IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_8b6bc30ae81dc2afea68c3eabac594fb8e9329_ac3115bf_13acbd2a-08b8-421e-b81f-57c23bf42259\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73F3.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 30 04:01:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER754B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER756C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\HFInUAYNqgsnDSwNdDpz.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 --field-trial-handle=2360,i,13484378935357473721,8351465032550903243,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 1296
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://home.twentykx20pt.top/bugEWhhZIPIipxajeFfO1732855736?argument=WPLtZeXDD4KyKIMk1732939208
34.118.84.150
malicious
home.twentykx20pt.top
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://unisolated.invalid/C
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmloriU
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://drive-daily-5.corp.go
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
twentykx20pt.top
34.118.84.150
home.twentykx20pt.top
34.118.84.150
www.google.com
142.250.181.100
httpbin.org
18.208.8.205

IPs

IP
Domain
Country
Malicious
18.208.8.205
httpbin.org
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
34.118.84.150
twentykx20pt.top
United States
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{ae8b4d76-bf26-5e69-41fb-c0ed1c10d6a8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7F17000
heap
page read and write
8234000
heap
page read and write
6FC1000
heap
page read and write
16947E4F000
heap
page read and write
821C000
heap
page read and write
46800084C000
trusted library allocation
page read and write
635C00EC4000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00328000
trusted library allocation
page read and write
635C00840000
trusted library allocation
page read and write
4680008F4000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C001E8000
trusted library allocation
page read and write
1DB6000
heap
page read and write
2AC49FE000
unkown
page readonly
4680007AC000
trusted library allocation
page read and write
1694DF93000
heap
page read and write
4680008F0000
trusted library allocation
page read and write
635C009F0000
trusted library allocation
page read and write
76C0000
direct allocation
page execute and read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00EFC000
trusted library allocation
page read and write
7840000
heap
page read and write
635C00EB4000
trusted library allocation
page read and write
2AB09FE000
unkown
page readonly
400000
unkown
page readonly
1694ECD0000
trusted library section
page read and write
635C000E0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
468000601000
trusted library allocation
page read and write
169483E6000
heap
page read and write
16944827000
heap
page read and write
2598002DC000
direct allocation
page read and write
635C00C98000
trusted library allocation
page read and write
2AD31FE000
stack
page read and write
635C00294000
trusted library allocation
page read and write
635C009E4000
trusted library allocation
page read and write
80BA000
heap
page read and write
1694842E000
heap
page read and write
7F1B000
heap
page read and write
FE0000
heap
page read and write
1DC0000
heap
page read and write
259800260000
direct allocation
page read and write
2ABA9FE000
unkown
page readonly
635C00854000
trusted library allocation
page read and write
635C0059C000
trusted library allocation
page read and write
20A000248000
trusted library allocation
page read and write
635C0100C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00AA0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
2AAF1FC000
stack
page read and write
635C00D54000
trusted library allocation
page read and write
4680006BC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00DD0000
trusted library allocation
page read and write
635C001B4000
trusted library allocation
page read and write
820A000
heap
page read and write
2AB91FB000
stack
page read and write
6FC1000
heap
page read and write
9F0000
heap
page read and write
635C00628000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00CEC000
trusted library allocation
page read and write
635C002F0000
trusted library allocation
page read and write
169483A1000
heap
page read and write
46800078C000
trusted library allocation
page read and write
1DAE000
heap
page read and write
6FC1000
heap
page read and write
635C00370000
trusted library allocation
page read and write
635C00B88000
trusted library allocation
page read and write
1694EAF0000
trusted library section
page read and write
635C002B4000
trusted library allocation
page read and write
635C00064000
trusted library allocation
page read and write
468000248000
trusted library allocation
page read and write
635C00EC6000
trusted library allocation
page read and write
2AB71FE000
stack
page read and write
6C141000
unkown
page execute read
635C01001000
trusted library allocation
page read and write
468000844000
trusted library allocation
page read and write
635C00601000
trusted library allocation
page read and write
2AC61FC000
stack
page read and write
1694E837000
unclassified section
page read and write
16948460000
trusted library section
page read and write
7FB6000
heap
page read and write
635C00D9C000
trusted library allocation
page read and write
635C0027C000
trusted library allocation
page read and write
80CE000
heap
page read and write
40A000
unkown
page readonly
635C00EA8000
trusted library allocation
page read and write
1DD8000
heap
page read and write
6FC1000
heap
page read and write
7842000
heap
page read and write
635C00D6C000
trusted library allocation
page read and write
411000
unkown
page readonly
635C004E7000
trusted library allocation
page read and write
40A000
unkown
page readonly
635C0008C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00298000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
635C002D3000
trusted library allocation
page read and write
400000
unkown
page readonly
2AB39FE000
unkown
page readonly
635C00118000
trusted library allocation
page read and write
20A0002C0000
trusted library allocation
page read and write
16947E42000
heap
page read and write
40E000
unkown
page read and write
76B0000
direct allocation
page execute and read and write
2AAB1FC000
stack
page read and write
635C00EB4000
trusted library allocation
page read and write
327F000
stack
page read and write
6FC1000
heap
page read and write
2AC31FB000
stack
page read and write
6FC1000
heap
page read and write
635C00074000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C001F0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
7440000
direct allocation
page read and write
635C00484000
trusted library allocation
page read and write
635C00314000
trusted library allocation
page read and write
6FC1000
heap
page read and write
401000
unkown
page execute read
6FC1000
heap
page read and write
970000
heap
page read and write
8018000
heap
page read and write
2AA69FE000
unkown
page readonly
7E0000
heap
page read and write
635C01044000
trusted library allocation
page read and write
2AC81FE000
stack
page read and write
635C003EC000
trusted library allocation
page read and write
635C00518000
trusted library allocation
page read and write
6FC1000
heap
page read and write
7F13000
heap
page read and write
635C003A4000
trusted library allocation
page read and write
635C0078C000
trusted library allocation
page read and write
1DED000
heap
page read and write
169448F3000
heap
page read and write
CCF000
stack
page read and write
6FC1000
heap
page read and write
16947E50000
heap
page read and write
635C00C14000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C007DC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
46800060C000
trusted library allocation
page read and write
635C00704000
trusted library allocation
page read and write
6FC1000
heap
page read and write
76D0000
direct allocation
page execute and read and write
805E000
heap
page read and write
635C00CFC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
40A000
unkown
page readonly
635C00174000
trusted library allocation
page read and write
800C000
heap
page read and write
635C00CA8000
trusted library allocation
page read and write
635C002B4000
trusted library allocation
page read and write
7F16000
heap
page read and write
635C00A54000
trusted library allocation
page read and write
400000
unkown
page readonly
8149000
heap
page read and write
6FC1000
heap
page read and write
1DD0000
heap
page read and write
635C00AB4000
trusted library allocation
page read and write
635C001F8000
trusted library allocation
page read and write
20A0002BC000
trusted library allocation
page read and write
4680007D4000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00F64000
trusted library allocation
page read and write
635C00001000
trusted library allocation
page read and write
635C01024000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1DAD000
heap
page read and write
635C003EC000
trusted library allocation
page read and write
635C008E0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
4680006E8000
trusted library allocation
page read and write
16944810000
heap
page read and write
7FE8000
heap
page read and write
635C003EC000
trusted library allocation
page read and write
16946753000
heap
page read and write
7D0000
heap
page read and write
2AD11FE000
stack
page read and write
468000728000
trusted library allocation
page read and write
2AB81FE000
stack
page read and write
635C00AE0000
trusted library allocation
page read and write
8038000
heap
page read and write
635C00A01000
trusted library allocation
page read and write
635C00350000
trusted library allocation
page read and write
635C00490000
trusted library allocation
page read and write
46800039C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00164000
trusted library allocation
page read and write
2ABC1FA000
stack
page read and write
4680007D0000
trusted library allocation
page read and write
635C00890000
trusted library allocation
page read and write
800D000
heap
page read and write
6FC1000
heap
page read and write
2ACE9FE000
unkown
page readonly
811F000
heap
page read and write
468000890000
trusted library allocation
page read and write
6FC1000
heap
page read and write
810E000
heap
page read and write
35CB000
heap
page read and write
40E000
unkown
page write copy
411000
unkown
page readonly
468000220000
trusted library allocation
page read and write
635C00BD0000
trusted library allocation
page read and write
1694E86E000
trusted library section
page read and write
468000878000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1D10000
direct allocation
page read and write
4680008E4000
trusted library allocation
page read and write
4680008AC000
trusted library allocation
page read and write
635C00F54000
trusted library allocation
page read and write
2AB51FE000
stack
page read and write
635C00AC0000
trusted library allocation
page read and write
169483D7000
heap
page read and write
6FC1000
heap
page read and write
7F14000
heap
page read and write
6FC1000
heap
page read and write
8046000
heap
page read and write
635C002E0000
trusted library allocation
page read and write
635C00E84000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1694E630000
trusted library section
page read and write
40E000
unkown
page write copy
259800220000
direct allocation
page read and write
6FC1000
heap
page read and write
2FE0000
heap
page read and write
635C00E89000
trusted library allocation
page read and write
1694EBD2000
trusted library section
page read and write
635C000A8000
trusted library allocation
page read and write
635C00308000
trusted library allocation
page read and write
7F1A000
heap
page read and write
FD0000
heap
page read and write
6FC1000
heap
page read and write
635C000D0000
trusted library allocation
page read and write
1694C5FB000
heap
page read and write
8289000
heap
page read and write
635C002FC000
trusted library allocation
page read and write
2AAF9FE000
unkown
page readonly
635C002E0000
trusted library allocation
page read and write
7F18000
heap
page read and write
6FC1000
heap
page read and write
1D10000
direct allocation
page read and write
770000
heap
page read and write
6FC1000
heap
page read and write
16948450000
heap
page read and write
635C001F4000
trusted library allocation
page read and write
1D62000
heap
page read and write
16947E3E000
heap
page read and write
635C00C30000
trusted library allocation
page read and write
468000788000
trusted library allocation
page read and write
323E000
stack
page read and write
635C00C98000
trusted library allocation
page read and write
635C0001C000
trusted library allocation
page read and write
468000430000
trusted library allocation
page read and write
6FC1000
heap
page read and write
2AB21FE000
stack
page read and write
635C00294000
trusted library allocation
page read and write
635C00F58000
trusted library allocation
page read and write
2AD39FE000
unkown
page readonly
670000
heap
page read and write
6FC1000
heap
page read and write
635C00298000
trusted library allocation
page read and write
468000201000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
13FC000
stack
page read and write
1694EA81000
trusted library section
page read and write
635C00CAB000
trusted library allocation
page read and write
6C21F000
unkown
page readonly
635C00D40000
trusted library allocation
page read and write
4680002FC000
trusted library allocation
page read and write
817E000
heap
page read and write
468000848000
trusted library allocation
page read and write
635C00C54000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00818000
trusted library allocation
page read and write
1AC0000
heap
page read and write
1694C0B0000
trusted library section
page read and write
635C00CD0000
trusted library allocation
page read and write
825F000
heap
page read and write
7FD7000
heap
page read and write
2AAD9FE000
unkown
page readonly
635C00154000
trusted library allocation
page read and write
1DDB000
heap
page read and write
635C01070000
trusted library allocation
page read and write
635C00560000
trusted library allocation
page read and write
6FC1000
heap
page read and write
4680008C8000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00E90000
trusted library allocation
page read and write
77D1000
heap
page read and write
169448CA000
heap
page read and write
2AC59FE000
unkown
page readonly
6FC1000
heap
page read and write
6FC1000
heap
page read and write
1DDF000
heap
page read and write
635C00370000
trusted library allocation
page read and write
635C00E20000
trusted library allocation
page read and write
20A0002F0000
trusted library allocation
page read and write
259800201000
direct allocation
page read and write
16948360000
heap
page read and write
635C00EF0000
trusted library allocation
page read and write
16948440000
heap
page read and write
40A000
unkown
page readonly
635C00F1C000
trusted library allocation
page read and write
635C005C4000
trusted library allocation
page read and write
2ABA1FC000
stack
page read and write
16944A40000
trusted library allocation
page read and write
635C002A4000
trusted library allocation
page read and write
259800290000
direct allocation
page read and write
401000
unkown
page execute read
7D8000
heap
page read and write
6FC1000
heap
page read and write
635C00328000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
81E1000
heap
page read and write
6FC1000
heap
page read and write
2AC19FE000
unkown
page readonly
6FC1000
heap
page read and write
1DC4000
heap
page read and write
1694843E000
heap
page read and write
635C00380000
trusted library allocation
page read and write
141F000
stack
page read and write
635C00FA0000
trusted library allocation
page read and write
635C00380000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00720000
trusted library allocation
page read and write
20A0002BC000
trusted library allocation
page read and write
1694EA90000
trusted library section
page read and write
635C00D60000
trusted library allocation
page read and write
635C00510000
trusted library allocation
page read and write
25980020C000
direct allocation
page read and write
76D0000
direct allocation
page execute and read and write
635C00F94000
trusted library allocation
page read and write
1694E1A0000
trusted library section
page read and write
F9F000
unkown
page read and write
6FC1000
heap
page read and write
468000880000
trusted library allocation
page read and write
169483D7000
heap
page read and write
20A00020C000
trusted library allocation
page read and write
169448AB000
heap
page read and write
635C0065C000
trusted library allocation
page read and write
16944A80000
heap
page read and write
2ABC9FE000
unkown
page readonly
6FC1000
heap
page read and write
169483C3000
heap
page read and write
10B2000
unkown
page write copy
16948453000
heap
page read and write
20A0002F4000
trusted library allocation
page read and write
468000408000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1AC000
stack
page read and write
2ACB9FE000
unkown
page readonly
6FC1000
heap
page read and write
169483DF000
heap
page read and write
20A0002B0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
25980024C000
direct allocation
page read and write
20A000278000
trusted library allocation
page read and write
6FC1000
heap
page read and write
7F10000
heap
page read and write
635C0000C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00948000
trusted library allocation
page read and write
1694EA67000
unclassified section
page read and write
635C00A64000
trusted library allocation
page read and write
2ABB1FD000
stack
page read and write
40E000
unkown
page write copy
400000
unkown
page readonly
635C01024000
trusted library allocation
page read and write
468000418000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1694DF90000
heap
page read and write
635C00D24000
trusted library allocation
page read and write
6FC1000
heap
page read and write
169483DE000
heap
page read and write
2AC51FE000
stack
page read and write
6FC1000
heap
page read and write
2AAC9FE000
unkown
page readonly
635C00184000
trusted library allocation
page read and write
20A0002B0000
trusted library allocation
page read and write
635C002FC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C001B4000
trusted library allocation
page read and write
7F1D000
heap
page read and write
635C00380000
trusted library allocation
page read and write
635C00214000
trusted library allocation
page read and write
635C0067C000
trusted library allocation
page read and write
15E7000
heap
page read and write
20A0002C0000
trusted library allocation
page read and write
46800085C000
trusted library allocation
page read and write
635C00C01000
trusted library allocation
page read and write
400000
unkown
page readonly
25980023C000
direct allocation
page read and write
635C00740000
trusted library allocation
page read and write
635C00D34000
trusted library allocation
page read and write
1694C5B0000
heap
page read and write
6FC1000
heap
page read and write
468000948000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
6FC1000
heap
page read and write
EE0000
heap
page read and write
635C0005A000
trusted library allocation
page read and write
635C00B5C000
trusted library allocation
page read and write
7F10000
heap
page read and write
1DD4000
heap
page read and write
635C00AD0000
trusted library allocation
page read and write
620000
heap
page read and write
20A000270000
trusted library allocation
page read and write
468000830000
trusted library allocation
page read and write
7F11000
heap
page read and write
76D0000
direct allocation
page execute and read and write
46800082C000
trusted library allocation
page read and write
7F16000
heap
page read and write
2AC09FE000
unkown
page readonly
2AC29FE000
unkown
page readonly
76D0000
direct allocation
page execute and read and write
40A000
unkown
page readonly
169483C0000
heap
page read and write
6FC1000
heap
page read and write
2AC71FD000
stack
page read and write
6FC1000
heap
page read and write
2ABF1FC000
stack
page read and write
2ACA9FE000
unkown
page readonly
16948403000
heap
page read and write
635C005B0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00E30000
trusted library allocation
page read and write
635C00DCC000
trusted library allocation
page read and write
635C00C5C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
7D11000
heap
page read and write
20A000201000
trusted library allocation
page read and write
2AC39FE000
unkown
page readonly
1694EB01000
trusted library section
page read and write
635C002A8000
trusted library allocation
page read and write
635C00C70000
trusted library allocation
page read and write
1694C600000
heap
page read and write
40A000
unkown
page readonly
635C005F4000
trusted library allocation
page read and write
46800081C000
trusted library allocation
page read and write
635C0018C000
trusted library allocation
page read and write
635C01054000
trusted library allocation
page read and write
1A4F000
stack
page read and write
80AF000
heap
page read and write
6FC1000
heap
page read and write
20A000260000
trusted library allocation
page read and write
2598002AC000
direct allocation
page read and write
76D0000
direct allocation
page execute and read and write
6FC1000
heap
page read and write
20A000235000
trusted library allocation
page read and write
635C001D0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
7B9E000
direct allocation
page read and write
6FC1000
heap
page read and write
411000
unkown
page readonly
635C00D2C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C007BC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
20A0002BC000
trusted library allocation
page read and write
635C0035C000
trusted library allocation
page read and write
4680006AC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
150000
heap
page read and write
6FC1000
heap
page read and write
6C140000
unkown
page readonly
81CE000
heap
page read and write
635C008CC000
trusted library allocation
page read and write
144B000
unkown
page execute and write copy
2AA49FE000
unkown
page readonly
76D0000
direct allocation
page execute and read and write
635C001E0000
trusted library allocation
page read and write
1694E050000
trusted library section
page read and write
B70000
heap
page read and write
6FC1000
heap
page read and write
7EA000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
1694E106000
trusted library section
page read and write
468000248000
trusted library allocation
page read and write
635C0057C000
trusted library allocation
page read and write
635C002F0000
trusted library allocation
page read and write
635C00868000
trusted library allocation
page read and write
635C006BC000
trusted library allocation
page read and write
4680002E4000
trusted library allocation
page read and write
4680002B8000
trusted library allocation
page read and write
635C00EA8000
trusted library allocation
page read and write
4680006E0000
trusted library allocation
page read and write
169471A0000
unkown
page read and write
401000
unkown
page execute read
20A000238000
trusted library allocation
page read and write
4680006E8000
trusted library allocation
page read and write
635C00054000
trusted library allocation
page read and write
259800217000
direct allocation
page read and write
1C4F000
stack
page read and write
635C001D4000
trusted library allocation
page read and write
635C00CF4000
trusted library allocation
page read and write
16944818000
heap
page read and write
635C009E4000
trusted library allocation
page read and write
635C00E50000
trusted library allocation
page read and write
468000210000
trusted library allocation
page read and write
4680006F0000
trusted library allocation
page read and write
20A0002C0000
trusted library allocation
page read and write
80C1000
heap
page read and write
635C00C0C000
trusted library allocation
page read and write
1694E162000
trusted library section
page read and write
76D0000
direct allocation
page execute and read and write
16947E4B000
heap
page read and write
6FC1000
heap
page read and write
635C00AC4000
trusted library allocation
page read and write
16947E3E000
heap
page read and write
FC000
stack
page read and write
2AB41FA000
stack
page read and write
4680006C8000
trusted library allocation
page read and write
259800270000
direct allocation
page read and write
6FC1000
heap
page read and write
411000
unkown
page readonly
6FC1000
heap
page read and write
6FC1000
heap
page read and write
2AB19FE000
unkown
page readonly
2AAA1FB000
stack
page read and write
1DBD000
heap
page read and write
61C000
stack
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
1758000
heap
page read and write
16948372000
heap
page read and write
468000894000
trusted library allocation
page read and write
635C00220000
trusted library allocation
page read and write
635C00E68000
trusted library allocation
page read and write
2AC99FE000
unkown
page readonly
635C002D0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00874000
trusted library allocation
page read and write
16947E43000
heap
page read and write
1694E2F0000
trusted library section
page read and write
635C00380000
trusted library allocation
page read and write
468000801000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00FC8000
trusted library allocation
page read and write
1694842E000
heap
page read and write
70C0000
trusted library allocation
page read and write
635C002BA000
trusted library allocation
page read and write
7840000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
F10000
heap
page read and write
635C00FA0000
trusted library allocation
page read and write
635C010AC000
trusted library allocation
page read and write
169483BD000
heap
page read and write
6FC1000
heap
page read and write
468000964000
trusted library allocation
page read and write
16947E46000
heap
page read and write
6FC1000
heap
page read and write
635C00CB0000
trusted library allocation
page read and write
1DD0000
heap
page read and write
2AB49FE000
unkown
page readonly
91C000
stack
page read and write
16948362000
heap
page read and write
401000
unkown
page execute read
411000
unkown
page readonly
2AB79FE000
unkown
page readonly
9BE000
stack
page read and write
802D000
heap
page read and write
2AC01FB000
stack
page read and write
468000288000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1694EBB6000
trusted library section
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
950000
unkown
page readonly
6FC1000
heap
page read and write
80A1000
heap
page read and write
7F19000
heap
page read and write
81A7000
heap
page read and write
4680002CC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
4680006C8000
trusted library allocation
page read and write
635C00474000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C001E4000
trusted library allocation
page read and write
2AC69FE000
unkown
page readonly
2ACB1FE000
stack
page read and write
2ACC1FE000
stack
page read and write
1DB7000
heap
page read and write
2ABD1FC000
stack
page read and write
2598002EC000
direct allocation
page read and write
20A0002E4000
trusted library allocation
page read and write
1DD9000
heap
page read and write
6FC1000
heap
page read and write
16944A20000
heap
page read and write
635C00C0C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
2AB11FE000
stack
page read and write
4680002F4000
trusted library allocation
page read and write
635C006BC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
4680007BC000
trusted library allocation
page read and write
35C0000
heap
page read and write
635C01020000
trusted library allocation
page read and write
2AB31FE000
stack
page read and write
46800070C000
trusted library allocation
page read and write
169448B7000
heap
page read and write
2AA61FE000
stack
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
1694841C000
heap
page read and write
169448AF000
heap
page read and write
16947E42000
heap
page read and write
76D0000
direct allocation
page execute and read and write
2AB89FE000
unkown
page readonly
4680007C0000
trusted library allocation
page read and write
1DB6000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
400000
unkown
page readonly
7F12000
heap
page read and write
1DCD000
heap
page read and write
2AC11FC000
stack
page read and write
635C00DB4000
trusted library allocation
page read and write
4680002D4000
trusted library allocation
page read and write
6FC1000
heap
page read and write
20A0002A0000
trusted library allocation
page read and write
635C001A8000
trusted library allocation
page read and write
1DB0000
heap
page read and write
16947E39000
heap
page read and write
6FC1000
heap
page read and write
40E000
unkown
page read and write
401000
unkown
page execute read
7FA9000
heap
page read and write
635C00973000
trusted library allocation
page read and write
6FC1000
heap
page read and write
16946740000
trusted library section
page readonly
635C00DA8000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
40A000
unkown
page readonly
2AA89FE000
unkown
page readonly
20A000250000
trusted library allocation
page read and write
2ABB9FE000
unkown
page readonly
8159000
heap
page read and write
6FC1000
heap
page read and write
635C004E4000
trusted library allocation
page read and write
7FF2000
heap
page read and write
401000
unkown
page execute read
76D0000
direct allocation
page execute and read and write
259800280000
direct allocation
page read and write
20A0002B0000
trusted library allocation
page read and write
20A0002C8000
trusted library allocation
page read and write
2AC21FD000
stack
page read and write
635C00394000
trusted library allocation
page read and write
635C00CB0000
trusted library allocation
page read and write
2598002E4000
direct allocation
page read and write
DDA000
stack
page read and write
6FC1000
heap
page read and write
2AA31EF000
stack
page read and write
6FC1000
heap
page read and write
635C00A0C000
trusted library allocation
page read and write
1694C60C000
heap
page read and write
6FC1000
heap
page read and write
635C00294000
trusted library allocation
page read and write
4680006F4000
trusted library allocation
page read and write
6FC1000
heap
page read and write
46800087C000
trusted library allocation
page read and write
7F18000
heap
page read and write
F7C000
stack
page read and write
635C010C4000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C002B4000
trusted library allocation
page read and write
2AA41FE000
unkown
page read and write
7FAE000
heap
page read and write
635C00A48000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
635C00C60000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
8183000
heap
page read and write
635C00E24000
trusted library allocation
page read and write
20A0002D8000
trusted library allocation
page read and write
2AD19FE000
unkown
page readonly
635C00E40000
trusted library allocation
page read and write
635C00EB4000
trusted library allocation
page read and write
635C00F44000
trusted library allocation
page read and write
468000790000
trusted library allocation
page read and write
2ACC9FE000
unkown
page readonly
635C00B80000
trusted library allocation
page read and write
411000
unkown
page readonly
635C00E23000
trusted library allocation
page read and write
468000860000
trusted library allocation
page read and write
1694843D000
heap
page read and write
6FC1000
heap
page read and write
4680008A8000
trusted library allocation
page read and write
635C001C4000
trusted library allocation
page read and write
6C26C000
unkown
page readonly
6FC1000
heap
page read and write
401000
unkown
page execute read
6FC1000
heap
page read and write
4680006AC000
trusted library allocation
page read and write
1DE2000
heap
page read and write
7400000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
2ABD9FE000
unkown
page readonly
76D0000
direct allocation
page execute and read and write
468000864000
trusted library allocation
page read and write
7BE000
stack
page read and write
7F1C000
heap
page read and write
635C001C8000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
468000238000
trusted library allocation
page read and write
635C0092C000
trusted library allocation
page read and write
4680002F0000
trusted library allocation
page read and write
468000898000
trusted library allocation
page read and write
16948401000
heap
page read and write
169483AC000
heap
page read and write
77D1000
heap
page read and write
76D0000
direct allocation
page execute and read and write
16944A50000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C009E4000
trusted library allocation
page read and write
2ACA1FE000
stack
page read and write
6FC1000
heap
page read and write
635C00DDC000
trusted library allocation
page read and write
2AD01FE000
stack
page read and write
468000904000
trusted library allocation
page read and write
635C00838000
trusted library allocation
page read and write
16948379000
heap
page read and write
6FC1000
heap
page read and write
169483CD000
heap
page read and write
EBC000
stack
page read and write
7F13000
heap
page read and write
468000828000
trusted library allocation
page read and write
40E000
unkown
page write copy
468000250000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C009A4000
trusted library allocation
page read and write
7F19000
heap
page read and write
259800294000
direct allocation
page read and write
1694DED7000
unclassified section
page read and write
635C00330000
trusted library allocation
page read and write
6FC1000
heap
page read and write
FF0000
heap
page read and write
6FC1000
heap
page read and write
7F18000
heap
page read and write
2AAB9FE000
unkown
page readonly
6FC1000
heap
page read and write
635C00F34000
trusted library allocation
page read and write
2AAE1FB000
stack
page read and write
2ABA1FA000
stack
page read and write
635C0009F000
trusted library allocation
page read and write
4680006AC000
trusted library allocation
page read and write
6C269000
unkown
page read and write
6FC1000
heap
page read and write
76A0000
direct allocation
page execute and read and write
635C00801000
trusted library allocation
page read and write
635C0058C000
trusted library allocation
page read and write
46800080C000
trusted library allocation
page read and write
259800215000
direct allocation
page read and write
6FC1000
heap
page read and write
411000
unkown
page readonly
16944800000
heap
page read and write
46800095C000
trusted library allocation
page read and write
635C00B0C000
trusted library allocation
page read and write
33F0000
heap
page read and write
1D10000
direct allocation
page read and write
2AA91FD000
stack
page read and write
635C009E4000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
7AF0000
heap
page read and write
635C00E60000
trusted library allocation
page read and write
7F14000
heap
page read and write
8059000
heap
page read and write
635C0020C000
trusted library allocation
page read and write
468000974000
trusted library allocation
page read and write
2ACF9FE000
unkown
page readonly
169483C3000
heap
page read and write
809D000
heap
page read and write
1D10000
direct allocation
page read and write
635C0075C000
trusted library allocation
page read and write
635C002C0000
trusted library allocation
page read and write
635C001B4000
trusted library allocation
page read and write
6FC1000
heap
page read and write
76D0000
direct allocation
page execute and read and write
7FA6000
heap
page read and write
635C00468000
trusted library allocation
page read and write
4680007A0000
trusted library allocation
page read and write
8045000
heap
page read and write
635C00B4C000
trusted library allocation
page read and write
680000
heap
page read and write
635C00E0C000
trusted library allocation
page read and write
259800250000
direct allocation
page read and write
6FC1000
heap
page read and write
169483D4000
heap
page read and write
7F10000
heap
page read and write
6FC1000
heap
page read and write
18DF000
stack
page read and write
635C006D9000
trusted library allocation
page read and write
4680008D8000
trusted library allocation
page read and write
635C00C8C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00EA4000
trusted library allocation
page read and write
635C00A84000
trusted library allocation
page read and write
46800025C000
trusted library allocation
page read and write
1694EA70000
trusted library section
page read and write
1694482E000
heap
page read and write
4680008C4000
trusted library allocation
page read and write
EE8000
heap
page read and write
6C21D000
unkown
page read and write
7FD1000
heap
page read and write
635C00F84000
trusted library allocation
page read and write
16944A85000
heap
page read and write
20A000230000
trusted library allocation
page read and write
2ABF9FE000
unkown
page readonly
2AC91FD000
stack
page read and write
46800039C000
trusted library allocation
page read and write
808F000
heap
page read and write
635C0020C000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
6FC1000
heap
page read and write
635C004C0000
trusted library allocation
page read and write
16948367000
heap
page read and write
6FC1000
heap
page read and write
20A0002BC000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
2ABE9FE000
unkown
page readonly
2598002D0000
direct allocation
page read and write
6FC1000
heap
page read and write
16947E20000
heap
page read and write
7F1C000
heap
page read and write
1D10000
direct allocation
page read and write
635C00A40000
trusted library allocation
page read and write
7A86000
heap
page read and write
2AC79FE000
unkown
page readonly
635C00CA8000
trusted library allocation
page read and write
803D000
heap
page read and write
635C00B4C000
trusted library allocation
page read and write
411000
unkown
page readonly
20A000274000
trusted library allocation
page read and write
169483CD000
heap
page read and write
635C00210000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C006E4000
trusted library allocation
page read and write
6FC1000
heap
page read and write
16947E10000
heap
page read and write
6FC1000
heap
page read and write
80CA000
heap
page read and write
6FC1000
heap
page read and write
635C00118000
trusted library allocation
page read and write
7440000
direct allocation
page read and write
1DC4000
heap
page read and write
635C00FEC000
trusted library allocation
page read and write
8045000
heap
page read and write
6FC1000
heap
page read and write
635C002F0000
trusted library allocation
page read and write
1DC4000
heap
page read and write
76D0000
direct allocation
page execute and read and write
4680007E4000
trusted library allocation
page read and write
1694839E000
heap
page read and write
1DE9000
heap
page read and write
6FC1000
heap
page read and write
635C00120000
trusted library allocation
page read and write
20A000288000
trusted library allocation
page read and write
20A0002BC000
trusted library allocation
page read and write
259800234000
direct allocation
page read and write
468000920000
trusted library allocation
page read and write
635C00BD4000
trusted library allocation
page read and write
20A0002F8000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00764000
trusted library allocation
page read and write
635C00A4A000
trusted library allocation
page read and write
811D000
heap
page read and write
1694ECDE000
trusted library section
page read and write
635C00230000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
6FC1000
heap
page read and write
635C00E18000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1DC0000
heap
page read and write
150E000
stack
page read and write
635C00B64000
trusted library allocation
page read and write
6A0000
heap
page read and write
F5E000
unkown
page read and write
6FC1000
heap
page read and write
40E000
unkown
page write copy
635C0077C000
trusted library allocation
page read and write
7F18000
heap
page read and write
6FC1000
heap
page read and write
4680008EC000
trusted library allocation
page read and write
46800079C000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
147E000
stack
page read and write
6FC1000
heap
page read and write
16947E4E000
heap
page read and write
635C0097C000
trusted library allocation
page read and write
7F14000
heap
page read and write
400000
unkown
page readonly
4680002ED000
trusted library allocation
page read and write
635C00218000
trusted library allocation
page read and write
D9D000
stack
page read and write
6FC1000
heap
page read and write
4680009C4000
trusted library allocation
page read and write
635C010A4000
trusted library allocation
page read and write
2AB69FE000
unkown
page readonly
1694EAAE000
trusted library section
page read and write
80CA000
heap
page read and write
635C0005E000
trusted library allocation
page read and write
635C0050D000
trusted library allocation
page read and write
15C0000
heap
page read and write
635C00958000
trusted library allocation
page read and write
1694C1A2000
trusted library allocation
page read and write
635C00F90000
trusted library allocation
page read and write
20A0002A0000
trusted library allocation
page read and write
411000
unkown
page readonly
807D000
heap
page read and write
2ACD1FE000
stack
page read and write
635C009E4000
trusted library allocation
page read and write
7440000
direct allocation
page read and write
20A000264000
trusted library allocation
page read and write
8011000
heap
page read and write
7B9C000
direct allocation
page read and write
2AC41FE000
stack
page read and write
635C008A4000
trusted library allocation
page read and write
635C00BE8000
trusted library allocation
page read and write
6FC1000
heap
page read and write
20A0002C0000
trusted library allocation
page read and write
2AB61FE000
stack
page read and write
16948384000
heap
page read and write
6FC1000
heap
page read and write
8055000
heap
page read and write
6FC1000
heap
page read and write
635C00F2C000
trusted library allocation
page read and write
DFC000
stack
page read and write
7400000
trusted library allocation
page read and write
8264000
heap
page read and write
6FC1000
heap
page read and write
635C00F74000
trusted library allocation
page read and write
635C00348000
trusted library allocation
page read and write
8091000
heap
page read and write
6FC1000
heap
page read and write
1694EAA2000
trusted library section
page read and write
6FC1000
heap
page read and write
635C00CC0000
trusted library allocation
page read and write
635C008D4000
trusted library allocation
page read and write
2AB01FE000
stack
page read and write
635C00B78000
trusted library allocation
page read and write
40E000
unkown
page read and write
4680008B8000
trusted library allocation
page read and write
7AFA000
heap
page read and write
2AD21FE000
stack
page read and write
2ACD9FE000
unkown
page readonly
635C0049C000
trusted library allocation
page read and write
4680007E0000
trusted library allocation
page read and write
7F11000
heap
page read and write
635C00118000
trusted library allocation
page read and write
80A6000
heap
page read and write
6FC1000
heap
page read and write
121E000
stack
page read and write
1510000
heap
page read and write
6FC1000
heap
page read and write
40A000
unkown
page readonly
401000
unkown
page execute read
1694E062000
trusted library section
page read and write
635C00C98000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
1DC4000
heap
page read and write
7F10000
heap
page read and write
259800210000
direct allocation
page read and write
46800071C000
trusted library allocation
page read and write
635C00F58000
trusted library allocation
page read and write
20A0002A0000
trusted library allocation
page read and write
1694E860000
trusted library section
page read and write
635C00308000
trusted library allocation
page read and write
6FC1000
heap
page read and write
76D0000
direct allocation
page execute and read and write
7EE000
heap
page read and write
76D0000
direct allocation
page execute and read and write
2ACF1FC000
stack
page read and write
468000850000
trusted library allocation
page read and write
1D10000
direct allocation
page read and write
635C006CC000
trusted library allocation
page read and write
635C0068C000
trusted library allocation
page read and write
7F17000
heap
page read and write
FF0000
heap
page read and write
635C0080C000
trusted library allocation
page read and write
1D6C000
heap
page read and write
1694845C000
heap
page read and write
635C002DB000
trusted library allocation
page read and write
40E000
unkown
page read and write
6FC1000
heap
page read and write
15E0000
heap
page read and write
8047000
heap
page read and write
6FC1000
heap
page read and write
13FC000
stack
page read and write
635C001EC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C0060C000
trusted library allocation
page read and write
2AB99FE000
unkown
page readonly
635C00A18000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
7FEF000
heap
page read and write
2AA51FE000
stack
page read and write
635C00F74000
trusted library allocation
page read and write
6FC1000
heap
page read and write
66E000
stack
page read and write
7F18000
heap
page read and write
635C00BD4000
trusted library allocation
page read and write
2AB59FE000
unkown
page readonly
1694A650000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
635C0012C000
trusted library allocation
page read and write
20A000220000
trusted library allocation
page read and write
635C003EC000
trusted library allocation
page read and write
468000404000
trusted library allocation
page read and write
635C0031C000
trusted library allocation
page read and write
2AAD1FB000
stack
page read and write
259800303000
direct allocation
page read and write
169483D4000
heap
page read and write
2ACE1FA000
stack
page read and write
6FC1000
heap
page read and write
80B7000
heap
page read and write
6FC1000
heap
page read and write
635C00330000
trusted library allocation
page read and write
169483BA000
heap
page read and write
635C00CDC000
trusted library allocation
page read and write
400000
unkown
page readonly
76D0000
direct allocation
page execute and read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
400000
unkown
page readonly
2AC89FE000
unkown
page readonly
2AAE9FE000
unkown
page readonly
635C00328000
trusted library allocation
page read and write
635C00CB0000
trusted library allocation
page read and write
169483A1000
heap
page read and write
6FC1000
heap
page read and write
7F10000
heap
page read and write
1694DEA7000
unclassified section
page read and write
635C00144000
trusted library allocation
page read and write
6FC1000
heap
page read and write
40A000
unkown
page readonly
635C0031C000
trusted library allocation
page read and write
635C00370000
trusted library allocation
page read and write
1694E0C3000
trusted library section
page read and write
635C0033C000
trusted library allocation
page read and write
635C00C5C000
trusted library allocation
page read and write
11DF000
stack
page read and write
401000
unkown
page execute read
7FD7000
heap
page read and write
635C00768000
trusted library allocation
page read and write
635C009C8000
trusted library allocation
page read and write
1DAE000
heap
page read and write
259800230000
direct allocation
page read and write
80DC000
heap
page read and write
20A0002C0000
trusted library allocation
page read and write
40E000
unkown
page read and write
6FC1000
heap
page read and write
4680006D4000
trusted library allocation
page read and write
635C00224000
trusted library allocation
page read and write
7FCE000
heap
page read and write
635C001D8000
trusted library allocation
page read and write
635C001B4000
trusted library allocation
page read and write
20A0002BC000
trusted library allocation
page read and write
635C0021C000
trusted library allocation
page read and write
635C00FEC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
468000918000
trusted library allocation
page read and write
7F12000
heap
page read and write
468000960000
trusted library allocation
page read and write
635C00401000
trusted library allocation
page read and write
1694EC10000
trusted library section
page read and write
635C00474000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
807B000
heap
page read and write
2AA79FE000
unkown
page readonly
635C00E78000
trusted library allocation
page read and write
635C00DE8000
trusted library allocation
page read and write
1694C61E000
heap
page read and write
2AD29FE000
unkown
page readonly
20A0002A0000
trusted library allocation
page read and write
E40000
heap
page read and write
400000
unkown
page readonly
7FD4000
heap
page read and write
635C00290000
trusted library allocation
page read and write
635C00759000
trusted library allocation
page read and write
635C000F0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C001DC000
trusted library allocation
page read and write
2AA81FE000
stack
page read and write
1DD9000
heap
page read and write
6FC1000
heap
page read and write
635C00201000
trusted library allocation
page read and write
635C006AC000
trusted library allocation
page read and write
468000230000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
7F18000
heap
page read and write
169483AC000
heap
page read and write
1DD9000
heap
page read and write
8078000
heap
page read and write
169449E0000
heap
page readonly
6FC1000
heap
page read and write
401000
unkown
page execute read
635C00294000
trusted library allocation
page read and write
20A000294000
trusted library allocation
page read and write
1DC0000
heap
page read and write
7F1B000
heap
page read and write
635C00080000
trusted library allocation
page read and write
635C00994000
trusted library allocation
page read and write
468000884000
trusted library allocation
page read and write
635C00DD0000
trusted library allocation
page read and write
7F1A000
heap
page read and write
7A39000
direct allocation
page read and write
7F1D000
heap
page read and write
46800027C000
trusted library allocation
page read and write
6FC1000
heap
page read and write
46800020C000
trusted library allocation
page read and write
1694EBDD000
trusted library section
page read and write
468000868000
trusted library allocation
page read and write
143E000
stack
page read and write
6FC1000
heap
page read and write
635C00E9C000
trusted library allocation
page read and write
468000778000
trusted library allocation
page read and write
16946750000
heap
page read and write
635C004F4000
trusted library allocation
page read and write
468000700000
trusted library allocation
page read and write
7F17000
heap
page read and write
2AA71FE000
stack
page read and write
1D10000
direct allocation
page read and write
259800284000
direct allocation
page read and write
2AB29FE000
unkown
page readonly
169480B0000
heap
page read and write
2AAC1FE000
stack
page read and write
635C00768000
trusted library allocation
page read and write
20A0002BC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C002A8000
trusted library allocation
page read and write
635C0090C000
trusted library allocation
page read and write
635C0040C000
trusted library allocation
page read and write
635C006F4000
trusted library allocation
page read and write
1694EAE0000
trusted library section
page read and write
2AA99FE000
unkown
page readonly
635C00E01000
trusted library allocation
page read and write
2ABE1FC000
stack
page read and write
635C00D88000
trusted library allocation
page read and write
635C00670000
trusted library allocation
page read and write
635C009E4000
trusted library allocation
page read and write
7981000
heap
page read and write
468000818000
trusted library allocation
page read and write
8286000
heap
page read and write
468000401000
trusted library allocation
page read and write
76D0000
direct allocation
page execute and read and write
635C0022C000
trusted library allocation
page read and write
46800040C000
trusted library allocation
page read and write
61D000
stack
page read and write
ACF000
stack
page read and write
2AD09FE000
unkown
page readonly
169483E6000
heap
page read and write
46800091C000
trusted library allocation
page read and write
468000840000
trusted library allocation
page read and write
635C00AEC000
trusted library allocation
page read and write
6FC1000
heap
page read and write
169484F0000
trusted library section
page read and write
6FC1000
heap
page read and write
1694E020000
heap
page read and write
6FC1000
heap
page read and write
468000874000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C008EC000
trusted library allocation
page read and write
259800274000
direct allocation
page read and write
16948385000
heap
page read and write
1694839E000
heap
page read and write
635C00EDC000
trusted library allocation
page read and write
169449F0000
heap
page read and write
2598002A8000
direct allocation
page read and write
6FC1000
heap
page read and write
9C0000
heap
page read and write
4680008E8000
trusted library allocation
page read and write
6FC1000
heap
page read and write
6FC1000
heap
page read and write
3580000
heap
page read and write
951000
unkown
page execute and write copy
6FC1000
heap
page read and write
2AAA9FE000
unkown
page readonly
169448CF000
heap
page read and write
635C01034000
trusted library allocation
page read and write
468000424000
trusted library allocation
page read and write
15F0000
heap
page read and write
160000
heap
page read and write
635C0029E000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C00BAC000
trusted library allocation
page read and write
4680002B0000
trusted library allocation
page read and write
1694E16D000
trusted library section
page read and write
635C00715000
trusted library allocation
page read and write
7F12000
heap
page read and write
411000
unkown
page readonly
635C00D04000
trusted library allocation
page read and write
635C00C98000
trusted library allocation
page read and write
7F1B000
heap
page read and write
6FC1000
heap
page read and write
7F1F000
heap
page read and write
1750000
heap
page read and write
635C00EA8000
trusted library allocation
page read and write
6FC1000
heap
page read and write
635C0019C000
trusted library allocation
page read and write
635C00ED0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
77EF000
heap
page read and write
40A000
unkown
page readonly
7840000
heap
page read and write
635C005E4000
trusted library allocation
page read and write
635C00228000
trusted library allocation
page read and write
806C000
heap
page read and write
635C00DC0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1694E06E000
trusted library section
page read and write
1694EB13000
trusted library section
page read and write
There are 1238 hidden memdumps, click here to show them.