IOC Report
PhwUGyok2i.exe

loading gif

Files

File Path
Type
Category
Malicious
PhwUGyok2i.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PhwUGyok2i.exe_e53411d3c21cb7ec1c44614921a458411af88053_8f197f82_ef1a3412-a482-4ccc-8fd7-cee110a5bed4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8305.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER876B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B15.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PhwUGyok2i.exe
"C:\Users\user\Desktop\PhwUGyok2i.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1988,i,12239918215258673824,2474268141507560200,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 1148
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actionsh
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
http://anglebug.com/3965B
unknown
http://anglebug.com/48362
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/3832F
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://anglebug.com/6048-
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://anglebug.com/7369$
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/8229H
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://anglebug.com/5371?
unknown
http://anglebug.com/4551:
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
http://anglebug.com/64394
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/4836&
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/5421M
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/4836)
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/5881.
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://www.google.com/async/ddljson?async=ntp:2ageHandler
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/5430J
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
ProgramId
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
FileId
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
LowerCaseLongPath
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
LongPathHash
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
Name
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
OriginalFileName
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
Publisher
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
Version
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
BinFileVersion
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
BinaryType
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
ProductName
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
ProductVersion
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
LinkDate
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
BinProductVersion
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
AppxPackageFullName
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
AppxPackageRelativeId
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
Size
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
Language
\REGISTRY\A\{c206c743-a985-0efb-e0fc-069128f538f7}\Root\InventoryApplicationFile\phwugyok2i.exe|fb025769c34b3a0e
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29ACA4B3000
heap
page read and write
F9237FD000
stack
page read and write
5C1800760000
trusted library allocation
page read and write
5E100075E000
trusted library allocation
page read and write
180F000
stack
page read and write
5C1800640000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
5E1002FE9000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
A80000
direct allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
7326000
heap
page read and write
8E4000
heap
page read and write
5E1000A7E000
trusted library allocation
page read and write
183F000
stack
page read and write
5E1002A74000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1002E38000
trusted library allocation
page read and write
27DF000
unkown
page read and write
68C1000
heap
page read and write
5E1002EC0000
trusted library allocation
page read and write
B54000
heap
page read and write
5E1002510000
trusted library allocation
page read and write
5E1002960000
trusted library allocation
page read and write
5E100260C000
trusted library allocation
page read and write
5E1002925000
trusted library allocation
page read and write
5E100349C000
trusted library allocation
page read and write
5E1003034000
trusted library allocation
page read and write
5E1002510000
trusted library allocation
page read and write
29ACD983000
heap
page read and write
29AD47EE000
trusted library section
page read and write
5C1800601000
trusted library allocation
page read and write
5E1003194000
trusted library allocation
page read and write
F9297FE000
stack
page read and write
5E10030E0000
trusted library allocation
page read and write
5E1003144000
trusted library allocation
page read and write
5E1002201000
trusted library allocation
page read and write
5E10023AC000
trusted library allocation
page read and write
5E1002FD4000
trusted library allocation
page read and write
F90EFFE000
unkown
page readonly
72B0000
heap
page read and write
5C1800758000
trusted library allocation
page read and write
16E000
unkown
page read and write
6C709000
unkown
page read and write
5E1002868000
trusted library allocation
page read and write
5C18006C8000
trusted library allocation
page read and write
29ACFEC0000
heap
page read and write
F90000
heap
page read and write
16E000
unkown
page write copy
29AD4A70000
trusted library section
page read and write
5E1002A54000
trusted library allocation
page read and write
5E10030E4000
trusted library allocation
page read and write
6A0000
heap
page read and write
5E10023F0000
trusted library allocation
page read and write
153A000
unkown
page write copy
54C0020C000
direct allocation
page read and write
68C1000
heap
page read and write
29AD43B0000
trusted library section
page read and write
68C1000
heap
page read and write
F9137FB000
stack
page read and write
5E1000C01000
trusted library allocation
page read and write
F91CFFE000
unkown
page readonly
5C1800320000
trusted library allocation
page read and write
73B3000
heap
page read and write
5E10024A4000
trusted library allocation
page read and write
5E1002580000
trusted library allocation
page read and write
5E1002944000
trusted library allocation
page read and write
79C2000
heap
page read and write
D10000
heap
page read and write
68C1000
heap
page read and write
29AD47A0000
trusted library section
page read and write
68C1000
heap
page read and write
29AD3D20000
trusted library section
page read and write
79CD000
heap
page read and write
16A000
unkown
page readonly
5E1003080000
trusted library allocation
page read and write
F906FFE000
unkown
page readonly
68C1000
heap
page read and write
1BFC002BC000
trusted library allocation
page read and write
160000
unkown
page readonly
F909FFE000
unkown
page readonly
68C1000
heap
page read and write
F910FFE000
unkown
page readonly
29ACDF60000
trusted library section
page read and write
5E10024A4000
trusted library allocation
page read and write
5C18007C8000
trusted library allocation
page read and write
6FA0000
direct allocation
page execute and read and write
5E1002B00000
trusted library allocation
page read and write
5E10031BC000
trusted library allocation
page read and write
5C180035C000
trusted library allocation
page read and write
5E1002C4C000
trusted library allocation
page read and write
5C1800714000
trusted library allocation
page read and write
5C1800418000
trusted library allocation
page read and write
5E1002C84000
trusted library allocation
page read and write
E5E000
stack
page read and write
68C1000
heap
page read and write
280A000
heap
page read and write
5E100318D000
trusted library allocation
page read and write
5C18006B0000
trusted library allocation
page read and write
5E1002FC8000
trusted library allocation
page read and write
7B7E000
heap
page read and write
5E1002A3A000
trusted library allocation
page read and write
F9067FC000
stack
page read and write
54C00210000
direct allocation
page read and write
6C70C000
unkown
page readonly
5E1002544000
trusted library allocation
page read and write
5C1800248000
trusted library allocation
page read and write
79C3000
heap
page read and write
8D0000
heap
page read and write
54C00270000
direct allocation
page read and write
F919FFE000
unkown
page readonly
5C1800770000
trusted library allocation
page read and write
29ACDEE7000
heap
page read and write
5E10023D4000
trusted library allocation
page read and write
8E4000
heap
page read and write
5E10030F0000
trusted library allocation
page read and write
68C1000
heap
page read and write
29ACA424000
heap
page read and write
FCE000
stack
page read and write
29ACA4B0000
heap
page read and write
68C1000
heap
page read and write
D5E000
stack
page read and write
5E10028AC000
trusted library allocation
page read and write
6A0000
heap
page read and write
16A000
unkown
page readonly
16A000
unkown
page readonly
16E000
unkown
page read and write
5C18006F0000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1002FF0000
trusted library allocation
page read and write
5E100304C000
trusted library allocation
page read and write
161000
unkown
page execute read
68C1000
heap
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
B54000
heap
page read and write
F91BFFE000
unkown
page readonly
F9277FE000
stack
page read and write
5E1002D20000
trusted library allocation
page read and write
5C18002F4000
trusted library allocation
page read and write
5E10023F8000
trusted library allocation
page read and write
5E1002EAC000
trusted library allocation
page read and write
161000
unkown
page execute read
B4C000
heap
page read and write
A7E000
stack
page read and write
7324000
heap
page read and write
BE0000
heap
page read and write
29ACDEC5000
heap
page read and write
5E100253C000
trusted library allocation
page read and write
29AD3C47000
unclassified section
page read and write
54C002A8000
direct allocation
page read and write
79C9000
heap
page read and write
5E10024D0000
trusted library allocation
page read and write
6F80000
direct allocation
page execute and read and write
F80000
heap
page read and write
68C1000
heap
page read and write
79C2000
heap
page read and write
5C1800368000
trusted library allocation
page read and write
5E1002504000
trusted library allocation
page read and write
5E10024B4000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C180033C000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
5E1002504000
trusted library allocation
page read and write
68C1000
heap
page read and write
6FB0000
direct allocation
page execute and read and write
5C1800644000
trusted library allocation
page read and write
73EE000
heap
page read and write
5E10027D8000
trusted library allocation
page read and write
5E100241C000
trusted library allocation
page read and write
68C1000
heap
page read and write
79CA000
heap
page read and write
5E10027B0000
trusted library allocation
page read and write
F9267FE000
stack
page read and write
5E10022A8000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1002550000
trusted library allocation
page read and write
5C1800404000
trusted library allocation
page read and write
5E1003228000
trusted library allocation
page read and write
5C180035C000
trusted library allocation
page read and write
68C1000
heap
page read and write
29AD47E0000
trusted library section
page read and write
F90B7FA000
stack
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
5C1800704000
trusted library allocation
page read and write
16E000
unkown
page write copy
5E100334C000
trusted library allocation
page read and write
1BFC002BC000
trusted library allocation
page read and write
29ACC123000
heap
page read and write
7323000
heap
page read and write
5C18006D0000
trusted library allocation
page read and write
AD0000
heap
page read and write
68C1000
heap
page read and write
732D000
heap
page read and write
5E1002A01000
trusted library allocation
page read and write
B45000
heap
page read and write
5E1002C18000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
68C1000
heap
page read and write
29ACFEC3000
heap
page read and write
5E1003188000
trusted library allocation
page read and write
29ACDE50000
heap
page read and write
29AD3AA0000
trusted library section
page read and write
1BFC002A0000
trusted library allocation
page read and write
5E1002D90000
trusted library allocation
page read and write
F91C7FD000
stack
page read and write
F90FFFE000
unkown
page readonly
732D000
heap
page read and write
29ACD97A000
heap
page read and write
5E100234C000
trusted library allocation
page read and write
5C1800788000
trusted library allocation
page read and write
5E1002B34000
trusted library allocation
page read and write
800000
heap
page read and write
5E100251C000
trusted library allocation
page read and write
68C1000
heap
page read and write
B47000
heap
page read and write
5C1800201000
trusted library allocation
page read and write
5C1800630000
trusted library allocation
page read and write
5E1002EEC000
trusted library allocation
page read and write
68C1000
heap
page read and write
18B0000
heap
page read and write
5E10022F0000
trusted library allocation
page read and write
79C9000
heap
page read and write
5E1002B80000
trusted library allocation
page read and write
F97FDFE000
unkown
page readonly
F921FFE000
unkown
page readonly
F912FFE000
unkown
page readonly
68C1000
heap
page read and write
5E10025EC000
trusted library allocation
page read and write
5E10024C4000
trusted library allocation
page read and write
F9227FD000
stack
page read and write
5E1002B4C000
trusted library allocation
page read and write
8E4000
heap
page read and write
16A000
unkown
page readonly
171000
unkown
page readonly
A80000
direct allocation
page read and write
5C18006E4000
trusted library allocation
page read and write
5E1002544000
trusted library allocation
page read and write
F97A5EF000
stack
page read and write
68C1000
heap
page read and write
5C1800248000
trusted library allocation
page read and write
160000
unkown
page readonly
F9057FB000
stack
page read and write
F90C7FE000
stack
page read and write
FFC000
stack
page read and write
A80000
direct allocation
page read and write
5C1800720000
trusted library allocation
page read and write
160000
unkown
page readonly
1BFC0020C000
trusted library allocation
page read and write
161000
unkown
page execute read
29AD3F20000
trusted library section
page read and write
5E10025EE000
trusted library allocation
page read and write
F9207FD000
stack
page read and write
68C1000
heap
page read and write
B25000
heap
page read and write
BF0000
heap
page read and write
5E1002C70000
trusted library allocation
page read and write
68C1000
heap
page read and write
29ACA5A5000
heap
page read and write
B5B000
heap
page read and write
732D000
heap
page read and write
5E1002550000
trusted library allocation
page read and write
18AB000
unkown
page execute and write copy
5E1002220000
trusted library allocation
page read and write
73CB000
heap
page read and write
F9017FB000
stack
page read and write
5E10034AC000
trusted library allocation
page read and write
5E1002E88000
trusted library allocation
page read and write
54C00220000
direct allocation
page read and write
E9F000
stack
page read and write
23CD000
stack
page read and write
5C1800698000
trusted library allocation
page read and write
79C2000
heap
page read and write
5E100340C000
trusted library allocation
page read and write
5E1002528000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E10024A4000
trusted library allocation
page read and write
27E0000
heap
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
8E4000
heap
page read and write
16E000
unkown
page write copy
68C1000
heap
page read and write
F9117FC000
stack
page read and write
F908FFE000
unkown
page readonly
79C9000
heap
page read and write
5E1002F04000
trusted library allocation
page read and write
5E1002CC3000
trusted library allocation
page read and write
5E1002530000
trusted library allocation
page read and write
68C1000
heap
page read and write
2F0000
heap
page read and write
68C1000
heap
page read and write
F97B5FD000
unkown
page read and write
5E1000B1A000
trusted library allocation
page read and write
5E100309C000
trusted library allocation
page read and write
5C180078C000
trusted library allocation
page read and write
6D40000
direct allocation
page read and write
68C1000
heap
page read and write
5E10024A8000
trusted library allocation
page read and write
B3E000
heap
page read and write
5E1000801000
trusted library allocation
page read and write
13FC000
stack
page read and write
EDC000
stack
page read and write
16E000
unkown
page read and write
29ACD97E000
heap
page read and write
68C1000
heap
page read and write
5E1003401000
trusted library allocation
page read and write
161000
unkown
page execute read
E10000
unkown
page readonly
68C1000
heap
page read and write
A80000
direct allocation
page read and write
5E10033BC000
trusted library allocation
page read and write
79C4000
heap
page read and write
29ACDED0000
heap
page read and write
F914FFE000
unkown
page readonly
5E10027C4000
trusted library allocation
page read and write
5E1002B24000
trusted library allocation
page read and write
5E1002930000
trusted library allocation
page read and write
79C3000
heap
page read and write
73CD000
heap
page read and write
7328000
heap
page read and write
79C3000
heap
page read and write
171000
unkown
page readonly
77C1000
heap
page read and write
68C1000
heap
page read and write
5E10003BE000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C1800320000
trusted library allocation
page read and write
5E100238C000
trusted library allocation
page read and write
29AD4621000
trusted library section
page read and write
68C1000
heap
page read and write
5C1800688000
trusted library allocation
page read and write
5E1003060000
trusted library allocation
page read and write
5E10026A8000
trusted library allocation
page read and write
29AD45C7000
unclassified section
page read and write
5E100267C000
trusted library allocation
page read and write
5E1003188000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
F97DDFE000
unkown
page readonly
6FB0000
direct allocation
page execute and read and write
72BA000
heap
page read and write
5E100220C000
trusted library allocation
page read and write
5E1000201000
trusted library allocation
page read and write
F903FFE000
unkown
page readonly
5E100253C000
trusted library allocation
page read and write
54C00284000
direct allocation
page read and write
7327000
heap
page read and write
68C1000
heap
page read and write
29ACDF21000
heap
page read and write
68C1000
heap
page read and write
7466000
direct allocation
page read and write
161000
unkown
page execute read
68C1000
heap
page read and write
68C1000
heap
page read and write
5E10030E4000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
4AC000
stack
page read and write
29AD476D000
trusted library section
page read and write
5E10031F0000
trusted library allocation
page read and write
B46000
heap
page read and write
F97F5FE000
stack
page read and write
68C1000
heap
page read and write
5C1800320000
trusted library allocation
page read and write
5E10030B4000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E10023EC000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
68C1000
heap
page read and write
8E4000
heap
page read and write
5E1002D20000
trusted library allocation
page read and write
5E10033B4000
trusted library allocation
page read and write
8E4000
heap
page read and write
29ACA4A7000
heap
page read and write
5E10023E4000
trusted library allocation
page read and write
171000
unkown
page readonly
B45000
heap
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
5E1002504000
trusted library allocation
page read and write
79C9000
heap
page read and write
160000
unkown
page readonly
11D7000
heap
page read and write
29ACDEDB000
heap
page read and write
5C1800320000
trusted library allocation
page read and write
5C1800401000
trusted library allocation
page read and write
5E1003147000
trusted library allocation
page read and write
171000
unkown
page readonly
68C1000
heap
page read and write
5E1002BF0000
trusted library allocation
page read and write
29AD4691000
trusted library section
page read and write
5E1000601000
trusted library allocation
page read and write
5E100306C000
trusted library allocation
page read and write
29AD43A0000
trusted library section
page read and write
5E1002BAC000
trusted library allocation
page read and write
5E10029A4000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E10025EC000
trusted library allocation
page read and write
5E1002BF0000
trusted library allocation
page read and write
B54000
heap
page read and write
68C1000
heap
page read and write
A80000
direct allocation
page read and write
68C1000
heap
page read and write
5C1800744000
trusted library allocation
page read and write
6E0000
heap
page read and write
7327000
heap
page read and write
16A000
unkown
page readonly
5E10023AC000
trusted library allocation
page read and write
5E1002BF0000
trusted library allocation
page read and write
5E1003144000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
68C1000
heap
page read and write
16E000
unkown
page read and write
5C1800210000
trusted library allocation
page read and write
5C18007D0000
trusted library allocation
page read and write
5E1002570000
trusted library allocation
page read and write
79C5000
heap
page read and write
68C1000
heap
page read and write
F91E7FE000
stack
page read and write
65C000
stack
page read and write
5E1002AC4000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
5C1800724000
trusted library allocation
page read and write
5C18006D4000
trusted library allocation
page read and write
732E000
heap
page read and write
5C180025C000
trusted library allocation
page read and write
5E1002F20000
trusted library allocation
page read and write
79CB000
heap
page read and write
F91FFFE000
unkown
page readonly
74C1000
heap
page read and write
171000
unkown
page readonly
5E1001001000
trusted library allocation
page read and write
5E10023A0000
trusted library allocation
page read and write
171000
unkown
page readonly
29ACA46A000
heap
page read and write
68C1000
heap
page read and write
7320000
heap
page read and write
1BFC002BC000
trusted library allocation
page read and write
F97D5FE000
stack
page read and write
5E1002BE0000
trusted library allocation
page read and write
5C1800430000
trusted library allocation
page read and write
B4F000
heap
page read and write
5C1800620000
trusted library allocation
page read and write
68C1000
heap
page read and write
71D0000
trusted library allocation
page read and write
171000
unkown
page readonly
EEF000
stack
page read and write
29ACD983000
heap
page read and write
5E1002B9F000
trusted library allocation
page read and write
5E100251C000
trusted library allocation
page read and write
16A000
unkown
page readonly
5E1002905000
trusted library allocation
page read and write
54C0024C000
direct allocation
page read and write
68C1000
heap
page read and write
5C18007B4000
trusted library allocation
page read and write
29AD4610000
trusted library section
page read and write
1BFC00288000
trusted library allocation
page read and write
68C1000
heap
page read and write
29ACD985000
heap
page read and write
2800000
heap
page read and write
5F0000
heap
page read and write
5E10032EC000
trusted library allocation
page read and write
68C1000
heap
page read and write
9A0000
heap
page read and write
5E100285C000
trusted library allocation
page read and write
5E100221C000
trusted library allocation
page read and write
5E10025EC000
trusted library allocation
page read and write
5E100253C000
trusted library allocation
page read and write
68C1000
heap
page read and write
7B7F000
heap
page read and write
5E100255C000
trusted library allocation
page read and write
54C00230000
direct allocation
page read and write
1BFC00248000
trusted library allocation
page read and write
5E10029DC000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
6FB0000
direct allocation
page execute and read and write
5E10023D0000
trusted library allocation
page read and write
5E100240C000
trusted library allocation
page read and write
160F000
stack
page read and write
16A000
unkown
page readonly
70D1000
heap
page read and write
5E100267C000
trusted library allocation
page read and write
5E10030A4000
trusted library allocation
page read and write
714B000
heap
page read and write
5E1002E94000
trusted library allocation
page read and write
7323000
heap
page read and write
5E10032C4000
trusted library allocation
page read and write
16A000
unkown
page readonly
5E1002704000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1002778000
trusted library allocation
page read and write
171000
unkown
page readonly
5E100267C000
trusted library allocation
page read and write
5C1800330000
trusted library allocation
page read and write
5C1800288000
trusted library allocation
page read and write
5E100242C000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E100332C000
trusted library allocation
page read and write
5C1800230000
trusted library allocation
page read and write
171000
unkown
page readonly
29ACD97E000
heap
page read and write
5C1800700000
trusted library allocation
page read and write
5E1002AA8000
trusted library allocation
page read and write
68C1000
heap
page read and write
29AD46A3000
trusted library section
page read and write
68C1000
heap
page read and write
7327000
heap
page read and write
68C1000
heap
page read and write
7D5F000
heap
page read and write
5E1002A44000
trusted library allocation
page read and write
F91A7FE000
stack
page read and write
5C18002D4000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
79CB000
heap
page read and write
29AD1F90000
trusted library allocation
page read and write
5C18006EC000
trusted library allocation
page read and write
5E1003018000
trusted library allocation
page read and write
7323000
heap
page read and write
5C18007CC000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
8E4000
heap
page read and write
73CF000
heap
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
6F90000
direct allocation
page execute and read and write
79C5000
heap
page read and write
5C180060C000
trusted library allocation
page read and write
160000
unkown
page readonly
7325000
heap
page read and write
68C1000
heap
page read and write
161000
unkown
page execute read
8E4000
heap
page read and write
68C1000
heap
page read and write
732F000
heap
page read and write
8E4000
heap
page read and write
F9047FB000
stack
page read and write
8E4000
heap
page read and write
79CF000
heap
page read and write
68C1000
heap
page read and write
29ACD97E000
heap
page read and write
68C1000
heap
page read and write
830000
heap
page read and write
5E1002FB8000
trusted library allocation
page read and write
5E10030C4000
trusted library allocation
page read and write
29AD396E000
trusted library section
page read and write
7320000
heap
page read and write
5C18007E0000
trusted library allocation
page read and write
68C1000
heap
page read and write
79CF000
heap
page read and write
5E1002830000
trusted library allocation
page read and write
29ACA4C2000
heap
page read and write
1BFC002B0000
trusted library allocation
page read and write
5E1003118000
trusted library allocation
page read and write
8E4000
heap
page read and write
16E000
unkown
page read and write
70EF000
heap
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
5E1002428000
trusted library allocation
page read and write
68C1000
heap
page read and write
73EB000
heap
page read and write
68C1000
heap
page read and write
1470000
heap
page read and write
1BFC00230000
trusted library allocation
page read and write
79CE000
heap
page read and write
1BFC002C0000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1002DA8000
trusted library allocation
page read and write
54C00290000
direct allocation
page read and write
5E1002394000
trusted library allocation
page read and write
29AD39C3000
trusted library section
page read and write
5E10025EE000
trusted library allocation
page read and write
5E1002500000
trusted library allocation
page read and write
29ACA493000
heap
page read and write
5E10025EE000
trusted library allocation
page read and write
5C1800694000
trusted library allocation
page read and write
732C000
heap
page read and write
7320000
heap
page read and write
5E1002530000
trusted library allocation
page read and write
3D0000
heap
page read and write
68C1000
heap
page read and write
B4F000
heap
page read and write
B08000
heap
page read and write
68C1000
heap
page read and write
171000
unkown
page readonly
1BFC00294000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
B4F000
heap
page read and write
6C6BF000
unkown
page readonly
5E1003024000
trusted library allocation
page read and write
79C2000
heap
page read and write
6FB0000
direct allocation
page execute and read and write
E5C000
stack
page read and write
F91AFFE000
unkown
page readonly
A80000
direct allocation
page read and write
1BFC002A0000
trusted library allocation
page read and write
68C1000
heap
page read and write
29ACDED3000
heap
page read and write
79CF000
heap
page read and write
68C1000
heap
page read and write
5E10024A8000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
5E100349C000
trusted library allocation
page read and write
D90000
heap
page read and write
16E000
unkown
page read and write
5E1002EB8000
trusted library allocation
page read and write
16E000
unkown
page write copy
1BFC00260000
trusted library allocation
page read and write
F905FFE000
unkown
page readonly
54C00201000
direct allocation
page read and write
1BFC002C8000
trusted library allocation
page read and write
5E1002E2C000
trusted library allocation
page read and write
29ACD991000
heap
page read and write
68C1000
heap
page read and write
F924FFE000
unkown
page readonly
68C1000
heap
page read and write
45C000
stack
page read and write
29AD418D000
heap
page read and write
68C1000
heap
page read and write
AF2000
heap
page read and write
5E1002274000
trusted library allocation
page read and write
5E10030F0000
trusted library allocation
page read and write
F91DFFE000
unkown
page readonly
5C1800750000
trusted library allocation
page read and write
161000
unkown
page execute read
160000
unkown
page readonly
29ACDEE1000
heap
page read and write
79C3000
heap
page read and write
F902FFE000
unkown
page readonly
5E10032CC000
trusted library allocation
page read and write
2A60000
heap
page read and write
1BFC00250000
trusted library allocation
page read and write
CBC000
stack
page read and write
68C1000
heap
page read and write
7292000
heap
page read and write
7142000
heap
page read and write
5C1800374000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C1800310000
trusted library allocation
page read and write
5E10031B8000
trusted library allocation
page read and write
5E100281C000
trusted library allocation
page read and write
54C00294000
direct allocation
page read and write
68C1000
heap
page read and write
16A000
unkown
page readonly
5E1003354000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E100300C000
trusted library allocation
page read and write
1BFC00278000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E100320C000
trusted library allocation
page read and write
5E100290A000
trusted library allocation
page read and write
68C1000
heap
page read and write
A80000
direct allocation
page read and write
F97EDFE000
unkown
page readonly
A3E000
stack
page read and write
29ACC100000
heap
page read and write
68C1000
heap
page read and write
5C18006C4000
trusted library allocation
page read and write
5C1800220000
trusted library allocation
page read and write
16A000
unkown
page readonly
5E1002F0C000
trusted library allocation
page read and write
29ACDEE5000
heap
page read and write
68C1000
heap
page read and write
29AD4762000
trusted library section
page read and write
171000
unkown
page readonly
5E1002264000
trusted library allocation
page read and write
68C1000
heap
page read and write
7B8F000
heap
page read and write
5E100253C000
trusted library allocation
page read and write
5C18006E0000
trusted library allocation
page read and write
79CE000
heap
page read and write
68C1000
heap
page read and write
5C180020C000
trusted library allocation
page read and write
16A000
unkown
page readonly
F90DFFE000
unkown
page readonly
11D0000
heap
page read and write
5C1800310000
trusted library allocation
page read and write
5E10024A4000
trusted library allocation
page read and write
5E1002E68000
trusted library allocation
page read and write
16A000
unkown
page readonly
A80000
direct allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
29ACD984000
heap
page read and write
68C1000
heap
page read and write
A80000
direct allocation
page read and write
29ACC120000
heap
page read and write
5C180039C000
trusted library allocation
page read and write
F90F7FC000
stack
page read and write
54C00250000
direct allocation
page read and write
5E100229F000
trusted library allocation
page read and write
F91B7FE000
stack
page read and write
5E1002590000
trusted library allocation
page read and write
29AD4670000
trusted library section
page read and write
960000
heap
page read and write
68C1000
heap
page read and write
29AD3A06000
trusted library section
page read and write
8E4000
heap
page read and write
68C1000
heap
page read and write
F90BFFE000
unkown
page readonly
F90AFFE000
unkown
page readonly
6FB0000
direct allocation
page execute and read and write
68C1000
heap
page read and write
29ACA4F0000
heap
page read and write
8E4000
heap
page read and write
5E1002244000
trusted library allocation
page read and write
5E1002568000
trusted library allocation
page read and write
5E1003188000
trusted library allocation
page read and write
5E1003054000
trusted library allocation
page read and write
5E100279C000
trusted library allocation
page read and write
5E10031B8000
trusted library allocation
page read and write
5E100267C000
trusted library allocation
page read and write
5C18003EC000
trusted library allocation
page read and write
5E1002DC8000
trusted library allocation
page read and write
5C1800354000
trusted library allocation
page read and write
5E100228C000
trusted library allocation
page read and write
18B0000
heap
page read and write
5E1002BF0000
trusted library allocation
page read and write
5E10034BC000
trusted library allocation
page read and write
5E10022D0000
trusted library allocation
page read and write
F904FFE000
unkown
page readonly
5E10023C4000
trusted library allocation
page read and write
29ACA3DB000
heap
page read and write
68C1000
heap
page read and write
5E10033AC000
trusted library allocation
page read and write
5E1003334000
trusted library allocation
page read and write
7328000
heap
page read and write
29ACDEEE000
heap
page read and write
5E1002898000
trusted library allocation
page read and write
68C1000
heap
page read and write
1BFC002F8000
trusted library allocation
page read and write
1BFC002C0000
trusted library allocation
page read and write
5E1002B90000
trusted library allocation
page read and write
5E1002F44000
trusted library allocation
page read and write
EA0000
heap
page read and write
29ACA540000
trusted library allocation
page read and write
5E1002F2C000
trusted library allocation
page read and write
279E000
unkown
page read and write
160000
unkown
page readonly
160000
unkown
page readonly
732E000
heap
page read and write
29ACD98F000
heap
page read and write
5C18006CC000
trusted library allocation
page read and write
54C00217000
direct allocation
page read and write
5E10031B8000
trusted library allocation
page read and write
161000
unkown
page execute read
161000
unkown
page execute read
B10000
heap
page read and write
7D3E000
heap
page read and write
79C8000
heap
page read and write
68C1000
heap
page read and write
B54000
heap
page read and write
F920FFE000
unkown
page readonly
5E1002F90000
trusted library allocation
page read and write
54C00280000
direct allocation
page read and write
5E10029A1000
trusted library allocation
page read and write
5E10026AC000
trusted library allocation
page read and write
5C1800614000
trusted library allocation
page read and write
5E1002590000
trusted library allocation
page read and write
F928FFE000
unkown
page readonly
79CA000
heap
page read and write
5E1002328000
trusted library allocation
page read and write
5E10028E0000
trusted library allocation
page read and write
5E1002C0C000
trusted library allocation
page read and write
5E1002601000
trusted library allocation
page read and write
68C1000
heap
page read and write
8E4000
heap
page read and write
161000
unkown
page execute read
5C1800364000
trusted library allocation
page read and write
54C002E4000
direct allocation
page read and write
5C180075C000
trusted library allocation
page read and write
5C18002B0000
trusted library allocation
page read and write
C5C000
stack
page read and write
5E1002D44000
trusted library allocation
page read and write
D60000
heap
page read and write
F90D7FE000
stack
page read and write
68C1000
heap
page read and write
5E10024A4000
trusted library allocation
page read and write
5E10028ED000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C1800734000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
54C002AC000
direct allocation
page read and write
B30000
heap
page read and write
F9177FB000
stack
page read and write
5E1002A2C000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E10026DC000
trusted library allocation
page read and write
7FE000
stack
page read and write
5E10032DC000
trusted library allocation
page read and write
5E1002FE4000
trusted library allocation
page read and write
5E10032A8000
trusted library allocation
page read and write
BF0000
heap
page read and write
79C7000
heap
page read and write
161000
unkown
page execute read
68C1000
heap
page read and write
293E000
stack
page read and write
67C000
stack
page read and write
29ACA5A0000
heap
page read and write
5E1003024000
trusted library allocation
page read and write
F9147FC000
stack
page read and write
29ACD960000
heap
page read and write
5E1002710000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C180027C000
trusted library allocation
page read and write
5E1002550000
trusted library allocation
page read and write
8E4000
heap
page read and write
5E10023B4000
trusted library allocation
page read and write
10A7000
heap
page read and write
68C1000
heap
page read and write
5E10033C8000
trusted library allocation
page read and write
16A000
unkown
page readonly
10EF000
stack
page read and write
29ACD97A000
heap
page read and write
68C1000
heap
page read and write
1BFC002F0000
trusted library allocation
page read and write
160000
unkown
page readonly
500000
heap
page read and write
F929FFE000
unkown
page readonly
54C002D0000
direct allocation
page read and write
71D0000
trusted library allocation
page read and write
11FD000
stack
page read and write
5E10023E0000
trusted library allocation
page read and write
5E1002E01000
trusted library allocation
page read and write
29AD3A6D000
trusted library section
page read and write
54C002EC000
direct allocation
page read and write
161000
unkown
page execute read
68C1000
heap
page read and write
68C1000
heap
page read and write
1BFC00238000
trusted library allocation
page read and write
68C1000
heap
page read and write
160000
unkown
page readonly
5E1002A0C000
trusted library allocation
page read and write
B3E000
heap
page read and write
5E10025A4000
trusted library allocation
page read and write
29ACDEE3000
heap
page read and write
780000
heap
page read and write
5E100253C000
trusted library allocation
page read and write
5E1000001000
trusted library allocation
page read and write
16A000
unkown
page readonly
29ACA530000
trusted library allocation
page read and write
5E10033AC000
trusted library allocation
page read and write
B62000
heap
page read and write
5E1002550000
trusted library allocation
page read and write
5E1002318000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1002F34000
trusted library allocation
page read and write
F9087FE000
stack
page read and write
54C0025C000
direct allocation
page read and write
5E1002858000
trusted library allocation
page read and write
1317000
heap
page read and write
5E10029C8000
trusted library allocation
page read and write
7FE000
stack
page read and write
29ACDEDF000
heap
page read and write
5E10031D8000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
5E1002CFC000
trusted library allocation
page read and write
1BFC002E4000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
2650000
heap
page read and write
7324000
heap
page read and write
1BFC002C0000
trusted library allocation
page read and write
79CF000
heap
page read and write
68C1000
heap
page read and write
F913FFE000
unkown
page readonly
F90E7FA000
stack
page read and write
5E10023B4000
trusted library allocation
page read and write
7143000
heap
page read and write
5E1002E28000
trusted library allocation
page read and write
7146000
heap
page read and write
5E1002CC0000
trusted library allocation
page read and write
16A000
unkown
page readonly
5E1002418000
trusted library allocation
page read and write
68C1000
heap
page read and write
6FB0000
direct allocation
page execute and read and write
A80000
direct allocation
page read and write
68C1000
heap
page read and write
5C1800354000
trusted library allocation
page read and write
5E1003090000
trusted library allocation
page read and write
5E1000401000
trusted library allocation
page read and write
1BFC002A0000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1003024000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
5E1002D9C000
trusted library allocation
page read and write
29ACD991000
heap
page read and write
5C1800330000
trusted library allocation
page read and write
29AD3A62000
trusted library section
page read and write
5E100237C000
trusted library allocation
page read and write
29C000
stack
page read and write
732D000
heap
page read and write
68C1000
heap
page read and write
5E100240C000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
29AD4632000
trusted library section
page read and write
68C1000
heap
page read and write
160000
unkown
page readonly
1270000
heap
page read and write
83E000
stack
page read and write
68C1000
heap
page read and write
5E1002984000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
5E100247C000
trusted library allocation
page read and write
161000
unkown
page execute read
5E1002FDB000
trusted library allocation
page read and write
5E1000E01000
trusted library allocation
page read and write
17E0000
heap
page read and write
5E100268C000
trusted library allocation
page read and write
7324000
heap
page read and write
5E1002E58000
trusted library allocation
page read and write
5E10030E4000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E10023E8000
trusted library allocation
page read and write
B4F000
heap
page read and write
29ACDDC0000
trusted library section
page read and write
F923FFE000
unkown
page readonly
5E1002590000
trusted library allocation
page read and write
F900FFE000
unkown
page readonly
FEE000
stack
page read and write
68C1000
heap
page read and write
16E000
unkown
page write copy
5E10025EC000
trusted library allocation
page read and write
161000
unkown
page execute read
5E1003140000
trusted library allocation
page read and write
68C1000
heap
page read and write
BF8000
heap
page read and write
68C1000
heap
page read and write
7326000
heap
page read and write
5E10023C8000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
5C1800368000
trusted library allocation
page read and write
5E10024A4000
trusted library allocation
page read and write
5E1003240000
trusted library allocation
page read and write
13B0000
heap
page read and write
F918FFE000
unkown
page readonly
5C1800730000
trusted library allocation
page read and write
68C1000
heap
page read and write
F9037FE000
stack
page read and write
5E1003218000
trusted library allocation
page read and write
7300000
direct allocation
page read and write
125C000
stack
page read and write
F91D7FD000
stack
page read and write
68C1000
heap
page read and write
5E100225A000
trusted library allocation
page read and write
5E1003001000
trusted library allocation
page read and write
5E10025A4000
trusted library allocation
page read and write
29AD3950000
trusted library section
page read and write
5E1002EFC000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
AAC000
stack
page read and write
68C1000
heap
page read and write
5C18002FC000
trusted library allocation
page read and write
79C7000
heap
page read and write
5E10023F4000
trusted library allocation
page read and write
5C18006FC000
trusted library allocation
page read and write
10A0000
heap
page read and write
5E1002504000
trusted library allocation
page read and write
29ACDEC2000
heap
page read and write
6C708000
unkown
page readonly
510000
heap
page read and write
78AA000
heap
page read and write
5C18006AC000
trusted library allocation
page read and write
29ACCB70000
unkown
page read and write
68C1000
heap
page read and write
29ACA510000
heap
page read and write
79CB000
heap
page read and write
B62000
heap
page read and write
5E10031C4000
trusted library allocation
page read and write
16A000
unkown
page readonly
29ACD983000
heap
page read and write
160000
unkown
page readonly
68C1000
heap
page read and write
F9077FE000
stack
page read and write
29AD26C0000
heap
page read and write
5E1002E9C000
trusted library allocation
page read and write
5E10024F0000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
1BFC002BC000
trusted library allocation
page read and write
160000
unkown
page readonly
7329000
heap
page read and write
FD0000
heap
page read and write
C90000
heap
page read and write
1BFC002C0000
trusted library allocation
page read and write
29ACD976000
heap
page read and write
29ACDEF4000
heap
page read and write
5E1002CE2000
trusted library allocation
page read and write
5C180040C000
trusted library allocation
page read and write
5E10025EE000
trusted library allocation
page read and write
1BFC002BC000
trusted library allocation
page read and write
5E1002BF0000
trusted library allocation
page read and write
B3D000
heap
page read and write
5E10024AC000
trusted library allocation
page read and write
16E000
unkown
page read and write
68C1000
heap
page read and write
160000
unkown
page readonly
29ACD950000
heap
page read and write
732B000
heap
page read and write
2680000
heap
page read and write
5E1002B68000
trusted library allocation
page read and write
68C1000
heap
page read and write
6FB0000
direct allocation
page execute and read and write
161000
unkown
page execute read
F9007FD000
stack
page read and write
29ACA46E000
heap
page read and write
5E10030B4000
trusted library allocation
page read and write
5E1002334000
trusted library allocation
page read and write
29ACA3D0000
heap
page read and write
68C1000
heap
page read and write
1477000
heap
page read and write
29ACFF17000
unclassified section
page read and write
68C1000
heap
page read and write
5E1003154000
trusted library allocation
page read and write
F917FFE000
unkown
page readonly
68C1000
heap
page read and write
5E10024F7000
trusted library allocation
page read and write
5E10024F3000
trusted library allocation
page read and write
79C8000
heap
page read and write
F9127FB000
stack
page read and write
77C1000
heap
page read and write
C5F000
stack
page read and write
F90A7FD000
stack
page read and write
54C0023C000
direct allocation
page read and write
F40000
heap
page read and write
F97BDFE000
unkown
page readonly
5E10028CC000
trusted library allocation
page read and write
68C1000
heap
page read and write
47C000
stack
page read and write
5E1003234000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
F9027FB000
stack
page read and write
14C0000
heap
page read and write
F9217FD000
stack
page read and write
5E1003130000
trusted library allocation
page read and write
171000
unkown
page readonly
5E10023DC000
trusted library allocation
page read and write
5E1002E28000
trusted library allocation
page read and write
7329000
heap
page read and write
29ACFEE7000
unclassified section
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
5E1002FAC000
trusted library allocation
page read and write
5C1800754000
trusted library allocation
page read and write
5E1002E78000
trusted library allocation
page read and write
B6C000
heap
page read and write
68C1000
heap
page read and write
1BFC002C0000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C1800684000
trusted library allocation
page read and write
1BFC00274000
trusted library allocation
page read and write
7464000
direct allocation
page read and write
5E1002DBC000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
5C1800250000
trusted library allocation
page read and write
68C1000
heap
page read and write
73D8000
heap
page read and write
5E100253C000
trusted library allocation
page read and write
10C0000
heap
page read and write
5E1003074000
trusted library allocation
page read and write
8E4000
heap
page read and write
5E1002280000
trusted library allocation
page read and write
68C1000
heap
page read and write
732A000
heap
page read and write
5E10034B0000
trusted library allocation
page read and write
5E10023D8000
trusted library allocation
page read and write
5E100236C000
trusted library allocation
page read and write
838000
heap
page read and write
68C1000
heap
page read and write
5E10023AC000
trusted library allocation
page read and write
1BFC002BC000
trusted library allocation
page read and write
5E1002801000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E10031F0000
trusted library allocation
page read and write
F9287FE000
stack
page read and write
5E10029B8000
trusted library allocation
page read and write
5E10023B4000
trusted library allocation
page read and write
161000
unkown
page execute read
68C1000
heap
page read and write
68C1000
heap
page read and write
5E10026C0000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C18002E4000
trusted library allocation
page read and write
5E10023AC000
trusted library allocation
page read and write
29ACA2F0000
heap
page read and write
5E1002BC8000
trusted library allocation
page read and write
5C18006B8000
trusted library allocation
page read and write
7324000
heap
page read and write
1297000
heap
page read and write
F922FFE000
unkown
page readonly
68C1000
heap
page read and write
5E1002DD0000
trusted library allocation
page read and write
8E4000
heap
page read and write
171000
unkown
page readonly
68C1000
heap
page read and write
68C1000
heap
page read and write
171000
unkown
page readonly
16A000
unkown
page readonly
5C1800390000
trusted library allocation
page read and write
F925FFE000
unkown
page readonly
29AD4170000
heap
page read and write
68C1000
heap
page read and write
79CB000
heap
page read and write
5E10028F4000
trusted library allocation
page read and write
68C1000
heap
page read and write
16E000
unkown
page write copy
171000
unkown
page readonly
5E10026A8000
trusted library allocation
page read and write
7321000
heap
page read and write
6C5E1000
unkown
page execute read
5E1002C40000
trusted library allocation
page read and write
139F000
stack
page read and write
F91F7FD000
stack
page read and write
1BFC002D8000
trusted library allocation
page read and write
54C00234000
direct allocation
page read and write
5E1002A68000
trusted library allocation
page read and write
29AD4377000
unclassified section
page read and write
F926FFE000
unkown
page readonly
1BFC00220000
trusted library allocation
page read and write
1BFC002B0000
trusted library allocation
page read and write
5E100235C000
trusted library allocation
page read and write
160000
unkown
page readonly
29ACD98B000
heap
page read and write
5C1800784000
trusted library allocation
page read and write
5C180069C000
trusted library allocation
page read and write
68C1000
heap
page read and write
F9187FB000
stack
page read and write
5E1002CCC000
trusted library allocation
page read and write
68C1000
heap
page read and write
B2F000
stack
page read and write
29ACDF10000
heap
page read and write
54C00303000
direct allocation
page read and write
5E1002590000
trusted library allocation
page read and write
5E1000A01000
trusted library allocation
page read and write
5E1002B14000
trusted library allocation
page read and write
5E100278C000
trusted library allocation
page read and write
F907FFE000
unkown
page readonly
5E1002E48000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
54C0026C000
direct allocation
page read and write
68C1000
heap
page read and write
5C1800664000
trusted library allocation
page read and write
68C1000
heap
page read and write
B40000
heap
page read and write
160000
unkown
page readonly
5E100266C000
trusted library allocation
page read and write
F90CFFE000
unkown
page readonly
68C1000
heap
page read and write
F901FFE000
unkown
page readonly
29ACA4D0000
heap
page readonly
68C1000
heap
page read and write
7325000
heap
page read and write
F916FFE000
unkown
page readonly
5E100326C000
trusted library allocation
page read and write
5E10024C0000
trusted library allocation
page read and write
5E1003310000
trusted library allocation
page read and write
B6E000
stack
page read and write
5E1002410000
trusted library allocation
page read and write
5E10025EC000
trusted library allocation
page read and write
29AD417C000
heap
page read and write
79CA000
heap
page read and write
1BFC002F4000
trusted library allocation
page read and write
5E10031B8000
trusted library allocation
page read and write
68C1000
heap
page read and write
54C002DC000
direct allocation
page read and write
29ACA570000
trusted library section
page readonly
5E10030D0000
trusted library allocation
page read and write
29AD43BE000
trusted library section
page read and write
7322000
heap
page read and write
5E1002544000
trusted library allocation
page read and write
732B000
heap
page read and write
5E1003040000
trusted library allocation
page read and write
5E10024B4000
trusted library allocation
page read and write
7B9B000
heap
page read and write
68C1000
heap
page read and write
16E000
unkown
page read and write
E11000
unkown
page execute and write copy
1BFC00201000
trusted library allocation
page read and write
297F000
stack
page read and write
16E000
unkown
page write copy
F9097FE000
stack
page read and write
5E1002CD8000
trusted library allocation
page read and write
5E1003201000
trusted library allocation
page read and write
171000
unkown
page readonly
29AD4746000
trusted library section
page read and write
5E1002CB0000
trusted library allocation
page read and write
F915FFE000
unkown
page readonly
732A000
heap
page read and write
68C1000
heap
page read and write
171000
unkown
page readonly
29ACE120000
trusted library section
page read and write
68C1000
heap
page read and write
F91EFFE000
unkown
page readonly
5C1800348000
trusted library allocation
page read and write
5E10026B4000
trusted library allocation
page read and write
5E100253C000
trusted library allocation
page read and write
68C1000
heap
page read and write
6C5E0000
unkown
page readonly
5C18006E8000
trusted library allocation
page read and write
5E1002ABC000
trusted library allocation
page read and write
68C1000
heap
page read and write
16A000
unkown
page readonly
1BFC00235000
trusted library allocation
page read and write
16D0000
heap
page read and write
29AD463E000
trusted library section
page read and write
F9157FC000
stack
page read and write
5C1800624000
trusted library allocation
page read and write
29AD3962000
trusted library section
page read and write
68C1000
heap
page read and write
5C1800678000
trusted library allocation
page read and write
1290000
heap
page read and write
6FB0000
direct allocation
page execute and read and write
5E1002544000
trusted library allocation
page read and write
5E1002910000
trusted library allocation
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
5C1800668000
trusted library allocation
page read and write
8E4000
heap
page read and write
5E1002550000
trusted library allocation
page read and write
5E1002E0C000
trusted library allocation
page read and write
7B0000
heap
page read and write
68C1000
heap
page read and write
F97E5FE000
stack
page read and write
F911FFE000
unkown
page readonly
F30000
heap
page read and write
5E1002430000
trusted library allocation
page read and write
68C1000
heap
page read and write
160000
unkown
page readonly
5E1003160000
trusted library allocation
page read and write
5C1800648000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
160000
unkown
page readonly
79CB000
heap
page read and write
5C1800610000
trusted library allocation
page read and write
5E1002E2C000
trusted library allocation
page read and write
16E000
unkown
page read and write
5E10025EF000
trusted library allocation
page read and write
B46000
heap
page read and write
5E10032B4000
trusted library allocation
page read and write
F9257FC000
stack
page read and write
16E000
unkown
page write copy
29AD4680000
trusted library section
page read and write
5C18002ED000
trusted library allocation
page read and write
DDE000
stack
page read and write
5E1002A3D000
trusted library allocation
page read and write
68C1000
heap
page read and write
8E4000
heap
page read and write
5C1800330000
trusted library allocation
page read and write
5E1002F7C000
trusted library allocation
page read and write
1BFC002BD000
trusted library allocation
page read and write
5E1003160000
trusted library allocation
page read and write
5E1003100000
trusted library allocation
page read and write
105C000
stack
page read and write
68C1000
heap
page read and write
5E1002728000
trusted library allocation
page read and write
5E10029AC000
trusted library allocation
page read and write
54C00215000
direct allocation
page read and write
5E1003304000
trusted library allocation
page read and write
5E10025EC000
trusted library allocation
page read and write
1310000
heap
page read and write
79C8000
heap
page read and write
161000
unkown
page execute read
DF0000
direct allocation
page read and write
29AD21C2000
trusted library allocation
page read and write
5E1002420000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1003250000
trusted library allocation
page read and write
9FD000
stack
page read and write
6FB0000
direct allocation
page execute and read and write
F9197FE000
stack
page read and write
79CE000
heap
page read and write
5E1003194000
trusted library allocation
page read and write
5C1800238000
trusted library allocation
page read and write
68C1000
heap
page read and write
7324000
heap
page read and write
68C1000
heap
page read and write
7324000
heap
page read and write
7325000
heap
page read and write
79C0000
heap
page read and write
5C180080C000
trusted library allocation
page read and write
F8E000
stack
page read and write
68C1000
heap
page read and write
68C1000
heap
page read and write
F97C5FF000
stack
page read and write
8E0000
heap
page read and write
F9107FC000
stack
page read and write
5C18002B8000
trusted library allocation
page read and write
1BFC00264000
trusted library allocation
page read and write
B3A000
heap
page read and write
5E100267C000
trusted library allocation
page read and write
5E1002D20000
trusted library allocation
page read and write
5C18002CC000
trusted library allocation
page read and write
5C1800658000
trusted library allocation
page read and write
5E1002414000
trusted library allocation
page read and write
5E1002401000
trusted library allocation
page read and write
5E1002888000
trusted library allocation
page read and write
68C1000
heap
page read and write
7FC000
stack
page read and write
8E4000
heap
page read and write
68C1000
heap
page read and write
F927FFE000
unkown
page readonly
5E1002A84000
trusted library allocation
page read and write
5E1002490000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
68C1000
heap
page read and write
8E4000
heap
page read and write
171000
unkown
page readonly
5E1002D50000
trusted library allocation
page read and write
5C18006B4000
trusted library allocation
page read and write
1BFC002A0000
trusted library allocation
page read and write
F9247FA000
stack
page read and write
5E100267C000
trusted library allocation
page read and write
6FB0000
direct allocation
page execute and read and write
5E10022E0000
trusted library allocation
page read and write
79C4000
heap
page read and write
5E10032A0000
trusted library allocation
page read and write
79CE000
heap
page read and write
7B95000
heap
page read and write
5E1002550000
trusted library allocation
page read and write
68C1000
heap
page read and write
5E1002C60000
trusted library allocation
page read and write
5E100280C000
trusted library allocation
page read and write
5E1002F70000
trusted library allocation
page read and write
79CE000
heap
page read and write
5C1800408000
trusted library allocation
page read and write
5E1002C01000
trusted library allocation
page read and write
5E1002F5C000
trusted library allocation
page read and write
68C1000
heap
page read and write
5C1800424000
trusted library allocation
page read and write
5E1002D90000
trusted library allocation
page read and write
161000
unkown
page execute read
5C180033C000
trusted library allocation
page read and write
68C1000
heap
page read and write
1FFF000
stack
page read and write
29AD3C10000
trusted library section
page read and write
5E1002AD0000
trusted library allocation
page read and write
6C6BD000
unkown
page read and write
7329000
heap
page read and write
68C1000
heap
page read and write
732B000
heap
page read and write
F9167FD000
stack
page read and write
B6E000
heap
page read and write
79C5000
heap
page read and write
A80000
direct allocation
page read and write
1BFC002BC000
trusted library allocation
page read and write
5E10025EE000
trusted library allocation
page read and write
968000
heap
page read and write
5C1800380000
trusted library allocation
page read and write
68C1000
heap
page read and write
732B000
heap
page read and write
5E1002424000
trusted library allocation
page read and write
73E9000
heap
page read and write
5E1000E0A000
trusted library allocation
page read and write
5E1002D34000
trusted library allocation
page read and write
1BFC00270000
trusted library allocation
page read and write
5E1002EDC000
trusted library allocation
page read and write
263A000
stack
page read and write
29ACD98B000
heap
page read and write
5E10028F0000
trusted library allocation
page read and write
1BFC002BC000
trusted library allocation
page read and write
73ED000
heap
page read and write
16E000
unkown
page write copy
68C1000
heap
page read and write
There are 1362 hidden memdumps, click here to show them.