000
heap
page read and write
230619F0000
heap
page read and write
230613FB000
heap
page read and write
491C025B4000
trusted library allocation
page read and write
491C02CA0000
trusted library allocation
page read and write
23061403000
heap
page read and write
41000
unkown
page execute and write copy
230613F4000
heap
page read and write
6E70000
trusted library allocation
page read and write
491C024A4000
trusted library allocation
page read and write
1E0000
unkown
page readonly
230619CF000
heap
page read and write
1290000
direct allocation
page read and write
1F1000
unkown
page readonly
6671000
heap
page read and write
23061403000
heap
page read and write
75F3000
heap
page read and write
230613F4000
heap
page read and write
6671000
heap
page read and write
75FE000
heap
page read and write
6671000
heap
page read and write
491C02434000
trusted library allocation
page read and write
23061A02000
heap
page read and write
23061403000
heap
page read and write
73F1000
heap
page read and write
6D50000
direct allocation
page execute and read and write
4880FFE000
unkown
page readonly
491C023E4000
trusted library allocation
page read and write
1E0000
unkown
page readonly
23067620000
heap
page read and write
14F1000
heap
page read and write
23061403000
heap
page read and write
2305DEC0000
heap
page read and write
7C002EC000
direct allocation
page read and write
23061406000
heap
page read and write
491C023D0000
trusted library allocation
page read and write
6671000
heap
page read and write
491C02E9C000
trusted library allocation
page read and write
491C024A4000
trusted library allocation
page read and write
4894FFE000
unkown
page readonly
491C023EC000
trusted library allocation
page read and write
6671000
heap
page read and write
1EA000
unkown
page readonly
12B4000
heap
page read and write
6F54000
heap
page read and write
7693000
heap
page read and write
39BC00770000
trusted library allocation
page read and write
230613F2000
heap
page read and write
6671000
heap
page read and write
458400201000
trusted library allocation
page read and write
6671000
heap
page read and write
23061403000
heap
page read and write
491C02EDC000
trusted library allocation
page read and write
39BC00220000
trusted library allocation
page read and write
491C022AC000
trusted library allocation
page read and write
23067C60000
trusted library section
page read and write
6671000
heap
page read and write
48FCFFE000
unkown
page readonly
6671000
heap
page read and write
458400220000
trusted library allocation
page read and write
6671000
heap
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
2E60000
heap
page read and write
491C02D38000
trusted library allocation
page read and write
491C02BF8000
trusted library allocation
page read and write
75FC000
heap
page read and write
775C000
heap
page read and write
491C026B8000
trusted library allocation
page read and write
39BC00354000
trusted library allocation
page read and write
48E9FFE000
unkown
page readonly
48EAFFE000
unkown
page readonly
491C023AC000
trusted library allocation
page read and write
4584002C0000
trusted library allocation
page read and write
4881FFE000
unkown
page readonly
6D50000
direct allocation
page execute and read and write
230613FA000
heap
page read and write
6671000
heap
page read and write
48EA7FD000
stack
page read and write
491C02CBC000
trusted library allocation
page read and write
717A000
heap
page read and write
39BC006FC000
trusted library allocation
page read and write
39BC00684000
trusted library allocation
page read and write
230613FB000
heap
page read and write
6671000
heap
page read and write
230613FA000
heap
page read and write
6671000
heap
page read and write
4584002C8000
trusted library allocation
page read and write
491C02648000
trusted library allocation
page read and write
230613FA000
heap
page read and write
12B4000
heap
page read and write
6D50000
direct allocation
page execute and read and write
23065C42000
heap
page read and write
6F00000
heap
page read and write
23061400000
heap
page read and write
23061406000
heap
page read and write
48EB7FB000
stack
page read and write
23061406000
heap
page read and write
39BC00700000
trusted library allocation
page read and write
39BC00330000
trusted library allocation
page read and write
15AA000
heap
page read and write
491C00E01000
trusted library allocation
page read and write
7917000
heap
page read and write
6671000
heap
page read and write
23061A0B000
heap
page read and write
23067A60000
trusted library section
page read and write
6671000
heap
page read and write
491C0258F000
trusted library allocation
page read and write
491C02644000
trusted library allocation
page read and write
39BC00354000
trusted library allocation
page read and write
39BC0040C000
trusted library allocation
page read and write
23061400000
heap
page read and write
6671000
heap
page read and write
48947FE000
stack
page read and write
230613FA000
heap
page read and write
76F3000
heap
page read and write
77A5000
heap
page read and write
6671000
heap
page read and write
23067570000
heap
page read and write
491C030C0000
trusted library allocation
page read and write
23061406000
heap
page read and write
23061403000
heap
page read and write
230613FA000
heap
page read and write
48EE7FB000
stack
page read and write
491C022EC000
trusted library allocation
page read and write
23061406000
heap
page read and write
230613F4000
heap
page read and write
23061940000
heap
page read and write
39BC002FC000
trusted library allocation
page read and write
230613EB000
heap
page read and write
23061403000
heap
page read and write
6F51000
heap
page read and write
491C02C01000
trusted library allocation
page read and write
76A2000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
230613FA000
heap
page read and write
1290000
direct allocation
page read and write
23068001000
trusted library section
page read and write
491C02430000
trusted library allocation
page read and write
230619B3000
heap
page read and write
230613F2000
heap
page read and write
491C02584000
trusted library allocation
page read and write
4584002B0000
trusted library allocation
page read and write
23067487000
unclassified section
page read and write
1247000
heap
page read and write
491C02A01000
trusted library allocation
page read and write
6D50000
direct allocation
page execute and read and write
6671000
heap
page read and write
23061400000
heap
page read and write
4584002A0000
trusted library allocation
page read and write
491C02C30000
trusted library allocation
page read and write
491C02278000
trusted library allocation
page read and write
491C023F0000
trusted library allocation
page read and write
491C022FC000
trusted library allocation
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
1F1000
unkown
page readonly
488F7FA000
stack
page read and write
230613F4000
heap
page read and write
530000
heap
page read and write
491C02BD4000
trusted library allocation
page read and write
23061406000
heap
page read and write
6AF0000
direct allocation
page read and write
6671000
heap
page read and write
77AE000
heap
page read and write
39BC00430000
trusted library allocation
page read and write
491C023D4000
trusted library allocation
page read and write
23061406000
heap
page read and write
6671000
heap
page read and write
491C0251C000
trusted library allocation
page read and write
23061406000
heap
page read and write
491C02F88000
trusted library allocation
page read and write
7170000
heap
page read and write
39BC006D4000
trusted library allocation
page read and write
488E7FE000
stack
page read and write
491C02E60000
trusted library allocation
page read and write
77D5000
heap
page read and write
6671000
heap
page read and write
6671000
heap
page read and write
48EC7FA000
stack
page read and write
491C02DE8000
trusted library allocation
page read and write
1EE000
unkown
page write copy
6671000
heap
page read and write
23061400000
heap
page read and write
6D50000
direct allocation
page execute and read and write
7722000
heap
page read and write
1180000
heap
page read and write
6671000
heap
page read and write
230613F4000
heap
page read and write
39BC00330000
trusted library allocation
page read and write
6671000
heap
page read and write
6C0E0000
unkown
page readonly
48FE7FC000
stack
page read and write
4584002BC000
trusted library allocation
page read and write
491C0301C000
trusted library allocation
page read and write
458400248000
trusted library allocation
page read and write
39BC006F0000
trusted library allocation
page read and write
There are 1516 hidden memdumps, click here to show them.