IOC Report
AD4q0qFvM8.exe

loading gif

Files

File Path
Type
Category
Malicious
AD4q0qFvM8.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_AD4q0qFvM8.exe_3747e555a493e3891907bd6c1eab24f90b9be_0bf36551_61e2a293-a1b6-4a4e-90f2-282960258848\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B8.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 07:55:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER630.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AD4q0qFvM8.exe
"C:\Users\user\Desktop\AD4q0qFvM8.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 --field-trial-handle=2404,i,6825449060728649226,8540860588299111,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6708 -s 1876

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://chrome.google.com/webstore?hl=enyz$
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoresent.
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://chrome.google.com/webstore$
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
https://issuetracker.google.com/166809097tracing.mojom.BackgroundTracingAgentProvider
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.132
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
142.250.181.132
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
ProgramId
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
FileId
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
LowerCaseLongPath
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
LongPathHash
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
Name
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
OriginalFileName
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
Publisher
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
Version
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
BinFileVersion
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
BinaryType
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
ProductName
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
ProductVersion
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
LinkDate
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
BinProductVersion
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
AppxPackageFullName
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
AppxPackageRelativeId
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
Size
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
Language
\REGISTRY\A\{23d3d7b6-033b-9b53-1fc5-a0e1c503dbe5}\Root\InventoryApplicationFile\ad4q0qfvm8.exe|a34aef7133814da5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6911000
heap
page read and write
57200020C000
trusted library allocation
page read and write
40A7DFD000
stack
page read and write
D6E000
unkown
page write copy
14D8000
heap
page read and write
162400EEC000
trusted library allocation
page read and write
40ABDFB000
stack
page read and write
77EB000
heap
page read and write
16240006E000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
162400E0C000
trusted library allocation
page read and write
40AEDFE000
stack
page read and write
162400BCC000
trusted library allocation
page read and write
55C40020C000
direct allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CE0000
heap
page read and write
40A5DFE000
stack
page read and write
1DA32CE6000
heap
page read and write
772C00288000
trusted library allocation
page read and write
6911000
heap
page read and write
7030000
direct allocation
page execute and read and write
6911000
heap
page read and write
162400BDC000
trusted library allocation
page read and write
78A7000
heap
page read and write
1DA2F774000
heap
page read and write
40BBDFD000
stack
page read and write
162400F5C000
trusted library allocation
page read and write
1DA32CC9000
heap
page read and write
1DA32CDB000
heap
page read and write
FF0000
heap
page read and write
1DA32CD4000
heap
page read and write
1624002B0000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
1DA398F2000
trusted library section
page read and write
D71000
unkown
page readonly
162400B60000
trusted library allocation
page read and write
D61000
unkown
page execute read
162400F04000
trusted library allocation
page read and write
79AF000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
162400D84000
trusted library allocation
page read and write
16D7000
heap
page read and write
7903000
heap
page read and write
6911000
heap
page read and write
1DA32CD4000
heap
page read and write
77EB000
heap
page read and write
6911000
heap
page read and write
162400D48000
trusted library allocation
page read and write
1DA398D6000
trusted library section
page read and write
1DA32CD2000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
74D6000
direct allocation
page read and write
73CA000
heap
page read and write
DF0000
heap
page read and write
1624002A4000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CE3000
heap
page read and write
162400EA8000
trusted library allocation
page read and write
6911000
heap
page read and write
40C5DFD000
stack
page read and write
16240022C000
trusted library allocation
page read and write
55C400210000
direct allocation
page read and write
40B7DFA000
stack
page read and write
572000744000
trusted library allocation
page read and write
77E1000
heap
page read and write
40B05FE000
unkown
page readonly
1DA32CE0000
heap
page read and write
1DA32CEC000
heap
page read and write
6911000
heap
page read and write
1DA32CD4000
heap
page read and write
1DA3321E000
heap
page read and write
572000640000
trusted library allocation
page read and write
1DA32CE6000
heap
page read and write
40A6DFE000
stack
page read and write
797E000
heap
page read and write
1DA32CE6000
heap
page read and write
162400FB4000
trusted library allocation
page read and write
162400BA4000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
772C002C0000
trusted library allocation
page read and write
1624001EC000
trusted library allocation
page read and write
1DA3737B000
heap
page read and write
77E9000
heap
page read and write
1624001D0000
trusted library allocation
page read and write
1DA2F7B0000
heap
page read and write
1DA32CE6000
heap
page read and write
1DA2F670000
heap
page readonly
162400708000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
55C400215000
direct allocation
page read and write
6911000
heap
page read and write
1DA32CC9000
heap
page read and write
7F0000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CC9000
heap
page read and write
1DA32CE8000
heap
page read and write
162400A2C000
trusted library allocation
page read and write
5720002F4000
trusted library allocation
page read and write
77A000
stack
page read and write
1DA32CD4000
heap
page read and write
162400DD0000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
1DA32CDA000
heap
page read and write
19AE000
stack
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
162400C58000
trusted library allocation
page read and write
162400524000
trusted library allocation
page read and write
D71000
unkown
page readonly
1DA397C2000
trusted library section
page read and write
1DA32CC9000
heap
page read and write
162400CC0000
trusted library allocation
page read and write
6911000
heap
page read and write
79E9000
heap
page read and write
162400390000
trusted library allocation
page read and write
16240009C000
trusted library allocation
page read and write
5720006E8000
trusted library allocation
page read and write
162400768000
trusted library allocation
page read and write
162400330000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
1624001DC000
trusted library allocation
page read and write
572000758000
trusted library allocation
page read and write
162400A4C000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
1DA32CF0000
heap
page read and write
572000784000
trusted library allocation
page read and write
6911000
heap
page read and write
7991000
heap
page read and write
40CE5FE000
unkown
page readonly
1DA32CE8000
heap
page read and write
55C400201000
direct allocation
page read and write
1DA32CD4000
heap
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CCE000
heap
page read and write
1DA32CD4000
heap
page read and write
74D4000
direct allocation
page read and write
D60000
unkown
page readonly
162400E20000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
B4F000
unkown
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA331E8000
heap
page read and write
130E000
stack
page read and write
162400454000
trusted library allocation
page read and write
6911000
heap
page read and write
5720003EC000
trusted library allocation
page read and write
6911000
heap
page read and write
1624004B0000
trusted library allocation
page read and write
1DA32CE3000
heap
page read and write
40AFDFE000
stack
page read and write
1DA32CEB000
heap
page read and write
791F000
heap
page read and write
162400A3C000
trusted library allocation
page read and write
16240015C000
trusted library allocation
page read and write
1DA3322F000
heap
page read and write
162400858000
trusted library allocation
page read and write
162400224000
trusted library allocation
page read and write
162400B18000
trusted library allocation
page read and write
572000644000
trusted library allocation
page read and write
1DA331DB000
heap
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
77E5000
heap
page read and write
162400D7C000
trusted library allocation
page read and write
77EA000
heap
page read and write
40BB5FE000
unkown
page readonly
6911000
heap
page read and write
77E3000
heap
page read and write
1624004E8000
trusted library allocation
page read and write
6C1FC000
unkown
page readonly
1DA32CE6000
heap
page read and write
1DA32CE0000
heap
page read and write
78BE000
heap
page read and write
1DA32CEB000
heap
page read and write
162400F44000
trusted library allocation
page read and write
6911000
heap
page read and write
14FF000
stack
page read and write
6911000
heap
page read and write
772C002A0000
trusted library allocation
page read and write
16240029A000
trusted library allocation
page read and write
6911000
heap
page read and write
F7C000
stack
page read and write
162400128000
trusted library allocation
page read and write
6911000
heap
page read and write
572000430000
trusted library allocation
page read and write
40BA5FE000
unkown
page readonly
1DA32CC7000
heap
page read and write
6911000
heap
page read and write
1DA32CD2000
heap
page read and write
6911000
heap
page read and write
57200033C000
trusted library allocation
page read and write
C30000
heap
page read and write
162400DF8000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
572000248000
trusted library allocation
page read and write
1624003A4000
trusted library allocation
page read and write
1DA32CD2000
heap
page read and write
1DA2F759000
heap
page read and write
78C6000
heap
page read and write
1DA32CE6000
heap
page read and write
1470000
heap
page read and write
FBE000
stack
page read and write
7B13000
heap
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
572000668000
trusted library allocation
page read and write
162400EE8000
trusted library allocation
page read and write
40C0DFC000
stack
page read and write
16D3000
heap
page read and write
7030000
direct allocation
page execute and read and write
1DA32CEB000
heap
page read and write
162400330000
trusted library allocation
page read and write
1624009B4000
trusted library allocation
page read and write
78AE000
heap
page read and write
1DA32CE0000
heap
page read and write
162400350000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
162400DA6000
trusted library allocation
page read and write
162400EC0000
trusted library allocation
page read and write
162400598000
trusted library allocation
page read and write
6C0D1000
unkown
page execute read
1DA32CDA000
heap
page read and write
162400BD4000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
572000210000
trusted library allocation
page read and write
40D15FE000
unkown
page readonly
6911000
heap
page read and write
162400820000
trusted library allocation
page read and write
1624001B4000
trusted library allocation
page read and write
1DA331BB000
heap
page read and write
1DA32CDA000
heap
page read and write
162400210000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
5720002ED000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
1DA32CE8000
heap
page read and write
16E6000
heap
page read and write
1DA32CEB000
heap
page read and write
16CA000
heap
page read and write
162400CEC000
trusted library allocation
page read and write
1DA39C3E000
trusted library section
page read and write
1DA37352000
heap
page read and write
772C002F4000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
7030000
direct allocation
page execute and read and write
1DA32CEB000
heap
page read and write
1DA32CDA000
heap
page read and write
1624001C8000
trusted library allocation
page read and write
793B000
heap
page read and write
6911000
heap
page read and write
772C002BC000
trusted library allocation
page read and write
78D5000
heap
page read and write
6911000
heap
page read and write
40C45FE000
unkown
page readonly
162400F90000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CE0000
heap
page read and write
1DA32CE8000
heap
page read and write
6911000
heap
page read and write
162400CEC000
trusted library allocation
page read and write
1DA2F75E000
heap
page read and write
162400BB0000
trusted library allocation
page read and write
162400E24000
trusted library allocation
page read and write
D61000
unkown
page execute read
40C8DFD000
stack
page read and write
40C9DFD000
stack
page read and write
1DA32CE8000
heap
page read and write
7030000
direct allocation
page execute and read and write
16240017C000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
772C002BC000
trusted library allocation
page read and write
1624001F4000
trusted library allocation
page read and write
16E7000
heap
page read and write
6911000
heap
page read and write
D6A000
unkown
page readonly
55C400230000
direct allocation
page read and write
1624002FB000
trusted library allocation
page read and write
772C002C0000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
77ED000
heap
page read and write
162400090000
trusted library allocation
page read and write
5720002E4000
trusted library allocation
page read and write
1DA2F7E0000
trusted library allocation
page read and write
572000694000
trusted library allocation
page read and write
5720002D4000
trusted library allocation
page read and write
162400E84000
trusted library allocation
page read and write
1624001AC000
trusted library allocation
page read and write
77EF000
heap
page read and write
162400733000
trusted library allocation
page read and write
40CADFD000
stack
page read and write
1DA32CD2000
heap
page read and write
40CCDFE000
stack
page read and write
1DA32CE0000
heap
page read and write
55C400220000
direct allocation
page read and write
1DA32CEB000
heap
page read and write
162400AF8000
trusted library allocation
page read and write
55C400217000
direct allocation
page read and write
1624003C0000
trusted library allocation
page read and write
55C400260000
direct allocation
page read and write
2D9A000
heap
page read and write
1DA2F764000
heap
page read and write
162400C70000
trusted library allocation
page read and write
6911000
heap
page read and write
77EF000
heap
page read and write
6911000
heap
page read and write
6DB0000
direct allocation
page read and write
1DA32CE6000
heap
page read and write
6911000
heap
page read and write
162400F84000
trusted library allocation
page read and write
162400D30000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
572000724000
trusted library allocation
page read and write
57200035C000
trusted library allocation
page read and write
D6E000
unkown
page write copy
6911000
heap
page read and write
6911000
heap
page read and write
6C1AF000
unkown
page readonly
16240033C000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
1DA32CE8000
heap
page read and write
73C0000
heap
page read and write
1624001A0000
trusted library allocation
page read and write
16D3000
heap
page read and write
1DA32CE0000
heap
page read and write
1DA331AF000
heap
page read and write
1DA32CE0000
heap
page read and write
40CA5FE000
unkown
page readonly
16240050C000
trusted library allocation
page read and write
6911000
heap
page read and write
162400AF4000
trusted library allocation
page read and write
1DA32CE8000
heap
page read and write
162400E2C000
trusted library allocation
page read and write
7996000
heap
page read and write
7AEE000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CDA000
heap
page read and write
1450000
heap
page read and write
772C002A0000
trusted library allocation
page read and write
40AA5FE000
unkown
page readonly
6911000
heap
page read and write
B0E000
unkown
page read and write
7B6F000
heap
page read and write
6911000
heap
page read and write
572000418000
trusted library allocation
page read and write
6911000
heap
page read and write
772C002BC000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CDA000
heap
page read and write
78ED000
heap
page read and write
1DA32CD4000
heap
page read and write
79A5000
heap
page read and write
77E7000
heap
page read and write
572000684000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
6911000
heap
page read and write
6911000
heap
page read and write
D10000
heap
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CDA000
heap
page read and write
6911000
heap
page read and write
77E2000
heap
page read and write
7000000
direct allocation
page execute and read and write
6911000
heap
page read and write
162400801000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CE6000
heap
page read and write
793E000
heap
page read and write
D2A000
unkown
page write copy
6911000
heap
page read and write
55C400250000
direct allocation
page read and write
57200025C000
trusted library allocation
page read and write
162400D14000
trusted library allocation
page read and write
572000630000
trusted library allocation
page read and write
1624003C0000
trusted library allocation
page read and write
7B4B000
heap
page read and write
7AC6000
heap
page read and write
6911000
heap
page read and write
40B85FE000
unkown
page readonly
572000424000
trusted library allocation
page read and write
1DA32CE8000
heap
page read and write
14BE000
stack
page read and write
6911000
heap
page read and write
7AD1000
heap
page read and write
162400CA4000
trusted library allocation
page read and write
40B5DFE000
stack
page read and write
1DA32CEB000
heap
page read and write
162400C74000
trusted library allocation
page read and write
1DA39790000
trusted library section
page read and write
1DA38DB0000
heap
page read and write
6911000
heap
page read and write
1624001E0000
trusted library allocation
page read and write
162400834000
trusted library allocation
page read and write
1DA32CDE000
heap
page read and write
D6A000
unkown
page readonly
1DA398FD000
trusted library section
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
1624001D8000
trusted library allocation
page read and write
16240033C000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
6911000
heap
page read and write
1DA32CD4000
heap
page read and write
55C400234000
direct allocation
page read and write
16E7000
heap
page read and write
1DA32CE6000
heap
page read and write
1DA32CE8000
heap
page read and write
1DA32CD4000
heap
page read and write
55C400274000
direct allocation
page read and write
1624002F0000
trusted library allocation
page read and write
5720007B4000
trusted library allocation
page read and write
40BC5FE000
unkown
page readonly
3490000
direct allocation
page read and write
1DA32CE6000
heap
page read and write
16D7000
heap
page read and write
772C002F8000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
1DA32CD4000
heap
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
7A16000
heap
page read and write
16240020C000
trusted library allocation
page read and write
1624002F0000
trusted library allocation
page read and write
572000201000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
77E6000
heap
page read and write
6911000
heap
page read and write
1624006A0000
trusted library allocation
page read and write
572000770000
trusted library allocation
page read and write
772C00238000
trusted library allocation
page read and write
162400ECC000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
572000601000
trusted library allocation
page read and write
1DA32CE8000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CD5000
heap
page read and write
572000401000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
772C002B0000
trusted library allocation
page read and write
1DA39637000
unclassified section
page read and write
1DA32CE6000
heap
page read and write
40C4DFE000
stack
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
40CBDFE000
stack
page read and write
1DA32CEB000
heap
page read and write
162400298000
trusted library allocation
page read and write
572000750000
trusted library allocation
page read and write
162400E60000
trusted library allocation
page read and write
40A65FE000
unkown
page readonly
1DA32CE0000
heap
page read and write
1DA32CD3000
heap
page read and write
40A1DEF000
stack
page read and write
1DA38D80000
heap
page read and write
162400E01000
trusted library allocation
page read and write
1DA32CD9000
heap
page read and write
1DA391E0000
trusted library section
page read and write
1DA32CE0000
heap
page read and write
1624008A8000
trusted library allocation
page read and write
1080000
heap
page read and write
55C40023C000
direct allocation
page read and write
1DA32CD4000
heap
page read and write
1DA39F5D000
trusted library section
page read and write
1DA32CEB000
heap
page read and write
162400364000
trusted library allocation
page read and write
1624001F8000
trusted library allocation
page read and write
1DA32CC9000
heap
page read and write
162400794000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
55C400284000
direct allocation
page read and write
1DA32CDA000
heap
page read and write
162400454000
trusted library allocation
page read and write
162400F34000
trusted library allocation
page read and write
162400294000
trusted library allocation
page read and write
162400B50000
trusted library allocation
page read and write
1390000
heap
page read and write
55C400270000
direct allocation
page read and write
1DA32CE8000
heap
page read and write
40A85FE000
unkown
page readonly
572000704000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
D6E000
unkown
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
16240092C000
trusted library allocation
page read and write
162400D38000
trusted library allocation
page read and write
572000248000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
572000700000
trusted library allocation
page read and write
79CA000
heap
page read and write
1DA32CE5000
heap
page read and write
77EB000
heap
page read and write
6911000
heap
page read and write
40C25FE000
unkown
page readonly
162400350000
trusted library allocation
page read and write
40A2DFE000
unkown
page read and write
1DA396A0000
trusted library section
page read and write
1DA32CC9000
heap
page read and write
6911000
heap
page read and write
7877000
heap
page read and write
162400DE8000
trusted library allocation
page read and write
162400948000
trusted library allocation
page read and write
55C4002EC000
direct allocation
page read and write
1DA32CD4000
heap
page read and write
7030000
direct allocation
page execute and read and write
572000374000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
D60000
unkown
page readonly
1DA37341000
heap
page read and write
1DA397CE000
trusted library section
page read and write
789A000
heap
page read and write
6911000
heap
page read and write
D60000
unkown
page readonly
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
16240061C000
trusted library allocation
page read and write
16F2000
heap
page read and write
6911000
heap
page read and write
572000730000
trusted library allocation
page read and write
572000788000
trusted library allocation
page read and write
1DA3321C000
heap
page read and write
1DA32CDA000
heap
page read and write
40AC5FE000
unkown
page readonly
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CD5000
heap
page read and write
1DA32CCE000
heap
page read and write
1624002B4000
trusted library allocation
page read and write
920000
heap
page read and write
1DA32CE0000
heap
page read and write
6C1F8000
unkown
page readonly
1DA32CE6000
heap
page read and write
40B95FE000
unkown
page readonly
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA331BD000
heap
page read and write
57200027C000
trusted library allocation
page read and write
5720006D4000
trusted library allocation
page read and write
55C4002A8000
direct allocation
page read and write
162400220000
trusted library allocation
page read and write
1DA331C1000
heap
page read and write
772C00230000
trusted library allocation
page read and write
1DA32CE8000
heap
page read and write
1DA32CCE000
heap
page read and write
57200039C000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
162400D9C000
trusted library allocation
page read and write
6911000
heap
page read and write
7974000
heap
page read and write
1DA32CE6000
heap
page read and write
1DA35360000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
7030000
direct allocation
page execute and read and write
1DA3321E000
heap
page read and write
1DA33140000
heap
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
162400310000
trusted library allocation
page read and write
1DA2F680000
heap
page read and write
1DA32CE8000
heap
page read and write
1DA32CE0000
heap
page read and write
16240080C000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
162400E54000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
772C0020D000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
162400B64000
trusted library allocation
page read and write
6911000
heap
page read and write
5720006B8000
trusted library allocation
page read and write
6911000
heap
page read and write
162400B40000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
1DA32CDA000
heap
page read and write
5720006CC000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
40A35FE000
unkown
page readonly
1DA32CEB000
heap
page read and write
1DA2F7D0000
trusted library allocation
page read and write
1624005DC000
trusted library allocation
page read and write
1DA32CD9000
heap
page read and write
40AD5FE000
unkown
page readonly
162400134000
trusted library allocation
page read and write
162400CFC000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
57200040C000
trusted library allocation
page read and write
10BE000
unkown
page execute and write copy
40CB5FE000
unkown
page readonly
C20000
heap
page read and write
1DA32CC8000
heap
page read and write
1DA32CD4000
heap
page read and write
572000654000
trusted library allocation
page read and write
572000320000
trusted library allocation
page read and write
6911000
heap
page read and write
572000624000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
162400978000
trusted library allocation
page read and write
162400294000
trusted library allocation
page read and write
1DA2F980000
heap
page read and write
1DA32CD4000
heap
page read and write
1000000
heap
page read and write
40CD5FE000
unkown
page readonly
1DA32CE6000
heap
page read and write
1DA32CE5000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
772C002C0000
trusted library allocation
page read and write
6911000
heap
page read and write
572000404000
trusted library allocation
page read and write
78D1000
heap
page read and write
1624007D8000
trusted library allocation
page read and write
7964000
heap
page read and write
6D60000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
3490000
direct allocation
page read and write
772C002B0000
trusted library allocation
page read and write
162400D5C000
trusted library allocation
page read and write
5720007C8000
trusted library allocation
page read and write
162400454000
trusted library allocation
page read and write
6911000
heap
page read and write
73D000
stack
page read and write
40A8DFB000
stack
page read and write
572000390000
trusted library allocation
page read and write
77E2000
heap
page read and write
1DA32CE6000
heap
page read and write
1624008F0000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
1DA32D01000
heap
page read and write
1DA32CE0000
heap
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
D4E000
stack
page read and write
162400390000
trusted library allocation
page read and write
5720006C8000
trusted library allocation
page read and write
77E7000
heap
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
162400E78000
trusted library allocation
page read and write
16D0000
heap
page read and write
16240018C000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
772C002E4000
trusted library allocation
page read and write
1DA2F73E000
heap
page read and write
7030000
direct allocation
page execute and read and write
40C3DFE000
stack
page read and write
16D3000
heap
page read and write
40BD5FE000
unkown
page readonly
162400660000
trusted library allocation
page read and write
1624001D4000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
7B86000
heap
page read and write
5720002B8000
trusted library allocation
page read and write
40CEDFC000
stack
page read and write
D6A000
unkown
page readonly
6911000
heap
page read and write
1624002C0000
trusted library allocation
page read and write
77E9000
heap
page read and write
6911000
heap
page read and write
1DA32D01000
heap
page read and write
1DA32CCE000
heap
page read and write
1DA397B0000
trusted library section
page read and write
1DA32CE6000
heap
page read and write
6911000
heap
page read and write
F7C000
stack
page read and write
1DA32CE0000
heap
page read and write
1DA3321E000
heap
page read and write
572000238000
trusted library allocation
page read and write
1DA32CDC000
heap
page read and write
1DA32CE8000
heap
page read and write
1624002F3000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
162400A0C000
trusted library allocation
page read and write
40AF5FE000
unkown
page readonly
162400CFC000
trusted library allocation
page read and write
162400E3C000
trusted library allocation
page read and write
6911000
heap
page read and write
772C002D8000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA39713000
trusted library section
page read and write
1DA32CE8000
heap
page read and write
572000230000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
1DA32CE8000
heap
page read and write
6911000
heap
page read and write
792E000
heap
page read and write
7351000
heap
page read and write
C18000
heap
page read and write
162400F1C000
trusted library allocation
page read and write
1DA32CE6000
heap
page read and write
1DA2F590000
heap
page read and write
1DA32CF0000
heap
page read and write
78DA000
heap
page read and write
D61000
unkown
page execute read
D71000
unkown
page readonly
6911000
heap
page read and write
1DA32CE6000
heap
page read and write
1624006F0000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
772C00260000
trusted library allocation
page read and write
162400CEC000
trusted library allocation
page read and write
162400D24000
trusted library allocation
page read and write
1DA32D03000
heap
page read and write
1624002A4000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CDA000
heap
page read and write
162400EDC000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
1DA38CA7000
unclassified section
page read and write
1DA32CE6000
heap
page read and write
1DA32CEB000
heap
page read and write
5720006D0000
trusted library allocation
page read and write
1DA32CE8000
heap
page read and write
1DA32CD2000
heap
page read and write
57200069C000
trusted library allocation
page read and write
C00000
heap
page read and write
D60000
unkown
page readonly
7030000
direct allocation
page execute and read and write
1DA32CD4000
heap
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
1DA32CDA000
heap
page read and write
40BDDFB000
stack
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
572000698000
trusted library allocation
page read and write
1DA32CC7000
heap
page read and write
772C00294000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
7ABB000
heap
page read and write
3490000
direct allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
16240020C000
trusted library allocation
page read and write
7912000
heap
page read and write
6911000
heap
page read and write
D6A000
unkown
page readonly
7FE1000
heap
page read and write
D6A000
unkown
page readonly
40C05FE000
unkown
page readonly
1DA32CD3000
heap
page read and write
1440000
heap
page read and write
162400A8C000
trusted library allocation
page read and write
162400380000
trusted library allocation
page read and write
6911000
heap
page read and write
162400FA0000
trusted library allocation
page read and write
7010000
direct allocation
page execute and read and write
1DA32CEB000
heap
page read and write
55C4002E4000
direct allocation
page read and write
572000380000
trusted library allocation
page read and write
1624001AC000
trusted library allocation
page read and write
5720007CC000
trusted library allocation
page read and write
1DA32CC7000
heap
page read and write
6911000
heap
page read and write
1DA32CD3000
heap
page read and write
40A3DFE000
stack
page read and write
1DA331AB000
heap
page read and write
6911000
heap
page read and write
162400EB8000
trusted library allocation
page read and write
162400ACC000
trusted library allocation
page read and write
57200035C000
trusted library allocation
page read and write
794F000
heap
page read and write
55C4002DC000
direct allocation
page read and write
1DA32CDA000
heap
page read and write
1DA32CE6000
heap
page read and write
7E0000
heap
page read and write
1DA32CEB000
heap
page read and write
16240071C000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
55C400280000
direct allocation
page read and write
1624008F8000
trusted library allocation
page read and write
162400533000
trusted library allocation
page read and write
D6A000
unkown
page readonly
1DA32CEB000
heap
page read and write
16E6000
heap
page read and write
1C70000
heap
page read and write
1624001E8000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
162400310000
trusted library allocation
page read and write
1DA32CE6000
heap
page read and write
1DA32CCB000
heap
page read and write
DA0000
heap
page read and write
16C9000
heap
page read and write
1DA3733D000
heap
page read and write
16D7000
heap
page read and write
1624008D0000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
40A4DFE000
stack
page read and write
162400AD8000
trusted library allocation
page read and write
40B2DFD000
stack
page read and write
57200033C000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
572000330000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
162400F58000
trusted library allocation
page read and write
40AE5FE000
unkown
page readonly
1DA32CDA000
heap
page read and write
16240091C000
trusted library allocation
page read and write
1624006C4000
trusted library allocation
page read and write
162400C58000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
1DA32CD4000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CEB000
heap
page read and write
162400E18000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
572000330000
trusted library allocation
page read and write
6911000
heap
page read and write
1624000DC000
trusted library allocation
page read and write
7A2E000
heap
page read and write
16240053C000
trusted library allocation
page read and write
75E1000
heap
page read and write
16D3000
heap
page read and write
2BFE000
stack
page read and write
6911000
heap
page read and write
D60000
unkown
page readonly
6C0D0000
unkown
page readonly
40AB5FE000
unkown
page readonly
77E7000
heap
page read and write
1DA32CE8000
heap
page read and write
40CFDFE000
stack
page read and write
572000718000
trusted library allocation
page read and write
162400C7C000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CD2000
heap
page read and write
162400A94000
trusted library allocation
page read and write
16240078C000
trusted library allocation
page read and write
1DA39F52000
trusted library section
page read and write
57200078C000
trusted library allocation
page read and write
C10000
heap
page read and write
1DA331E2000
heap
page read and write
1DA32CE6000
heap
page read and write
1624007DD000
trusted library allocation
page read and write
162400C54000
trusted library allocation
page read and write
16240060C000
trusted library allocation
page read and write
1DA32CE6000
heap
page read and write
1DA32CDA000
heap
page read and write
1624001B4000
trusted library allocation
page read and write
162400F48000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
162400054000
trusted library allocation
page read and write
162400214000
trusted library allocation
page read and write
55C40024C000
direct allocation
page read and write
16240072F000
trusted library allocation
page read and write
716F000
heap
page read and write
1DA32CE6000
heap
page read and write
6911000
heap
page read and write
7030000
direct allocation
page execute and read and write
3490000
direct allocation
page read and write
6A10000
trusted library allocation
page read and write
1624003B9000
trusted library allocation
page read and write
162400B04000
trusted library allocation
page read and write
40C85FE000
unkown
page readonly
1DA33227000
heap
page read and write
572000678000
trusted library allocation
page read and write
162400E90000
trusted library allocation
page read and write
1DA39930000
trusted library section
page read and write
77E5000
heap
page read and write
1DA32CD4000
heap
page read and write
7030000
direct allocation
page execute and read and write
40ACDFB000
stack
page read and write
40B1DFE000
stack
page read and write
1DA32CA0000
heap
page read and write
1DA32CE6000
heap
page read and write
6911000
heap
page read and write
162400703000
trusted library allocation
page read and write
1624004C0000
trusted library allocation
page read and write
6911000
heap
page read and write
189F000
stack
page read and write
601000
unkown
page execute and write copy
40CC5FE000
unkown
page readonly
1DA32CE6000
heap
page read and write
162400AE4000
trusted library allocation
page read and write
6911000
heap
page read and write
D6A000
unkown
page readonly
6911000
heap
page read and write
1DA2F960000
heap
page read and write
572000368000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
77E8000
heap
page read and write
6911000
heap
page read and write
1DA33250000
trusted library section
page read and write
D61000
unkown
page execute read
6911000
heap
page read and write
78E2000
heap
page read and write
3490000
direct allocation
page read and write
7030000
direct allocation
page execute and read and write
162400C01000
trusted library allocation
page read and write
6911000
heap
page read and write
772C002C8000
trusted library allocation
page read and write
1DA38DB3000
heap
page read and write
40C1DFB000
stack
page read and write
6911000
heap
page read and write
1DA32CE3000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CE8000
heap
page read and write
40B55FE000
unkown
page readonly
1DA32CEB000
heap
page read and write
572000250000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
162400CFC000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
2D90000
heap
page read and write
1DA32CD4000
heap
page read and write
16240000C000
trusted library allocation
page read and write
162400344000
trusted library allocation
page read and write
162400294000
trusted library allocation
page read and write
1DA32CB0000
heap
page read and write
55C4002AC000
direct allocation
page read and write
143E000
stack
page read and write
16240035C000
trusted library allocation
page read and write
572000754000
trusted library allocation
page read and write
162400228000
trusted library allocation
page read and write
6911000
heap
page read and write
40B75FE000
unkown
page readonly
7876000
heap
page read and write
1DA32CE8000
heap
page read and write
1DA32CE0000
heap
page read and write
162400F44000
trusted library allocation
page read and write
162400074000
trusted library allocation
page read and write
1DA37200000
trusted library section
page read and write
1DA32CDA000
heap
page read and write
162400304000
trusted library allocation
page read and write
572000288000
trusted library allocation
page read and write
6911000
heap
page read and write
78FD000
heap
page read and write
7877000
heap
page read and write
572000760000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
600000
unkown
page readonly
1DA32CEB000
heap
page read and write
16240095C000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
77E5000
heap
page read and write
1DA32CDA000
heap
page read and write
1DA32CE8000
heap
page read and write
7897000
heap
page read and write
1DA33227000
heap
page read and write
772C002F0000
trusted library allocation
page read and write
5720002F0000
trusted library allocation
page read and write
6911000
heap
page read and write
1624005CC000
trusted library allocation
page read and write
7020000
direct allocation
page execute and read and write
162400518000
trusted library allocation
page read and write
1DA32CEC000
heap
page read and write
7916000
heap
page read and write
1DA2F742000
heap
page read and write
162400218000
trusted library allocation
page read and write
162400A4C000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
1DA32CEB000
heap
page read and write
162400994000
trusted library allocation
page read and write
1624001E4000
trusted library allocation
page read and write
40B25FE000
unkown
page readonly
1DA39833000
trusted library section
page read and write
17AF000
stack
page read and write
772C00220000
trusted library allocation
page read and write
16240063C000
trusted library allocation
page read and write
D61000
unkown
page execute read
1624002E0000
trusted library allocation
page read and write
D61000
unkown
page execute read
1DA331C3000
heap
page read and write
1DA32CE6000
heap
page read and write
1DA32CE8000
heap
page read and write
D6E000
unkown
page read and write
40C6DFE000
stack
page read and write
1DA32CE6000
heap
page read and write
16240021C000
trusted library allocation
page read and write
6911000
heap
page read and write
16240031C000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA2F6A0000
heap
page read and write
572000688000
trusted library allocation
page read and write
1DA396B2000
trusted library section
page read and write
40C75FE000
unkown
page readonly
1DA32CDA000
heap
page read and write
772C002A0000
trusted library allocation
page read and write
D60000
unkown
page readonly
1DA32CD4000
heap
page read and write
162400E6C000
trusted library allocation
page read and write
1DA32CE6000
heap
page read and write
16DF000
heap
page read and write
6911000
heap
page read and write
1DA32CDA000
heap
page read and write
D71000
unkown
page readonly
6911000
heap
page read and write
D61000
unkown
page execute read
40BCDFC000
stack
page read and write
1624001AC000
trusted library allocation
page read and write
572000408000
trusted library allocation
page read and write
16240054C000
trusted library allocation
page read and write
D6E000
unkown
page write copy
162400D04000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
77EA000
heap
page read and write
DEE000
stack
page read and write
55C4002D0000
direct allocation
page read and write
1DA32CEB000
heap
page read and write
162400DC4000
trusted library allocation
page read and write
572000364000
trusted library allocation
page read and write
2C6F000
stack
page read and write
162400EF8000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
D60000
unkown
page readonly
6911000
heap
page read and write
1DA33227000
heap
page read and write
6911000
heap
page read and write
D71000
unkown
page readonly
1DA2F985000
heap
page read and write
1DA32CD2000
heap
page read and write
1DA32CDA000
heap
page read and write
572000658000
trusted library allocation
page read and write
5720002FC000
trusted library allocation
page read and write
77E0000
heap
page read and write
7939000
heap
page read and write
F9C000
stack
page read and write
772C002BC000
trusted library allocation
page read and write
572000320000
trusted library allocation
page read and write
772C002A0000
trusted library allocation
page read and write
77E3000
heap
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
1DA32CEB000
heap
page read and write
572000320000
trusted library allocation
page read and write
6C1F9000
unkown
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
1DA32CDE000
heap
page read and write
6911000
heap
page read and write
572000220000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CE0000
heap
page read and write
1DA32CDC000
heap
page read and write
162400FA8000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CE5000
heap
page read and write
1DA39800000
trusted library section
page read and write
772C00274000
trusted library allocation
page read and write
772C002B0000
trusted library allocation
page read and write
7966000
heap
page read and write
572000614000
trusted library allocation
page read and write
1DA32CCE000
heap
page read and write
1DA331B8000
heap
page read and write
77E0000
heap
page read and write
162400300000
trusted library allocation
page read and write
77E7000
heap
page read and write
1DA331D9000
heap
page read and write
16240006A000
trusted library allocation
page read and write
1DA39810000
trusted library section
page read and write
1624007E9000
trusted library allocation
page read and write
D71000
unkown
page readonly
1DA32CE6000
heap
page read and write
772C00250000
trusted library allocation
page read and write
1DA38CD7000
unclassified section
page read and write
16240014C000
trusted library allocation
page read and write
16240002C000
trusted library allocation
page read and write
1DA32CE3000
heap
page read and write
7946000
heap
page read and write
40B4DFE000
stack
page read and write
1DA32CE8000
heap
page read and write
40D05FE000
unkown
page readonly
2C20000
heap
page read and write
40C7DFE000
stack
page read and write
1624005F0000
trusted library allocation
page read and write
1DA330C0000
trusted library section
page read and write
1DA36E02000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
162400F24000
trusted library allocation
page read and write
162400084000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
71C6000
heap
page read and write
162400700000
trusted library allocation
page read and write
1DA32CE6000
heap
page read and write
40CDDFA000
stack
page read and write
6DA0000
direct allocation
page read and write
1DA32CEB000
heap
page read and write
1DA2F6A8000
heap
page read and write
40A75FE000
unkown
page readonly
1DA32D01000
heap
page read and write
1DA32CD4000
heap
page read and write
16240033C000
trusted library allocation
page read and write
16240033C000
trusted library allocation
page read and write
7151000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32D01000
heap
page read and write
40B35FE000
unkown
page readonly
162400DB0000
trusted library allocation
page read and write
772C002C0000
trusted library allocation
page read and write
D6E000
unkown
page write copy
6911000
heap
page read and write
1DA32CCE000
heap
page read and write
1DA32CEB000
heap
page read and write
78F3000
heap
page read and write
7893000
heap
page read and write
6911000
heap
page read and write
1070000
heap
page read and write
77E4000
heap
page read and write
1DA37341000
heap
page read and write
1624000B4000
trusted library allocation
page read and write
1DA37341000
heap
page read and write
572000348000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
1DA32CD2000
heap
page read and write
1624001C4000
trusted library allocation
page read and write
162400304000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
6911000
heap
page read and write
55C400303000
direct allocation
page read and write
572000714000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
162400294000
trusted library allocation
page read and write
162400E48000
trusted library allocation
page read and write
1624008C4000
trusted library allocation
page read and write
16E6000
heap
page read and write
1DA331A4000
heap
page read and write
5720006C4000
trusted library allocation
page read and write
16EB000
heap
page read and write
40ADDFC000
stack
page read and write
77E4000
heap
page read and write
572000330000
trusted library allocation
page read and write
6911000
heap
page read and write
107E000
heap
page read and write
6911000
heap
page read and write
162400118000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
1DA397A1000
trusted library section
page read and write
6911000
heap
page read and write
572000734000
trusted library allocation
page read and write
1DA393E0000
trusted library section
page read and write
40C15FE000
unkown
page readonly
16D7000
heap
page read and write
162400C0C000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
5720006AC000
trusted library allocation
page read and write
1DA31643000
heap
page read and write
1DA32CE6000
heap
page read and write
1DA32CE6000
heap
page read and write
6911000
heap
page read and write
16240072C000
trusted library allocation
page read and write
1DA32CE8000
heap
page read and write
1624009E8000
trusted library allocation
page read and write
1DA37330000
heap
page read and write
77E7000
heap
page read and write
6911000
heap
page read and write
1DA32CEB000
heap
page read and write
5720006B4000
trusted library allocation
page read and write
7370000
direct allocation
page read and write
6911000
heap
page read and write
162400298000
trusted library allocation
page read and write
40CF5FE000
unkown
page readonly
55C400290000
direct allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
3490000
direct allocation
page read and write
1DA32CD4000
heap
page read and write
162400A68000
trusted library allocation
page read and write
77E4000
heap
page read and write
7030000
direct allocation
page execute and read and write
572000354000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
1DA32CEA000
heap
page read and write
1DA32CE6000
heap
page read and write
162400888000
trusted library allocation
page read and write
1DA36DE4000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
16240031C000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
14B8000
heap
page read and write
6911000
heap
page read and write
5720007D0000
trusted library allocation
page read and write
6DA0000
direct allocation
page read and write
6911000
heap
page read and write
107A000
heap
page read and write
1DA32CEB000
heap
page read and write
1DA32CE8000
heap
page read and write
1DA32CDA000
heap
page read and write
1DA32CDA000
heap
page read and write
6911000
heap
page read and write
1DA32CE0000
heap
page read and write
1DA32CE6000
heap
page read and write
2DAC000
heap
page read and write
1DA39C30000
trusted library section
page read and write
1DA32CE0000
heap
page read and write
1DA32CE5000
heap
page read and write
162400780000
trusted library allocation
page read and write
1624007B0000
trusted library allocation
page read and write
572000664000
trusted library allocation
page read and write
D61000
unkown
page execute read
1DA32CE5000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
798E000
heap
page read and write
162400001000
trusted library allocation
page read and write
1624009F8000
trusted library allocation
page read and write
1624001F0000
trusted library allocation
page read and write
162400044000
trusted library allocation
page read and write
13FC000
stack
page read and write
77EE000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA3735F000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
77E5000
heap
page read and write
1DA32CE5000
heap
page read and write
1DA32CC6000
heap
page read and write
1624002B4000
trusted library allocation
page read and write
772C00270000
trusted library allocation
page read and write
1DA39697000
unclassified section
page read and write
6911000
heap
page read and write
7917000
heap
page read and write
162400401000
trusted library allocation
page read and write
162400CB4000
trusted library allocation
page read and write
14B0000
heap
page read and write
1DA32CD4000
heap
page read and write
3490000
direct allocation
page read and write
1DA32CD3000
heap
page read and write
5720006F0000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CE6000
heap
page read and write
40C65FE000
unkown
page readonly
162400A4C000
trusted library allocation
page read and write
5720002B0000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
772C00235000
trusted library allocation
page read and write
6C1AD000
unkown
page read and write
6911000
heap
page read and write
1DA32CE6000
heap
page read and write
57200075C000
trusted library allocation
page read and write
55C400294000
direct allocation
page read and write
1DA32CEB000
heap
page read and write
162400E9C000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
14D0000
heap
page read and write
1DA32CE8000
heap
page read and write
6911000
heap
page read and write
40B0DFE000
stack
page read and write
77E8000
heap
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
40BADFC000
stack
page read and write
40BF5FE000
unkown
page readonly
1624005BC000
trusted library allocation
page read and write
1DA32CDF000
heap
page read and write
6911000
heap
page read and write
1DA32CD4000
heap
page read and write
6911000
heap
page read and write
162400454000
trusted library allocation
page read and write
162400D8C000
trusted library allocation
page read and write
1DA39970000
trusted library section
page read and write
12FF000
stack
page read and write
40D0DFE000
stack
page read and write
162400014000
trusted library allocation
page read and write
572000354000
trusted library allocation
page read and write
77EE000
heap
page read and write
1DA32CEB000
heap
page read and write
797D000
heap
page read and write
8CC000
stack
page read and write
162400BA4000
trusted library allocation
page read and write
795E000
heap
page read and write
162400290000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA31640000
heap
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
40BE5FE000
unkown
page readonly
1DA32CE0000
heap
page read and write
1DA32CE0000
heap
page read and write
1624002A4000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA39821000
trusted library section
page read and write
6911000
heap
page read and write
11FC000
stack
page read and write
162400731000
trusted library allocation
page read and write
1DA32CD2000
heap
page read and write
6911000
heap
page read and write
772C002C0000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
1DA32CE0000
heap
page read and write
772C00278000
trusted library allocation
page read and write
77E8000
heap
page read and write
57200080C000
trusted library allocation
page read and write
77E3000
heap
page read and write
16240064C000
trusted library allocation
page read and write
572000620000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
40BFDFD000
stack
page read and write
16240016C000
trusted library allocation
page read and write
10F0000
heap
page read and write
162400A58000
trusted library allocation
page read and write
6911000
heap
page read and write
57200060C000
trusted library allocation
page read and write
16240027C000
trusted library allocation
page read and write
572000310000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
D6E000
unkown
page read and write
9CC000
stack
page read and write
162400880000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
3490000
direct allocation
page read and write
6911000
heap
page read and write
1DA39756000
trusted library section
page read and write
79B0000
heap
page read and write
1DA32CD2000
heap
page read and write
1DA32CDA000
heap
page read and write
40A55FE000
unkown
page readonly
1DA32CE0000
heap
page read and write
162400DE0000
trusted library allocation
page read and write
1624004BC000
trusted library allocation
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CD4000
heap
page read and write
1DA3733A000
heap
page read and write
1DA32CDA000
heap
page read and write
1DA32CEB000
heap
page read and write
16240066C000
trusted library allocation
page read and write
772C002BC000
trusted library allocation
page read and write
162400CC4000
trusted library allocation
page read and write
1DA32CE8000
heap
page read and write
1DA32CEB000
heap
page read and write
162400230000
trusted library allocation
page read and write
1624009C0000
trusted library allocation
page read and write
7955000
heap
page read and write
D2C000
stack
page read and write
6911000
heap
page read and write
162400328000
trusted library allocation
page read and write
162400A01000
trusted library allocation
page read and write
162400C98000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
1DA32CD4000
heap
page read and write
16D3000
heap
page read and write
1DA32CD4000
heap
page read and write
1DA32CEB000
heap
page read and write
162400E24000
trusted library allocation
page read and write
7B37000
heap
page read and write
16D7000
heap
page read and write
162400D68000
trusted library allocation
page read and write
1DA32CD3000
heap
page read and write
40BEDFC000
stack
page read and write
1DA32CE0000
heap
page read and write
1DA32CDA000
heap
page read and write
162400748000
trusted library allocation
page read and write
1DA32CDA000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1624000FC000
trusted library allocation
page read and write
1DA32CD4000
heap
page read and write
1DA32CE0000
heap
page read and write
40AADFE000
stack
page read and write
D6E000
unkown
page read and write
40C35FE000
unkown
page readonly
6911000
heap
page read and write
40A9DFB000
stack
page read and write
162400D54000
trusted library allocation
page read and write
772C00201000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CE6000
heap
page read and write
162400B34000
trusted library allocation
page read and write
5720006E0000
trusted library allocation
page read and write
B70000
heap
page read and write
162400738000
trusted library allocation
page read and write
5720006E4000
trusted library allocation
page read and write
71C2000
heap
page read and write
1DA32CE6000
heap
page read and write
1624006B0000
trusted library allocation
page read and write
772C002BC000
trusted library allocation
page read and write
79B1000
heap
page read and write
1DA331BF000
heap
page read and write
1DA331F0000
heap
page read and write
77E8000
heap
page read and write
40C55FE000
unkown
page readonly
1DA32CE6000
heap
page read and write
1DA32CE6000
heap
page read and write
1DA32CD5000
heap
page read and write
6911000
heap
page read and write
16C2000
heap
page read and write
1624000EC000
trusted library allocation
page read and write
5720006B0000
trusted library allocation
page read and write
162400A24000
trusted library allocation
page read and write
7A9A000
heap
page read and write
7A45000
heap
page read and write
78BF000
heap
page read and write
772C002BC000
trusted library allocation
page read and write
6911000
heap
page read and write
162400370000
trusted library allocation
page read and write
162400194000
trusted library allocation
page read and write
5720006FC000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA33227000
heap
page read and write
7030000
direct allocation
page execute and read and write
1DA32CE0000
heap
page read and write
1DA2F74B000
heap
page read and write
572000310000
trusted library allocation
page read and write
162400601000
trusted library allocation
page read and write
1DA33207000
heap
page read and write
5720002CC000
trusted library allocation
page read and write
1624001B4000
trusted library allocation
page read and write
794F000
heap
page read and write
1DA396BE000
trusted library section
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CDA000
heap
page read and write
40B65FE000
unkown
page readonly
1DA32CE8000
heap
page read and write
162400D04000
trusted library allocation
page read and write
1DA32CE6000
heap
page read and write
40B9DFC000
stack
page read and write
6911000
heap
page read and write
D71000
unkown
page readonly
1624003B0000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
1DA33215000
heap
page read and write
40B6DFE000
stack
page read and write
7030000
direct allocation
page execute and read and write
16E6000
heap
page read and write
6911000
heap
page read and write
1DA3997E000
trusted library section
page read and write
1DA37341000
heap
page read and write
6911000
heap
page read and write
162400BB8000
trusted library allocation
page read and write
40B8DFD000
stack
page read and write
1DA32CE0000
heap
page read and write
6911000
heap
page read and write
772C00248000
trusted library allocation
page read and write
6911000
heap
page read and write
1DA32CE0000
heap
page read and write
162400CD4000
trusted library allocation
page read and write
40A95FE000
unkown
page readonly
6911000
heap
page read and write
1DA32CE6000
heap
page read and write
40B15FE000
unkown
page readonly
1DA32CEB000
heap
page read and write
1624006D0000
trusted library allocation
page read and write
6911000
heap
page read and write
D60000
unkown
page readonly
1DA32CEB000
heap
page read and write
16D7000
heap
page read and write
1DA32090000
unkown
page read and write
40C95FE000
unkown
page readonly
1A9F000
stack
page read and write
D71000
unkown
page readonly
1DA2F920000
trusted library section
page readonly
1DA33216000
heap
page read and write
1DA32CE6000
heap
page read and write
1DA32CE6000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
1DA32CE8000
heap
page read and write
6911000
heap
page read and write
6D60000
trusted library allocation
page read and write
77E6000
heap
page read and write
6911000
heap
page read and write
6911000
heap
page read and write
162400C60000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
572000610000
trusted library allocation
page read and write
572000320000
trusted library allocation
page read and write
162400390000
trusted library allocation
page read and write
1DA32CEB000
heap
page read and write
6911000
heap
page read and write
162400201000
trusted library allocation
page read and write
1DA32CE0000
heap
page read and write
1DA3322D000
heap
page read and write
16C9000
heap
page read and write
772C00264000
trusted library allocation
page read and write
5720006EC000
trusted library allocation
page read and write
40B3DFA000
stack
page read and write
1DA32CEB000
heap
page read and write
1DA32CD4000
heap
page read and write
1DA32CE6000
heap
page read and write
40B45FE000
unkown
page readonly
6911000
heap
page read and write
6911000
heap
page read and write
1624004C8000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
7A7F000
heap
page read and write
D6A000
unkown
page readonly
40C2DFE000
stack
page read and write
There are 1506 hidden memdumps, click here to show them.