IOC Report
u25XzKsRuY.exe

loading gif

Files

File Path
Type
Category
Malicious
u25XzKsRuY.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u25XzKsRuY.exe_d912b26a4f22b39a1ac63905abfec74ef9af42_012cb695_11be3652-9528-41c9-ba30-4315974fc19c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER92B7.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:33:19 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER946D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94BC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\u25XzKsRuY.exe
"C:\Users\user\Desktop\u25XzKsRuY.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 --field-trial-handle=2132,i,4658029953640130748,9299250250525862020,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7996 -s 1236

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://docs.google.com/spreadsheets/?usp=installed_webapp5
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.youtube.coP
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icoeb
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://chrome.google.com/webstore?hl=en2
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b5
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmlr
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
https://chrome.google.com/webstore3NgtAZQc=
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://chrome.google.com/webstore?hl=enpS
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.132
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.132
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
ProgramId
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
FileId
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
LowerCaseLongPath
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
LongPathHash
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
Name
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
OriginalFileName
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
Publisher
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
Version
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
BinFileVersion
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
BinaryType
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
ProductName
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
ProductVersion
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
LinkDate
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
BinProductVersion
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
AppxPackageFullName
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
AppxPackageRelativeId
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
Size
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
Language
\REGISTRY\A\{ce8c9f51-f34a-a7a5-67ac-987aeb3cf2c3}\Root\InventoryApplicationFile\u25xzksruy.exe|a04114191459ce5a
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6E80000
direct allocation
page execute and read and write
350C003A8000
trusted library allocation
page read and write
AEDA7FA000
stack
page read and write
20E000
unkown
page write copy
AECB7FD000
stack
page read and write
350C000EC000
trusted library allocation
page read and write
350C00401000
trusted library allocation
page read and write
32B000280000
direct allocation
page read and write
78FA000
heap
page read and write
67A1000
heap
page read and write
7162000
heap
page read and write
6E70000
direct allocation
page execute and read and write
79B0000
heap
page read and write
67A1000
heap
page read and write
C8E000
stack
page read and write
6E80000
direct allocation
page execute and read and write
28A46595000
heap
page read and write
6E80000
direct allocation
page execute and read and write
1974000
heap
page read and write
350C00758000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00224000
trusted library allocation
page read and write
350C002A8000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
14F7000
heap
page read and write
28A49F66000
heap
page read and write
350C006D4000
trusted library allocation
page read and write
28A499DD000
heap
page read and write
ECE000
stack
page read and write
67A1000
heap
page read and write
AED2FFE000
unkown
page readonly
AEC87FE000
stack
page read and write
350C00BD8000
trusted library allocation
page read and write
67A1000
heap
page read and write
DC0000
heap
page read and write
67A1000
heap
page read and write
350C004AC000
trusted library allocation
page read and write
350C001E0000
trusted library allocation
page read and write
716A000
heap
page read and write
79FC008E8000
trusted library allocation
page read and write
79FC008D8000
trusted library allocation
page read and write
75C9000
heap
page read and write
9FC000
stack
page read and write
1943000
heap
page read and write
28A4659C000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
350C003A8000
trusted library allocation
page read and write
350C00A84000
trusted library allocation
page read and write
79FC00878000
trusted library allocation
page read and write
350C001F8000
trusted library allocation
page read and write
1798000
heap
page read and write
674002BC000
trusted library allocation
page read and write
28A4FFC0000
trusted library section
page read and write
FF0000
heap
page read and write
79FC00848000
trusted library allocation
page read and write
350C00AB0000
trusted library allocation
page read and write
AED3FFE000
unkown
page readonly
350C00EE4000
trusted library allocation
page read and write
211000
unkown
page readonly
350C0016C000
trusted library allocation
page read and write
1979000
heap
page read and write
350C002C4000
trusted library allocation
page read and write
7166000
heap
page read and write
28A46460000
heap
page read and write
350C00EBC000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
350C00CC8000
trusted library allocation
page read and write
AED4FFE000
unkown
page readonly
1979000
heap
page read and write
75C3000
heap
page read and write
350C00C90000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC008A8000
trusted library allocation
page read and write
B20000
heap
page read and write
AEB6FFE000
unkown
page readonly
350C008A8000
trusted library allocation
page read and write
350C00FA8000
trusted library allocation
page read and write
67A1000
heap
page read and write
F80000
heap
page read and write
28A46546000
heap
page read and write
32B00020C000
direct allocation
page read and write
674002BC000
trusted library allocation
page read and write
79FC006E8000
trusted library allocation
page read and write
776A000
heap
page read and write
350C00D14000
trusted library allocation
page read and write
79FC00401000
trusted library allocation
page read and write
20A000
unkown
page readonly
350C0111C000
trusted library allocation
page read and write
716B000
heap
page read and write
350C00F20000
trusted library allocation
page read and write
824000
heap
page read and write
28A5070E000
trusted library section
page read and write
AED97FD000
stack
page read and write
7163000
heap
page read and write
20A000
unkown
page readonly
67A1000
heap
page read and write
350C00ED4000
trusted library allocation
page read and write
7163000
heap
page read and write
79FC007BC000
trusted library allocation
page read and write
350C00368000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC00788000
trusted library allocation
page read and write
28A4D460000
trusted library allocation
page read and write
824000
heap
page read and write
350C009E4000
trusted library allocation
page read and write
28A4FA07000
unclassified section
page read and write
79FC00898000
trusted library allocation
page read and write
67400201000
trusted library allocation
page read and write
350C0035C000
trusted library allocation
page read and write
211000
unkown
page readonly
350C0020C000
trusted library allocation
page read and write
350C00374000
trusted library allocation
page read and write
350C00BA4000
trusted library allocation
page read and write
AEC97FC000
stack
page read and write
79FC00430000
trusted library allocation
page read and write
350C0081C000
trusted library allocation
page read and write
AECF7FE000
stack
page read and write
75C8000
heap
page read and write
32B00023C000
direct allocation
page read and write
350C00E6C000
trusted library allocation
page read and write
75C5000
heap
page read and write
200000
unkown
page readonly
201000
unkown
page execute read
67A1000
heap
page read and write
28A4FC1E000
trusted library section
page read and write
67A1000
heap
page read and write
211000
unkown
page readonly
67A1000
heap
page read and write
32B000217000
direct allocation
page read and write
67A1000
heap
page read and write
350C00F60000
trusted library allocation
page read and write
AED27FE000
stack
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
350C00ED8000
trusted library allocation
page read and write
201000
unkown
page execute read
32B0002A8000
direct allocation
page read and write
75CD000
heap
page read and write
67A1000
heap
page read and write
716A000
heap
page read and write
75C8000
heap
page read and write
1980000
heap
page read and write
776A000
heap
page read and write
350C00CB4000
trusted library allocation
page read and write
AECC7FB000
stack
page read and write
AEC27FE000
stack
page read and write
1985000
heap
page read and write
79FC0039C000
trusted library allocation
page read and write
7160000
heap
page read and write
67A1000
heap
page read and write
350C0014C000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00D54000
trusted library allocation
page read and write
350C0027C000
trusted library allocation
page read and write
79FC007A0000
trusted library allocation
page read and write
6C840000
unkown
page readonly
350C00FC4000
trusted library allocation
page read and write
A40000
heap
page read and write
67A1000
heap
page read and write
350C00540000
trusted library allocation
page read and write
AED6FFE000
unkown
page readonly
79FC00238000
trusted library allocation
page read and write
79FC007E0000
trusted library allocation
page read and write
28A46584000
heap
page read and write
67400278000
trusted library allocation
page read and write
350C00214000
trusted library allocation
page read and write
350C00680000
trusted library allocation
page read and write
28A49F68000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
75C4000
heap
page read and write
350C012F4000
trusted library allocation
page read and write
79FC002F0000
trusted library allocation
page read and write
824000
heap
page read and write
75CB000
heap
page read and write
AEC1FFE000
unkown
page readonly
79FC00201000
trusted library allocation
page read and write
350C00CE0000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
AECBFFE000
unkown
page readonly
79FC008EC000
trusted library allocation
page read and write
AEDF7FE000
stack
page read and write
79FC008C8000
trusted library allocation
page read and write
350C00CE0000
trusted library allocation
page read and write
350C004CC000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A465A4000
heap
page read and write
3DF000
unkown
page read and write
79FC00601000
trusted library allocation
page read and write
350C0034C000
trusted library allocation
page read and write
79FC002EE000
trusted library allocation
page read and write
350C0015C000
trusted library allocation
page read and write
350C0102C000
trusted library allocation
page read and write
824000
heap
page read and write
7163000
heap
page read and write
350C003A8000
trusted library allocation
page read and write
350C001DC000
trusted library allocation
page read and write
350C00724000
trusted library allocation
page read and write
28A4FD12000
trusted library section
page read and write
28A499C9000
heap
page read and write
350C007B1000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
7897000
heap
page read and write
674002F0000
trusted library allocation
page read and write
350C002A4000
trusted library allocation
page read and write
350C00FE0000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
67A1000
heap
page read and write
1700000
heap
page read and write
350C00744000
trusted library allocation
page read and write
200000
unkown
page readonly
67A1000
heap
page read and write
350C00710000
trusted library allocation
page read and write
28A50626000
trusted library section
page read and write
79FC006C8000
trusted library allocation
page read and write
350C002A4000
trusted library allocation
page read and write
79FC0071C000
trusted library allocation
page read and write
350C00AC8000
trusted library allocation
page read and write
350C001CC000
trusted library allocation
page read and write
AEC5FFE000
unkown
page readonly
200000
unkown
page readonly
824000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
350C00F6C000
trusted library allocation
page read and write
350C007BC000
trusted library allocation
page read and write
67A1000
heap
page read and write
7164000
heap
page read and write
75C3000
heap
page read and write
28A464B8000
heap
page read and write
67A1000
heap
page read and write
674002C0000
trusted library allocation
page read and write
7161000
heap
page read and write
350C00CD4000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
AEC3FFE000
unkown
page readonly
674002D8000
trusted library allocation
page read and write
67A1000
heap
page read and write
AEBDFFE000
unkown
page readonly
79FC002CC000
trusted library allocation
page read and write
716F000
heap
page read and write
67A1000
heap
page read and write
75CE000
heap
page read and write
28A499D6000
heap
page read and write
AECEFFE000
unkown
page readonly
28A49F6A000
heap
page read and write
350C009CB000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
28A49F01000
heap
page read and write
772C000
heap
page read and write
350C00D4C000
trusted library allocation
page read and write
67A1000
heap
page read and write
716C000
heap
page read and write
824000
heap
page read and write
7878000
heap
page read and write
A70000
direct allocation
page read and write
AEB77FB000
stack
page read and write
AED57FD000
stack
page read and write
201000
unkown
page execute read
350C00DD4000
trusted library allocation
page read and write
AEDEFFE000
unkown
page readonly
350C00FC4000
trusted library allocation
page read and write
67A1000
heap
page read and write
20E000
unkown
page read and write
AEDFFFE000
unkown
page readonly
6E80000
direct allocation
page execute and read and write
75C6000
heap
page read and write
350C00E01000
trusted library allocation
page read and write
79FC00948000
trusted library allocation
page read and write
350C00EE4000
trusted library allocation
page read and write
79FC00248000
trusted library allocation
page read and write
350C003F8000
trusted library allocation
page read and write
79FC00404000
trusted library allocation
page read and write
AEDBFFE000
unkown
page readonly
350C0039C000
trusted library allocation
page read and write
350C00704000
trusted library allocation
page read and write
28A49F57000
heap
page read and write
674002BC000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00CA8000
trusted library allocation
page read and write
20E000
unkown
page read and write
67A1000
heap
page read and write
350C0022C000
trusted library allocation
page read and write
350C002F0000
trusted library allocation
page read and write
350C00734000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
79FC002B8000
trusted library allocation
page read and write
20E000
unkown
page write copy
824000
heap
page read and write
28A49E20000
trusted library section
page read and write
350C00F49000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C0039C000
trusted library allocation
page read and write
350C0101C000
trusted library allocation
page read and write
350C00228000
trusted library allocation
page read and write
79FC0040C000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
67A1000
heap
page read and write
79FC00868000
trusted library allocation
page read and write
AEBC7FA000
stack
page read and write
75C8000
heap
page read and write
350C01198000
trusted library allocation
page read and write
716B000
heap
page read and write
201000
unkown
page execute read
28A481C0000
heap
page read and write
350C008E0000
trusted library allocation
page read and write
75C7000
heap
page read and write
28A50583000
trusted library section
page read and write
67A1000
heap
page read and write
32B0002DC000
direct allocation
page read and write
67400238000
trusted library allocation
page read and write
350C002AA000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00220000
trusted library allocation
page read and write
75C0000
heap
page read and write
350C01001000
trusted library allocation
page read and write
28A499E3000
heap
page read and write
674002C0000
trusted library allocation
page read and write
350C00648000
trusted library allocation
page read and write
350C001E8000
trusted library allocation
page read and write
350C00388000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
AEBD7FE000
stack
page read and write
350C00784000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00B3C000
trusted library allocation
page read and write
28A4FBA1000
trusted library section
page read and write
350C00954000
trusted library allocation
page read and write
75CC000
heap
page read and write
67A1000
heap
page read and write
7EC1000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
28A499C9000
heap
page read and write
AECE7FB000
stack
page read and write
79FC00250000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00844000
trusted library allocation
page read and write
67A1000
heap
page read and write
32B0002AC000
direct allocation
page read and write
79FC002C4000
trusted library allocation
page read and write
79FC0027C000
trusted library allocation
page read and write
350C005AC000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
DD0000
heap
page read and write
350C00F49000
trusted library allocation
page read and write
A90000
unkown
page readonly
28A46340000
heap
page read and write
67A1000
heap
page read and write
6E80000
direct allocation
page execute and read and write
AEB2FFE000
unkown
page readonly
6BE0000
trusted library allocation
page read and write
350C00675000
trusted library allocation
page read and write
20A000
unkown
page readonly
350C0001C000
trusted library allocation
page read and write
AEBFFFE000
unkown
page readonly
350C00E4C000
trusted library allocation
page read and write
79FC006AC000
trusted library allocation
page read and write
79FC006BC000
trusted library allocation
page read and write
350C0091C000
trusted library allocation
page read and write
67A1000
heap
page read and write
AECDFFE000
unkown
page readonly
350C00E98000
trusted library allocation
page read and write
674002B0000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C004A4000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
1290000
heap
page read and write
350C004A4000
trusted library allocation
page read and write
67400260000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC00840000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C007A4000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
7754000
heap
page read and write
7163000
heap
page read and write
28A46589000
heap
page read and write
28A481A0000
heap
page read and write
67A1000
heap
page read and write
A70000
direct allocation
page read and write
350C00230000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
7163000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
350C00A4C000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
716B000
heap
page read and write
350C00044000
trusted library allocation
page read and write
674002C0000
trusted library allocation
page read and write
79FC00884000
trusted library allocation
page read and write
79FC002B0000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC0025C000
trusted library allocation
page read and write
674002BC000
trusted library allocation
page read and write
350C01154000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
1965000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
6C20000
direct allocation
page read and write
20E000
unkown
page write copy
AEC2FFE000
unkown
page readonly
153F000
unkown
page execute and write copy
32B000284000
direct allocation
page read and write
350C00DD4000
trusted library allocation
page read and write
71FD000
heap
page read and write
28A49F9B000
heap
page read and write
350C002C7000
trusted library allocation
page read and write
67A1000
heap
page read and write
6E80000
direct allocation
page execute and read and write
28A46595000
heap
page read and write
DFC000
stack
page read and write
28A49F17000
heap
page read and write
79FC00220000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00D8C000
trusted library allocation
page read and write
75CA000
heap
page read and write
350C00520000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
13FC000
stack
page read and write
75C2000
heap
page read and write
350C00FB8000
trusted library allocation
page read and write
350C001C4000
trusted library allocation
page read and write
32B000294000
direct allocation
page read and write
28A50560000
trusted library section
page read and write
28A5095E000
trusted library section
page read and write
28A46780000
heap
page read and write
AEBAFFE000
unkown
page readonly
350C01044000
trusted library allocation
page read and write
28A4DEA2000
trusted library allocation
page read and write
75C8000
heap
page read and write
350C00514000
trusted library allocation
page read and write
350C00DC0000
trusted library allocation
page read and write
350C00801000
trusted library allocation
page read and write
F70000
heap
page read and write
A70000
direct allocation
page read and write
28A49F3A000
heap
page read and write
350C00394000
trusted library allocation
page read and write
67A1000
heap
page read and write
32B000201000
direct allocation
page read and write
79FC006C8000
trusted library allocation
page read and write
67A1000
heap
page read and write
AEB27FE000
stack
page read and write
67A1000
heap
page read and write
350C00074000
trusted library allocation
page read and write
350C00090000
trusted library allocation
page read and write
350C00B90000
trusted library allocation
page read and write
350C0040C000
trusted library allocation
page read and write
11BA000
unkown
page write copy
350C003A8000
trusted library allocation
page read and write
350C00535000
trusted library allocation
page read and write
350C0004C000
trusted library allocation
page read and write
28A50410000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
79FC00850000
trusted library allocation
page read and write
AEC07FE000
stack
page read and write
674002C8000
trusted library allocation
page read and write
777F000
heap
page read and write
350C001B4000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC00700000
trusted library allocation
page read and write
201000
unkown
page execute read
350C00960000
trusted library allocation
page read and write
674002A0000
trusted library allocation
page read and write
6740020C000
trusted library allocation
page read and write
28A499D0000
heap
page read and write
6E80000
direct allocation
page execute and read and write
67A1000
heap
page read and write
28A49EFA000
heap
page read and write
67A1000
heap
page read and write
350C00118000
trusted library allocation
page read and write
350C00C58000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C0087C000
trusted library allocation
page read and write
6C91D000
unkown
page read and write
350C003D8000
trusted library allocation
page read and write
79FC006F0000
trusted library allocation
page read and write
7165000
heap
page read and write
10CF000
stack
page read and write
67A1000
heap
page read and write
67400248000
trusted library allocation
page read and write
211000
unkown
page readonly
350C00E64000
trusted library allocation
page read and write
350C00001000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00418000
trusted library allocation
page read and write
AEDB7FC000
stack
page read and write
1590000
heap
page read and write
A70000
direct allocation
page read and write
350C00A60000
trusted library allocation
page read and write
AEB37FE000
stack
page read and write
67A1000
heap
page read and write
1310000
heap
page read and write
67A1000
heap
page read and write
FE0000
heap
page read and write
773E000
heap
page read and write
6FA1000
heap
page read and write
AEB67FB000
stack
page read and write
350C001F0000
trusted library allocation
page read and write
28A50512000
trusted library section
page read and write
674002A0000
trusted library allocation
page read and write
350C00D7C000
trusted library allocation
page read and write
773D000
heap
page read and write
78B8000
heap
page read and write
32B000270000
direct allocation
page read and write
350C00E18000
trusted library allocation
page read and write
32B0002EC000
direct allocation
page read and write
AEDAFFE000
unkown
page readonly
200000
unkown
page readonly
350C00677000
trusted library allocation
page read and write
6C96C000
unkown
page readonly
20A000
unkown
page readonly
79FC006AC000
trusted library allocation
page read and write
1991000
heap
page read and write
AEB87FE000
stack
page read and write
79FC00844000
trusted library allocation
page read and write
75CB000
heap
page read and write
350C004FC000
trusted library allocation
page read and write
74F000
stack
page read and write
67A1000
heap
page read and write
AECAFFE000
unkown
page readonly
67A1000
heap
page read and write
67400230000
trusted library allocation
page read and write
350C001B4000
trusted library allocation
page read and write
75CD000
heap
page read and write
67A1000
heap
page read and write
75CC000
heap
page read and write
79FC00248000
trusted library allocation
page read and write
79FC00920000
trusted library allocation
page read and write
9F0000
heap
page read and write
67A1000
heap
page read and write
350C002D0000
trusted library allocation
page read and write
67A1000
heap
page read and write
196C000
heap
page read and write
28A501C0000
trusted library section
page read and write
28A4E2D7000
heap
page read and write
7D0000
heap
page read and write
28A4FD50000
trusted library section
page read and write
32B000303000
direct allocation
page read and write
67A1000
heap
page read and write
75C2000
heap
page read and write
28A4FBB0000
heap
page read and write
350C0009C000
trusted library allocation
page read and write
350C009B4000
trusted library allocation
page read and write
79FC002DC000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A49EF2000
heap
page read and write
39E000
unkown
page read and write
350C0000C000
trusted library allocation
page read and write
350C00DA0000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
350C00F00000
trusted library allocation
page read and write
350C00020000
trusted library allocation
page read and write
350C00FB8000
trusted library allocation
page read and write
AEB47FE000
stack
page read and write
28A46584000
heap
page read and write
28A465A3000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
28A50C20000
trusted library section
page read and write
AEC6FFE000
unkown
page readonly
67A1000
heap
page read and write
350C00A01000
trusted library allocation
page read and write
10E0000
heap
page read and write
28A49EFE000
heap
page read and write
350C005EC000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A46750000
trusted library section
page readonly
824000
heap
page read and write
350C002A4000
trusted library allocation
page read and write
79FC00801000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C001B4000
trusted library allocation
page read and write
350C003C8000
trusted library allocation
page read and write
79FC0087C000
trusted library allocation
page read and write
824000
heap
page read and write
79FC008F0000
trusted library allocation
page read and write
67A1000
heap
page read and write
75C6000
heap
page read and write
350C00474000
trusted library allocation
page read and write
350C001A0000
trusted library allocation
page read and write
28A465A0000
heap
page read and write
67A1000
heap
page read and write
AEB8FFE000
unkown
page readonly
6C841000
unkown
page execute read
350C00A24000
trusted library allocation
page read and write
350C00AD4000
trusted library allocation
page read and write
67A1000
heap
page read and write
67400270000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A4FC12000
trusted library section
page read and write
350C00128000
trusted library allocation
page read and write
28A49EF0000
heap
page read and write
20E000
unkown
page write copy
196B000
heap
page read and write
10EE000
heap
page read and write
AEBB7FC000
stack
page read and write
6E80000
direct allocation
page execute and read and write
350C0120C000
trusted library allocation
page read and write
350C001AC000
trusted library allocation
page read and write
79FC00880000
trusted library allocation
page read and write
350C00694000
trusted library allocation
page read and write
79FC008B4000
trusted library allocation
page read and write
67A1000
heap
page read and write
32B000215000
direct allocation
page read and write
AED17FD000
stack
page read and write
350C0097C000
trusted library allocation
page read and write
A30000
heap
page read and write
67A1000
heap
page read and write
350C00CE0000
trusted library allocation
page read and write
AEB4FFE000
unkown
page readonly
67A1000
heap
page read and write
28A46490000
trusted library allocation
page read and write
67A1000
heap
page read and write
AED5FFE000
unkown
page readonly
824000
heap
page read and write
824000
heap
page read and write
7166000
heap
page read and write
350C00D30000
trusted library allocation
page read and write
67A1000
heap
page read and write
AEAF7EF000
stack
page read and write
350C003D8000
trusted library allocation
page read and write
350C012F4000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00FA0000
trusted library allocation
page read and write
67A1000
heap
page read and write
71FB000
heap
page read and write
716D000
heap
page read and write
350C003D8000
trusted library allocation
page read and write
28A499D0000
heap
page read and write
75C1000
heap
page read and write
B58000
heap
page read and write
350C0035C000
trusted library allocation
page read and write
350C00AE8000
trusted library allocation
page read and write
75CF000
heap
page read and write
350C00FF0000
trusted library allocation
page read and write
350C010F8000
trusted library allocation
page read and write
28A4FC73000
trusted library section
page read and write
67A1000
heap
page read and write
7FC1000
heap
page read and write
67A1000
heap
page read and write
28A49F6C000
heap
page read and write
28A46551000
heap
page read and write
350C00D84000
trusted library allocation
page read and write
79FC007E4000
trusted library allocation
page read and write
AEB3FFE000
unkown
page readonly
28A499D5000
heap
page read and write
350C005BC000
trusted library allocation
page read and write
9E0000
heap
page read and write
350C01148000
trusted library allocation
page read and write
350C008E8000
trusted library allocation
page read and write
350C00588000
trusted library allocation
page read and write
824000
heap
page read and write
350C00210000
trusted library allocation
page read and write
350C00ED0000
trusted library allocation
page read and write
2EA000
stack
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
28A49EC6000
heap
page read and write
201000
unkown
page execute read
AEB0FFE000
unkown
page readonly
75C3000
heap
page read and write
211000
unkown
page readonly
67A1000
heap
page read and write
AEC77FC000
stack
page read and write
79FC006AC000
trusted library allocation
page read and write
75C4000
heap
page read and write
350C003EF000
trusted library allocation
page read and write
350C00B50000
trusted library allocation
page read and write
350C00FD4000
trusted library allocation
page read and write
350C005D0000
trusted library allocation
page read and write
79FC008E4000
trusted library allocation
page read and write
97A000
heap
page read and write
20E000
unkown
page read and write
AEBA7FB000
stack
page read and write
AEDDFFE000
unkown
page readonly
75C1000
heap
page read and write
350C0074C000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
350C00DF0000
trusted library allocation
page read and write
AED7FFE000
unkown
page readonly
6E80000
direct allocation
page execute and read and write
350C00C78000
trusted library allocation
page read and write
67A1000
heap
page read and write
716E000
heap
page read and write
A91000
unkown
page execute and write copy
28A50642000
trusted library section
page read and write
79FC00894000
trusted library allocation
page read and write
350C00D0C000
trusted library allocation
page read and write
350C00134000
trusted library allocation
page read and write
350C00C14000
trusted library allocation
page read and write
14F0000
heap
page read and write
AED9FFE000
unkown
page readonly
AEDE7FE000
stack
page read and write
79FC00424000
trusted library allocation
page read and write
350C001AC000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
350C0035C000
trusted library allocation
page read and write
350C00BC8000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC002FC000
trusted library allocation
page read and write
67A1000
heap
page read and write
75C1000
heap
page read and write
350C00C98000
trusted library allocation
page read and write
350C00F54000
trusted library allocation
page read and write
AEDCFFE000
unkown
page readonly
28A46586000
heap
page read and write
A70000
direct allocation
page read and write
350C00ED0000
trusted library allocation
page read and write
28A465AA000
heap
page read and write
79FC0082C000
trusted library allocation
page read and write
75C6000
heap
page read and write
350C00AF8000
trusted library allocation
page read and write
28A4FB87000
unclassified section
page read and write
32B000210000
direct allocation
page read and write
28A49F01000
heap
page read and write
28A49F3E000
heap
page read and write
AEBEFFE000
unkown
page readonly
67A1000
heap
page read and write
75C0000
heap
page read and write
350C00B90000
trusted library allocation
page read and write
674002A0000
trusted library allocation
page read and write
67A1000
heap
page read and write
7717000
heap
page read and write
716C000
heap
page read and write
67A1000
heap
page read and write
79FC00890000
trusted library allocation
page read and write
350C00C3C000
trusted library allocation
page read and write
1975000
heap
page read and write
350C0039C000
trusted library allocation
page read and write
154E000
stack
page read and write
28A46591000
heap
page read and write
28A49EB0000
heap
page read and write
777D000
heap
page read and write
350C001EC000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC00960000
trusted library allocation
page read and write
350C00E0C000
trusted library allocation
page read and write
32B00024C000
direct allocation
page read and write
28A4FD1D000
trusted library section
page read and write
350C00D00000
trusted library allocation
page read and write
350C0018C000
trusted library allocation
page read and write
79FC006E0000
trusted library allocation
page read and write
AEC67FA000
stack
page read and write
350C004A7000
trusted library allocation
page read and write
28A49F73000
heap
page read and write
28A49EBF000
heap
page read and write
67A1000
heap
page read and write
350C01034000
trusted library allocation
page read and write
79FC00210000
trusted library allocation
page read and write
350C00394000
trusted library allocation
page read and write
7344000
direct allocation
page read and write
28A465A8000
heap
page read and write
67A1000
heap
page read and write
28A46591000
heap
page read and write
28A4654A000
heap
page read and write
350C00394000
trusted library allocation
page read and write
350C00D5C000
trusted library allocation
page read and write
350C003A8000
trusted library allocation
page read and write
71E0000
direct allocation
page read and write
674002E4000
trusted library allocation
page read and write
28A499DD000
heap
page read and write
67A1000
heap
page read and write
28A50680000
trusted library section
page read and write
67A1000
heap
page read and write
350000
heap
page read and write
350C00F49000
trusted library allocation
page read and write
201000
unkown
page execute read
350C00C8C000
trusted library allocation
page read and write
350C00D28000
trusted library allocation
page read and write
28A499E3000
heap
page read and write
2AD000
stack
page read and write
67A1000
heap
page read and write
350C00D20000
trusted library allocation
page read and write
75CB000
heap
page read and write
350C00380000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
AED47FE000
stack
page read and write
350C0074C000
trusted library allocation
page read and write
28A46785000
heap
page read and write
350C001AC000
trusted library allocation
page read and write
28A50550000
trusted library section
page read and write
67A1000
heap
page read and write
350C012F4000
trusted library allocation
page read and write
28A4FCB6000
trusted library section
page read and write
67A1000
heap
page read and write
AEBBFFE000
unkown
page readonly
28A46420000
heap
page readonly
350C00F20000
trusted library allocation
page read and write
350C00CE0000
trusted library allocation
page read and write
7166000
heap
page read and write
350C001D0000
trusted library allocation
page read and write
350C009A4000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC0020C000
trusted library allocation
page read and write
67A1000
heap
page read and write
20E000
unkown
page read and write
75C2000
heap
page read and write
20A000
unkown
page readonly
28A4FDC7000
unclassified section
page read and write
AEB5FFE000
unkown
page readonly
3280000
direct allocation
page execute and read and write
67A1000
heap
page read and write
350C0105C000
trusted library allocation
page read and write
28A465A8000
heap
page read and write
350C00484000
trusted library allocation
page read and write
32B000290000
direct allocation
page read and write
79FC0039C000
trusted library allocation
page read and write
7779000
heap
page read and write
79FC0095C000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C01050000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A4FA17000
unclassified section
page read and write
150E000
stack
page read and write
67A1000
heap
page read and write
28A4A220000
trusted library section
page read and write
350C000B4000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
28A4E284000
heap
page read and write
75CA000
heap
page read and write
824000
heap
page read and write
71FD000
heap
page read and write
674002B0000
trusted library allocation
page read and write
775E000
heap
page read and write
350C00C0C000
trusted library allocation
page read and write
AECD7FC000
stack
page read and write
67A1000
heap
page read and write
211000
unkown
page readonly
7160000
heap
page read and write
350C00FB8000
trusted library allocation
page read and write
79FC00418000
trusted library allocation
page read and write
28A49F07000
heap
page read and write
6C91F000
unkown
page readonly
350C00C24000
trusted library allocation
page read and write
28A46480000
trusted library allocation
page read and write
350C0086C000
trusted library allocation
page read and write
350C01160000
trusted library allocation
page read and write
28A49F48000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
79FC0084C000
trusted library allocation
page read and write
350C00304000
trusted library allocation
page read and write
70E000
stack
page read and write
75C2000
heap
page read and write
3E0000
heap
page read and write
79FC0080C000
trusted library allocation
page read and write
350C002B8000
trusted library allocation
page read and write
79FC002EC000
trusted library allocation
page read and write
20A000
unkown
page readonly
79FC00828000
trusted library allocation
page read and write
28A465A0000
heap
page read and write
AEB07FE000
unkown
page read and write
79FC00230000
trusted library allocation
page read and write
350C00DD4000
trusted library allocation
page read and write
1790000
heap
page read and write
75C2000
heap
page read and write
350C00EA0000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00394000
trusted library allocation
page read and write
28A49F4F000
heap
page read and write
67A1000
heap
page read and write
211000
unkown
page readonly
350C00A0C000
trusted library allocation
page read and write
350C00080000
trusted library allocation
page read and write
7FC2000
heap
page read and write
716B000
heap
page read and write
AED67FD000
stack
page read and write
79FC006F4000
trusted library allocation
page read and write
350C00BE8000
trusted library allocation
page read and write
1A8E000
stack
page read and write
F8C000
stack
page read and write
674002B0000
trusted library allocation
page read and write
AECFFFE000
unkown
page readonly
67A1000
heap
page read and write
7FC2000
heap
page read and write
196B000
heap
page read and write
350C006F4000
trusted library allocation
page read and write
11FC000
stack
page read and write
A70000
direct allocation
page read and write
200000
unkown
page readonly
67A1000
heap
page read and write
350C0059C000
trusted library allocation
page read and write
350C01201000
trusted library allocation
page read and write
75C3000
heap
page read and write
D6C000
stack
page read and write
350C003BC000
trusted library allocation
page read and write
350C01084000
trusted library allocation
page read and write
350C00CE0000
trusted library allocation
page read and write
350C0060C000
trusted library allocation
page read and write
AEB97FB000
stack
page read and write
350C00464000
trusted library allocation
page read and write
67A1000
heap
page read and write
E8E000
stack
page read and write
28A4658E000
heap
page read and write
200000
unkown
page readonly
350C01084000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C0006A000
trusted library allocation
page read and write
211000
unkown
page readonly
79FC008C4000
trusted library allocation
page read and write
28A49EF6000
heap
page read and write
350C0020C000
trusted library allocation
page read and write
28A5051E000
trusted library section
page read and write
79FC00964000
trusted library allocation
page read and write
350C00BB8000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A499D6000
heap
page read and write
32B000234000
direct allocation
page read and write
674002F4000
trusted library allocation
page read and write
79FC007D4000
trusted library allocation
page read and write
350C010A8000
trusted library allocation
page read and write
10EA000
heap
page read and write
AEDC7FE000
stack
page read and write
350C0100C000
trusted library allocation
page read and write
AEDD7FE000
stack
page read and write
79FC00288000
trusted library allocation
page read and write
350C0119C000
trusted library allocation
page read and write
350C00710000
trusted library allocation
page read and write
350C010C4000
trusted library allocation
page read and write
7167000
heap
page read and write
350C011A8000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
79FC006D4000
trusted library allocation
page read and write
350C00201000
trusted library allocation
page read and write
350C00FB4000
trusted library allocation
page read and write
350C004F0000
trusted library allocation
page read and write
350C00218000
trusted library allocation
page read and write
14B0000
heap
page read and write
75C9000
heap
page read and write
350C01098000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00C68000
trusted library allocation
page read and write
674002BC000
trusted library allocation
page read and write
772F000
heap
page read and write
350C00BE0000
trusted library allocation
page read and write
1971000
heap
page read and write
350C008C4000
trusted library allocation
page read and write
350C001D4000
trusted library allocation
page read and write
67A1000
heap
page read and write
75C4000
heap
page read and write
67A1000
heap
page read and write
350C00394000
trusted library allocation
page read and write
674002C0000
trusted library allocation
page read and write
1974000
heap
page read and write
771B000
heap
page read and write
350C006DC000
trusted library allocation
page read and write
28A46430000
heap
page read and write
1979000
heap
page read and write
79FC007C0000
trusted library allocation
page read and write
28A464B0000
heap
page read and write
AEC57FB000
stack
page read and write
824000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
AED8FFE000
unkown
page readonly
67A1000
heap
page read and write
350C00394000
trusted library allocation
page read and write
350C00FA0000
trusted library allocation
page read and write
79FC00790000
trusted library allocation
page read and write
67A1000
heap
page read and write
79FC0085C000
trusted library allocation
page read and write
67A1000
heap
page read and write
67400288000
trusted library allocation
page read and write
79FC00864000
trusted library allocation
page read and write
67A1000
heap
page read and write
AED77FE000
stack
page read and write
350C00E68000
trusted library allocation
page read and write
98C000
stack
page read and write
67A1000
heap
page read and write
350C00DE4000
trusted library allocation
page read and write
350C011B4000
trusted library allocation
page read and write
350C002B4000
trusted library allocation
page read and write
67A1000
heap
page read and write
720A000
heap
page read and write
7161000
heap
page read and write
28A499B0000
heap
page read and write
350C00EF0000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
70A0000
trusted library allocation
page read and write
AEC0FFE000
unkown
page readonly
350C002C4000
trusted library allocation
page read and write
350C0034C000
trusted library allocation
page read and write
AECCFFE000
unkown
page readonly
824000
heap
page read and write
79FC00830000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
67A1000
heap
page read and write
350C004A4000
trusted library allocation
page read and write
3260000
direct allocation
page read and write
79FC0091C000
trusted library allocation
page read and write
350C001F4000
trusted library allocation
page read and write
350C002A4000
trusted library allocation
page read and write
1928000
heap
page read and write
350C01178000
trusted library allocation
page read and write
7160000
heap
page read and write
79FC006F4000
trusted library allocation
page read and write
6C969000
unkown
page read and write
350C00F6C000
trusted library allocation
page read and write
350C002A8000
trusted library allocation
page read and write
79FC00974000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C003A8000
trusted library allocation
page read and write
75CB000
heap
page read and write
79FC00778000
trusted library allocation
page read and write
350C00D64000
trusted library allocation
page read and write
350C002FB000
trusted library allocation
page read and write
350C003B4000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C0021C000
trusted library allocation
page read and write
AEB7FFE000
unkown
page readonly
28A49ECE000
heap
page read and write
AEC17FE000
stack
page read and write
350C001E4000
trusted library allocation
page read and write
350C00B30000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
28A4FB20000
heap
page read and write
32B0002D0000
direct allocation
page read and write
79FC00728000
trusted library allocation
page read and write
28A50950000
trusted library section
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
1975000
heap
page read and write
350C00EAC000
trusted library allocation
page read and write
350C00C01000
trusted library allocation
page read and write
AEC9FFE000
unkown
page readonly
32B000274000
direct allocation
page read and write
350C001AC000
trusted library allocation
page read and write
7161000
heap
page read and write
79FC008F4000
trusted library allocation
page read and write
79FC00408000
trusted library allocation
page read and write
350C00300000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
350C00CE0000
trusted library allocation
page read and write
AED07FE000
stack
page read and write
350C002CC000
trusted library allocation
page read and write
5DC000
stack
page read and write
350C00DF0000
trusted library allocation
page read and write
350C00BC0000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
67A1000
heap
page read and write
350C00904000
trusted library allocation
page read and write
AEC37FC000
stack
page read and write
67A1000
heap
page read and write
AED1FFE000
unkown
page readonly
67A1000
heap
page read and write
67A1000
heap
page read and write
AEC8FFE000
unkown
page readonly
350C003A8000
trusted library allocation
page read and write
824000
heap
page read and write
824000
heap
page read and write
67A1000
heap
page read and write
350C00ED8000
trusted library allocation
page read and write
350C00394000
trusted library allocation
page read and write
350C01184000
trusted library allocation
page read and write
A70000
direct allocation
page read and write
350C0098C000
trusted library allocation
page read and write
201000
unkown
page execute read
67A1000
heap
page read and write
350C00D74000
trusted library allocation
page read and write
67A1000
heap
page read and write
970000
heap
page read and write
350C00F60000
trusted library allocation
page read and write
AED87FE000
stack
page read and write
67400220000
trusted library allocation
page read and write
674002BC000
trusted library allocation
page read and write
79FC0060C000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
350C00CF0000
trusted library allocation
page read and write
28A4659C000
heap
page read and write
67A1000
heap
page read and write
350C01100000
trusted library allocation
page read and write
75C7000
heap
page read and write
67A1000
heap
page read and write
350C006A4000
trusted library allocation
page read and write
6E80000
direct allocation
page execute and read and write
6E80000
direct allocation
page execute and read and write
79FC007C4000
trusted library allocation
page read and write
824000
heap
page read and write
350C01264000
trusted library allocation
page read and write
75C7000
heap
page read and write
A70000
direct allocation
page read and write
350C0051A000
trusted library allocation
page read and write
28A48C10000
unkown
page read and write
350C00E30000
trusted library allocation
page read and write
67400294000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C01300000
trusted library allocation
page read and write
200000
unkown
page readonly
350C0080C000
trusted library allocation
page read and write
79FC008B8000
trusted library allocation
page read and write
AEC7FFE000
unkown
page readonly
28A46591000
heap
page read and write
28A499D0000
heap
page read and write
67400250000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C003A8000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00388000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
AEC4FFE000
unkown
page readonly
7916000
heap
page read and write
AEB9FFE000
unkown
page readonly
350C00194000
trusted library allocation
page read and write
28A499D8000
heap
page read and write
79FC007AC000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A4FB90000
trusted library section
page read and write
350C0034C000
trusted library allocation
page read and write
350C002F0000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00DB9000
trusted library allocation
page read and write
350C00ED4000
trusted library allocation
page read and write
1979000
heap
page read and write
3260000
direct allocation
page read and write
C20000
heap
page read and write
350C0106C000
trusted library allocation
page read and write
28A50700000
trusted library section
page read and write
350C00618000
trusted library allocation
page read and write
793B000
heap
page read and write
350C0017C000
trusted library allocation
page read and write
674002A0000
trusted library allocation
page read and write
28A50571000
trusted library section
page read and write
350C00710000
trusted library allocation
page read and write
75CF000
heap
page read and write
28A4E2C3000
heap
page read and write
350C003EC000
trusted library allocation
page read and write
79FC00980000
trusted library allocation
page read and write
67A1000
heap
page read and write
AEB17FF000
stack
page read and write
674002F8000
trusted library allocation
page read and write
716F000
heap
page read and write
350C00B9C000
trusted library allocation
page read and write
79FC0078C000
trusted library allocation
page read and write
824000
heap
page read and write
32B000230000
direct allocation
page read and write
67A1000
heap
page read and write
350C0035C000
trusted library allocation
page read and write
67400235000
trusted library allocation
page read and write
350C00517000
trusted library allocation
page read and write
AEBE7FE000
stack
page read and write
28A49EF4000
heap
page read and write
AEB57FD000
stack
page read and write
79FC00874000
trusted library allocation
page read and write
67A1000
heap
page read and write
67A1000
heap
page read and write
32B000250000
direct allocation
page read and write
75C7000
heap
page read and write
AEBCFFE000
unkown
page readonly
350C0035C000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00E24000
trusted library allocation
page read and write
67400264000
trusted library allocation
page read and write
67A1000
heap
page read and write
28A4657C000
heap
page read and write
70A0000
trusted library allocation
page read and write
28A4FBB3000
heap
page read and write
67A1000
heap
page read and write
28A4A1A0000
trusted library section
page read and write
32B000220000
direct allocation
page read and write
79FC00904000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C002F3000
trusted library allocation
page read and write
32B0002E4000
direct allocation
page read and write
AECA7FC000
stack
page read and write
67A1000
heap
page read and write
79FC0070C000
trusted library allocation
page read and write
67A1000
heap
page read and write
AEBF7FE000
stack
page read and write
350C00B08000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00DD4000
trusted library allocation
page read and write
350C00290000
trusted library allocation
page read and write
28A499D5000
heap
page read and write
67A1000
heap
page read and write
350C00F7C000
trusted library allocation
page read and write
20A000
unkown
page readonly
28A4E289000
heap
page read and write
28A499D5000
heap
page read and write
79FC0081C000
trusted library allocation
page read and write
20A000
unkown
page readonly
824000
heap
page read and write
79FC002F4000
trusted library allocation
page read and write
28A5064D000
trusted library section
page read and write
350C0034C000
trusted library allocation
page read and write
350C00E40000
trusted library allocation
page read and write
716F000
heap
page read and write
79FC00818000
trusted library allocation
page read and write
350C0053B000
trusted library allocation
page read and write
AED37FD000
stack
page read and write
350C01194000
trusted library allocation
page read and write
773A000
heap
page read and write
28A49F64000
heap
page read and write
350C000DC000
trusted library allocation
page read and write
350C01190000
trusted library allocation
page read and write
28A499A0000
heap
page read and write
67400274000
trusted library allocation
page read and write
350C002AA000
trusted library allocation
page read and write
350C01110000
trusted library allocation
page read and write
6E60000
direct allocation
page execute and read and write
350C0035C000
trusted library allocation
page read and write
350C00F7C000
trusted library allocation
page read and write
28A481C3000
heap
page read and write
7719000
heap
page read and write
350C007DC000
trusted library allocation
page read and write
32B000260000
direct allocation
page read and write
79FC00918000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C01264000
trusted library allocation
page read and write
75CA000
heap
page read and write
67A1000
heap
page read and write
350C009D4000
trusted library allocation
page read and write
79FC0079C000
trusted library allocation
page read and write
B50000
heap
page read and write
350C0084C000
trusted library allocation
page read and write
28A4FC00000
trusted library section
page read and write
AEC47FC000
stack
page read and write
350C00E88000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00E7C000
trusted library allocation
page read and write
674002C0000
trusted library allocation
page read and write
7160000
heap
page read and write
79FC00860000
trusted library allocation
page read and write
1971000
heap
page read and write
824000
heap
page read and write
1918000
heap
page read and write
674002BC000
trusted library allocation
page read and write
1998000
heap
page read and write
350C0034C000
trusted library allocation
page read and write
350C00394000
trusted library allocation
page read and write
6FC2000
heap
page read and write
350C00A38000
trusted library allocation
page read and write
67A1000
heap
page read and write
1C8F000
stack
page read and write
350C0112C000
trusted library allocation
page read and write
28A49F7B000
heap
page read and write
7200000
heap
page read and write
350C00910000
trusted library allocation
page read and write
350C006B4000
trusted library allocation
page read and write
67A1000
heap
page read and write
350C00ED8000
trusted library allocation
page read and write
350C001D8000
trusted library allocation
page read and write
6C968000
unkown
page readonly
67A1000
heap
page read and write
350C00660000
trusted library allocation
page read and write
716A000
heap
page read and write
350C00FC4000
trusted library allocation
page read and write
AED0FFE000
unkown
page readonly
67A1000
heap
page read and write
350C000FC000
trusted library allocation
page read and write
79FC006E8000
trusted library allocation
page read and write
67A1000
heap
page read and write
6E80000
direct allocation
page execute and read and write
28A50907000
unclassified section
page read and write
28A4A0C0000
trusted library section
page read and write
350C003D8000
trusted library allocation
page read and write
350C00D98000
trusted library allocation
page read and write
200000
unkown
page readonly
7346000
direct allocation
page read and write
350C00601000
trusted library allocation
page read and write
There are 1271 hidden memdumps, click here to show them.