IOC Report
QDQXUZhiY3.exe

loading gif

Files

File Path
Type
Category
Malicious
QDQXUZhiY3.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QDQXUZhiY3.exe_f266db8c788d7509a82e858cc86429985a0d9_e68ec146_0ba0f399-52a7-4f71-8e9e-dc4b5cdbc916\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C67.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:39:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E0E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E3E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\CaHNbeclRGcBxNSvHjFX.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QDQXUZhiY3.exe
"C:\Users\user\Desktop\QDQXUZhiY3.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 --field-trial-handle=2364,i,2043666830668904066,2319298136264217903,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\/service123.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\/service123.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\/service123.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\/service123.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7872 -s 1400
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b6
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
https://drive.google.com/?lfhs=2/4j
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://httpbin.org/ip
98.85.100.80
https://anglebug.com/7847
unknown
https://google-ohttp-relay-join.fastly-edge.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fivetk5sb.top
185.121.15.192
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
fivetk5sb.top
185.121.15.192
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.fivetk5sb.top
Spain
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
ProgramId
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
FileId
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
LowerCaseLongPath
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
LongPathHash
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
Name
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
OriginalFileName
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
Publisher
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
Version
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
BinFileVersion
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
BinaryType
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
ProductName
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
ProductVersion
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
LinkDate
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
BinProductVersion
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
AppxPackageFullName
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
AppxPackageRelativeId
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
Size
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
Language
\REGISTRY\A\{65961b53-456b-ad2d-df9c-b496547753db}\Root\InventoryApplicationFile\qdqxuzhiy3.exe|21f2c5f86d78c007
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
163F000
stack
page read and write
18B94A8F000
heap
page read and write
369C009D8000
trusted library allocation
page read and write
18B9849B000
heap
page read and write
2D7E000
unkown
page read and write
7251000
heap
page read and write
7910000
direct allocation
page execute and read and write
369C002B4000
trusted library allocation
page read and write
3DF0000
direct allocation
page execute and read and write
82AF000
heap
page read and write
369C00A44000
trusted library allocation
page read and write
18B9EB26000
trusted library section
page read and write
18B984F1000
heap
page read and write
369C00F3C000
trusted library allocation
page read and write
18B98451000
heap
page read and write
1AC800284000
direct allocation
page read and write
1AC800215000
direct allocation
page read and write
7251000
heap
page read and write
18B9847C000
heap
page read and write
1958007CC000
trusted library allocation
page read and write
2CB21FE000
stack
page read and write
2A0000
unkown
page readonly
7910000
direct allocation
page execute and read and write
51E8002C8000
trusted library allocation
page read and write
7251000
heap
page read and write
195800614000
trusted library allocation
page read and write
51E8002BC000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
18B98469000
heap
page read and write
18B984C1000
heap
page read and write
18B9C190000
heap
page read and write
369C00228000
trusted library allocation
page read and write
2AA000
unkown
page readonly
369C00078000
trusted library allocation
page read and write
369C00C5C000
trusted library allocation
page read and write
369C006BC000
trusted library allocation
page read and write
195800390000
trusted library allocation
page read and write
369C00C84000
trusted library allocation
page read and write
2CAA1FC000
stack
page read and write
2096000
heap
page read and write
18B97F17000
heap
page read and write
1AC800294000
direct allocation
page read and write
2CAC1FE000
stack
page read and write
7251000
heap
page read and write
7A4C000
heap
page read and write
847D000
heap
page read and write
195800374000
trusted library allocation
page read and write
7251000
heap
page read and write
18B97F30000
heap
page read and write
58E000
stack
page read and write
18B9EA83000
trusted library section
page read and write
369C003EC000
trusted library allocation
page read and write
19580033C000
trusted library allocation
page read and write
18B98471000
heap
page read and write
7251000
heap
page read and write
18B9848B000
heap
page read and write
7251000
heap
page read and write
369C00350000
trusted library allocation
page read and write
2CCC1FE000
stack
page read and write
7910000
direct allocation
page execute and read and write
7251000
heap
page read and write
7910000
direct allocation
page execute and read and write
7251000
heap
page read and write
83A5000
heap
page read and write
18B94970000
heap
page read and write
7251000
heap
page read and write
8324000
heap
page read and write
369C01164000
trusted library allocation
page read and write
7251000
heap
page read and write
13FF000
stack
page read and write
2CA81FA000
stack
page read and write
2EE0000
heap
page read and write
2CB31FE000
stack
page read and write
7DEC000
direct allocation
page read and write
369C00344000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00D74000
trusted library allocation
page read and write
7251000
heap
page read and write
29FA000
stack
page read and write
7251000
heap
page read and write
369C003A4000
trusted library allocation
page read and write
369C001AC000
trusted library allocation
page read and write
19580078C000
trusted library allocation
page read and write
1958006C8000
trusted library allocation
page read and write
11F0000
heap
page read and write
369C00E58000
trusted library allocation
page read and write
8553000
heap
page read and write
18B9845A000
heap
page read and write
369C00DAC000
trusted library allocation
page read and write
369C001C4000
trusted library allocation
page read and write
18B9EB4D000
trusted library section
page read and write
18B9CBB7000
unclassified section
page read and write
7910000
direct allocation
page execute and read and write
2CB09FE000
unkown
page readonly
369C0033C000
trusted library allocation
page read and write
18B9E0F2000
trusted library section
page read and write
6D13C000
unkown
page readonly
369C01110000
trusted library allocation
page read and write
369C00994000
trusted library allocation
page read and write
369C00AB4000
trusted library allocation
page read and write
2CBE1FD000
stack
page read and write
369C00230000
trusted library allocation
page read and write
195800210000
trusted library allocation
page read and write
7251000
heap
page read and write
950000
heap
page read and write
369C00128000
trusted library allocation
page read and write
2CCA1FE000
stack
page read and write
18B9844B000
heap
page read and write
2AA000
unkown
page readonly
81FD000
heap
page read and write
369C00BD8000
trusted library allocation
page read and write
8525000
heap
page read and write
7251000
heap
page read and write
2AA000
unkown
page readonly
7251000
heap
page read and write
2CCE9FE000
unkown
page readonly
369C00C84000
trusted library allocation
page read and write
410000
heap
page read and write
7251000
heap
page read and write
83F0000
heap
page read and write
836B000
heap
page read and write
18B9EA1E000
trusted library section
page read and write
1958002B0000
trusted library allocation
page read and write
51E8002BC000
trusted library allocation
page read and write
1958003EC000
trusted library allocation
page read and write
51E8002B0000
trusted library allocation
page read and write
7251000
heap
page read and write
7C1E000
heap
page read and write
7251000
heap
page read and write
195800368000
trusted library allocation
page read and write
369C00DE4000
trusted library allocation
page read and write
195800630000
trusted library allocation
page read and write
19580069C000
trusted library allocation
page read and write
369C00B40000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
369C007E4000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
9FC000
stack
page read and write
369C00D94000
trusted library allocation
page read and write
1AC8002AC000
direct allocation
page read and write
369C010EC000
trusted library allocation
page read and write
51E800248000
trusted library allocation
page read and write
7251000
heap
page read and write
369C007A8000
trusted library allocation
page read and write
369C012AC000
trusted library allocation
page read and write
19F0000
direct allocation
page read and write
369C00D54000
trusted library allocation
page read and write
D00000
heap
page read and write
81F7000
heap
page read and write
83B3000
heap
page read and write
2A0000
unkown
page readonly
2CC31FE000
stack
page read and write
81F2000
heap
page read and write
195800698000
trusted library allocation
page read and write
7251000
heap
page read and write
1AC80023C000
direct allocation
page read and write
369C00EA0000
trusted library allocation
page read and write
369C003EC000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
369C00234000
trusted library allocation
page read and write
19F0000
direct allocation
page read and write
2CC81FA000
stack
page read and write
2A1000
unkown
page execute read
369C00B24000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
18B984C5000
heap
page read and write
2CC19FE000
unkown
page readonly
2CAA9FE000
unkown
page readonly
369C000F0000
trusted library allocation
page read and write
18B97F30000
heap
page read and write
369C00F64000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00D24000
trusted library allocation
page read and write
369C006CC000
trusted library allocation
page read and write
2CAF9FE000
unkown
page readonly
369C00BF0000
trusted library allocation
page read and write
1780000
heap
page read and write
369C00350000
trusted library allocation
page read and write
7251000
heap
page read and write
81F2000
heap
page read and write
1AC800201000
direct allocation
page read and write
369C00350000
trusted library allocation
page read and write
18B984E2000
heap
page read and write
2C9E9FE000
unkown
page readonly
369C00FDC000
trusted library allocation
page read and write
369C003A4000
trusted library allocation
page read and write
1AC8002A8000
direct allocation
page read and write
7251000
heap
page read and write
18B9CD70000
heap
page read and write
2CC71FE000
stack
page read and write
369C006DC000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
65C000
stack
page read and write
18B9CD73000
heap
page read and write
7910000
direct allocation
page execute and read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C00B4C000
trusted library allocation
page read and write
369C00390000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00A01000
trusted library allocation
page read and write
369C00564000
trusted library allocation
page read and write
369C001DC000
trusted library allocation
page read and write
369C00310000
trusted library allocation
page read and write
1958006FC000
trusted library allocation
page read and write
2CA01FE000
stack
page read and write
844E000
heap
page read and write
195800368000
trusted library allocation
page read and write
18B9EC0E000
trusted library section
page read and write
2A0000
unkown
page readonly
369C0033C000
trusted library allocation
page read and write
369C002F4000
trusted library allocation
page read and write
369C0016C000
trusted library allocation
page read and write
369C0100C000
trusted library allocation
page read and write
369C000E0000
trusted library allocation
page read and write
195800644000
trusted library allocation
page read and write
369C00740000
trusted library allocation
page read and write
369C00F1C000
trusted library allocation
page read and write
195800750000
trusted library allocation
page read and write
7251000
heap
page read and write
195800648000
trusted library allocation
page read and write
2CC39FE000
unkown
page readonly
369C00328000
trusted library allocation
page read and write
7EF1000
heap
page read and write
1958007C8000
trusted library allocation
page read and write
2CBC1FD000
stack
page read and write
7251000
heap
page read and write
369C00294000
trusted library allocation
page read and write
51E800260000
trusted library allocation
page read and write
2A0000
unkown
page readonly
2CC99FE000
unkown
page readonly
2A0000
unkown
page readonly
2CBF9FE000
unkown
page readonly
8336000
heap
page read and write
2CA49FE000
unkown
page readonly
7251000
heap
page read and write
1958006D0000
trusted library allocation
page read and write
D80000
heap
page read and write
369C00118000
trusted library allocation
page read and write
838C000
heap
page read and write
369C00BE8000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00CEC000
trusted library allocation
page read and write
18B984D4000
heap
page read and write
18B9846A000
heap
page read and write
7251000
heap
page read and write
1AC800290000
direct allocation
page read and write
2A0000
unkown
page readonly
195800354000
trusted library allocation
page read and write
18B98463000
heap
page read and write
2CBD9FE000
unkown
page readonly
7251000
heap
page read and write
369C00C94000
trusted library allocation
page read and write
369C00304000
trusted library allocation
page read and write
369C00CD8000
trusted library allocation
page read and write
7251000
heap
page read and write
195800310000
trusted library allocation
page read and write
18B9845A000
heap
page read and write
2096000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
1AC8002D0000
direct allocation
page read and write
7910000
direct allocation
page execute and read and write
369C00304000
trusted library allocation
page read and write
369C0068C000
trusted library allocation
page read and write
51E800230000
trusted library allocation
page read and write
18B9E133000
trusted library section
page read and write
81F2000
heap
page read and write
369C00850000
trusted library allocation
page read and write
369C00890000
trusted library allocation
page read and write
2B1000
unkown
page readonly
81F2000
heap
page read and write
369C00098000
trusted library allocation
page read and write
20A4000
heap
page read and write
195800320000
trusted library allocation
page read and write
369C001C8000
trusted library allocation
page read and write
195800250000
trusted library allocation
page read and write
369C00044000
trusted library allocation
page read and write
369C00E4C000
trusted library allocation
page read and write
81F0000
heap
page read and write
8304000
heap
page read and write
3DD0000
direct allocation
page execute and read and write
2AA000
unkown
page readonly
7251000
heap
page read and write
208D000
heap
page read and write
369C003EC000
trusted library allocation
page read and write
369C001B4000
trusted library allocation
page read and write
2AA000
unkown
page readonly
7251000
heap
page read and write
51E8002BC000
trusted library allocation
page read and write
18B9E0FE000
trusted library section
page read and write
7251000
heap
page read and write
369C001E4000
trusted library allocation
page read and write
81F5000
heap
page read and write
18B97F28000
heap
page read and write
18B9848C000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
833E000
heap
page read and write
1AC800234000
direct allocation
page read and write
18B949C0000
trusted library allocation
page read and write
369C00F90000
trusted library allocation
page read and write
18B94A7B000
heap
page read and write
2CAB1FE000
stack
page read and write
195800688000
trusted library allocation
page read and write
369C00BC4000
trusted library allocation
page read and write
18B94940000
heap
page read and write
7251000
heap
page read and write
2CB11FE000
stack
page read and write
18B9E1B2000
trusted library section
page read and write
2F6F000
stack
page read and write
369C003EC000
trusted library allocation
page read and write
2CA91FC000
stack
page read and write
369C00390000
trusted library allocation
page read and write
2096000
heap
page read and write
7E0000
heap
page read and write
369C00A4C000
trusted library allocation
page read and write
2CA39FE000
unkown
page readonly
17BC000
unkown
page execute and write copy
369C00294000
trusted library allocation
page read and write
2CCA9FE000
unkown
page readonly
82F0000
heap
page read and write
7251000
heap
page read and write
2B1000
unkown
page readonly
1AC800274000
direct allocation
page read and write
2CA19FE000
unkown
page readonly
369C00FB0000
trusted library allocation
page read and write
8412000
heap
page read and write
7251000
heap
page read and write
18B984C1000
heap
page read and write
369C001AC000
trusted library allocation
page read and write
2A1000
unkown
page execute read
369C009D8000
trusted library allocation
page read and write
369C0020C000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
7251000
heap
page read and write
18B9E9B7000
unclassified section
page read and write
195800401000
trusted library allocation
page read and write
51E8002A0000
trusted library allocation
page read and write
369C00434000
trusted library allocation
page read and write
7251000
heap
page read and write
369C0033C000
trusted library allocation
page read and write
18B97EF0000
heap
page read and write
369C00E4C000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00D69000
trusted library allocation
page read and write
7251000
heap
page read and write
369C001E0000
trusted library allocation
page read and write
84FF000
heap
page read and write
195800220000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
1958002B8000
trusted library allocation
page read and write
369C0031C000
trusted library allocation
page read and write
369C01001000
trusted library allocation
page read and write
369C007B0000
trusted library allocation
page read and write
369C00214000
trusted library allocation
page read and write
369C00298000
trusted library allocation
page read and write
6D0EF000
unkown
page readonly
369C00B08000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C001F0000
trusted library allocation
page read and write
2CB49FE000
unkown
page readonly
7251000
heap
page read and write
369C00C30000
trusted library allocation
page read and write
81F5000
heap
page read and write
369C00C84000
trusted library allocation
page read and write
1AC800220000
direct allocation
page read and write
369C00C14000
trusted library allocation
page read and write
195800734000
trusted library allocation
page read and write
195800404000
trusted library allocation
page read and write
82FD000
heap
page read and write
7251000
heap
page read and write
18B98410000
heap
page read and write
369C00E28000
trusted library allocation
page read and write
369C00C84000
trusted library allocation
page read and write
369C006E8000
trusted library allocation
page read and write
369C0018C000
trusted library allocation
page read and write
195800310000
trusted library allocation
page read and write
369C00F10000
trusted library allocation
page read and write
369C01158000
trusted library allocation
page read and write
369C002B4000
trusted library allocation
page read and write
369C000A8000
trusted library allocation
page read and write
369C00E58000
trusted library allocation
page read and write
369C00F6C000
trusted library allocation
page read and write
51E8002BC000
trusted library allocation
page read and write
369C00574000
trusted library allocation
page read and write
7251000
heap
page read and write
51E8002BC000
trusted library allocation
page read and write
369C001F8000
trusted library allocation
page read and write
369C00618000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
2CC11FD000
stack
page read and write
369C00774000
trusted library allocation
page read and write
369C009D8000
trusted library allocation
page read and write
80EA000
heap
page read and write
2093000
heap
page read and write
369C00D80000
trusted library allocation
page read and write
81F4000
heap
page read and write
7251000
heap
page read and write
18B9C1B9000
heap
page read and write
7251000
heap
page read and write
195800720000
trusted library allocation
page read and write
7251000
heap
page read and write
8303000
heap
page read and write
18B97F30000
heap
page read and write
7251000
heap
page read and write
369C00508000
trusted library allocation
page read and write
D88000
heap
page read and write
369C0008E000
trusted library allocation
page read and write
369C009B0000
trusted library allocation
page read and write
AF0000
heap
page read and write
369C0060D000
trusted library allocation
page read and write
195800760000
trusted library allocation
page read and write
2B1000
unkown
page readonly
1AC800260000
direct allocation
page read and write
369C009E4000
trusted library allocation
page read and write
7D0000
heap
page read and write
7251000
heap
page read and write
19F0000
direct allocation
page read and write
18B94AA0000
heap
page read and write
7251000
heap
page read and write
369C00DD0000
trusted library allocation
page read and write
7FF1000
heap
page read and write
7251000
heap
page read and write
369C00A20000
trusted library allocation
page read and write
2CA89FE000
unkown
page readonly
195800700000
trusted library allocation
page read and write
18B9844B000
heap
page read and write
7251000
heap
page read and write
369C00368000
trusted library allocation
page read and write
369C00E4C000
trusted library allocation
page read and write
19580040C000
trusted library allocation
page read and write
2CCC9FE000
unkown
page readonly
2CBD1FB000
stack
page read and write
369C00CEF000
trusted library allocation
page read and write
2C9F1FE000
stack
page read and write
369C002C0000
trusted library allocation
page read and write
369C00201000
trusted library allocation
page read and write
2CC01FD000
stack
page read and write
7690000
trusted library allocation
page read and write
2B1000
unkown
page readonly
369C001F4000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C00F08000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
369C00601000
trusted library allocation
page read and write
51E800278000
trusted library allocation
page read and write
18B984CE000
heap
page read and write
7251000
heap
page read and write
195800758000
trusted library allocation
page read and write
2C9D1EF000
stack
page read and write
8480000
heap
page read and write
18B949B0000
trusted library allocation
page read and write
369C01028000
trusted library allocation
page read and write
19F0000
direct allocation
page read and write
1958002D4000
trusted library allocation
page read and write
51E8002B0000
trusted library allocation
page read and write
18B97F23000
heap
page read and write
7251000
heap
page read and write
81F0000
heap
page read and write
19580075C000
trusted library allocation
page read and write
2CC21FD000
stack
page read and write
51E8002F4000
trusted library allocation
page read and write
18B94A7E000
heap
page read and write
1AC800230000
direct allocation
page read and write
7251000
heap
page read and write
195800320000
trusted library allocation
page read and write
7251000
heap
page read and write
18B9EB42000
trusted library section
page read and write
420000
heap
page read and write
7B0000
heap
page read and write
B00000
heap
page read and write
369C00218000
trusted library allocation
page read and write
7251000
heap
page read and write
18B984B8000
heap
page read and write
195800230000
trusted library allocation
page read and write
10BF000
stack
page read and write
18B9845F000
heap
page read and write
369C00390000
trusted library allocation
page read and write
369C00D08000
trusted library allocation
page read and write
2CC89FE000
unkown
page readonly
18B9E7B0000
trusted library section
page read and write
18B9EBC7000
unclassified section
page read and write
369C00F3C000
trusted library allocation
page read and write
369C001EC000
trusted library allocation
page read and write
369C001D8000
trusted library allocation
page read and write
82BE000
heap
page read and write
369C00498000
trusted library allocation
page read and write
369C0000C000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C0027C000
trusted library allocation
page read and write
369C002B8000
trusted library allocation
page read and write
8378000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
18B9EE00000
trusted library section
page read and write
20AC000
heap
page read and write
19580035C000
trusted library allocation
page read and write
18B984C6000
heap
page read and write
7251000
heap
page read and write
18B9847B000
heap
page read and write
2CAC9FE000
unkown
page readonly
369C0080C000
trusted library allocation
page read and write
81F9000
heap
page read and write
81FD000
heap
page read and write
195800330000
trusted library allocation
page read and write
1AC800217000
direct allocation
page read and write
7910000
direct allocation
page execute and read and write
81FF000
heap
page read and write
7251000
heap
page read and write
19F0000
direct allocation
page read and write
369C0020C000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C00BB0000
trusted library allocation
page read and write
8304000
heap
page read and write
369C00C0C000
trusted library allocation
page read and write
BEE000
stack
page read and write
5F0000
heap
page read and write
369C012B8000
trusted library allocation
page read and write
81FF000
heap
page read and write
F00000
heap
page read and write
2AE000
unkown
page read and write
81F1000
heap
page read and write
18B94C25000
heap
page read and write
51E8002C0000
trusted library allocation
page read and write
7251000
heap
page read and write
369C008A8000
trusted library allocation
page read and write
195800424000
trusted library allocation
page read and write
18B98457000
heap
page read and write
369C01148000
trusted library allocation
page read and write
369C00CE0000
trusted library allocation
page read and write
82D5000
heap
page read and write
369C001AC000
trusted library allocation
page read and write
1958007E0000
trusted library allocation
page read and write
7251000
heap
page read and write
18B96840000
heap
page read and write
19F0000
direct allocation
page read and write
195800704000
trusted library allocation
page read and write
195800620000
trusted library allocation
page read and write
1958002ED000
trusted library allocation
page read and write
7251000
heap
page read and write
2CC51FE000
stack
page read and write
369C003EC000
trusted library allocation
page read and write
369C00750000
trusted library allocation
page read and write
1AC800210000
direct allocation
page read and write
369C00654000
trusted library allocation
page read and write
10FE000
stack
page read and write
369C00940000
trusted library allocation
page read and write
369C002FB000
trusted library allocation
page read and write
81FE000
heap
page read and write
7910000
direct allocation
page execute and read and write
209A000
heap
page read and write
E47000
heap
page read and write
369C001B4000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C0098B000
trusted library allocation
page read and write
7251000
heap
page read and write
18B949EB000
heap
page read and write
CBE000
stack
page read and write
18B97F1B000
heap
page read and write
369C00FA0000
trusted library allocation
page read and write
81FE000
heap
page read and write
195800320000
trusted library allocation
page read and write
7251000
heap
page read and write
2CA59FE000
unkown
page readonly
1958006D4000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
18B972E0000
unkown
page read and write
A5C000
stack
page read and write
195800668000
trusted library allocation
page read and write
369C005E4000
trusted library allocation
page read and write
369C00F64000
trusted library allocation
page read and write
195800248000
trusted library allocation
page read and write
835F000
heap
page read and write
369C00350000
trusted library allocation
page read and write
369C0076C000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
84CC000
heap
page read and write
81FD000
heap
page read and write
2CB01FE000
stack
page read and write
19F0000
direct allocation
page read and write
18B98455000
heap
page read and write
51E800294000
trusted library allocation
page read and write
369C010EC000
trusted library allocation
page read and write
7251000
heap
page read and write
2CBC9FE000
unkown
page readonly
18B9EC00000
trusted library section
page read and write
2B1000
unkown
page readonly
369C01070000
trusted library allocation
page read and write
20BB000
heap
page read and write
2CAD1FE000
stack
page read and write
2CAE9FE000
unkown
page readonly
143E000
stack
page read and write
7251000
heap
page read and write
51E8002E4000
trusted library allocation
page read and write
7251000
heap
page read and write
83D1000
heap
page read and write
7910000
direct allocation
page execute and read and write
195800408000
trusted library allocation
page read and write
2CBA9FE000
unkown
page readonly
195800664000
trusted library allocation
page read and write
7251000
heap
page read and write
7910000
direct allocation
page execute and read and write
2CC79FE000
unkown
page readonly
369C00CA4000
trusted library allocation
page read and write
18B9EB80000
trusted library section
page read and write
369C005B4000
trusted library allocation
page read and write
2AA000
unkown
page readonly
369C00224000
trusted library allocation
page read and write
4FE000
stack
page read and write
7251000
heap
page read and write
113F000
stack
page read and write
2CCE1FE000
stack
page read and write
369C00EE4000
trusted library allocation
page read and write
369C00B18000
trusted library allocation
page read and write
2A1000
unkown
page execute read
369C00401000
trusted library allocation
page read and write
369C00E38000
trusted library allocation
page read and write
BD7000
heap
page read and write
195800248000
trusted library allocation
page read and write
195800788000
trusted library allocation
page read and write
76D0000
direct allocation
page read and write
18B9E5B0000
trusted library section
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
B8C000
stack
page read and write
19F0000
direct allocation
page read and write
369C00E68000
trusted library allocation
page read and write
369C00E70000
trusted library allocation
page read and write
18B9E9E0000
trusted library section
page read and write
51E8002D8000
trusted library allocation
page read and write
2CC61FE000
stack
page read and write
369C00EB0000
trusted library allocation
page read and write
2CC29FE000
unkown
page readonly
369C008F0000
trusted library allocation
page read and write
2CCD9FE000
unkown
page readonly
1958006B4000
trusted library allocation
page read and write
369C00664000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00C84000
trusted library allocation
page read and write
1958006AC000
trusted library allocation
page read and write
7251000
heap
page read and write
19F0000
direct allocation
page read and write
369C00FC8000
trusted library allocation
page read and write
195800694000
trusted library allocation
page read and write
195800418000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00390000
trusted library allocation
page read and write
51E8002C0000
trusted library allocation
page read and write
2B1000
unkown
page readonly
7251000
heap
page read and write
369C00EF4000
trusted library allocation
page read and write
2CA31FE000
stack
page read and write
1420000
unkown
page write copy
369C01138000
trusted library allocation
page read and write
369C00E18000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C001E8000
trusted library allocation
page read and write
82A4000
heap
page read and write
7910000
direct allocation
page execute and read and write
18B94AA6000
heap
page read and write
1AC80024C000
direct allocation
page read and write
369C00304000
trusted library allocation
page read and write
195800610000
trusted library allocation
page read and write
84E4000
heap
page read and write
18B98737000
unclassified section
page read and write
7251000
heap
page read and write
18B949E0000
heap
page read and write
2CB59FE000
unkown
page readonly
369C00D20000
trusted library allocation
page read and write
369C001B4000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
18B9E1F0000
trusted library section
page read and write
18B984B5000
heap
page read and write
7910000
direct allocation
page execute and read and write
369C004F0000
trusted library allocation
page read and write
29BD000
stack
page read and write
2CB89FE000
unkown
page readonly
6D0ED000
unkown
page read and write
A3C000
stack
page read and write
369C00BAC000
trusted library allocation
page read and write
369C006D1000
trusted library allocation
page read and write
82BC000
heap
page read and write
7251000
heap
page read and write
369C00E7C000
trusted library allocation
page read and write
2A1000
unkown
page execute read
2A1000
unkown
page execute read
18B9C160000
heap
page read and write
7251000
heap
page read and write
18B9EA00000
trusted library section
page read and write
7251000
heap
page read and write
2B1000
unkown
page readonly
2A0000
unkown
page readonly
7251000
heap
page read and write
2CB79FE000
unkown
page readonly
369C00A20000
trusted library allocation
page read and write
7251000
heap
page read and write
18B97F23000
heap
page read and write
369C00E0C000
trusted library allocation
page read and write
369C00E28000
trusted library allocation
page read and write
845E000
heap
page read and write
2CA41FD000
stack
page read and write
18B97F00000
heap
page read and write
369C00350000
trusted library allocation
page read and write
369C0082C000
trusted library allocation
page read and write
209A000
heap
page read and write
369C007AC000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00E4C000
trusted library allocation
page read and write
369C007C0000
trusted library allocation
page read and write
369C00E01000
trusted library allocation
page read and write
2CA21FE000
stack
page read and write
51E800270000
trusted library allocation
page read and write
20A8000
heap
page read and write
2CA11FE000
stack
page read and write
2CAD9FE000
unkown
page readonly
1958006F0000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C0014C000
trusted library allocation
page read and write
2CB69FE000
unkown
page readonly
7251000
heap
page read and write
19580035C000
trusted library allocation
page read and write
1AC800280000
direct allocation
page read and write
369C006AC000
trusted library allocation
page read and write
7251000
heap
page read and write
369C005D0000
trusted library allocation
page read and write
18B94C20000
heap
page read and write
369C00F90000
trusted library allocation
page read and write
7251000
heap
page read and write
7C0000
heap
page read and write
81F4000
heap
page read and write
369C00350000
trusted library allocation
page read and write
2AE000
unkown
page read and write
7251000
heap
page read and write
195800730000
trusted library allocation
page read and write
8356000
heap
page read and write
7251000
heap
page read and write
51E8002BC000
trusted library allocation
page read and write
AFA000
heap
page read and write
81FB000
heap
page read and write
18B98506000
heap
page read and write
369C00A20000
trusted library allocation
page read and write
369C0120C000
trusted library allocation
page read and write
18B97F27000
heap
page read and write
369C00E4C000
trusted library allocation
page read and write
1958006EC000
trusted library allocation
page read and write
831F000
heap
page read and write
2A0000
unkown
page readonly
369C00474000
trusted library allocation
page read and write
208D000
heap
page read and write
7251000
heap
page read and write
195800770000
trusted library allocation
page read and write
829C000
heap
page read and write
369C002A8000
trusted library allocation
page read and write
369C00E84000
trusted library allocation
page read and write
7A31000
heap
page read and write
18B97F1A000
heap
page read and write
7251000
heap
page read and write
3DE0000
direct allocation
page execute and read and write
18B97F2C000
heap
page read and write
195800601000
trusted library allocation
page read and write
6D139000
unkown
page read and write
369C00C0C000
trusted library allocation
page read and write
195800288000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
18B986A0000
trusted library section
page read and write
2CB39FE000
unkown
page readonly
18B9E9F1000
trusted library section
page read and write
369C00960000
trusted library allocation
page read and write
19580033C000
trusted library allocation
page read and write
1958007D0000
trusted library allocation
page read and write
2A1000
unkown
page execute read
369C001D4000
trusted library allocation
page read and write
51E800238000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
13A0000
heap
page read and write
195800754000
trusted library allocation
page read and write
369C00294000
trusted library allocation
page read and write
82D1000
heap
page read and write
369C00868000
trusted library allocation
page read and write
18B98510000
trusted library section
page read and write
195800354000
trusted library allocation
page read and write
18B96890000
heap
page read and write
18B9E1BD000
trusted library section
page read and write
19580025C000
trusted library allocation
page read and write
19580080C000
trusted library allocation
page read and write
7251000
heap
page read and write
369C001B4000
trusted library allocation
page read and write
1958006CC000
trusted library allocation
page read and write
2CB41FB000
stack
page read and write
18B97F25000
heap
page read and write
2C47000
heap
page read and write
2CB71FC000
stack
page read and write
369C00F90000
trusted library allocation
page read and write
AFE000
heap
page read and write
3C0000
heap
page read and write
7251000
heap
page read and write
8289000
heap
page read and write
18B9846C000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C0085C000
trusted library allocation
page read and write
2B1000
unkown
page readonly
19580027C000
trusted library allocation
page read and write
2CBB1FC000
stack
page read and write
1AC800270000
direct allocation
page read and write
369C00330000
trusted library allocation
page read and write
18B947E0000
heap
page readonly
18B9C175000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
2056000
heap
page read and write
369C0105C000
trusted library allocation
page read and write
2CB29FE000
unkown
page readonly
7251000
heap
page read and write
51E800201000
trusted library allocation
page read and write
369C004E7000
trusted library allocation
page read and write
51E800220000
trusted library allocation
page read and write
1FD0000
direct allocation
page read and write
1AC8002E4000
direct allocation
page read and write
1958006E4000
trusted library allocation
page read and write
18B984F3000
heap
page read and write
1958002E4000
trusted library allocation
page read and write
1AC80020C000
direct allocation
page read and write
369C00AC8000
trusted library allocation
page read and write
1958006C4000
trusted library allocation
page read and write
51E800235000
trusted library allocation
page read and write
51E8002C0000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
81FD000
heap
page read and write
18B97F1F000
heap
page read and write
6D138000
unkown
page readonly
1958006E0000
trusted library allocation
page read and write
369C00294000
trusted library allocation
page read and write
7251000
heap
page read and write
82D6000
heap
page read and write
19580039C000
trusted library allocation
page read and write
1958006E8000
trusted library allocation
page read and write
83AF000
heap
page read and write
19580020C000
trusted library allocation
page read and write
369C0031C000
trusted library allocation
page read and write
81F3000
heap
page read and write
2AA000
unkown
page readonly
81F5000
heap
page read and write
369C00C58000
trusted library allocation
page read and write
369C00490000
trusted library allocation
page read and write
369C00760000
trusted library allocation
page read and write
369C00F1C000
trusted library allocation
page read and write
51E8002C0000
trusted library allocation
page read and write
857D000
heap
page read and write
369C001AC000
trusted library allocation
page read and write
2A1000
unkown
page execute read
369C008C8000
trusted library allocation
page read and write
81FD000
heap
page read and write
369C004BC000
trusted library allocation
page read and write
18B97F23000
heap
page read and write
7251000
heap
page read and write
18B984E6000
heap
page read and write
2940000
heap
page read and write
369C00734000
trusted library allocation
page read and write
838C000
heap
page read and write
2CC59FE000
unkown
page readonly
195800320000
trusted library allocation
page read and write
195800744000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C00C94000
trusted library allocation
page read and write
369C00EDC000
trusted library allocation
page read and write
7DEA000
direct allocation
page read and write
369C0017C000
trusted library allocation
page read and write
369C00F64000
trusted library allocation
page read and write
81F4000
heap
page read and write
369C00E0C000
trusted library allocation
page read and write
369C009D8000
trusted library allocation
page read and write
369C009D8000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00EC8000
trusted library allocation
page read and write
D01000
unkown
page execute and write copy
51E8002A0000
trusted library allocation
page read and write
7251000
heap
page read and write
369C0022C000
trusted library allocation
page read and write
2CC91FC000
stack
page read and write
81F6000
heap
page read and write
51E8002A0000
trusted library allocation
page read and write
369C00CB4000
trusted library allocation
page read and write
2930000
heap
page read and write
7251000
heap
page read and write
7910000
direct allocation
page execute and read and write
209A000
heap
page read and write
7251000
heap
page read and write
2CC49FE000
unkown
page readonly
2CB91FC000
stack
page read and write
7251000
heap
page read and write
369C00C78000
trusted library allocation
page read and write
7251000
heap
page read and write
369C0015C000
trusted library allocation
page read and write
195800201000
trusted library allocation
page read and write
7251000
heap
page read and write
2CCB9FE000
unkown
page readonly
7251000
heap
page read and write
2AA000
unkown
page readonly
1958006B8000
trusted library allocation
page read and write
B10000
heap
page read and write
7251000
heap
page read and write
18B9C199000
heap
page read and write
195800430000
trusted library allocation
page read and write
369C00CAC000
trusted library allocation
page read and write
7251000
heap
page read and write
18B9CCF7000
unclassified section
page read and write
7251000
heap
page read and write
369C0129C000
trusted library allocation
page read and write
369C0021C000
trusted library allocation
page read and write
BD0000
heap
page read and write
369C00678000
trusted library allocation
page read and write
2CA79FE000
unkown
page readonly
369C0040C000
trusted library allocation
page read and write
51E8002F8000
trusted library allocation
page read and write
D50000
heap
page read and write
2AE000
unkown
page write copy
369C002BA000
trusted library allocation
page read and write
18B984F7000
heap
page read and write
81FA000
heap
page read and write
7251000
heap
page read and write
195800238000
trusted library allocation
page read and write
7C8F000
direct allocation
page read and write
369C00DB8000
trusted library allocation
page read and write
7251000
heap
page read and write
82AE000
heap
page read and write
82F8000
heap
page read and write
18B9EA60000
trusted library section
page read and write
7251000
heap
page read and write
369C00A74000
trusted library allocation
page read and write
369C00C84000
trusted library allocation
page read and write
7251000
heap
page read and write
49C000
stack
page read and write
7251000
heap
page read and write
369C00093000
trusted library allocation
page read and write
369C00C4C000
trusted library allocation
page read and write
369C00344000
trusted library allocation
page read and write
7251000
heap
page read and write
18B984EF000
heap
page read and write
369C00294000
trusted library allocation
page read and write
1AC800250000
direct allocation
page read and write
7251000
heap
page read and write
369C0033C000
trusted library allocation
page read and write
369C00610000
trusted library allocation
page read and write
369C010FC000
trusted library allocation
page read and write
2CBA1FC000
stack
page read and write
1200000
heap
page read and write
1028000
heap
page read and write
18B984B9000
heap
page read and write
195800624000
trusted library allocation
page read and write
7251000
heap
page read and write
18B984F5000
heap
page read and write
7251000
heap
page read and write
7A94000
heap
page read and write
7251000
heap
page read and write
C3C000
stack
page read and write
7251000
heap
page read and write
C5C000
stack
page read and write
19580060C000
trusted library allocation
page read and write
369C00720000
trusted library allocation
page read and write
2AE000
unkown
page write copy
369C00330000
trusted library allocation
page read and write
2CBE9FE000
unkown
page readonly
369C00310000
trusted library allocation
page read and write
2CAB9FE000
unkown
page readonly
369C00B54000
trusted library allocation
page read and write
2F2E000
stack
page read and write
1AC8002DC000
direct allocation
page read and write
2CA29FE000
unkown
page readonly
369C003A4000
trusted library allocation
page read and write
2CA71FE000
stack
page read and write
7251000
heap
page read and write
2AE000
unkown
page write copy
2CA99FE000
unkown
page readonly
369C006FE000
trusted library allocation
page read and write
195800348000
trusted library allocation
page read and write
369C00A6F000
trusted library allocation
page read and write
7251000
heap
page read and write
2CAE1FE000
stack
page read and write
195800330000
trusted library allocation
page read and write
369C00060000
trusted library allocation
page read and write
18B9C185000
heap
page read and write
369C00D8C000
trusted library allocation
page read and write
18B98496000
heap
page read and write
839D000
heap
page read and write
7251000
heap
page read and write
195800364000
trusted library allocation
page read and write
2CB81FC000
stack
page read and write
7251000
heap
page read and write
369C009BC000
trusted library allocation
page read and write
81F9000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
2CB61FC000
stack
page read and write
85C000
stack
page read and write
18B97F27000
heap
page read and write
2CA61FA000
stack
page read and write
369C00194000
trusted library allocation
page read and write
2CC09FE000
unkown
page readonly
369C00D10000
trusted library allocation
page read and write
369C0129C000
trusted library allocation
page read and write
369C00C6C000
trusted library allocation
page read and write
195800380000
trusted library allocation
page read and write
18B9EA71000
trusted library section
page read and write
369C002F7000
trusted library allocation
page read and write
7251000
heap
page read and write
369C009D8000
trusted library allocation
page read and write
369C00484000
trusted library allocation
page read and write
1AC8002EC000
direct allocation
page read and write
195800724000
trusted library allocation
page read and write
2A0000
unkown
page readonly
7910000
direct allocation
page execute and read and write
7251000
heap
page read and write
81F9000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
2CA51FA000
stack
page read and write
7251000
heap
page read and write
D00000
unkown
page readonly
369C000D0000
trusted library allocation
page read and write
18B9E490000
trusted library section
page read and write
7251000
heap
page read and write
369C0116C000
trusted library allocation
page read and write
2CC69FE000
unkown
page readonly
18B9E0B0000
heap
page read and write
1958002CC000
trusted library allocation
page read and write
51E800250000
trusted library allocation
page read and write
81FA000
heap
page read and write
7251000
heap
page read and write
369C00AA4000
trusted library allocation
page read and write
2CCD1FE000
stack
page read and write
369C0029A000
trusted library allocation
page read and write
18B94BF0000
trusted library section
page readonly
18B9F100000
trusted library section
page read and write
369C00344000
trusted library allocation
page read and write
7251000
heap
page read and write
51E800288000
trusted library allocation
page read and write
369C002A4000
trusted library allocation
page read and write
369C00AFC000
trusted library allocation
page read and write
369C00930000
trusted library allocation
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C008DC000
trusted library allocation
page read and write
369C00CF8000
trusted library allocation
page read and write
369C00F2C000
trusted library allocation
page read and write
369C00380000
trusted library allocation
page read and write
369C00B2C000
trusted library allocation
page read and write
369C00D2C000
trusted library allocation
page read and write
838F000
heap
page read and write
2CA69FE000
unkown
page readonly
369C00490000
trusted library allocation
page read and write
7251000
heap
page read and write
195800678000
trusted library allocation
page read and write
369C00AD8000
trusted library allocation
page read and write
51E800264000
trusted library allocation
page read and write
8373000
heap
page read and write
195800640000
trusted library allocation
page read and write
1020000
heap
page read and write
369C0006C000
trusted library allocation
page read and write
2AE000
unkown
page read and write
2CBF1FE000
stack
page read and write
7C84000
direct allocation
page read and write
2B1000
unkown
page readonly
8329000
heap
page read and write
369C00DC4000
trusted library allocation
page read and write
7251000
heap
page read and write
18B9C150000
trusted library allocation
page read and write
8334000
heap
page read and write
369C01118000
trusted library allocation
page read and write
369C002E0000
trusted library allocation
page read and write
7251000
heap
page read and write
19F0000
direct allocation
page read and write
195800714000
trusted library allocation
page read and write
369C0058C000
trusted library allocation
page read and write
7251000
heap
page read and write
369C01130000
trusted library allocation
page read and write
369C008D0000
trusted library allocation
page read and write
2AE000
unkown
page read and write
369C00304000
trusted library allocation
page read and write
7251000
heap
page read and write
51E80020C000
trusted library allocation
page read and write
369C00EE4000
trusted library allocation
page read and write
83FA000
heap
page read and write
7251000
heap
page read and write
EBE000
stack
page read and write
859E000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C0069C000
trusted library allocation
page read and write
369C01064000
trusted library allocation
page read and write
208E000
heap
page read and write
369C00E44000
trusted library allocation
page read and write
369C002F0000
trusted library allocation
page read and write
369C00290000
trusted library allocation
page read and write
369C00134000
trusted library allocation
page read and write
18B9E256000
trusted library section
page read and write
369C00FC8000
trusted library allocation
page read and write
7251000
heap
page read and write
51E8002F0000
trusted library allocation
page read and write
2CC41FE000
stack
page read and write
7690000
trusted library allocation
page read and write
19F0000
direct allocation
page read and write
195800684000
trusted library allocation
page read and write
369C00BAC000
trusted library allocation
page read and write
18B97F1F000
heap
page read and write
51E8002C0000
trusted library allocation
page read and write
81FF000
heap
page read and write
7251000
heap
page read and write
ECF000
stack
page read and write
2AE000
unkown
page write copy
7251000
heap
page read and write
2AA000
unkown
page readonly
195800658000
trusted library allocation
page read and write
18B9EA50000
trusted library section
page read and write
195800330000
trusted library allocation
page read and write
1958002F0000
trusted library allocation
page read and write
7251000
heap
page read and write
195800784000
trusted library allocation
page read and write
2CB51FC000
stack
page read and write
6D010000
unkown
page readonly
369C00020000
trusted library allocation
page read and write
369C00220000
trusted library allocation
page read and write
18B97F1A000
heap
page read and write
81FA000
heap
page read and write
1FD0000
direct allocation
page read and write
51E8002A0000
trusted library allocation
page read and write
1958002F4000
trusted library allocation
page read and write
7251000
heap
page read and write
1AC800303000
direct allocation
page read and write
18B9EE0E000
trusted library section
page read and write
51E800274000
trusted library allocation
page read and write
369C009D8000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
19F0000
direct allocation
page read and write
369C00C84000
trusted library allocation
page read and write
51E8002B0000
trusted library allocation
page read and write
369C0033C000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00210000
trusted library allocation
page read and write
FFC000
stack
page read and write
81F5000
heap
page read and write
20B4000
heap
page read and write
19F0000
direct allocation
page read and write
369C004E0000
trusted library allocation
page read and write
81FC000
heap
page read and write
7251000
heap
page read and write
83C2000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C0114C000
trusted library allocation
page read and write
1958002FC000
trusted library allocation
page read and write
369C001A0000
trusted library allocation
page read and write
1958007B4000
trusted library allocation
page read and write
18B94AC2000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
2A1000
unkown
page execute read
369C00001000
trusted library allocation
page read and write
369C005A0000
trusted library allocation
page read and write
540000
heap
page read and write
369C0035C000
trusted library allocation
page read and write
369C00E58000
trusted library allocation
page read and write
831F000
heap
page read and write
2DBF000
unkown
page read and write
7251000
heap
page read and write
2031000
heap
page read and write
19F0000
direct allocation
page read and write
2C9E1FE000
unkown
page read and write
369C00298000
trusted library allocation
page read and write
18B97F1F000
heap
page read and write
835B000
heap
page read and write
369C00350000
trusted library allocation
page read and write
2AA000
unkown
page readonly
369C00304000
trusted library allocation
page read and write
2AE000
unkown
page write copy
2B1000
unkown
page readonly
369C00344000
trusted library allocation
page read and write
369C00A34000
trusted library allocation
page read and write
10CF000
stack
page read and write
369C01170000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
7CEA000
heap
page read and write
7251000
heap
page read and write
369C00C01000
trusted library allocation
page read and write
7251000
heap
page read and write
1958006B0000
trusted library allocation
page read and write
7CE0000
heap
page read and write
369C00E88000
trusted library allocation
page read and write
7251000
heap
page read and write
369C00554000
trusted library allocation
page read and write
2A1000
unkown
page execute read
6D011000
unkown
page execute read
7251000
heap
page read and write
2CAF1FA000
stack
page read and write
7251000
heap
page read and write
2A0000
unkown
page readonly
2DE0000
heap
page read and write
369C00708000
trusted library allocation
page read and write
8366000
heap
page read and write
18B9C682000
trusted library allocation
page read and write
836B000
heap
page read and write
A20000
heap
page read and write
369C00D38000
trusted library allocation
page read and write
18B947D0000
heap
page read and write
83B1000
heap
page read and write
369C00F6C000
trusted library allocation
page read and write
369C00874000
trusted library allocation
page read and write
209A000
heap
page read and write
7251000
heap
page read and write
369C00370000
trusted library allocation
page read and write
E40000
heap
page read and write
369C0009F000
trusted library allocation
page read and write
18B98451000
heap
page read and write
7251000
heap
page read and write
7251000
heap
page read and write
369C00A0C000
trusted library allocation
page read and write
2AE000
unkown
page read and write
369C0001C000
trusted library allocation
page read and write
369C00E94000
trusted library allocation
page read and write
18B9EA12000
trusted library section
page read and write
369C01201000
trusted library allocation
page read and write
7251000
heap
page read and write
2CBB9FE000
unkown
page readonly
854E000
heap
page read and write
2CB99FE000
unkown
page readonly
2C40000
heap
page read and write
2A1000
unkown
page execute read
369C00CBC000
trusted library allocation
page read and write
2CB19FE000
unkown
page readonly
7251000
heap
page read and write
83BE000
heap
page read and write
369C01094000
trusted library allocation
page read and write
51E8002BC000
trusted library allocation
page read and write
369C01114000
trusted library allocation
page read and write
369C00801000
trusted library allocation
page read and write
83CC000
heap
page read and write
7251000
heap
page read and write
81FB000
heap
page read and write
7251000
heap
page read and write
18B96893000
heap
page read and write
369C009D0000
trusted library allocation
page read and write
369C00B9C000
trusted library allocation
page read and write
369C00A6A000
trusted library allocation
page read and write
18B983C0000
trusted library section
page read and write
369C0042E000
trusted library allocation
page read and write
2CCB1FE000
stack
page read and write
12FE000
stack
page read and write
7251000
heap
page read and write
There are 1262 hidden memdumps, click here to show them.