IOC Report
RGU8qibimk.exe

loading gif

Files

File Path
Type
Category
Malicious
RGU8qibimk.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RGU8qibimk.exe_d25c87f13dc6c3581317ff0e5e8ce87b1b014ae_7003eea9_7a4a4e48-07be-4135-a515-2ca43c361a56\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F06.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7187.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71D7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RGU8qibimk.exe
"C:\Users\user\Desktop\RGU8qibimk.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1992,i,8706350967883089063,667949651104255721,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7896 -s 1224
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://anglebug.com/4836E
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/6048K
unknown
http://anglebug.com/4836I
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/4836Q
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://chrome.google.com/webstore?hl=enF
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://chrome.google.com/webstore?hl=en2
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
http://anglebug.com/6439A
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/5881G
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5881J
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/5881I
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://drive.google.com/?lfhs=2Bd
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
http://anglebug.com/3584:
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://unisolated.invalid/B
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://anglebug.com/3862/
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.217.21.36
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
ProgramId
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
FileId
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
LowerCaseLongPath
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
LongPathHash
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
Name
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
OriginalFileName
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
Publisher
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
Version
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
BinFileVersion
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
BinaryType
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
ProductName
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
ProductVersion
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
LinkDate
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
BinProductVersion
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
AppxPackageFullName
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
AppxPackageRelativeId
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
Size
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
Language
\REGISTRY\A\{7dbc34af-a362-abfd-9100-42c8bf39672d}\Root\InventoryApplicationFile\rgu8qibimk.exe|29e2f3dddb9aec48
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8262000
heap
page read and write
DFD000
stack
page read and write
1AC0002B0000
trusted library allocation
page read and write
47BC5FE000
unkown
page readonly
1AC000220000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802E01000
trusted library allocation
page read and write
47C7DFE000
stack
page read and write
70F1000
heap
page read and write
5CD803401000
trusted library allocation
page read and write
1D08000
heap
page read and write
5CD802424000
trusted library allocation
page read and write
9EE000
stack
page read and write
5CD803114000
trusted library allocation
page read and write
70F1000
heap
page read and write
7C5A000
heap
page read and write
5CD8024AC000
trusted library allocation
page read and write
33E000
unkown
page write copy
5CD803114000
trusted library allocation
page read and write
59B0002CC000
trusted library allocation
page read and write
59B00079C000
trusted library allocation
page read and write
8176000
heap
page read and write
70E0000
direct allocation
page read and write
81CC000
heap
page read and write
70F1000
heap
page read and write
5CD8026A0000
trusted library allocation
page read and write
70E0000
direct allocation
page read and write
5CD80302C000
trusted library allocation
page read and write
47D9DFE000
stack
page read and write
5CD802AD8000
trusted library allocation
page read and write
331000
unkown
page execute read
330000
unkown
page readonly
33E000
unkown
page read and write
47C85FE000
unkown
page readonly
5CD8024BC000
trusted library allocation
page read and write
5CD80015A000
trusted library allocation
page read and write
341000
unkown
page readonly
47E3DFE000
stack
page read and write
81AF000
heap
page read and write
59B000880000
trusted library allocation
page read and write
6C831000
unkown
page execute read
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD80241C000
trusted library allocation
page read and write
1AC000278000
trusted library allocation
page read and write
5CD802450000
trusted library allocation
page read and write
5CD8023D0000
trusted library allocation
page read and write
7EB1000
heap
page read and write
330000
unkown
page readonly
1AC0002BC000
trusted library allocation
page read and write
1D3D000
heap
page read and write
1D2E6887000
unclassified section
page read and write
5CD8024AC000
trusted library allocation
page read and write
59B000401000
trusted library allocation
page read and write
47DFDFE000
stack
page read and write
5CD802974000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802BC4000
trusted library allocation
page read and write
59B000850000
trusted library allocation
page read and write
5CD8023A8000
trusted library allocation
page read and write
3FA000
heap
page read and write
70F1000
heap
page read and write
47DF5FE000
unkown
page readonly
12B0000
heap
page read and write
5CD802444000
trusted library allocation
page read and write
5CD802344000
trusted library allocation
page read and write
70F1000
heap
page read and write
70E0000
direct allocation
page read and write
59B0002B8000
trusted library allocation
page read and write
47CEDFB000
stack
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD802790000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD80262F000
trusted library allocation
page read and write
25DE000
stack
page read and write
59B000201000
trusted library allocation
page read and write
5CD802554000
trusted library allocation
page read and write
5CD8025A4000
trusted library allocation
page read and write
1AC0002A0000
trusted library allocation
page read and write
47C15FE000
unkown
page readonly
70F1000
heap
page read and write
5CD800832000
trusted library allocation
page read and write
443000303000
direct allocation
page read and write
125C000
stack
page read and write
47CDDFD000
stack
page read and write
5CD8024C0000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D54000
heap
page read and write
33A000
unkown
page readonly
5CD80314C000
trusted library allocation
page read and write
59B000894000
trusted library allocation
page read and write
10A0000
heap
page read and write
5CD802EA4000
trusted library allocation
page read and write
331000
unkown
page execute read
70F1000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
47B6DFE000
stack
page read and write
70F1000
heap
page read and write
5CD802C0C000
trusted library allocation
page read and write
81F9000
heap
page read and write
70F1000
heap
page read and write
259F000
unkown
page read and write
1D2EA822000
trusted library section
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
59B000250000
trusted library allocation
page read and write
1AC0002BC000
trusted library allocation
page read and write
1AC000248000
trusted library allocation
page read and write
59B000828000
trusted library allocation
page read and write
70E0000
direct allocation
page read and write
30C000
stack
page read and write
47D95FE000
unkown
page readonly
80B4000
heap
page read and write
7B40000
direct allocation
page read and write
7810000
direct allocation
page execute and read and write
70F1000
heap
page read and write
819C000
heap
page read and write
5CD803080000
trusted library allocation
page read and write
15DF000
stack
page read and write
47BADFB000
stack
page read and write
70F1000
heap
page read and write
8FC000
stack
page read and write
DFC000
stack
page read and write
331000
unkown
page execute read
70F1000
heap
page read and write
70F1000
heap
page read and write
1D2EA8B0000
trusted library section
page read and write
1AC00020C000
trusted library allocation
page read and write
5CD802A24000
trusted library allocation
page read and write
8237000
heap
page read and write
47DD5FE000
unkown
page readonly
1AC000260000
trusted library allocation
page read and write
2BD000
stack
page read and write
70F1000
heap
page read and write
5CD8023D0000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
7540000
trusted library allocation
page read and write
82AC000
heap
page read and write
5CD8025BC000
trusted library allocation
page read and write
1AC0002E4000
trusted library allocation
page read and write
5CD802FF8000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD8024AC000
trusted library allocation
page read and write
1D54000
heap
page read and write
47DBDFE000
stack
page read and write
5CD80296C000
trusted library allocation
page read and write
47B7DFE000
stack
page read and write
5CD802554000
trusted library allocation
page read and write
47BF5FE000
unkown
page readonly
331000
unkown
page execute read
47CADFD000
stack
page read and write
59B000248000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
443000274000
direct allocation
page read and write
70F1000
heap
page read and write
47CF5FE000
unkown
page readonly
1440000
heap
page read and write
47CB5FE000
unkown
page readonly
5CD8032D8000
trusted library allocation
page read and write
80B9000
heap
page read and write
70F1000
heap
page read and write
1D2E4AC3000
heap
page read and write
842D000
heap
page read and write
5CD802414000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD80259C000
trusted library allocation
page read and write
80B1000
heap
page read and write
70F1000
heap
page read and write
5CD80284C000
trusted library allocation
page read and write
80B2000
heap
page read and write
1D2EAE40000
trusted library section
page read and write
1D63000
heap
page read and write
5CD8024FB000
trusted library allocation
page read and write
33E000
unkown
page read and write
5CD8027A4000
trusted library allocation
page read and write
5CD80320C000
trusted library allocation
page read and write
5CD802590000
trusted library allocation
page read and write
5CD802BBC000
trusted library allocation
page read and write
E6E000
stack
page read and write
70E0000
direct allocation
page read and write
5CD802354000
trusted library allocation
page read and write
5CD80259C000
trusted library allocation
page read and write
70F1000
heap
page read and write
1AC000264000
trusted library allocation
page read and write
5CD802318000
trusted library allocation
page read and write
80B9000
heap
page read and write
5CD80272A000
trusted library allocation
page read and write
5CD803078000
trusted library allocation
page read and write
59B000430000
trusted library allocation
page read and write
80B6000
heap
page read and write
59B0006F4000
trusted library allocation
page read and write
5CD802801000
trusted library allocation
page read and write
5CD802498000
trusted library allocation
page read and write
9E0000
heap
page read and write
70F1000
heap
page read and write
1D2E446C000
heap
page read and write
5CD802554000
trusted library allocation
page read and write
80B2000
heap
page read and write
1AC0002C0000
trusted library allocation
page read and write
5CD803324000
trusted library allocation
page read and write
59B000860000
trusted library allocation
page read and write
59B000964000
trusted library allocation
page read and write
70F1000
heap
page read and write
47D25FE000
unkown
page readonly
9CC000
stack
page read and write
341000
unkown
page readonly
47C05FE000
unkown
page readonly
5CD802418000
trusted library allocation
page read and write
5CD8027B8000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
59B000728000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD8030CC000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2EAD20000
trusted library section
page read and write
443000215000
direct allocation
page read and write
59B0008EC000
trusted library allocation
page read and write
5CD802D08000
trusted library allocation
page read and write
5CD802214000
trusted library allocation
page read and write
70F1000
heap
page read and write
443000220000
direct allocation
page read and write
70F1000
heap
page read and write
4430002EC000
direct allocation
page read and write
EAE000
stack
page read and write
5CD802FB4000
trusted library allocation
page read and write
1AC0002D8000
trusted library allocation
page read and write
5CD802448000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD8023D0000
trusted library allocation
page read and write
5CD800401000
trusted library allocation
page read and write
1D2E0F1A000
heap
page read and write
331000
unkown
page execute read
70F1000
heap
page read and write
4430002E4000
direct allocation
page read and write
33A000
unkown
page readonly
70F1000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
1AC000294000
trusted library allocation
page read and write
47BB5FE000
unkown
page readonly
70F1000
heap
page read and write
5CD802398000
trusted library allocation
page read and write
5CD802F3C000
trusted library allocation
page read and write
59B0006AC000
trusted library allocation
page read and write
1D2E0F46000
heap
page read and write
1AC000230000
trusted library allocation
page read and write
1D2E0F42000
heap
page read and write
59B000778000
trusted library allocation
page read and write
47B5DFE000
stack
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
59B000237000
trusted library allocation
page read and write
80BD000
heap
page read and write
1AC0002BC000
trusted library allocation
page read and write
8294000
heap
page read and write
5CD802554000
trusted library allocation
page read and write
4430002D0000
direct allocation
page read and write
70F1000
heap
page read and write
5CD803364000
trusted library allocation
page read and write
5CD802A64000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2EB28D000
trusted library section
page read and write
80BE000
heap
page read and write
1D2E0F50000
heap
page readonly
1D63000
heap
page read and write
70F1000
heap
page read and write
1D2EAD31000
trusted library section
page read and write
1D6D000
heap
page read and write
830D000
heap
page read and write
1D46000
heap
page read and write
5CD802E28000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD8026CC000
trusted library allocation
page read and write
5CD8030E4000
trusted library allocation
page read and write
5CD80224D000
trusted library allocation
page read and write
5CD803228000
trusted library allocation
page read and write
5CD802910000
trusted library allocation
page read and write
5CD802EB4000
trusted library allocation
page read and write
5CD8029E8000
trusted library allocation
page read and write
47E1DFE000
stack
page read and write
E20000
heap
page read and write
59B0006E0000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2E8C24000
heap
page read and write
1D2E0D70000
heap
page read and write
5CD802F70000
trusted library allocation
page read and write
47B3DEF000
stack
page read and write
47B55FE000
unkown
page readonly
950000
heap
page read and write
1D2E4470000
heap
page read and write
341000
unkown
page readonly
13EE000
stack
page read and write
80BB000
heap
page read and write
70F1000
heap
page read and write
341000
unkown
page readonly
370000
heap
page read and write
47E0DFE000
stack
page read and write
70F1000
heap
page read and write
7810000
direct allocation
page execute and read and write
47C5DFA000
stack
page read and write
F40000
heap
page read and write
3CE000
stack
page read and write
77F0000
direct allocation
page execute and read and write
F0F000
stack
page read and write
80B3000
heap
page read and write
828B000
heap
page read and write
822C000
heap
page read and write
70F1000
heap
page read and write
33E000
unkown
page write copy
7810000
direct allocation
page execute and read and write
5CD80225C000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D1B000
heap
page read and write
1D2EA55E000
trusted library section
page read and write
330000
unkown
page readonly
70F1000
heap
page read and write
5CD802E7C000
trusted library allocation
page read and write
FD7000
heap
page read and write
7CA4000
direct allocation
page read and write
1D2EACDE000
trusted library section
page read and write
5CD803108000
trusted library allocation
page read and write
47CBDFA000
stack
page read and write
5CD8022C4000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
1578000
heap
page read and write
7810000
direct allocation
page execute and read and write
59B0008C8000
trusted library allocation
page read and write
5CD8022AC000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
59B0007BC000
trusted library allocation
page read and write
59B000904000
trusted library allocation
page read and write
5CD8022EC000
trusted library allocation
page read and write
99E000
stack
page read and write
1D2E4AD4000
heap
page read and write
5CD802EB4000
trusted library allocation
page read and write
47E2DFE000
stack
page read and write
5CD802EA4000
trusted library allocation
page read and write
47C0DFB000
stack
page read and write
70F1000
heap
page read and write
5CD802EA4000
trusted library allocation
page read and write
5CD802EC4000
trusted library allocation
page read and write
827A000
heap
page read and write
59B000864000
trusted library allocation
page read and write
1CF2000
heap
page read and write
70F1000
heap
page read and write
443000250000
direct allocation
page read and write
70F1000
heap
page read and write
47D85FE000
unkown
page readonly
70F1000
heap
page read and write
5CD802B34000
trusted library allocation
page read and write
70F1000
heap
page read and write
828E000
heap
page read and write
47C8DFD000
stack
page read and write
443000230000
direct allocation
page read and write
59B000801000
trusted library allocation
page read and write
1AC000235000
trusted library allocation
page read and write
80B2000
heap
page read and write
5CD803044000
trusted library allocation
page read and write
1AC0002C0000
trusted library allocation
page read and write
836B000
heap
page read and write
5CD802E20000
trusted library allocation
page read and write
1AC0002B0000
trusted library allocation
page read and write
8156000
heap
page read and write
70F1000
heap
page read and write
1D63000
heap
page read and write
5CD8026A8000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD800001000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
59B0007AC000
trusted library allocation
page read and write
33E000
unkown
page read and write
5CD803050000
trusted library allocation
page read and write
5CD803158000
trusted library allocation
page read and write
5CD802D84000
trusted library allocation
page read and write
5CD8023E0000
trusted library allocation
page read and write
47D05FE000
unkown
page readonly
7B21000
heap
page read and write
330000
unkown
page readonly
5CD8025A4000
trusted library allocation
page read and write
5CD80259C000
trusted library allocation
page read and write
F00000
heap
page read and write
5CD8025A4000
trusted library allocation
page read and write
5CD802401000
trusted library allocation
page read and write
1AC000238000
trusted library allocation
page read and write
1D2EACB0000
trusted library section
page read and write
70F1000
heap
page read and write
13A0000
heap
page read and write
5CD802FE4000
trusted library allocation
page read and write
5CD8024B0000
trusted library allocation
page read and write
341000
unkown
page readonly
5CD80260C000
trusted library allocation
page read and write
33E000
unkown
page read and write
5CD8025B0000
trusted library allocation
page read and write
8DC000
stack
page read and write
1D2EAD43000
trusted library section
page read and write
5CD802F54000
trusted library allocation
page read and write
59B0006D4000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD80257C000
trusted library allocation
page read and write
1D54000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
1D2E4ADF000
heap
page read and write
59B0007C4000
trusted library allocation
page read and write
5CD802930000
trusted library allocation
page read and write
5CD802906000
trusted library allocation
page read and write
1D2EAF3E000
trusted library section
page read and write
5CD802C14000
trusted library allocation
page read and write
47D5DFD000
stack
page read and write
5CD802CE4000
trusted library allocation
page read and write
47BE5FE000
unkown
page readonly
1D2E8C3D000
heap
page read and write
5CD802440000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2E446C000
heap
page read and write
1D2EB282000
trusted library section
page read and write
70F1000
heap
page read and write
5CD802554000
trusted library allocation
page read and write
1AC0002BC000
trusted library allocation
page read and write
5CD802CE4000
trusted library allocation
page read and write
70F1000
heap
page read and write
816B000
heap
page read and write
5CD802684000
trusted library allocation
page read and write
5CD8022D4000
trusted library allocation
page read and write
1D2E8C47000
heap
page read and write
5CD802D68000
trusted library allocation
page read and write
59B000918000
trusted library allocation
page read and write
A70000
heap
page read and write
47E15FE000
unkown
page readonly
70F1000
heap
page read and write
1AC0002C0000
trusted library allocation
page read and write
1D2E0F90000
heap
page read and write
1D2EA4D7000
unclassified section
page read and write
70F1000
heap
page read and write
5CD802B24000
trusted library allocation
page read and write
5CD802CAC000
trusted library allocation
page read and write
5CD802438000
trusted library allocation
page read and write
5CD802A01000
trusted library allocation
page read and write
59B000404000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD8028D5000
trusted library allocation
page read and write
5CD80313C000
trusted library allocation
page read and write
6C90D000
unkown
page read and write
341000
unkown
page readonly
940000
heap
page read and write
80B8000
heap
page read and write
70F1000
heap
page read and write
5CD802E6C000
trusted library allocation
page read and write
1D50000
heap
page read and write
70F1000
heap
page read and write
5CD802508000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD803248000
trusted library allocation
page read and write
5CD8026A0000
trusted library allocation
page read and write
5CD800A01000
trusted library allocation
page read and write
33A000
unkown
page readonly
59B0006C8000
trusted library allocation
page read and write
70E0000
direct allocation
page read and write
5CD802560000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD80259C000
trusted library allocation
page read and write
5CD80315C000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802CBC000
trusted library allocation
page read and write
F1E000
stack
page read and write
5CD802428000
trusted library allocation
page read and write
5CD8023D0000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802AEC000
trusted library allocation
page read and write
5CD802820000
trusted library allocation
page read and write
5CD802F30000
trusted library allocation
page read and write
443000294000
direct allocation
page read and write
EB0000
heap
page read and write
1AC000201000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
70F1000
heap
page read and write
8240000
heap
page read and write
6C95C000
unkown
page readonly
82BE000
heap
page read and write
1D2E4466000
heap
page read and write
1D2E4AB5000
heap
page read and write
59B0006F0000
trusted library allocation
page read and write
443000217000
direct allocation
page read and write
70F1000
heap
page read and write
5CD803220000
trusted library allocation
page read and write
7800000
direct allocation
page execute and read and write
33A000
unkown
page readonly
330000
unkown
page readonly
80BB000
heap
page read and write
5CD802E98000
trusted library allocation
page read and write
70F1000
heap
page read and write
47BFDFC000
stack
page read and write
3E0000
heap
page read and write
5CD8024D8000
trusted library allocation
page read and write
59B0002F2000
trusted library allocation
page read and write
13F0000
heap
page read and write
7C50000
heap
page read and write
5CD803348000
trusted library allocation
page read and write
1D2E0F29000
heap
page read and write
1AC0002C0000
trusted library allocation
page read and write
80B0000
heap
page read and write
70F1000
heap
page read and write
5CD8029C8000
trusted library allocation
page read and write
A9E000
stack
page read and write
5CD802EF0000
trusted library allocation
page read and write
5CD8025B0000
trusted library allocation
page read and write
331000
unkown
page execute read
5CD802C24000
trusted library allocation
page read and write
5CD803330000
trusted library allocation
page read and write
59B00095C000
trusted library allocation
page read and write
70E0000
direct allocation
page read and write
5CD802D74000
trusted library allocation
page read and write
5CD802CE4000
trusted library allocation
page read and write
380000
heap
page read and write
80B5000
heap
page read and write
70F1000
heap
page read and write
8205000
heap
page read and write
1D2EA750000
trusted library section
page read and write
80BD000
heap
page read and write
70F1000
heap
page read and write
5CD802BA0000
trusted library allocation
page read and write
83D7000
heap
page read and write
7810000
direct allocation
page execute and read and write
5CD80302C000
trusted library allocation
page read and write
5CD802EC4000
trusted library allocation
page read and write
70F1000
heap
page read and write
47C65FE000
unkown
page readonly
5CD803318000
trusted library allocation
page read and write
59B00078C000
trusted library allocation
page read and write
159F000
stack
page read and write
47C45FE000
unkown
page readonly
1D2E4AD8000
heap
page read and write
5CD8030A0000
trusted library allocation
page read and write
47D7DFE000
stack
page read and write
1D2E445E000
heap
page read and write
1D1B000
heap
page read and write
5CD80259C000
trusted library allocation
page read and write
70F1000
heap
page read and write
33A000
unkown
page readonly
5CD803184000
trusted library allocation
page read and write
5CD800601000
trusted library allocation
page read and write
70F1000
heap
page read and write
47DEDFE000
stack
page read and write
8253000
heap
page read and write
1D2E69F0000
heap
page read and write
33A000
unkown
page readonly
5CD8023C8000
trusted library allocation
page read and write
1AC0002F8000
trusted library allocation
page read and write
8DC000
stack
page read and write
70F1000
heap
page read and write
5CD803184000
trusted library allocation
page read and write
5CD8025B0000
trusted library allocation
page read and write
5CD8023F8000
trusted library allocation
page read and write
5CD803114000
trusted library allocation
page read and write
930000
heap
page read and write
5CD802F68000
trusted library allocation
page read and write
47E35FE000
unkown
page readonly
70F1000
heap
page read and write
1D62000
heap
page read and write
3D0000
heap
page read and write
70F1000
heap
page read and write
5CD802CF8000
trusted library allocation
page read and write
59B000848000
trusted library allocation
page read and write
70F1000
heap
page read and write
A3C000
stack
page read and write
44300020C000
direct allocation
page read and write
5CD802588000
trusted library allocation
page read and write
70F1000
heap
page read and write
47C55FE000
unkown
page readonly
5CD802878000
trusted library allocation
page read and write
5CD8028B0000
trusted library allocation
page read and write
1D2E3700000
unkown
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
83C000
stack
page read and write
59B000960000
trusted library allocation
page read and write
5CD803298000
trusted library allocation
page read and write
70F1000
heap
page read and write
33A000
unkown
page readonly
59B00071C000
trusted library allocation
page read and write
70F1000
heap
page read and write
47CC5FE000
unkown
page readonly
5CD8025F4000
trusted library allocation
page read and write
5CD80272F000
trusted library allocation
page read and write
70F1000
heap
page read and write
47B75FE000
unkown
page readonly
5CD802634000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
330000
unkown
page readonly
7810000
direct allocation
page execute and read and write
B30000
heap
page read and write
70F1000
heap
page read and write
7810000
direct allocation
page execute and read and write
5CD80280C000
trusted library allocation
page read and write
186F000
stack
page read and write
47C35FE000
unkown
page readonly
5CD802B18000
trusted library allocation
page read and write
47C25FE000
unkown
page readonly
47C6DFE000
stack
page read and write
70F1000
heap
page read and write
ECA000
heap
page read and write
331000
unkown
page execute read
70F1000
heap
page read and write
70F1000
heap
page read and write
829A000
heap
page read and write
1D2E4AD2000
heap
page read and write
5CD8032A0000
trusted library allocation
page read and write
70F1000
heap
page read and write
47BD5FE000
unkown
page readonly
8218000
heap
page read and write
5CD803238000
trusted library allocation
page read and write
79A6000
heap
page read and write
80B1000
heap
page read and write
5CD802554000
trusted library allocation
page read and write
59B0002C4000
trusted library allocation
page read and write
70E0000
direct allocation
page read and write
5CD80220C000
trusted library allocation
page read and write
59B000790000
trusted library allocation
page read and write
5CD802B84000
trusted library allocation
page read and write
1D2E0E50000
heap
page read and write
1D2E4AD0000
heap
page read and write
5CD802768000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802A94000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
47C9DFC000
stack
page read and write
443000270000
direct allocation
page read and write
5CD802D68000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2E4AD6000
heap
page read and write
70F1000
heap
page read and write
83FF000
heap
page read and write
5CD80302C000
trusted library allocation
page read and write
2FA000
stack
page read and write
10A7000
heap
page read and write
70F1000
heap
page read and write
59B0008E8000
trusted library allocation
page read and write
1D2EAF30000
trusted library section
page read and write
70F1000
heap
page read and write
5CD80349C000
trusted library allocation
page read and write
ABE000
stack
page read and write
5CD802EA4000
trusted library allocation
page read and write
33A000
unkown
page readonly
59B000878000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
59B000898000
trusted library allocation
page read and write
70F1000
heap
page read and write
940000
heap
page read and write
5CD8023EC000
trusted library allocation
page read and write
70F1000
heap
page read and write
47CD5FE000
unkown
page readonly
5CD802C01000
trusted library allocation
page read and write
59B000788000
trusted library allocation
page read and write
44300023C000
direct allocation
page read and write
5CD80313C000
trusted library allocation
page read and write
5CD802BD0000
trusted library allocation
page read and write
1D2E8C2B000
heap
page read and write
5CD8024FF000
trusted library allocation
page read and write
47D75FE000
unkown
page readonly
70F1000
heap
page read and write
5CD802388000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
7A0000
heap
page read and write
5CD802554000
trusted library allocation
page read and write
70F1000
heap
page read and write
59B000424000
trusted library allocation
page read and write
1D2E1015000
heap
page read and write
341000
unkown
page readonly
5CD802EA4000
trusted library allocation
page read and write
5CD802FA4000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
8164000
heap
page read and write
81DC000
heap
page read and write
5CD80295C000
trusted library allocation
page read and write
331000
unkown
page execute read
59B0002EC000
trusted library allocation
page read and write
1D2EADE6000
trusted library section
page read and write
5CD803124000
trusted library allocation
page read and write
5CD80305C000
trusted library allocation
page read and write
80B4000
heap
page read and write
33E000
unkown
page write copy
59B0008C4000
trusted library allocation
page read and write
443000280000
direct allocation
page read and write
5CD802C58000
trusted library allocation
page read and write
3D0000
heap
page read and write
7C2E000
heap
page read and write
4430002DC000
direct allocation
page read and write
5CD802E88000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802780000
trusted library allocation
page read and write
5CD802F4C000
trusted library allocation
page read and write
1D2E4ABF000
heap
page read and write
80B5000
heap
page read and write
70F1000
heap
page read and write
5CD802240000
trusted library allocation
page read and write
5CD802ED4000
trusted library allocation
page read and write
70F1000
heap
page read and write
80B8000
heap
page read and write
8242000
heap
page read and write
70F1000
heap
page read and write
1D2E4A24000
heap
page read and write
1CFF000
heap
page read and write
1D2EA806000
trusted library section
page read and write
5CD802554000
trusted library allocation
page read and write
5CD802ACC000
trusted library allocation
page read and write
5CD8031C4000
trusted library allocation
page read and write
5CD8024B2000
trusted library allocation
page read and write
47D2DFB000
stack
page read and write
5CD802629000
trusted library allocation
page read and write
9FE000
stack
page read and write
1AC0002C8000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802C34000
trusted library allocation
page read and write
47CCDFC000
stack
page read and write
5CD80302C000
trusted library allocation
page read and write
819D000
heap
page read and write
59B0007A0000
trusted library allocation
page read and write
33E000
unkown
page read and write
80B9000
heap
page read and write
330000
unkown
page readonly
1390000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
59B00060C000
trusted library allocation
page read and write
330000
unkown
page readonly
1D47000
heap
page read and write
70F1000
heap
page read and write
8356000
heap
page read and write
5CD8024AC000
trusted library allocation
page read and write
331000
unkown
page execute read
70F1000
heap
page read and write
1D2E4463000
heap
page read and write
1AC0002BC000
trusted library allocation
page read and write
33E000
unkown
page write copy
70F1000
heap
page read and write
443000210000
direct allocation
page read and write
5CD802C84000
trusted library allocation
page read and write
5CD80259C000
trusted library allocation
page read and write
5CD802F7C000
trusted library allocation
page read and write
7580000
direct allocation
page read and write
5CD8028EC000
trusted library allocation
page read and write
C9F000
stack
page read and write
1D2E2CB0000
heap
page read and write
AFE000
stack
page read and write
83C8000
heap
page read and write
331000
unkown
page execute read
10C000
stack
page read and write
47D3DFB000
stack
page read and write
1D2EA550000
trusted library section
page read and write
1050000
heap
page read and write
331000
unkown
page execute read
341000
unkown
page readonly
47CA5FE000
unkown
page readonly
59B000874000
trusted library allocation
page read and write
5CD803108000
trusted library allocation
page read and write
33E000
unkown
page write copy
59B000920000
trusted library allocation
page read and write
33A000
unkown
page readonly
3C0000
heap
page read and write
ED0000
heap
page read and write
81AD000
heap
page read and write
5CD802A38000
trusted library allocation
page read and write
AD0000
unkown
page readonly
59B0006BC000
trusted library allocation
page read and write
5CD802D7C000
trusted library allocation
page read and write
ECE000
heap
page read and write
5CD8031A8000
trusted library allocation
page read and write
1D2E4464000
heap
page read and write
331000
unkown
page execute read
1D54000
heap
page read and write
59B000884000
trusted library allocation
page read and write
331000
unkown
page execute read
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD8025B0000
trusted library allocation
page read and write
5CD800C01000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
47D1DFE000
stack
page read and write
70F1000
heap
page read and write
5CD802F20000
trusted library allocation
page read and write
AD1000
unkown
page execute and write copy
1D2E4AA6000
heap
page read and write
33A000
unkown
page readonly
77E0000
direct allocation
page execute and read and write
70F1000
heap
page read and write
105C000
stack
page read and write
70F1000
heap
page read and write
5CD802ED4000
trusted library allocation
page read and write
5CD802EF0000
trusted library allocation
page read and write
47D6DFD000
stack
page read and write
70F1000
heap
page read and write
341000
unkown
page readonly
841C000
heap
page read and write
5CD8032C8000
trusted library allocation
page read and write
47E45FE000
unkown
page readonly
80B0000
heap
page read and write
5CD8025B0000
trusted library allocation
page read and write
70F1000
heap
page read and write
331000
unkown
page execute read
5CD80250C000
trusted library allocation
page read and write
1D2E2CB3000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
80BD000
heap
page read and write
340000
heap
page read and write
5CD8025D0000
trusted library allocation
page read and write
82EC000
heap
page read and write
5CD803300000
trusted library allocation
page read and write
DFC000
stack
page read and write
59B00085C000
trusted library allocation
page read and write
47D15FE000
unkown
page readonly
5CD80300C000
trusted library allocation
page read and write
7580000
direct allocation
page read and write
1D2E69F3000
heap
page read and write
8447000
heap
page read and write
1D54000
heap
page read and write
1280000
heap
page read and write
70E0000
direct allocation
page read and write
3F0000
heap
page read and write
47D4DFB000
stack
page read and write
5CD802410000
trusted library allocation
page read and write
1AC000270000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802F88000
trusted library allocation
page read and write
5CD802A8C000
trusted library allocation
page read and write
47BCDFE000
stack
page read and write
4430002AC000
direct allocation
page read and write
70F1000
heap
page read and write
47B8DFE000
stack
page read and write
5CD80298C000
trusted library allocation
page read and write
70F1000
heap
page read and write
99E000
stack
page read and write
5CD802B60000
trusted library allocation
page read and write
59B000248000
trusted library allocation
page read and write
1AC0002BC000
trusted library allocation
page read and write
59B000948000
trusted library allocation
page read and write
33A000
unkown
page readonly
5CD802D24000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2EAEE7000
unclassified section
page read and write
5CD802EA4000
trusted library allocation
page read and write
1D2E445A000
heap
page read and write
341000
unkown
page readonly
5CD802F44000
trusted library allocation
page read and write
80B9000
heap
page read and write
5CD80250C000
trusted library allocation
page read and write
81C9000
heap
page read and write
1D2E4B50000
trusted library section
page read and write
1D2E4471000
heap
page read and write
5CD802DE4000
trusted library allocation
page read and write
59B0006AC000
trusted library allocation
page read and write
5CD8025A4000
trusted library allocation
page read and write
7CA6000
direct allocation
page read and write
5CD8031A8000
trusted library allocation
page read and write
1D2E4BE0000
trusted library section
page read and write
5CD8025C4000
trusted library allocation
page read and write
81FF000
heap
page read and write
330000
unkown
page readonly
5CD802D94000
trusted library allocation
page read and write
5CD8032B8000
trusted library allocation
page read and write
59B00040C000
trusted library allocation
page read and write
5CD802EA4000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
8266000
heap
page read and write
47D65FE000
unkown
page readonly
59B0007C0000
trusted library allocation
page read and write
443000284000
direct allocation
page read and write
80B5000
heap
page read and write
341000
unkown
page readonly
7810000
direct allocation
page execute and read and write
47B95FE000
unkown
page readonly
70F1000
heap
page read and write
FD0000
heap
page read and write
7810000
direct allocation
page execute and read and write
70F1000
heap
page read and write
5CD802E38000
trusted library allocation
page read and write
59B000844000
trusted library allocation
page read and write
59B000818000
trusted library allocation
page read and write
59B00087C000
trusted library allocation
page read and write
3BE000
unkown
page read and write
47D8DFD000
stack
page read and write
70F1000
heap
page read and write
1D50000
heap
page read and write
59B000288000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD802E1C000
trusted library allocation
page read and write
5CD8023F0000
trusted library allocation
page read and write
443000201000
direct allocation
page read and write
5CD8030FC000
trusted library allocation
page read and write
70F1000
heap
page read and write
59B00039C000
trusted library allocation
page read and write
9B0000
heap
page read and write
1D2E9250000
heap
page read and write
5CD802B7B000
trusted library allocation
page read and write
5CD80242C000
trusted library allocation
page read and write
5CD8032F4000
trusted library allocation
page read and write
7931000
heap
page read and write
59B0002DC000
trusted library allocation
page read and write
33E000
unkown
page write copy
70F1000
heap
page read and write
70F1000
heap
page read and write
331000
unkown
page execute read
F07000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
47B85FE000
unkown
page readonly
59B0006E8000
trusted library allocation
page read and write
110F000
stack
page read and write
DE0000
heap
page read and write
5CD801001000
trusted library allocation
page read and write
33A000
unkown
page readonly
5CD80257C000
trusted library allocation
page read and write
1D2E4ACB000
heap
page read and write
47C2DFE000
stack
page read and write
5CD8026F0000
trusted library allocation
page read and write
80B1000
heap
page read and write
5CD803370000
trusted library allocation
page read and write
70E0000
direct allocation
page read and write
1D2E4620000
heap
page read and write
8488000
heap
page read and write
59B00039C000
trusted library allocation
page read and write
47BBDFA000
stack
page read and write
1A6E000
stack
page read and write
70F1000
heap
page read and write
5CD802C9C000
trusted library allocation
page read and write
C30000
heap
page read and write
5CD802DC8000
trusted library allocation
page read and write
59B0006C8000
trusted library allocation
page read and write
1D2E4440000
heap
page read and write
5CD802BC4000
trusted library allocation
page read and write
5CD80302C000
trusted library allocation
page read and write
1AC000274000
trusted library allocation
page read and write
1AC000250000
trusted library allocation
page read and write
1D2E4950000
trusted library section
page read and write
5CD802BC4000
trusted library allocation
page read and write
59B000601000
trusted library allocation
page read and write
1D2EB2E0000
trusted library section
page read and write
816F000
heap
page read and write
70F1000
heap
page read and write
5CD803001000
trusted library allocation
page read and write
5CD802FEC000
trusted library allocation
page read and write
1D69000
heap
page read and write
47C3DFE000
stack
page read and write
47CFDFC000
stack
page read and write
5CD8001D4000
trusted library allocation
page read and write
1D2E0F60000
heap
page read and write
5CD8028C4000
trusted library allocation
page read and write
70F1000
heap
page read and write
47E05FE000
unkown
page readonly
70F1000
heap
page read and write
5CD8024CC000
trusted library allocation
page read and write
5CD802B54000
trusted library allocation
page read and write
6C90F000
unkown
page readonly
1D2E4A5F000
heap
page read and write
1D2E0E58000
heap
page read and write
59B000418000
trusted library allocation
page read and write
59B0006AC000
trusted library allocation
page read and write
5CD802734000
trusted library allocation
page read and write
5CD802570000
trusted library allocation
page read and write
33E000
unkown
page write copy
47BDDFC000
stack
page read and write
B38000
heap
page read and write
59B0008E4000
trusted library allocation
page read and write
5CD8025E0000
trusted library allocation
page read and write
B00000
heap
page read and write
1D2EAAB0000
trusted library section
page read and write
5CD802A0C000
trusted library allocation
page read and write
8239000
heap
page read and write
70F1000
heap
page read and write
8388000
heap
page read and write
1D4D000
heap
page read and write
1D54000
heap
page read and write
1D2E0FB0000
trusted library allocation
page read and write
81DC000
heap
page read and write
5CD802F00000
trusted library allocation
page read and write
47DA5FE000
unkown
page readonly
5CD80229C000
trusted library allocation
page read and write
5CD802E4D000
trusted library allocation
page read and write
821E000
heap
page read and write
70F1000
heap
page read and write
81DF000
heap
page read and write
70F1000
heap
page read and write
5CD802858000
trusted library allocation
page read and write
DFC000
stack
page read and write
330000
unkown
page readonly
70F1000
heap
page read and write
70F1000
heap
page read and write
1D2E6857000
unclassified section
page read and write
8142000
heap
page read and write
80BB000
heap
page read and write
7A8000
heap
page read and write
59B0007E4000
trusted library allocation
page read and write
5CD802CD4000
trusted library allocation
page read and write
80B2000
heap
page read and write
33E000
unkown
page read and write
341000
unkown
page readonly
EC0000
heap
page read and write
70F1000
heap
page read and write
80B8000
heap
page read and write
59B00082C000
trusted library allocation
page read and write
16A0000
heap
page read and write
7540000
trusted library allocation
page read and write
5CD802E5C000
trusted library allocation
page read and write
1D2E445E000
heap
page read and write
70F1000
heap
page read and write
5CD8024AC000
trusted library allocation
page read and write
47C1DFD000
stack
page read and write
83BF000
heap
page read and write
59B000830000
trusted library allocation
page read and write
59B0002B0000
trusted library allocation
page read and write
59B0007E0000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
80B4000
heap
page read and write
70F1000
heap
page read and write
7810000
direct allocation
page execute and read and write
5CD8025B0000
trusted library allocation
page read and write
59B0007D4000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD803090000
trusted library allocation
page read and write
5CD802430000
trusted library allocation
page read and write
59B0006E8000
trusted library allocation
page read and write
5CD80259C000
trusted library allocation
page read and write
5CD8031B8000
trusted library allocation
page read and write
1D2EACD2000
trusted library section
page read and write
5CD802EF0000
trusted library allocation
page read and write
59B000974000
trusted library allocation
page read and write
59B00091C000
trusted library allocation
page read and write
5CD802BC4000
trusted library allocation
page read and write
5CD802590000
trusted library allocation
page read and write
5CD8029AC000
trusted library allocation
page read and write
5CD8025E0000
trusted library allocation
page read and write
47B4DFD000
unkown
page read and write
330000
unkown
page readonly
8222000
heap
page read and write
5CD800E01000
trusted library allocation
page read and write
1589000
unkown
page execute and write copy
1D2E8C74000
heap
page read and write
443000290000
direct allocation
page read and write
70F1000
heap
page read and write
1AC0002A0000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
5CD803108000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802601000
trusted library allocation
page read and write
5CD8032E4000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
70E0000
direct allocation
page read and write
5CD80349C000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802378000
trusted library allocation
page read and write
5CD80240C000
trusted library allocation
page read and write
990000
heap
page read and write
5CD800201000
trusted library allocation
page read and write
1D40000
heap
page read and write
70F1000
heap
page read and write
1D2E4A00000
heap
page read and write
1D2E0FC0000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD8030C2000
trusted library allocation
page read and write
5CD8024F8000
trusted library allocation
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
5CD802554000
trusted library allocation
page read and write
70E000
stack
page read and write
154F000
stack
page read and write
7810000
direct allocation
page execute and read and write
341000
unkown
page readonly
1D2E8E62000
trusted library allocation
page read and write
5CD803114000
trusted library allocation
page read and write
70F1000
heap
page read and write
821F000
heap
page read and write
80BA000
heap
page read and write
1AC0002F0000
trusted library allocation
page read and write
95C000
stack
page read and write
59B000868000
trusted library allocation
page read and write
5CD80299C000
trusted library allocation
page read and write
5CD802D28000
trusted library allocation
page read and write
81B7000
heap
page read and write
5CD802434000
trusted library allocation
page read and write
1D2E0FF0000
trusted library section
page readonly
5CD802BE4000
trusted library allocation
page read and write
59B000220000
trusted library allocation
page read and write
59B00020C000
trusted library allocation
page read and write
12AF000
stack
page read and write
5CD802714000
trusted library allocation
page read and write
33E000
unkown
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
33A000
unkown
page readonly
5CD8027CC000
trusted library allocation
page read and write
5CD803380000
trusted library allocation
page read and write
1D2E1010000
heap
page read and write
33E000
unkown
page read and write
443000260000
direct allocation
page read and write
70F1000
heap
page read and write
443000234000
direct allocation
page read and write
5CD802201000
trusted library allocation
page read and write
5CD802AC4000
trusted library allocation
page read and write
5CD80340C000
trusted library allocation
page read and write
341000
unkown
page readonly
330000
unkown
page readonly
59B00080C000
trusted library allocation
page read and write
1D46000
heap
page read and write
5CD8023F4000
trusted library allocation
page read and write
6C830000
unkown
page readonly
5CD802308000
trusted library allocation
page read and write
59B0008F0000
trusted library allocation
page read and write
5CD8025E0000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD8023BC000
trusted library allocation
page read and write
1D2E4463000
heap
page read and write
70F1000
heap
page read and write
134F000
stack
page read and write
1AC0002BC000
trusted library allocation
page read and write
1AC000288000
trusted library allocation
page read and write
5CD8024CC000
trusted library allocation
page read and write
5CD800C24000
trusted library allocation
page read and write
59B000890000
trusted library allocation
page read and write
5CD803201000
trusted library allocation
page read and write
341000
unkown
page readonly
7810000
direct allocation
page execute and read and write
59B00027C000
trusted library allocation
page read and write
33A000
unkown
page readonly
5CD8024AC000
trusted library allocation
page read and write
47DB5FE000
unkown
page readonly
1AC0002B0000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802E0C000
trusted library allocation
page read and write
5CD802EB4000
trusted library allocation
page read and write
1D2EA76E000
trusted library section
page read and write
1D2EAF27000
unclassified section
page read and write
13D0000
heap
page read and write
70E0000
direct allocation
page read and write
5CD802BC4000
trusted library allocation
page read and write
70F1000
heap
page read and write
47DCDFA000
stack
page read and write
5CD80259C000
trusted library allocation
page read and write
1D5C000
heap
page read and write
910000
heap
page read and write
819E000
heap
page read and write
1570000
heap
page read and write
5CD8025B0000
trusted library allocation
page read and write
5CD8026A0000
trusted library allocation
page read and write
5CD8034AC000
trusted library allocation
page read and write
7810000
direct allocation
page execute and read and write
5CD802E20000
trusted library allocation
page read and write
1D08000
heap
page read and write
5CD802A70000
trusted library allocation
page read and write
5CD8026FC000
trusted library allocation
page read and write
139F000
stack
page read and write
331000
unkown
page execute read
70F1000
heap
page read and write
70E0000
direct allocation
page read and write
47DADFE000
stack
page read and write
47CE5FE000
unkown
page readonly
1AC0002F4000
trusted library allocation
page read and write
1D2EA762000
trusted library section
page read and write
5CD80315C000
trusted library allocation
page read and write
33A000
unkown
page readonly
8159000
heap
page read and write
70F1000
heap
page read and write
70E0000
direct allocation
page read and write
1AC0002C0000
trusted library allocation
page read and write
5CD802D8C000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
5CD802EE8000
trusted library allocation
page read and write
7580000
direct allocation
page read and write
5CD802420000
trusted library allocation
page read and write
5CD802FD0000
trusted library allocation
page read and write
59B0008D8000
trusted library allocation
page read and write
5CD8023C8000
trusted library allocation
page read and write
5CD802A40000
trusted library allocation
page read and write
330000
unkown
page readonly
5CD803108000
trusted library allocation
page read and write
1AC0002A0000
trusted library allocation
page read and write
5CD802554000
trusted library allocation
page read and write
5CD8027E8000
trusted library allocation
page read and write
5CD802E68000
trusted library allocation
page read and write
44300024C000
direct allocation
page read and write
59B000230000
trusted library allocation
page read and write
47DDDFC000
stack
page read and write
EE0000
heap
page read and write
70F1000
heap
page read and write
8399000
heap
page read and write
5CD802DF4000
trusted library allocation
page read and write
47C95FE000
unkown
page readonly
1D2E4AB2000
heap
page read and write
47E25FE000
unkown
page readonly
70F1000
heap
page read and write
5CD8026A3000
trusted library allocation
page read and write
47B9DFD000
stack
page read and write
5CD8028E0000
trusted library allocation
page read and write
70F1000
heap
page read and write
59B00084C000
trusted library allocation
page read and write
8179000
heap
page read and write
47C4DFE000
stack
page read and write
1D2EA82D000
trusted library section
page read and write
80B7000
heap
page read and write
5CD802292000
trusted library allocation
page read and write
5CD80302C000
trusted library allocation
page read and write
47D0DFE000
stack
page read and write
5CD802E68000
trusted library allocation
page read and write
81D6000
heap
page read and write
47BA5FE000
unkown
page readonly
11FA000
unkown
page write copy
59B00081C000
trusted library allocation
page read and write
341000
unkown
page readonly
70F1000
heap
page read and write
5CD802674000
trusted library allocation
page read and write
59B0008A8000
trusted library allocation
page read and write
5CD802EB4000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD803108000
trusted library allocation
page read and write
5CD802BC4000
trusted library allocation
page read and write
47C75FE000
unkown
page readonly
1010000
heap
page read and write
794F000
heap
page read and write
6C959000
unkown
page read and write
330000
unkown
page readonly
142E000
stack
page read and write
5CD8023C8000
trusted library allocation
page read and write
1D63000
heap
page read and write
5CD8028FC000
trusted library allocation
page read and write
70F1000
heap
page read and write
47D45FE000
unkown
page readonly
5CD802570000
trusted library allocation
page read and write
5CD8031D4000
trusted library allocation
page read and write
47BEDFB000
stack
page read and write
1AC0002A0000
trusted library allocation
page read and write
5CD80335C000
trusted library allocation
page read and write
5CD802EDC000
trusted library allocation
page read and write
1D2E4A44000
heap
page read and write
70F1000
heap
page read and write
5CD8026A0000
trusted library allocation
page read and write
5CD803068000
trusted library allocation
page read and write
5CD802EA4000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2E445A000
heap
page read and write
7810000
direct allocation
page execute and read and write
47DC5FE000
unkown
page readonly
6C958000
unkown
page readonly
1D2E6900000
trusted library allocation
page read and write
1058000
heap
page read and write
70F1000
heap
page read and write
5CD800CC2000
trusted library allocation
page read and write
12CF000
stack
page read and write
59B000700000
trusted library allocation
page read and write
1D2E4471000
heap
page read and write
5CD80301C000
trusted library allocation
page read and write
59B000210000
trusted library allocation
page read and write
5CD8030F4000
trusted library allocation
page read and write
5CD8024B0000
trusted library allocation
page read and write
5CD8030C0000
trusted library allocation
page read and write
5CD800801000
trusted library allocation
page read and write
5CD80244C000
trusted library allocation
page read and write
5CD8022B8000
trusted library allocation
page read and write
5CD803264000
trusted library allocation
page read and write
59B00025C000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD80243C000
trusted library allocation
page read and write
1D2E4AE5000
heap
page read and write
1D50000
heap
page read and write
330000
unkown
page readonly
59B000980000
trusted library allocation
page read and write
59B0002FC000
trusted library allocation
page read and write
1D2E4A35000
heap
page read and write
5CD802E1C000
trusted library allocation
page read and write
4430002A8000
direct allocation
page read and write
70F1000
heap
page read and write
5CD802E58000
trusted library allocation
page read and write
5CD802C89000
trusted library allocation
page read and write
DFC000
stack
page read and write
1D50000
heap
page read and write
7810000
direct allocation
page execute and read and write
1D2EACC1000
trusted library section
page read and write
5CD8023C8000
trusted library allocation
page read and write
FD0000
heap
page read and write
1D2EA7C3000
trusted library section
page read and write
59B0008B4000
trusted library allocation
page read and write
59B0006F4000
trusted library allocation
page read and write
59B0008F4000
trusted library allocation
page read and write
5CD802C74000
trusted library allocation
page read and write
5CD8025E0000
trusted library allocation
page read and write
80BE000
heap
page read and write
81FE000
heap
page read and write
80B4000
heap
page read and write
70F1000
heap
page read and write
8204000
heap
page read and write
290F000
stack
page read and write
ED0000
heap
page read and write
59B0008B8000
trusted library allocation
page read and write
5CD80283C000
trusted library allocation
page read and write
70F1000
heap
page read and write
1D2E4430000
heap
page read and write
33A000
unkown
page readonly
5CD8030B0000
trusted library allocation
page read and write
47D55FE000
unkown
page readonly
9A0000
heap
page read and write
70F1000
heap
page read and write
47D35FE000
unkown
page readonly
33E000
unkown
page write copy
1D2EAD10000
trusted library section
page read and write
5CD802328000
trusted library allocation
page read and write
330000
unkown
page readonly
5CD80309C000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD802360000
trusted library allocation
page read and write
47DE5FE000
unkown
page readonly
70F1000
heap
page read and write
1D2E4790000
trusted library section
page read and write
5CD802F14000
trusted library allocation
page read and write
5CD8025A4000
trusted library allocation
page read and write
834D000
heap
page read and write
80BA000
heap
page read and write
70F1000
heap
page read and write
70F1000
heap
page read and write
59B000408000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD8023B0000
trusted library allocation
page read and write
70F1000
heap
page read and write
59B000840000
trusted library allocation
page read and write
70F1000
heap
page read and write
5CD8024B2000
trusted library allocation
page read and write
59B00070C000
trusted library allocation
page read and write
5CD803038000
trusted library allocation
page read and write
5CD80240C000
trusted library allocation
page read and write
There are 1334 hidden memdumps, click here to show them.