IOC Report
95e1Fwp61u.exe

loading gif

Files

File Path
Type
Category
Malicious
95e1Fwp61u.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_95e1Fwp61u.exe_712e2179e37367d26716f84bdb6b61d81dd8a813_efa5f1a4_e25b01f1-01ff-401e-8715-92e1633a9c87\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31F7.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:25:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER338E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33BE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\95e1Fwp61u.exe
"C:\Users\user\Desktop\95e1Fwp61u.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2000,i,15655755230875397707,13609631537999439981,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 1144

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
http://anglebug.com/6929an
unknown
https://issuetracker.google.com/284462263
unknown
http://anglebug.com/5371W
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/3965U
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
https://anglebug.com/7369an
unknown
http://unisolated.invalid/
unknown
http://anglebug.com/6048.
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en0
unknown
http://anglebug.com/8229b
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/8280rk.enable
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5055=
unknown
http://anglebug.com/4551Y
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/3502v
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://anglebug.com/4551F
unknown
https://clients4.google.com/chrome-sync
unknown
http://anglebug.com/6860r
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://google-ohttp-relay-join.fastly-edge.com/hjt)
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/7047b
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://ch.search.yahoo.com/favicon.icofrom_play_api2
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
ProgramId
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
FileId
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
LowerCaseLongPath
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
LongPathHash
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
Name
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
OriginalFileName
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
Publisher
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
Version
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
BinFileVersion
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
BinaryType
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
ProductName
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
ProductVersion
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
LinkDate
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
BinProductVersion
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
AppxPackageFullName
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
AppxPackageRelativeId
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
Size
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
Language
\REGISTRY\A\{8cd38bca-c0e6-7f14-3d85-a3579df7ae45}\Root\InventoryApplicationFile\95e1fwp61u.exe|21767968c677fd5f
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B0DC7FE000
unkown
page readonly
36C02994000
trusted library allocation
page read and write
2000002E4000
trusted library allocation
page read and write
36C02514000
trusted library allocation
page read and write
36C0256C000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
36C02420000
trusted library allocation
page read and write
136000290000
direct allocation
page read and write
B40000
unkown
page readonly
36C02878000
trusted library allocation
page read and write
D9E000
stack
page read and write
36C023C8000
trusted library allocation
page read and write
297400354000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
7341000
heap
page read and write
1B0DD5E5000
heap
page read and write
7341000
heap
page read and write
297400310000
trusted library allocation
page read and write
2190000
heap
page read and write
B0E0FFE000
stack
page read and write
1B0DD5FE000
heap
page read and write
B0FCFFE000
stack
page read and write
297400614000
trusted library allocation
page read and write
36C02B08000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
36C02514000
trusted library allocation
page read and write
36C03040000
trusted library allocation
page read and write
36C02280000
trusted library allocation
page read and write
1360002DC000
direct allocation
page read and write
1FB4000
heap
page read and write
1B0DD60A000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
A5C000
stack
page read and write
B41000
unkown
page execute read
2000002BC000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
83A7000
heap
page read and write
36C02801000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02EF4000
trusted library allocation
page read and write
7341000
heap
page read and write
2000002F0000
trusted library allocation
page read and write
1B0DDC96000
heap
page read and write
7341000
heap
page read and write
3F50000
direct allocation
page read and write
8271000
heap
page read and write
B40000
unkown
page readonly
7A30000
direct allocation
page execute and read and write
36C03025000
trusted library allocation
page read and write
29740075C000
trusted library allocation
page read and write
1B0DD5EE000
heap
page read and write
B4A000
unkown
page readonly
7341000
heap
page read and write
2180000
heap
page read and write
1B0DD5F2000
heap
page read and write
36C02B74000
trusted library allocation
page read and write
2974002B8000
trusted library allocation
page read and write
36C03001000
trusted library allocation
page read and write
36C02F04000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
7341000
heap
page read and write
1B0DD5FC000
heap
page read and write
8274000
heap
page read and write
1B0E3EF0000
trusted library section
page read and write
1B0DD5FE000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
36C02E7C000
trusted library allocation
page read and write
36C02614000
trusted library allocation
page read and write
36C02264000
trusted library allocation
page read and write
36C02546000
trusted library allocation
page read and write
297400734000
trusted library allocation
page read and write
2974006B0000
trusted library allocation
page read and write
B0FD7FE000
unkown
page readonly
36C02F20000
trusted library allocation
page read and write
1040000
heap
page read and write
7341000
heap
page read and write
1B0DA1D0000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
8A20000
heap
page read and write
B40000
unkown
page readonly
B0DCFFE000
stack
page read and write
8368000
heap
page read and write
2974002E4000
trusted library allocation
page read and write
2194000
heap
page read and write
B0E000
stack
page read and write
1B0DDC8F000
heap
page read and write
7341000
heap
page read and write
8271000
heap
page read and write
8389000
heap
page read and write
297400404000
trusted library allocation
page read and write
36C02934000
trusted library allocation
page read and write
36C02554000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
1B0DD5F8000
heap
page read and write
B0F97FE000
unkown
page readonly
B0E37FE000
unkown
page readonly
7341000
heap
page read and write
7341000
heap
page read and write
B0D8FFC000
stack
page read and write
1B0E1AA0000
trusted library allocation
page read and write
1B0DA03E000
heap
page read and write
2974006B4000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02FC8000
trusted library allocation
page read and write
B41000
unkown
page execute read
1B0DD60A000
heap
page read and write
331F000
unkown
page read and write
36C022F0000
trusted library allocation
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
B4A000
unkown
page readonly
7341000
heap
page read and write
1FB4000
heap
page read and write
1B0DD5FC000
heap
page read and write
7341000
heap
page read and write
297400210000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
200000278000
trusted library allocation
page read and write
297400640000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
B4E000
unkown
page read and write
36C02390000
trusted library allocation
page read and write
7341000
heap
page read and write
2000002A0000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
200000260000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
36C0240C000
trusted library allocation
page read and write
1B0E40F0000
trusted library section
page read and write
7341000
heap
page read and write
36C0307C000
trusted library allocation
page read and write
7341000
heap
page read and write
297400758000
trusted library allocation
page read and write
36C02590000
trusted library allocation
page read and write
B20000
heap
page read and write
1B0DD609000
heap
page read and write
7D80000
direct allocation
page read and write
13FF000
stack
page read and write
7A00000
direct allocation
page execute and read and write
36C027B8000
trusted library allocation
page read and write
36C027A4000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0E0004000
heap
page read and write
1B0DD60A000
heap
page read and write
36C023E8000
trusted library allocation
page read and write
297400248000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
7341000
heap
page read and write
B0D1FFE000
stack
page read and write
7341000
heap
page read and write
1B0DDCE4000
heap
page read and write
1B0DD60D000
heap
page read and write
36C028E0000
trusted library allocation
page read and write
7341000
heap
page read and write
200000238000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
36C029E4000
trusted library allocation
page read and write
36C0240C000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
1B0DA210000
heap
page read and write
2190000
heap
page read and write
2000002B0000
trusted library allocation
page read and write
1B0DD5F8000
heap
page read and write
B0E3FFD000
stack
page read and write
1B0DDE57000
unclassified section
page read and write
1B0DD5FC000
heap
page read and write
2000002C0000
trusted library allocation
page read and write
36C02960000
trusted library allocation
page read and write
B4E000
unkown
page read and write
B0EF7FE000
unkown
page readonly
32D0000
heap
page read and write
11FF000
stack
page read and write
36C0254C000
trusted library allocation
page read and write
1B0DDCCB000
heap
page read and write
7341000
heap
page read and write
B0D5FFE000
stack
page read and write
B0E17FE000
unkown
page readonly
1B0DD609000
heap
page read and write
7341000
heap
page read and write
B0F8FFE000
stack
page read and write
B0F4FFE000
stack
page read and write
B0E8FFD000
stack
page read and write
FFC000
stack
page read and write
1B0DD5FE000
heap
page read and write
8273000
heap
page read and write
7341000
heap
page read and write
200000270000
trusted library allocation
page read and write
827E000
heap
page read and write
7341000
heap
page read and write
B0DEFFA000
stack
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
297400678000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
36C0254C000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DDC98000
heap
page read and write
878000
heap
page read and write
36C0269C000
trusted library allocation
page read and write
1FB4000
heap
page read and write
7341000
heap
page read and write
1B0DD604000
heap
page read and write
2186000
heap
page read and write
1B0DD60A000
heap
page read and write
36C02D10000
trusted library allocation
page read and write
36C029D0000
trusted library allocation
page read and write
1B0DDC00000
heap
page read and write
36C02E34000
trusted library allocation
page read and write
7341000
heap
page read and write
36C026F0000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
2974006D4000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
7341000
heap
page read and write
2974002ED000
trusted library allocation
page read and write
36C02E58000
trusted library allocation
page read and write
B0F1FFE000
stack
page read and write
7341000
heap
page read and write
B0FAFFE000
stack
page read and write
7341000
heap
page read and write
36C0235C000
trusted library allocation
page read and write
B0F47FE000
unkown
page readonly
1B0DDB50000
trusted library section
page read and write
7E04000
heap
page read and write
36C0252C000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
7341000
heap
page read and write
7A30000
direct allocation
page execute and read and write
36C026E7000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
B40000
unkown
page readonly
36C024AE000
trusted library allocation
page read and write
6C1F9000
unkown
page read and write
7341000
heap
page read and write
36C02E48000
trusted library allocation
page read and write
2000002C0000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
7341000
heap
page read and write
36C024C9000
trusted library allocation
page read and write
36C02EDC000
trusted library allocation
page read and write
104E000
heap
page read and write
36C02B90000
trusted library allocation
page read and write
36C02EB0000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
2000002D8000
trusted library allocation
page read and write
6C0D1000
unkown
page execute read
8468000
heap
page read and write
29740040C000
trusted library allocation
page read and write
8274000
heap
page read and write
36C02F80000
trusted library allocation
page read and write
1B0DD5EB000
heap
page read and write
7341000
heap
page read and write
7F0000
heap
page read and write
36C0277C000
trusted library allocation
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
36C0246C000
trusted library allocation
page read and write
297400688000
trusted library allocation
page read and write
297400368000
trusted library allocation
page read and write
7341000
heap
page read and write
2000002B0000
trusted library allocation
page read and write
36C02E48000
trusted library allocation
page read and write
1B0DA213000
heap
page read and write
36C02D74000
trusted library allocation
page read and write
297400658000
trusted library allocation
page read and write
8368000
heap
page read and write
36C03050000
trusted library allocation
page read and write
83E3000
heap
page read and write
1B0DD5E7000
heap
page read and write
36C02944000
trusted library allocation
page read and write
1B0DD5E4000
heap
page read and write
297400610000
trusted library allocation
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
36C02F34000
trusted library allocation
page read and write
84AA000
heap
page read and write
1B0DD5FC000
heap
page read and write
36C02430000
trusted library allocation
page read and write
36C0278C000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
21A9000
heap
page read and write
136000217000
direct allocation
page read and write
1B0DFFA2000
heap
page read and write
1B0DA255000
heap
page read and write
7A30000
direct allocation
page execute and read and write
1B0DD604000
heap
page read and write
2000002BC000
trusted library allocation
page read and write
B0CEFFE000
stack
page read and write
297400374000
trusted library allocation
page read and write
36C0221C000
trusted library allocation
page read and write
1B0DD5EE000
heap
page read and write
8273000
heap
page read and write
36C02418000
trusted library allocation
page read and write
8158000
heap
page read and write
7341000
heap
page read and write
36C02FB8000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
36C023B4000
trusted library allocation
page read and write
B0FBFFE000
stack
page read and write
36C0290C000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
1B0DD609000
heap
page read and write
36C02CD8000
trusted library allocation
page read and write
B0CE7FE000
unkown
page readonly
1B0DD5FE000
heap
page read and write
7341000
heap
page read and write
1B0DD5EB000
heap
page read and write
36C02DD4000
trusted library allocation
page read and write
1FB4000
heap
page read and write
F08000
heap
page read and write
36C02FF0000
trusted library allocation
page read and write
B51000
unkown
page readonly
7341000
heap
page read and write
1FB4000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
2974002F4000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
7341000
heap
page read and write
36C02410000
trusted library allocation
page read and write
7341000
heap
page read and write
36C03054000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
7341000
heap
page read and write
20D0000
direct allocation
page read and write
6C1AD000
unkown
page read and write
297400401000
trusted library allocation
page read and write
B40000
unkown
page readonly
29740033C000
trusted library allocation
page read and write
36C02F90000
trusted library allocation
page read and write
36C02EEC000
trusted library allocation
page read and write
D5C000
stack
page read and write
136000210000
direct allocation
page read and write
1B0DD5F0000
heap
page read and write
846F000
heap
page read and write
36C02398000
trusted library allocation
page read and write
837D000
heap
page read and write
7341000
heap
page read and write
36C024A4000
trusted library allocation
page read and write
7E0000
heap
page read and write
7341000
heap
page read and write
1B0DD609000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
B0F2FFD000
stack
page read and write
7341000
heap
page read and write
1B0DD609000
heap
page read and write
7A30000
direct allocation
page execute and read and write
297400248000
trusted library allocation
page read and write
84DA000
heap
page read and write
7341000
heap
page read and write
36C003F4000
trusted library allocation
page read and write
297400724000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
335E000
stack
page read and write
297400238000
trusted library allocation
page read and write
36C00B06000
trusted library allocation
page read and write
7341000
heap
page read and write
36C0252C000
trusted library allocation
page read and write
36C02D20000
trusted library allocation
page read and write
7341000
heap
page read and write
297400704000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
B4E000
unkown
page write copy
7341000
heap
page read and write
36C02AAC000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
7341000
heap
page read and write
1B0DD5FE000
heap
page read and write
215B000
heap
page read and write
36C02DB4000
trusted library allocation
page read and write
B0DE7FE000
unkown
page readonly
1B0DD604000
heap
page read and write
1B0DD609000
heap
page read and write
1B0DD60A000
heap
page read and write
36C02D04000
trusted library allocation
page read and write
1B0DD5F8000
heap
page read and write
7341000
heap
page read and write
36C02ADC000
trusted library allocation
page read and write
36C02E24000
trusted library allocation
page read and write
36C023E4000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DD5FC000
heap
page read and write
B51000
unkown
page readonly
36C02500000
trusted library allocation
page read and write
36C023AC000
trusted library allocation
page read and write
1B0DD628000
heap
page read and write
7341000
heap
page read and write
36C02C01000
trusted library allocation
page read and write
7341000
heap
page read and write
841F000
heap
page read and write
36C0234C000
trusted library allocation
page read and write
2974006C8000
trusted library allocation
page read and write
1FB4000
heap
page read and write
297400601000
trusted library allocation
page read and write
7341000
heap
page read and write
200000288000
trusted library allocation
page read and write
36C0225A000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DDA50000
trusted library section
page read and write
B0E2FFE000
unkown
page readonly
36C024AE000
trusted library allocation
page read and write
36C02A98000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
36C00801000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
1B0DD609000
heap
page read and write
36C02BD0000
trusted library allocation
page read and write
297400320000
trusted library allocation
page read and write
297400320000
trusted library allocation
page read and write
21AC000
heap
page read and write
2000002A0000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
36C02E6C000
trusted library allocation
page read and write
36C02A50000
trusted library allocation
page read and write
36C023EC000
trusted library allocation
page read and write
7341000
heap
page read and write
36C023F0000
trusted library allocation
page read and write
B0D67FE000
unkown
page readonly
1B0DD5FE000
heap
page read and write
7341000
heap
page read and write
1B0DD5EB000
heap
page read and write
7341000
heap
page read and write
36C024A8000
trusted library allocation
page read and write
B41000
unkown
page execute read
1B0DD604000
heap
page read and write
1B0DFFCB000
heap
page read and write
1B0DD5FE000
heap
page read and write
1B0E3700000
heap
page read and write
2FCE000
unkown
page read and write
77C0000
direct allocation
page read and write
83CF000
heap
page read and write
1B0DD604000
heap
page read and write
36C028F8000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
AB0000
heap
page read and write
861D000
heap
page read and write
2974006D0000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
29740020C000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
7341000
heap
page read and write
1FB4000
heap
page read and write
36C02EB0000
trusted library allocation
page read and write
8270000
heap
page read and write
36C0013C000
trusted library allocation
page read and write
136000303000
direct allocation
page read and write
7341000
heap
page read and write
8275000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
B0EFFFD000
stack
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7EE4000
direct allocation
page read and write
136000270000
direct allocation
page read and write
7341000
heap
page read and write
CF1000
unkown
page execute and write copy
297400684000
trusted library allocation
page read and write
B0F57FE000
unkown
page readonly
36C0280C000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
8344000
heap
page read and write
36C02E98000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
1B0DD604000
heap
page read and write
2190000
heap
page read and write
7341000
heap
page read and write
1097000
heap
page read and write
827A000
heap
page read and write
36C02914000
trusted library allocation
page read and write
1B0DD60D000
heap
page read and write
1B0DD5EB000
heap
page read and write
B0EA7FE000
unkown
page readonly
1B0E432E000
trusted library section
page read and write
6C0D0000
unkown
page readonly
36C0303C000
trusted library allocation
page read and write
36C02888000
trusted library allocation
page read and write
297400250000
trusted library allocation
page read and write
7CE1000
heap
page read and write
7341000
heap
page read and write
36C02CAC000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
1B0DA09E000
heap
page read and write
1090000
heap
page read and write
8272000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
1B0E38D0000
heap
page read and write
1B0DD60A000
heap
page read and write
36C02E5C000
trusted library allocation
page read and write
7341000
heap
page read and write
29740085C000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
36C02401000
trusted library allocation
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
1B0DD609000
heap
page read and write
B0E5FFC000
stack
page read and write
7B4C000
heap
page read and write
36C0285C000
trusted library allocation
page read and write
2974002B0000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
1B0DDC86000
heap
page read and write
1360002D0000
direct allocation
page read and write
7C30000
heap
page read and write
827F000
heap
page read and write
1B0DD5FC000
heap
page read and write
1B0DD5E7000
heap
page read and write
36C024AE000
trusted library allocation
page read and write
29740035C000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02D90000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
1B0DD5F0000
heap
page read and write
841C000
heap
page read and write
7341000
heap
page read and write
1B0DD609000
heap
page read and write
835C000
heap
page read and write
20D0000
direct allocation
page read and write
200000230000
trusted library allocation
page read and write
7341000
heap
page read and write
8322000
heap
page read and write
1B0DD5FE000
heap
page read and write
B0E9FFE000
stack
page read and write
2F80000
heap
page read and write
3430000
heap
page read and write
7B99000
heap
page read and write
7341000
heap
page read and write
827C000
heap
page read and write
B0CCFF1000
stack
page read and write
36C02718000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
8276000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
200000294000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DA200000
trusted library section
page readonly
136000250000
direct allocation
page read and write
7341000
heap
page read and write
1FB4000
heap
page read and write
36C02601000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
2F1A000
stack
page read and write
36C02628000
trusted library allocation
page read and write
8560000
heap
page read and write
8423000
heap
page read and write
1B0DD5EB000
heap
page read and write
297400770000
trusted library allocation
page read and write
1B0DD628000
heap
page read and write
84E4000
heap
page read and write
1B0DD609000
heap
page read and write
1B0D9FA0000
heap
page read and write
1FB4000
heap
page read and write
B0EAFFB000
stack
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7FC000
stack
page read and write
1B0DDCDB000
heap
page read and write
36C024E0000
trusted library allocation
page read and write
7341000
heap
page read and write
21A3000
heap
page read and write
1B0DD604000
heap
page read and write
B0D77FE000
unkown
page readonly
7341000
heap
page read and write
36C024A8000
trusted library allocation
page read and write
7341000
heap
page read and write
104A000
heap
page read and write
1B0DDC21000
heap
page read and write
1B0DD5FC000
heap
page read and write
7A30000
direct allocation
page execute and read and write
1B0DD60A000
heap
page read and write
36C02560000
trusted library allocation
page read and write
B4E000
unkown
page write copy
1B0DD604000
heap
page read and write
F00000
heap
page read and write
7341000
heap
page read and write
36C027DC000
trusted library allocation
page read and write
297400348000
trusted library allocation
page read and write
1B0DD5E7000
heap
page read and write
1B0DD609000
heap
page read and write
29740027C000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
1B0DD5FE000
heap
page read and write
1B0DD609000
heap
page read and write
1B0DD5E5000
heap
page read and write
36C00401000
trusted library allocation
page read and write
845A000
heap
page read and write
7341000
heap
page read and write
36C025EC000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
136000280000
direct allocation
page read and write
1B0DD604000
heap
page read and write
1FB4000
heap
page read and write
7341000
heap
page read and write
36C02514000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
297400624000
trusted library allocation
page read and write
7341000
heap
page read and write
1FB4000
heap
page read and write
1B0DD609000
heap
page read and write
36C02538000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DD5F0000
heap
page read and write
36C02543000
trusted library allocation
page read and write
B51000
unkown
page readonly
2194000
heap
page read and write
1B0DD60A000
heap
page read and write
1B0DD5E5000
heap
page read and write
2FD0000
heap
page read and write
297400364000
trusted library allocation
page read and write
7341000
heap
page read and write
7A00000
trusted library allocation
page read and write
1360002EC000
direct allocation
page read and write
6C1AF000
unkown
page readonly
7A30000
direct allocation
page execute and read and write
83E4000
heap
page read and write
2000002BC000
trusted library allocation
page read and write
36C02EC0000
trusted library allocation
page read and write
29740025C000
trusted library allocation
page read and write
200000220000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
36C02434000
trusted library allocation
page read and write
7341000
heap
page read and write
36C00432000
trusted library allocation
page read and write
297400390000
trusted library allocation
page read and write
36C02A28000
trusted library allocation
page read and write
1FB4000
heap
page read and write
2000002C0000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
7341000
heap
page read and write
36C02244000
trusted library allocation
page read and write
B4E000
unkown
page write copy
7341000
heap
page read and write
B0D97FE000
unkown
page readonly
827D000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
36C02FD0000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DD617000
heap
page read and write
1B0DDC31000
heap
page read and write
20000020C000
trusted library allocation
page read and write
297400788000
trusted library allocation
page read and write
7341000
heap
page read and write
21A3000
heap
page read and write
7341000
heap
page read and write
1B0E3CF0000
trusted library section
page read and write
B0EEFFC000
stack
page read and write
21A2000
heap
page read and write
7341000
heap
page read and write
36C02FE8000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
7A30000
direct allocation
page execute and read and write
7341000
heap
page read and write
7EE6000
direct allocation
page read and write
36C02E7C000
trusted library allocation
page read and write
1B0DDDC0000
trusted library section
page read and write
2000002BC000
trusted library allocation
page read and write
29740060C000
trusted library allocation
page read and write
827D000
heap
page read and write
36C02F40000
trusted library allocation
page read and write
B0F0FFE000
stack
page read and write
36C030D8000
trusted library allocation
page read and write
36C030F4000
trusted library allocation
page read and write
36C023F8000
trusted library allocation
page read and write
36C02FAC000
trusted library allocation
page read and write
1B0DD5F0000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
36C030EC000
trusted library allocation
page read and write
36C02334000
trusted library allocation
page read and write
36C023AC000
trusted library allocation
page read and write
36C02C1C000
trusted library allocation
page read and write
16F0000
heap
page read and write
343B000
heap
page read and write
200000201000
trusted library allocation
page read and write
1B0D9F90000
heap
page readonly
B0ECFFE000
stack
page read and write
36C02F5C000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
7341000
heap
page read and write
B0F6FFE000
stack
page read and write
7341000
heap
page read and write
297400320000
trusted library allocation
page read and write
36C007F8000
trusted library allocation
page read and write
36C0289B000
trusted library allocation
page read and write
7341000
heap
page read and write
36C0276C000
trusted library allocation
page read and write
8272000
heap
page read and write
B0E27FA000
stack
page read and write
B0DB7FE000
unkown
page readonly
200000248000
trusted library allocation
page read and write
6C1F8000
unkown
page readonly
36C0287C000
trusted library allocation
page read and write
B4A000
unkown
page readonly
297400668000
trusted library allocation
page read and write
AC0000
heap
page read and write
7341000
heap
page read and write
1FB4000
heap
page read and write
36C02B4C000
trusted library allocation
page read and write
297400330000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DD5FE000
heap
page read and write
2000002F8000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
20D0000
direct allocation
page read and write
7DE5000
heap
page read and write
1B0E1AD2000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
B4A000
unkown
page readonly
8604000
heap
page read and write
36C02AF0000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
36C02DAC000
trusted library allocation
page read and write
E40000
heap
page read and write
1B0DD609000
heap
page read and write
36C023D8000
trusted library allocation
page read and write
7341000
heap
page read and write
7B9C000
heap
page read and write
36C025EC000
trusted library allocation
page read and write
36C02490000
trusted library allocation
page read and write
36C0237C000
trusted library allocation
page read and write
7341000
heap
page read and write
2974007B4000
trusted library allocation
page read and write
297400750000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
36C027EC000
trusted library allocation
page read and write
1B0DDC9D000
heap
page read and write
7341000
heap
page read and write
1B0DD60E000
heap
page read and write
36C03084000
trusted library allocation
page read and write
36C02E98000
trusted library allocation
page read and write
36C02580000
trusted library allocation
page read and write
297400718000
trusted library allocation
page read and write
6C1FC000
unkown
page readonly
7B31000
heap
page read and write
8506000
heap
page read and write
7341000
heap
page read and write
2974006E4000
trusted library allocation
page read and write
B0D37FE000
unkown
page readonly
7341000
heap
page read and write
36C02C2C000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
1B0DD5FE000
heap
page read and write
136000284000
direct allocation
page read and write
1B0DD604000
heap
page read and write
7341000
heap
page read and write
36C02708000
trusted library allocation
page read and write
297400220000
trusted library allocation
page read and write
7341000
heap
page read and write
78C000
stack
page read and write
17B7000
unkown
page execute and write copy
36C023B4000
trusted library allocation
page read and write
2974002FC000
trusted library allocation
page read and write
36C02E3C000
trusted library allocation
page read and write
218D000
heap
page read and write
1B0DD604000
heap
page read and write
8A27000
heap
page read and write
7341000
heap
page read and write
297400620000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
136000274000
direct allocation
page read and write
36C0309C000
trusted library allocation
page read and write
13600023C000
direct allocation
page read and write
36C0220C000
trusted library allocation
page read and write
7341000
heap
page read and write
2974002CC000
trusted library allocation
page read and write
36C0254C000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
7E00000
heap
page read and write
1B0DD604000
heap
page read and write
36C02F4C000
trusted library allocation
page read and write
1B0DD5EE000
heap
page read and write
B0D3FFB000
stack
page read and write
1B0DD604000
heap
page read and write
36C02201000
trusted library allocation
page read and write
84BE000
heap
page read and write
36C02988000
trusted library allocation
page read and write
297400694000
trusted library allocation
page read and write
D5F000
stack
page read and write
7341000
heap
page read and write
B41000
unkown
page execute read
B41000
unkown
page execute read
1B0DD5FE000
heap
page read and write
2974006F0000
trusted library allocation
page read and write
36C00601000
trusted library allocation
page read and write
1B0DD5F0000
heap
page read and write
B0D17FE000
unkown
page readonly
36C030D0000
trusted library allocation
page read and write
7341000
heap
page read and write
36C00E01000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
1B0DD5F8000
heap
page read and write
200000235000
trusted library allocation
page read and write
36C02414000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
36C023C4000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
B0E67FE000
unkown
page readonly
1B0DD604000
heap
page read and write
B0FA7FE000
unkown
page readonly
297400664000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
36C00F56000
trusted library allocation
page read and write
83AB000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
1FB4000
heap
page read and write
8275000
heap
page read and write
1B0DD5FC000
heap
page read and write
2132000
heap
page read and write
36C0275C000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02955000
trusted library allocation
page read and write
2000002A0000
trusted library allocation
page read and write
8272000
heap
page read and write
136000260000
direct allocation
page read and write
83B7000
heap
page read and write
7341000
heap
page read and write
2974006AC000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
1B0DD5F8000
heap
page read and write
7341000
heap
page read and write
36C02684000
trusted library allocation
page read and write
8278000
heap
page read and write
7B31000
heap
page read and write
36C02D68000
trusted library allocation
page read and write
1FB4000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
36C023B4000
trusted library allocation
page read and write
8277000
heap
page read and write
36C02F0C000
trusted library allocation
page read and write
1B0DD608000
heap
page read and write
8279000
heap
page read and write
36C0242C000
trusted library allocation
page read and write
7341000
heap
page read and write
36C0281C000
trusted library allocation
page read and write
B30000
heap
page read and write
2000002BC000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02328000
trusted library allocation
page read and write
7341000
heap
page read and write
8275000
heap
page read and write
36C029B8000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
297400330000
trusted library allocation
page read and write
1B0DDE47000
unclassified section
page read and write
B0D07FE000
unkown
page readonly
B0DF7FE000
unkown
page readonly
B40000
unkown
page readonly
8327000
heap
page read and write
B0E77FE000
unkown
page readonly
1B0DD609000
heap
page read and write
7341000
heap
page read and write
8447000
heap
page read and write
297400714000
trusted library allocation
page read and write
2000002BC000
trusted library allocation
page read and write
297400744000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
1B0DD5EB000
heap
page read and write
1B0DD604000
heap
page read and write
136000234000
direct allocation
page read and write
1360002AC000
direct allocation
page read and write
36C0228F000
trusted library allocation
page read and write
1B0DA1A0000
heap
page read and write
36C02E44000
trusted library allocation
page read and write
1B0DD5EE000
heap
page read and write
36C02957000
trusted library allocation
page read and write
8317000
heap
page read and write
1B0DFFE5000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
36C03029000
trusted library allocation
page read and write
36C02F74000
trusted library allocation
page read and write
36C02C78000
trusted library allocation
page read and write
858E000
heap
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
13600020C000
direct allocation
page read and write
36C02C70000
trusted library allocation
page read and write
83EC000
heap
page read and write
7A30000
direct allocation
page execute and read and write
2000002C8000
trusted library allocation
page read and write
36C023A0000
trusted library allocation
page read and write
36C02B30000
trusted library allocation
page read and write
7341000
heap
page read and write
1360002E4000
direct allocation
page read and write
8319000
heap
page read and write
2186000
heap
page read and write
36C029A1000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
827C000
heap
page read and write
2974006E0000
trusted library allocation
page read and write
85EB000
heap
page read and write
1B0DD5FC000
heap
page read and write
7341000
heap
page read and write
1B0DDCCD000
heap
page read and write
297400380000
trusted library allocation
page read and write
297400630000
trusted library allocation
page read and write
7341000
heap
page read and write
843C000
heap
page read and write
7341000
heap
page read and write
1B0DD5C0000
heap
page read and write
2000002F4000
trusted library allocation
page read and write
3670000
heap
page read and write
9F0000
heap
page read and write
1B0DD5FC000
heap
page read and write
36C03030000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
7A30000
direct allocation
page execute and read and write
B0F07FE000
unkown
page readonly
1B0DD609000
heap
page read and write
36C023D4000
trusted library allocation
page read and write
B0F87FE000
unkown
page readonly
29740080C000
trusted library allocation
page read and write
B51000
unkown
page readonly
B51000
unkown
page readonly
297400424000
trusted library allocation
page read and write
34C000
stack
page read and write
36C026E0000
trusted library allocation
page read and write
36C02ECC000
trusted library allocation
page read and write
36C024EB000
trusted library allocation
page read and write
2974006EC000
trusted library allocation
page read and write
36C02F9C000
trusted library allocation
page read and write
1B0DD830000
heap
page read and write
7341000
heap
page read and write
1B0E36A7000
unclassified section
page read and write
36C024B8000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02EA8000
trusted library allocation
page read and write
36C023DC000
trusted library allocation
page read and write
36C02BEC000
trusted library allocation
page read and write
7341000
heap
page read and write
21A3000
heap
page read and write
36C02A01000
trusted library allocation
page read and write
AD0000
heap
page read and write
36C0301F000
trusted library allocation
page read and write
7341000
heap
page read and write
B0EE7FE000
unkown
page readonly
1B0E3677000
unclassified section
page read and write
1B0DD604000
heap
page read and write
7A30000
direct allocation
page execute and read and write
B4E000
unkown
page read and write
1B0E4320000
trusted library section
page read and write
1B0DD604000
heap
page read and write
7341000
heap
page read and write
1B0DDC83000
heap
page read and write
36C02C0C000
trusted library allocation
page read and write
36C029AC000
trusted library allocation
page read and write
7A10000
direct allocation
page execute and read and write
B0E7FFC000
stack
page read and write
B0E4FFC000
stack
page read and write
36C02D28000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
83FC000
heap
page read and write
36C030E0000
trusted library allocation
page read and write
7341000
heap
page read and write
36C030B8000
trusted library allocation
page read and write
1B0DDCC5000
heap
page read and write
36C023E0000
trusted library allocation
page read and write
2974007CC000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02CF4000
trusted library allocation
page read and write
85C7000
heap
page read and write
3EE000
stack
page read and write
1B0DD5FE000
heap
page read and write
36C0305C000
trusted library allocation
page read and write
2187000
heap
page read and write
B0CDFFE000
unkown
page read and write
36C024A4000
trusted library allocation
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
863B000
heap
page read and write
7A20000
direct allocation
page execute and read and write
36C02EE0000
trusted library allocation
page read and write
B4A000
unkown
page readonly
B4A000
unkown
page readonly
1B0DD5FE000
heap
page read and write
1B0DDCF0000
heap
page read and write
1B0E40FE000
trusted library section
page read and write
297400784000
trusted library allocation
page read and write
36C00A01000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
2974006C4000
trusted library allocation
page read and write
8511000
heap
page read and write
1B0DD5FC000
heap
page read and write
870000
heap
page read and write
B0EC7FE000
unkown
page readonly
7341000
heap
page read and write
B0E07FE000
unkown
page readonly
7341000
heap
page read and write
36C029C4000
trusted library allocation
page read and write
36C02540000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
1B0DA1C0000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
3F50000
direct allocation
page read and write
B0F37FE000
unkown
page readonly
B0E47FE000
unkown
page readonly
29740078C000
trusted library allocation
page read and write
36C028FC000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
1B0DD5F8000
heap
page read and write
2000002C0000
trusted library allocation
page read and write
B0E1FFB000
stack
page read and write
36C030C8000
trusted library allocation
page read and write
B0EDFFE000
stack
page read and write
B51000
unkown
page readonly
1B0DD5F0000
heap
page read and write
B0D87FE000
unkown
page readonly
8271000
heap
page read and write
36C024F0000
trusted library allocation
page read and write
B0E87FE000
unkown
page readonly
7341000
heap
page read and write
8278000
heap
page read and write
1B0DD628000
heap
page read and write
1FB4000
heap
page read and write
36C02B18000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
8271000
heap
page read and write
1B0DD609000
heap
page read and write
7341000
heap
page read and write
8436000
heap
page read and write
B51000
unkown
page readonly
339F000
stack
page read and write
297400201000
trusted library allocation
page read and write
B40000
unkown
page readonly
1B0DD5FE000
heap
page read and write
B0CFFFE000
stack
page read and write
36C023F4000
trusted library allocation
page read and write
36C02540000
trusted library allocation
page read and write
7341000
heap
page read and write
2000002BC000
trusted library allocation
page read and write
297400430000
trusted library allocation
page read and write
2EDD000
stack
page read and write
8276000
heap
page read and write
1B0DD5F0000
heap
page read and write
36C0260C000
trusted library allocation
page read and write
36C008C6000
trusted library allocation
page read and write
297400320000
trusted library allocation
page read and write
8071000
heap
page read and write
36C00001000
trusted library allocation
page read and write
7341000
heap
page read and write
9F0000
heap
page read and write
A00000
heap
page read and write
7341000
heap
page read and write
1B0DD608000
heap
page read and write
36C02CC8000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DD5FC000
heap
page read and write
36C03070000
trusted library allocation
page read and write
B0F17FE000
unkown
page readonly
8271000
heap
page read and write
1360002A8000
direct allocation
page read and write
8274000
heap
page read and write
2000002B0000
trusted library allocation
page read and write
B4A000
unkown
page readonly
1B0DD60A000
heap
page read and write
1B0DD5EB000
heap
page read and write
1B0DDC0C000
heap
page read and write
1B0DD604000
heap
page read and write
36C02318000
trusted library allocation
page read and write
36C00C01000
trusted library allocation
page read and write
29740035C000
trusted library allocation
page read and write
2974002D4000
trusted library allocation
page read and write
200000250000
trusted library allocation
page read and write
1B0DA042000
heap
page read and write
1B0DD609000
heap
page read and write
20D0000
direct allocation
page read and write
36C0236C000
trusted library allocation
page read and write
36C024C4000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
7341000
heap
page read and write
B0DBFFE000
stack
page read and write
36C00678000
trusted library allocation
page read and write
B0F77FE000
unkown
page readonly
8340000
heap
page read and write
B0D7FFB000
stack
page read and write
8274000
heap
page read and write
B0D57FE000
unkown
page readonly
2000002C0000
trusted library allocation
page read and write
29740033C000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
29740069C000
trusted library allocation
page read and write
8398000
heap
page read and write
853F000
heap
page read and write
7341000
heap
page read and write
36C02D68000
trusted library allocation
page read and write
B0E6FFB000
stack
page read and write
36C02D84000
trusted library allocation
page read and write
8400000
heap
page read and write
1B0DA250000
heap
page read and write
136000230000
direct allocation
page read and write
36C02E78000
trusted library allocation
page read and write
1B0DD60A000
heap
page read and write
36C02BBC000
trusted library allocation
page read and write
7341000
heap
page read and write
20D0000
direct allocation
page read and write
7341000
heap
page read and write
B0F7FFA000
stack
page read and write
B0D6FFD000
stack
page read and write
1B0DD5F0000
heap
page read and write
B4A000
unkown
page readonly
1B0DD5FE000
heap
page read and write
B0ED7FE000
unkown
page readonly
1B0DD5D0000
heap
page read and write
1B0DD609000
heap
page read and write
1B0DD60A000
heap
page read and write
36C03018000
trusted library allocation
page read and write
1B0DD604000
heap
page read and write
36C0287C000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02CCC000
trusted library allocation
page read and write
7341000
heap
page read and write
8274000
heap
page read and write
1B0DD5FE000
heap
page read and write
36C0298A000
trusted library allocation
page read and write
7341000
heap
page read and write
14B0000
heap
page read and write
36C00D2E000
trusted library allocation
page read and write
859F000
heap
page read and write
1B0DD5FE000
heap
page read and write
36C03068000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
83E000
stack
page read and write
2194000
heap
page read and write
3F0000
heap
page read and write
36C02B24000
trusted library allocation
page read and write
36C02C4C000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0D9F80000
heap
page read and write
1B0DD5FC000
heap
page read and write
7A30000
direct allocation
page execute and read and write
B0DFFFE000
stack
page read and write
36C02618000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
1B0DD5F0000
heap
page read and write
136000294000
direct allocation
page read and write
2974006CC000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02A0C000
trusted library allocation
page read and write
36C02888000
trusted library allocation
page read and write
1B0D9FA8000
heap
page read and write
1B0DD609000
heap
page read and write
83C3000
heap
page read and write
7341000
heap
page read and write
36C028A0000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
83BD000
heap
page read and write
8359000
heap
page read and write
20D0000
direct allocation
page read and write
B0F27FE000
unkown
page readonly
297400754000
trusted library allocation
page read and write
297400700000
trusted library allocation
page read and write
20D0000
direct allocation
page read and write
36C01001000
trusted library allocation
page read and write
36C02274000
trusted library allocation
page read and write
8376000
heap
page read and write
B0D47FE000
unkown
page readonly
1B0DC780000
unkown
page read and write
7341000
heap
page read and write
1B0DD609000
heap
page read and write
7341000
heap
page read and write
7A30000
direct allocation
page execute and read and write
1B0DA170000
heap
page read and write
297400330000
trusted library allocation
page read and write
2194000
heap
page read and write
36C023B4000
trusted library allocation
page read and write
B0DDFFE000
stack
page read and write
842A000
heap
page read and write
8303000
heap
page read and write
B0EB7FE000
unkown
page readonly
1B0DD604000
heap
page read and write
1B0DD5FC000
heap
page read and write
297400288000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
7A30000
direct allocation
page execute and read and write
B0DAFFE000
stack
page read and write
1B0E000F000
heap
page read and write
36C02E01000
trusted library allocation
page read and write
1FB4000
heap
page read and write
8271000
heap
page read and write
836C000
heap
page read and write
1FB4000
heap
page read and write
7341000
heap
page read and write
297400644000
trusted library allocation
page read and write
36C022A8000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
36C02E0C000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
B0DA7FE000
unkown
page readonly
B41000
unkown
page execute read
36C02D98000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
36C024A4000
trusted library allocation
page read and write
1FB4000
heap
page read and write
2974007C8000
trusted library allocation
page read and write
36C024A8000
trusted library allocation
page read and write
297400310000
trusted library allocation
page read and write
8324000
heap
page read and write
7A30000
direct allocation
page execute and read and write
7341000
heap
page read and write
B0EBFFE000
stack
page read and write
36C0300C000
trusted library allocation
page read and write
7341000
heap
page read and write
B0E57FE000
unkown
page readonly
1B0DD5FE000
heap
page read and write
2974006B8000
trusted library allocation
page read and write
CF0000
unkown
page readonly
36C022E0000
trusted library allocation
page read and write
200000274000
trusted library allocation
page read and write
200000264000
trusted library allocation
page read and write
B0D4FFB000
stack
page read and write
136000215000
direct allocation
page read and write
297400408000
trusted library allocation
page read and write
7A30000
direct allocation
page execute and read and write
B51000
unkown
page readonly
297400654000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02F18000
trusted library allocation
page read and write
36C02868000
trusted library allocation
page read and write
7341000
heap
page read and write
FFC000
stack
page read and write
B0E97FE000
unkown
page readonly
1B0DD5F8000
heap
page read and write
297400418000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
36C022D0000
trusted library allocation
page read and write
36C00201000
trusted library allocation
page read and write
2000002A0000
trusted library allocation
page read and write
1B0DD5F8000
heap
page read and write
B0F67FE000
unkown
page readonly
B41000
unkown
page execute read
83EA000
heap
page read and write
36C02EA8000
trusted library allocation
page read and write
7341000
heap
page read and write
219C000
heap
page read and write
848E000
heap
page read and write
7341000
heap
page read and write
1B0DD5F8000
heap
page read and write
B0F5FFE000
stack
page read and write
B0D9FFE000
stack
page read and write
B0F3FFB000
stack
page read and write
36C02520000
trusted library allocation
page read and write
29740039C000
trusted library allocation
page read and write
36C02428000
trusted library allocation
page read and write
36C02DBC000
trusted library allocation
page read and write
B40000
unkown
page readonly
7A30000
direct allocation
page execute and read and write
7A30000
direct allocation
page execute and read and write
83CE000
heap
page read and write
1B0DDC7F000
heap
page read and write
1B0DD5F8000
heap
page read and write
827A000
heap
page read and write
13600024C000
direct allocation
page read and write
99C000
stack
page read and write
1B0DFFB2000
heap
page read and write
1B0DD609000
heap
page read and write
36C02894000
trusted library allocation
page read and write
36C028B8000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02CB8000
trusted library allocation
page read and write
B0FB7FE000
unkown
page readonly
1B0DD609000
heap
page read and write
7341000
heap
page read and write
36C026A8000
trusted library allocation
page read and write
B4E000
unkown
page read and write
B0D2FFD000
stack
page read and write
36C02574000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
B41000
unkown
page execute read
1B0DD609000
heap
page read and write
839F000
heap
page read and write
1B0DD5FC000
heap
page read and write
7341000
heap
page read and write
297400354000
trusted library allocation
page read and write
B0F9FFC000
stack
page read and write
297400760000
trusted library allocation
page read and write
36C02F68000
trusted library allocation
page read and write
36C024D0000
trusted library allocation
page read and write
36C02A58000
trusted library allocation
page read and write
36C02BAC000
trusted library allocation
page read and write
1B0E38D3000
heap
page read and write
8401000
heap
page read and write
297400730000
trusted library allocation
page read and write
B0FC7FE000
unkown
page readonly
297400230000
trusted library allocation
page read and write
1FB4000
heap
page read and write
36C02BA0000
trusted library allocation
page read and write
1B0DD5FC000
heap
page read and write
1B0DD5FC000
heap
page read and write
7341000
heap
page read and write
36C030B0000
trusted library allocation
page read and write
136000220000
direct allocation
page read and write
7341000
heap
page read and write
7341000
heap
page read and write
1B0DD5FC000
heap
page read and write
8277000
heap
page read and write
2974006FC000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
1B0DD5FE000
heap
page read and write
F5F000
stack
page read and write
7780000
trusted library allocation
page read and write
36C023AC000
trusted library allocation
page read and write
36C02A78000
trusted library allocation
page read and write
B0DD7FE000
unkown
page readonly
1010000
heap
page read and write
36C024A4000
trusted library allocation
page read and write
36C0260F000
trusted library allocation
page read and write
36C0241C000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DA090000
heap
page read and write
1B0DD5FC000
heap
page read and write
36C024B4000
trusted library allocation
page read and write
8271000
heap
page read and write
36C026BC000
trusted library allocation
page read and write
B0D0FFE000
stack
page read and write
3A0000
heap
page read and write
36C00DCC000
trusted library allocation
page read and write
36C02424000
trusted library allocation
page read and write
7341000
heap
page read and write
36C02520000
trusted library allocation
page read and write
2974007D0000
trusted library allocation
page read and write
36C024C4000
trusted library allocation
page read and write
7341000
heap
page read and write
1B0DD5EB000
heap
page read and write
136000201000
direct allocation
page read and write
B0D27FE000
unkown
page readonly
1B0DD5E6000
heap
page read and write
7341000
heap
page read and write
1B0E1AB4000
trusted library allocation
page read and write
297400698000
trusted library allocation
page read and write
1B0DD609000
heap
page read and write
1FB4000
heap
page read and write
2974003EC000
trusted library allocation
page read and write
141A000
unkown
page write copy
2974006E8000
trusted library allocation
page read and write
1B0DD5FE000
heap
page read and write
B4E000
unkown
page write copy
There are 1345 hidden memdumps, click here to show them.