IOC Report
ijn8pyFXSP.exe

loading gif

Files

File Path
Type
Category
Malicious
ijn8pyFXSP.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ijn8pyFXSP.exe_e09c98efc89b864925e53164e399d97ed708841_5f4aa4c2_38cff074-f15c-457f-8600-c984cd2c7b82\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF0F.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:43:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE143.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1C1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ijn8pyFXSP.exe
"C:\Users\user\Desktop\ijn8pyFXSP.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2180,i,10823519220852029465,5010327835150347019,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 1184

URLs

Name
IP
Malicious
http://home.twentytk20ht.top/TQIuuaqjNpwYjtUvFojm1734579850?argument=nXdACgDWMqabIudk1735026090
185.121.15.192
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
http://anglebug.com/8215P
unknown
http://anglebug.com/8162L
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bK
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/6876W
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/82295
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://anglebug.com/6929M
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/3452Q
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/35022
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://anglebug.com/7369J
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
ProgramId
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
FileId
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
LowerCaseLongPath
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
LongPathHash
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
Name
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
OriginalFileName
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
Publisher
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
Version
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
BinFileVersion
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
BinaryType
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
ProductName
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
ProductVersion
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
LinkDate
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
BinProductVersion
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
AppxPackageFullName
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
AppxPackageRelativeId
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
Size
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
Language
\REGISTRY\A\{975b19cf-4d40-8c4b-cd57-ecd9a91f090e}\Root\InventoryApplicationFile\ijn8pyfxsp.exe|6271dc79644199c0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4BF400C18000
trusted library allocation
page read and write
1947000
heap
page read and write
6F41000
heap
page read and write
256CFFE000
unkown
page readonly
4BF400CA4000
trusted library allocation
page read and write
14C36253000
heap
page read and write
6F41000
heap
page read and write
14C3624A000
heap
page read and write
4BF400601000
trusted library allocation
page read and write
14C32BA0000
heap
page read and write
4BF400698000
trusted library allocation
page read and write
4BF400D18000
trusted library allocation
page read and write
4BF4001C8000
trusted library allocation
page read and write
961000
unkown
page readonly
6F41000
heap
page read and write
7FAC000
heap
page read and write
530800248000
trusted library allocation
page read and write
7EC2000
heap
page read and write
4BF400CFC000
trusted library allocation
page read and write
4BF400C9C000
trusted library allocation
page read and write
530800620000
trusted library allocation
page read and write
14C3625D000
heap
page read and write
14C36244000
heap
page read and write
7ECF000
heap
page read and write
4BF400AE4000
trusted library allocation
page read and write
4BF400C44000
trusted library allocation
page read and write
4BF4007A5000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
14C36253000
heap
page read and write
7630000
trusted library allocation
page read and write
4BF400E18000
trusted library allocation
page read and write
4BF400EB8000
trusted library allocation
page read and write
511800294000
trusted library allocation
page read and write
3310000
heap
page read and write
7ECD000
heap
page read and write
6F41000
heap
page read and write
7F7A000
heap
page read and write
6F41000
heap
page read and write
4BF4000A0000
trusted library allocation
page read and write
6F41000
heap
page read and write
530800401000
trusted library allocation
page read and write
7660000
direct allocation
page execute and read and write
8109000
heap
page read and write
5E1800260000
direct allocation
page read and write
1DF4000
heap
page read and write
6F41000
heap
page read and write
95E000
unkown
page read and write
7EC2000
heap
page read and write
951000
unkown
page execute read
530800770000
trusted library allocation
page read and write
6F41000
heap
page read and write
73D0000
direct allocation
page read and write
5118002A0000
trusted library allocation
page read and write
7F5F000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
4BF400368000
trusted library allocation
page read and write
7EC3000
heap
page read and write
7FE0000
heap
page read and write
4BF4006B8000
trusted library allocation
page read and write
53080040C000
trusted library allocation
page read and write
195F000
heap
page read and write
8098000
heap
page read and write
4BF400290000
trusted library allocation
page read and write
6F41000
heap
page read and write
5118002B0000
trusted library allocation
page read and write
6F41000
heap
page read and write
1955000
heap
page read and write
4BF400E5C000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400F18000
trusted library allocation
page read and write
4BF400124000
trusted library allocation
page read and write
6F41000
heap
page read and write
2506FFE000
unkown
page readonly
7660000
direct allocation
page execute and read and write
5118002C8000
trusted library allocation
page read and write
14C3624B000
heap
page read and write
890000
heap
page read and write
800D000
heap
page read and write
14C3C480000
trusted library section
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
25137FE000
stack
page read and write
14C36256000
heap
page read and write
530800288000
trusted library allocation
page read and write
6F41000
heap
page read and write
950000
unkown
page readonly
6F41000
heap
page read and write
4BF4003A8000
trusted library allocation
page read and write
14C36244000
heap
page read and write
14C36244000
heap
page read and write
4BF400228000
trusted library allocation
page read and write
256E7FA000
stack
page read and write
DED000
stack
page read and write
4BF400588000
trusted library allocation
page read and write
511800274000
trusted library allocation
page read and write
5118002A0000
trusted library allocation
page read and write
25697FE000
stack
page read and write
6F41000
heap
page read and write
4BF4001B4000
trusted library allocation
page read and write
250CFFE000
unkown
page readonly
6F41000
heap
page read and write
7660000
direct allocation
page execute and read and write
4BF400490000
trusted library allocation
page read and write
25097FE000
stack
page read and write
6F41000
heap
page read and write
4BF40015C000
trusted library allocation
page read and write
7ECA000
heap
page read and write
14C36244000
heap
page read and write
4BF400C10000
trusted library allocation
page read and write
1DF4000
heap
page read and write
81D3000
heap
page read and write
6F41000
heap
page read and write
1DF4000
heap
page read and write
4BF400BB0000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
7FD0000
heap
page read and write
4BF4003A0000
trusted library allocation
page read and write
7FA9000
heap
page read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
14C3CF96000
trusted library section
page read and write
14C32F13000
heap
page read and write
7660000
direct allocation
page execute and read and write
4BF400DED000
trusted library allocation
page read and write
5F0000
heap
page read and write
53080020C000
trusted library allocation
page read and write
14C36244000
heap
page read and write
4BF400080000
trusted library allocation
page read and write
1DF4000
heap
page read and write
4BF40087C000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
4BF400B20000
trusted library allocation
page read and write
4BF400C01000
trusted library allocation
page read and write
4BF400394000
trusted library allocation
page read and write
4BF400B58000
trusted library allocation
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C3BE50000
heap
page read and write
8044000
heap
page read and write
73D0000
direct allocation
page read and write
7EC3000
heap
page read and write
7660000
direct allocation
page execute and read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C3C3D7000
unclassified section
page read and write
1972000
heap
page read and write
6F41000
heap
page read and write
4BF400948000
trusted library allocation
page read and write
14C32CF0000
trusted library allocation
page read and write
25737FE000
stack
page read and write
250E7FE000
stack
page read and write
6F41000
heap
page read and write
7660000
direct allocation
page execute and read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
3B20000
direct allocation
page read and write
530800238000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
14C36256000
heap
page read and write
4BF4009B0000
trusted library allocation
page read and write
4BF4006C4000
trusted library allocation
page read and write
14C3D240000
trusted library section
page read and write
2578FFE000
unkown
page readonly
257DFFE000
unkown
page readonly
6F41000
heap
page read and write
6F41000
heap
page read and write
4BF4006CC000
trusted library allocation
page read and write
14C36242000
heap
page read and write
14C3624A000
heap
page read and write
4BF400300000
trusted library allocation
page read and write
5118002F4000
trusted library allocation
page read and write
1955000
heap
page read and write
4BF400BDC000
trusted library allocation
page read and write
14C354E0000
unkown
page read and write
4BF4008D4000
trusted library allocation
page read and write
2511FFE000
unkown
page readonly
EE0000
heap
page read and write
6F41000
heap
page read and write
511800201000
trusted library allocation
page read and write
14C36750000
heap
page read and write
530800678000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400BDC000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C3626E000
heap
page read and write
14C3CFB2000
trusted library section
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
7660000
direct allocation
page execute and read and write
6F41000
heap
page read and write
1678000
unkown
page execute and write copy
3B20000
direct allocation
page read and write
810C000
heap
page read and write
5E1800217000
direct allocation
page read and write
6F41000
heap
page read and write
14C3624F000
heap
page read and write
4BF400C0C000
trusted library allocation
page read and write
4BF400001000
trusted library allocation
page read and write
4BF4000B4000
trusted library allocation
page read and write
250C7FE000
stack
page read and write
95A000
unkown
page readonly
14C32DF9000
heap
page read and write
4BF400DB0000
trusted library allocation
page read and write
950000
unkown
page readonly
2507FFE000
unkown
page readonly
7EC3000
heap
page read and write
25127FC000
stack
page read and write
14C3626C000
heap
page read and write
2573FFE000
unkown
page readonly
14C3624A000
heap
page read and write
6F41000
heap
page read and write
53080033C000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C3624B000
heap
page read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
14C3624A000
heap
page read and write
6F41000
heap
page read and write
1951000
heap
page read and write
25677FE000
stack
page read and write
7660000
direct allocation
page execute and read and write
6F41000
heap
page read and write
5DE000
stack
page read and write
4BF400B44000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
257E7FC000
stack
page read and write
530800354000
trusted library allocation
page read and write
14C36244000
heap
page read and write
4BF400294000
trusted library allocation
page read and write
8027000
heap
page read and write
4BF400BD0000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
1DF4000
heap
page read and write
25787FE000
stack
page read and write
7F5E000
heap
page read and write
4BF40072C000
trusted library allocation
page read and write
4BF4001D0000
trusted library allocation
page read and write
25047FD000
stack
page read and write
4BF4009CF000
trusted library allocation
page read and write
4BF400844000
trusted library allocation
page read and write
E88000
heap
page read and write
4BF4000AC000
trusted library allocation
page read and write
4BF40021C000
trusted library allocation
page read and write
6F41000
heap
page read and write
A50000
heap
page read and write
14C3624A000
heap
page read and write
6F41000
heap
page read and write
4BF4006A8000
trusted library allocation
page read and write
4BF400DC8000
trusted library allocation
page read and write
530800330000
trusted library allocation
page read and write
530800330000
trusted library allocation
page read and write
4BF40034C000
trusted library allocation
page read and write
530800718000
trusted library allocation
page read and write
7660000
direct allocation
page execute and read and write
4BF400380000
trusted library allocation
page read and write
80DC000
heap
page read and write
4BF4002A4000
trusted library allocation
page read and write
14C3C860000
trusted library section
page read and write
4BF400628000
trusted library allocation
page read and write
1DF4000
heap
page read and write
951000
unkown
page execute read
8000000
heap
page read and write
530800390000
trusted library allocation
page read and write
195C000
heap
page read and write
4BF400F90000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
14C32E1E000
heap
page read and write
6F41000
heap
page read and write
14C32C90000
heap
page read and write
4BF400DE0000
trusted library allocation
page read and write
CD0000
heap
page read and write
CD8000
heap
page read and write
6F41000
heap
page read and write
7FC9000
heap
page read and write
6F41000
heap
page read and write
7ECB000
heap
page read and write
14C36244000
heap
page read and write
951000
unkown
page execute read
14C36250000
heap
page read and write
14C36253000
heap
page read and write
EDE000
unkown
page read and write
14C36253000
heap
page read and write
5308006E0000
trusted library allocation
page read and write
6F41000
heap
page read and write
961000
unkown
page readonly
25717FE000
stack
page read and write
7DA8000
heap
page read and write
4BF400ED0000
trusted library allocation
page read and write
53080078C000
trusted library allocation
page read and write
4BF40095C000
trusted library allocation
page read and write
14C367F4000
heap
page read and write
95E000
unkown
page write copy
14C36253000
heap
page read and write
5E1800230000
direct allocation
page read and write
511800220000
trusted library allocation
page read and write
530800348000
trusted library allocation
page read and write
4BF4008FC000
trusted library allocation
page read and write
5308002F0000
trusted library allocation
page read and write
14C32E05000
heap
page read and write
14C36820000
heap
page read and write
14C3624A000
heap
page read and write
4BF4002F3000
trusted library allocation
page read and write
2567FFE000
unkown
page readonly
1965000
heap
page read and write
4BF400EC0000
trusted library allocation
page read and write
14C36244000
heap
page read and write
25037FC000
stack
page read and write
4BF40038C000
trusted library allocation
page read and write
25687FE000
stack
page read and write
14C36271000
heap
page read and write
511800250000
trusted library allocation
page read and write
4BF400298000
trusted library allocation
page read and write
4BF400798000
trusted library allocation
page read and write
6F41000
heap
page read and write
530800430000
trusted library allocation
page read and write
7F74000
heap
page read and write
FCF000
stack
page read and write
4BF400E2C000
trusted library allocation
page read and write
14C36700000
trusted library section
page read and write
7640000
direct allocation
page execute and read and write
4BF4003A0000
trusted library allocation
page read and write
14C3626B000
heap
page read and write
6F41000
heap
page read and write
4BF400B6C000
trusted library allocation
page read and write
4BF400D88000
trusted library allocation
page read and write
511800264000
trusted library allocation
page read and write
4BF400658000
trusted library allocation
page read and write
14C36244000
heap
page read and write
14C3C603000
trusted library section
page read and write
4BF4006F1000
trusted library allocation
page read and write
4BF4008E8000
trusted library allocation
page read and write
7B04000
direct allocation
page read and write
14C32D68000
heap
page read and write
6F41000
heap
page read and write
7EC7000
heap
page read and write
6F41000
heap
page read and write
18F2000
heap
page read and write
7900000
heap
page read and write
6F41000
heap
page read and write
7660000
direct allocation
page execute and read and write
5308006CC000
trusted library allocation
page read and write
8094000
heap
page read and write
7EC7000
heap
page read and write
4BF40084C000
trusted library allocation
page read and write
4BF4003E4000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400598000
trusted library allocation
page read and write
14C36250000
heap
page read and write
14C32FB0000
heap
page read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
14C3CE70000
trusted library section
page read and write
25777FE000
stack
page read and write
14C36244000
heap
page read and write
530800668000
trusted library allocation
page read and write
4BF400998000
trusted library allocation
page read and write
250AFFE000
unkown
page readonly
14C36253000
heap
page read and write
6C1FC000
unkown
page readonly
6F41000
heap
page read and write
7630000
direct allocation
page execute and read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
2503FFE000
unkown
page readonly
5E18002A8000
direct allocation
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
1965000
heap
page read and write
5118002C0000
trusted library allocation
page read and write
4BF4003E4000
trusted library allocation
page read and write
14C367C6000
heap
page read and write
6F41000
heap
page read and write
81AF000
heap
page read and write
14C3C260000
heap
page read and write
4BF400210000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C3624A000
heap
page read and write
14C36253000
heap
page read and write
256EFFE000
unkown
page readonly
6F41000
heap
page read and write
14C36825000
heap
page read and write
8096000
heap
page read and write
14C3CE50000
trusted library section
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
4BF400748000
trusted library allocation
page read and write
250A7FD000
stack
page read and write
14C36253000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
5308006E4000
trusted library allocation
page read and write
11CE000
stack
page read and write
7660000
direct allocation
page execute and read and write
4BF400401000
trusted library allocation
page read and write
530800201000
trusted library allocation
page read and write
E80000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C3624A000
heap
page read and write
7EC6000
heap
page read and write
4BF400714000
trusted library allocation
page read and write
806C000
heap
page read and write
4BF4003A0000
trusted library allocation
page read and write
25727FE000
stack
page read and write
137F000
stack
page read and write
14C36220000
heap
page read and write
14C36253000
heap
page read and write
4BF400AF8000
trusted library allocation
page read and write
1DF4000
heap
page read and write
14C36244000
heap
page read and write
25707FC000
stack
page read and write
14C36830000
heap
page read and write
4BF40000C000
trusted library allocation
page read and write
6F41000
heap
page read and write
7FEE000
heap
page read and write
1951000
heap
page read and write
7EC7000
heap
page read and write
5118002C0000
trusted library allocation
page read and write
14C3624D000
heap
page read and write
7EC5000
heap
page read and write
14C3A454000
trusted library allocation
page read and write
3510000
heap
page read and write
14C32D60000
heap
page read and write
3390000
heap
page read and write
14C3C287000
unclassified section
page read and write
4BF400664000
trusted library allocation
page read and write
4BF40017C000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
530800644000
trusted library allocation
page read and write
4BF4001E8000
trusted library allocation
page read and write
63C000
stack
page read and write
4BF400894000
trusted library allocation
page read and write
14C3CE8E000
trusted library section
page read and write
4BF400CA4000
trusted library allocation
page read and write
4BF40035C000
trusted library allocation
page read and write
117F000
stack
page read and write
2565FFE000
unkown
page readonly
14C36244000
heap
page read and write
6F41000
heap
page read and write
4BF400574000
trusted library allocation
page read and write
14C367B2000
heap
page read and write
14C36244000
heap
page read and write
14C3624A000
heap
page read and write
4BF40016C000
trusted library allocation
page read and write
5308002EC000
trusted library allocation
page read and write
530800610000
trusted library allocation
page read and write
1965000
heap
page read and write
4BF40098C000
trusted library allocation
page read and write
25767FA000
stack
page read and write
4BF4002F0000
trusted library allocation
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C3624A000
heap
page read and write
14C32FB5000
heap
page read and write
A5E000
heap
page read and write
4BF40049C000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400C8C000
trusted library allocation
page read and write
4BF400201000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
BB0000
unkown
page readonly
4BF4001EC000
trusted library allocation
page read and write
1965000
heap
page read and write
B6C000
stack
page read and write
4BF4003E4000
trusted library allocation
page read and write
14C367A4000
heap
page read and write
4BF4002C0000
trusted library allocation
page read and write
4BF400C9C000
trusted library allocation
page read and write
14C3CEC0000
trusted library section
page read and write
530800758000
trusted library allocation
page read and write
530800210000
trusted library allocation
page read and write
6F41000
heap
page read and write
8032000
heap
page read and write
14C3CD97000
unclassified section
page read and write
14C36243000
heap
page read and write
6F41000
heap
page read and write
95E000
unkown
page write copy
14C36244000
heap
page read and write
6F41000
heap
page read and write
14C36250000
heap
page read and write
6F41000
heap
page read and write
53080060C000
trusted library allocation
page read and write
5E1800303000
direct allocation
page read and write
77E6000
heap
page read and write
7EC7000
heap
page read and write
530800784000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400712000
trusted library allocation
page read and write
7660000
direct allocation
page execute and read and write
4BF4003F8000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
257FFFE000
unkown
page readonly
4BF400C8C000
trusted library allocation
page read and write
3B20000
direct allocation
page read and write
14C3624A000
heap
page read and write
6F41000
heap
page read and write
25147FE000
stack
page read and write
4BF400BC4000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
4BF4001F0000
trusted library allocation
page read and write
4BF400AB8000
trusted library allocation
page read and write
6F41000
heap
page read and write
3B20000
direct allocation
page read and write
1DF4000
heap
page read and write
5118002BC000
trusted library allocation
page read and write
4BF400C9C000
trusted library allocation
page read and write
4BF400BD8000
trusted library allocation
page read and write
4BF400484000
trusted library allocation
page read and write
14C36253000
heap
page read and write
4BF4006D0000
trusted library allocation
page read and write
4BF400064000
trusted library allocation
page read and write
804B000
heap
page read and write
4BF400A6C000
trusted library allocation
page read and write
4BF400DD4000
trusted library allocation
page read and write
257EFFE000
unkown
page readonly
4BF400F50000
trusted library allocation
page read and write
4BF400B64000
trusted library allocation
page read and write
4BF4008C0000
trusted library allocation
page read and write
2512FFE000
unkown
page readonly
53080027C000
trusted library allocation
page read and write
2569FFE000
unkown
page readonly
6F41000
heap
page read and write
4BF400E5C000
trusted library allocation
page read and write
5308003EC000
trusted library allocation
page read and write
961000
unkown
page readonly
25747FE000
stack
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
7F66000
heap
page read and write
77E9000
heap
page read and write
1965000
heap
page read and write
14C3624F000
heap
page read and write
511800235000
trusted library allocation
page read and write
4BF4005E4000
trusted library allocation
page read and write
7EC7000
heap
page read and write
14C36253000
heap
page read and write
5118002BC000
trusted library allocation
page read and write
14C36253000
heap
page read and write
7781000
heap
page read and write
14C36253000
heap
page read and write
4BF4003B4000
trusted library allocation
page read and write
4BF4002E0000
trusted library allocation
page read and write
2570FFE000
unkown
page readonly
14C3A870000
trusted library section
page read and write
4BF4001B4000
trusted library allocation
page read and write
530800230000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400C80000
trusted library allocation
page read and write
6F41000
heap
page read and write
7660000
direct allocation
page execute and read and write
7660000
direct allocation
page execute and read and write
D30000
heap
page read and write
5118002BC000
trusted library allocation
page read and write
7F97000
heap
page read and write
6F41000
heap
page read and write
4BF400B14000
trusted library allocation
page read and write
4BF400418000
trusted library allocation
page read and write
4BF40077C000
trusted library allocation
page read and write
6C1AF000
unkown
page readonly
6F41000
heap
page read and write
95A000
unkown
page readonly
4BF400908000
trusted library allocation
page read and write
4BF4004F8000
trusted library allocation
page read and write
4BF40080C000
trusted library allocation
page read and write
5308006C8000
trusted library allocation
page read and write
530800354000
trusted library allocation
page read and write
1DF4000
heap
page read and write
4BF400230000
trusted library allocation
page read and write
6F41000
heap
page read and write
95A000
unkown
page readonly
5308002C4000
trusted library allocation
page read and write
14C3681E000
heap
page read and write
4BF40008C000
trusted library allocation
page read and write
5E1800234000
direct allocation
page read and write
4BF4004EC000
trusted library allocation
page read and write
14C36253000
heap
page read and write
6F41000
heap
page read and write
256A7FD000
stack
page read and write
4BF400DC0000
trusted library allocation
page read and write
14C36253000
heap
page read and write
8004000
heap
page read and write
14C36238000
heap
page read and write
14C36253000
heap
page read and write
6F41000
heap
page read and write
14C36806000
heap
page read and write
14C3624D000
heap
page read and write
4BF4000EC000
trusted library allocation
page read and write
530800310000
trusted library allocation
page read and write
5308006D0000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400DC8000
trusted library allocation
page read and write
14C36250000
heap
page read and write
53080035C000
trusted library allocation
page read and write
1947000
heap
page read and write
5118002BC000
trusted library allocation
page read and write
4BF400DA8000
trusted library allocation
page read and write
2505FFE000
unkown
page readonly
4BF40052F000
trusted library allocation
page read and write
511800260000
trusted library allocation
page read and write
6F41000
heap
page read and write
E90000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
530800310000
trusted library allocation
page read and write
7EC2000
heap
page read and write
14C36253000
heap
page read and write
4BF4000FC000
trusted library allocation
page read and write
6F41000
heap
page read and write
950000
unkown
page readonly
1941000
heap
page read and write
14C3BE72000
heap
page read and write
5E18002DC000
direct allocation
page read and write
6F41000
heap
page read and write
5118002BC000
trusted library allocation
page read and write
2572FFE000
unkown
page readonly
5E1800215000
direct allocation
page read and write
3B20000
direct allocation
page read and write
14C3CFF0000
trusted library section
page read and write
4BF400D5C000
trusted library allocation
page read and write
4BF400DA8000
trusted library allocation
page read and write
4BF4007B4000
trusted library allocation
page read and write
4BF400F84000
trusted library allocation
page read and write
7EC2000
heap
page read and write
5E1800250000
direct allocation
page read and write
4BF4007B0000
trusted library allocation
page read and write
4BF40029A000
trusted library allocation
page read and write
4BF4002B0000
trusted library allocation
page read and write
4BF4008A0000
trusted library allocation
page read and write
14C3624D000
heap
page read and write
7660000
direct allocation
page execute and read and write
7660000
direct allocation
page execute and read and write
14C36253000
heap
page read and write
7EC6000
heap
page read and write
3B20000
direct allocation
page read and write
6F41000
heap
page read and write
530800418000
trusted library allocation
page read and write
8004000
heap
page read and write
4BF4002FB000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400674000
trusted library allocation
page read and write
25067FE000
stack
page read and write
7B06000
direct allocation
page read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
25007FC000
stack
page read and write
14C36253000
heap
page read and write
511800278000
trusted library allocation
page read and write
4BF400CA4000
trusted library allocation
page read and write
4BF400F6C000
trusted library allocation
page read and write
4BF400751000
trusted library allocation
page read and write
6F41000
heap
page read and write
5118002F8000
trusted library allocation
page read and write
530800250000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400E38000
trusted library allocation
page read and write
14C3CEE1000
trusted library section
page read and write
2568FFE000
unkown
page readonly
256FFFE000
unkown
page readonly
4BF400C74000
trusted library allocation
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
5E180020C000
direct allocation
page read and write
6F41000
heap
page read and write
4BF40020C000
trusted library allocation
page read and write
530800374000
trusted library allocation
page read and write
4BF4001F8000
trusted library allocation
page read and write
8020000
heap
page read and write
4BF400368000
trusted library allocation
page read and write
4BF400EE0000
trusted library allocation
page read and write
1955000
heap
page read and write
4BF40022C000
trusted library allocation
page read and write
14C3626C000
heap
page read and write
6F41000
heap
page read and write
14C32DFD000
heap
page read and write
14C3624A000
heap
page read and write
4BF40014C000
trusted library allocation
page read and write
6F41000
heap
page read and write
7ECD000
heap
page read and write
14C36244000
heap
page read and write
14C36244000
heap
page read and write
7EC6000
heap
page read and write
6F41000
heap
page read and write
14C3C5CE000
trusted library section
page read and write
14C36253000
heap
page read and write
5308002CC000
trusted library allocation
page read and write
14C3625D000
heap
page read and write
14C36253000
heap
page read and write
7EC4000
heap
page read and write
801D000
heap
page read and write
7660000
direct allocation
page execute and read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
90E000
stack
page read and write
13FC000
stack
page read and write
4BF400374000
trusted library allocation
page read and write
4BF4001DC000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400E0C000
trusted library allocation
page read and write
250EFFE000
unkown
page readonly
4BF400A0C000
trusted library allocation
page read and write
53080039C000
trusted library allocation
page read and write
14C36244000
heap
page read and write
7EC9000
heap
page read and write
95A000
unkown
page readonly
511800248000
trusted library allocation
page read and write
4BF400D04000
trusted library allocation
page read and write
77E4000
heap
page read and write
1951000
heap
page read and write
5308002FC000
trusted library allocation
page read and write
14C36253000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C3681B000
heap
page read and write
BB1000
unkown
page execute and write copy
8020000
heap
page read and write
14C3A472000
trusted library allocation
page read and write
950000
unkown
page readonly
4BF400CB4000
trusted library allocation
page read and write
3B20000
direct allocation
page read and write
14C36253000
heap
page read and write
5E1800280000
direct allocation
page read and write
4BF400EA4000
trusted library allocation
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
7660000
direct allocation
page execute and read and write
7660000
direct allocation
page execute and read and write
4BF40020C000
trusted library allocation
page read and write
257C7FE000
stack
page read and write
14C32C80000
heap
page readonly
25117FA000
stack
page read and write
530800320000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C32CE0000
trusted library allocation
page read and write
7EC3000
heap
page read and write
530800664000
trusted library allocation
page read and write
8064000
heap
page read and write
6F41000
heap
page read and write
4BF4005AC000
trusted library allocation
page read and write
4BF400F34000
trusted library allocation
page read and write
6F41000
heap
page read and write
7660000
direct allocation
page execute and read and write
4BF400D50000
trusted library allocation
page read and write
530800744000
trusted library allocation
page read and write
250FFFE000
unkown
page readonly
1DF4000
heap
page read and write
1DF4000
heap
page read and write
4BF400C60000
trusted library allocation
page read and write
6F41000
heap
page read and write
5E1800294000
direct allocation
page read and write
14C3624A000
heap
page read and write
6F41000
heap
page read and write
AD0000
heap
page read and write
14C3624A000
heap
page read and write
6F41000
heap
page read and write
7911000
heap
page read and write
530800698000
trusted library allocation
page read and write
4BF40005E000
trusted library allocation
page read and write
14C36255000
heap
page read and write
257D7FB000
stack
page read and write
4BF400F44000
trusted library allocation
page read and write
257F7FB000
stack
page read and write
83C000
stack
page read and write
6F41000
heap
page read and write
2508FFE000
unkown
page readonly
4BF400E7C000
trusted library allocation
page read and write
4BF400E5C000
trusted library allocation
page read and write
870000
heap
page read and write
14C36244000
heap
page read and write
95E000
unkown
page read and write
823B000
heap
page read and write
14C32CC0000
heap
page read and write
4BF400DA4000
trusted library allocation
page read and write
7F80000
heap
page read and write
7630000
trusted library allocation
page read and write
530800730000
trusted library allocation
page read and write
8042000
heap
page read and write
4BF400394000
trusted library allocation
page read and write
1DF4000
heap
page read and write
194E000
heap
page read and write
14C367CD000
heap
page read and write
14C38980000
trusted library allocation
page read and write
1DF4000
heap
page read and write
6F41000
heap
page read and write
191B000
heap
page read and write
4BF400368000
trusted library allocation
page read and write
4BF400E78000
trusted library allocation
page read and write
951000
unkown
page execute read
80AE000
heap
page read and write
530800624000
trusted library allocation
page read and write
4BF400E60000
trusted library allocation
page read and write
4BF400E50000
trusted library allocation
page read and write
3B20000
direct allocation
page read and write
F90000
heap
page read and write
530800684000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C36243000
heap
page read and write
6F41000
heap
page read and write
14C36259000
heap
page read and write
5308006E8000
trusted library allocation
page read and write
2504FFE000
unkown
page readonly
530800320000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
4BF4004E0000
trusted library allocation
page read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
4BF400030000
trusted library allocation
page read and write
4BF400224000
trusted library allocation
page read and write
4BF400C28000
trusted library allocation
page read and write
2501FFE000
unkown
page readonly
4BF400718000
trusted library allocation
page read and write
4BF4001B4000
trusted library allocation
page read and write
14C32D77000
heap
page read and write
14C36244000
heap
page read and write
1965000
heap
page read and write
1948000
heap
page read and write
4BF40026C000
trusted library allocation
page read and write
4BF4006BC000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400294000
trusted library allocation
page read and write
4BF4001F4000
trusted library allocation
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
4BF4005F4000
trusted library allocation
page read and write
4BF4001E4000
trusted library allocation
page read and write
1955000
heap
page read and write
14C36270000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
8153000
heap
page read and write
530800734000
trusted library allocation
page read and write
4BF400E44000
trusted library allocation
page read and write
819E000
heap
page read and write
14C36253000
heap
page read and write
14C36244000
heap
page read and write
4BF400D20000
trusted library allocation
page read and write
951000
unkown
page execute read
4BF40070D000
trusted library allocation
page read and write
530800658000
trusted library allocation
page read and write
2509FFE000
unkown
page readonly
14C36793000
heap
page read and write
7EC0000
heap
page read and write
14C3624A000
heap
page read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
14C3624A000
heap
page read and write
1955000
heap
page read and write
5308002B0000
trusted library allocation
page read and write
4BF4001C4000
trusted library allocation
page read and write
4BF40091C000
trusted library allocation
page read and write
7EC0000
heap
page read and write
256BFFE000
unkown
page readonly
530800380000
trusted library allocation
page read and write
530800714000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
95A000
unkown
page readonly
4BF4003B4000
trusted library allocation
page read and write
511800230000
trusted library allocation
page read and write
5118002C0000
trusted library allocation
page read and write
8A0000
heap
page read and write
779C000
heap
page read and write
6F41000
heap
page read and write
14C3626C000
heap
page read and write
256AFFE000
unkown
page readonly
4BF400C8C000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400428000
trusted library allocation
page read and write
7ECB000
heap
page read and write
6F41000
heap
page read and write
14C3626E000
heap
page read and write
530800220000
trusted library allocation
page read and write
6C1F8000
unkown
page readonly
4BF4001AC000
trusted library allocation
page read and write
530800724000
trusted library allocation
page read and write
1757000
heap
page read and write
80ED000
heap
page read and write
256C7FA000
stack
page read and write
4BF400AD8000
trusted library allocation
page read and write
950000
unkown
page readonly
4BF400218000
trusted library allocation
page read and write
5308002F4000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
14C3624A000
heap
page read and write
4BF400CF4000
trusted library allocation
page read and write
3B20000
direct allocation
page read and write
6F41000
heap
page read and write
5308006B4000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF4001E0000
trusted library allocation
page read and write
8F0000
heap
page read and write
2502FFE000
unkown
page readonly
6F41000
heap
page read and write
1DF4000
heap
page read and write
53080033C000
trusted library allocation
page read and write
4BF4006D0000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
4BF400C40000
trusted library allocation
page read and write
4BF400E6C000
trusted library allocation
page read and write
6F41000
heap
page read and write
5E18002AC000
direct allocation
page read and write
5118002A0000
trusted library allocation
page read and write
7FC6000
heap
page read and write
5308006F0000
trusted library allocation
page read and write
6F41000
heap
page read and write
5E18002EC000
direct allocation
page read and write
4BF400EA0000
trusted library allocation
page read and write
A5A000
heap
page read and write
4BF400C24000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
14C36797000
heap
page read and write
5E1800270000
direct allocation
page read and write
5118002A0000
trusted library allocation
page read and write
6F41000
heap
page read and write
95E000
unkown
page read and write
73E0000
direct allocation
page read and write
7FB8000
heap
page read and write
14C3624A000
heap
page read and write
95E000
unkown
page write copy
6F41000
heap
page read and write
7EC5000
heap
page read and write
2F7F000
unkown
page read and write
1DF4000
heap
page read and write
F80000
heap
page read and write
14C3624A000
heap
page read and write
4BF4001B4000
trusted library allocation
page read and write
14C3624D000
heap
page read and write
6F41000
heap
page read and write
530800704000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
14C3CED0000
trusted library section
page read and write
14C36243000
heap
page read and write
14C3CA60000
trusted library section
page read and write
7ECC000
heap
page read and write
256DFFE000
unkown
page readonly
6F41000
heap
page read and write
4BF40075C000
trusted library allocation
page read and write
4BF400134000
trusted library allocation
page read and write
5308002DC000
trusted library allocation
page read and write
9F0000
heap
page read and write
14C36784000
heap
page read and write
7F8F000
heap
page read and write
4BF400F7C000
trusted library allocation
page read and write
4BF400214000
trusted library allocation
page read and write
14C38990000
trusted library section
page read and write
5118002E4000
trusted library allocation
page read and write
6F41000
heap
page read and write
530800754000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400801000
trusted library allocation
page read and write
6C1AD000
unkown
page read and write
4BF400EF0000
trusted library allocation
page read and write
79A0000
direct allocation
page read and write
7FFE000
heap
page read and write
14C36253000
heap
page read and write
4BF400FB4000
trusted library allocation
page read and write
5308006C4000
trusted library allocation
page read and write
53080069C000
trusted library allocation
page read and write
1951000
heap
page read and write
6F41000
heap
page read and write
95E000
unkown
page write copy
530800404000
trusted library allocation
page read and write
3B20000
direct allocation
page read and write
53080080C000
trusted library allocation
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
4BF400CD0000
trusted library allocation
page read and write
14C3CE61000
trusted library section
page read and write
4BF400C64000
trusted library allocation
page read and write
1710000
heap
page read and write
14C3624F000
heap
page read and write
3B20000
direct allocation
page read and write
6F41000
heap
page read and write
4BF400D78000
trusted library allocation
page read and write
25757FD000
stack
page read and write
25087FB000
stack
page read and write
7EC8000
heap
page read and write
95E000
unkown
page read and write
8219000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C3CFBD000
trusted library section
page read and write
95A000
unkown
page readonly
4BF40060C000
trusted library allocation
page read and write
511800288000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C36253000
heap
page read and write
530800640000
trusted library allocation
page read and write
5118002C0000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
4BF4001AC000
trusted library allocation
page read and write
14C36250000
heap
page read and write
250B7FE000
stack
page read and write
5118002BC000
trusted library allocation
page read and write
7660000
direct allocation
page execute and read and write
4BF400D2C000
trusted library allocation
page read and write
53080025C000
trusted library allocation
page read and write
EDC000
stack
page read and write
14C3BE85000
heap
page read and write
4BF4006DC000
trusted library allocation
page read and write
1DF4000
heap
page read and write
14C36244000
heap
page read and write
12DA000
unkown
page write copy
4BF40034C000
trusted library allocation
page read and write
14C3CE82000
trusted library section
page read and write
4BF400CC0000
trusted library allocation
page read and write
7EC2000
heap
page read and write
7ECE000
heap
page read and write
590000
heap
page read and write
2579FFE000
unkown
page readonly
14C3624A000
heap
page read and write
14C36242000
heap
page read and write
14C36253000
heap
page read and write
E2A000
stack
page read and write
7660000
direct allocation
page execute and read and write
14C36253000
heap
page read and write
4BF400DC8000
trusted library allocation
page read and write
5308006EC000
trusted library allocation
page read and write
2510FFE000
unkown
page readonly
961000
unkown
page readonly
25017FC000
stack
page read and write
7EC8000
heap
page read and write
6F41000
heap
page read and write
4BF40018C000
trusted library allocation
page read and write
14C32D20000
trusted library section
page readonly
5118002F0000
trusted library allocation
page read and write
6F41000
heap
page read and write
530800688000
trusted library allocation
page read and write
1750000
heap
page read and write
14C3624A000
heap
page read and write
14C3624A000
heap
page read and write
530800364000
trusted library allocation
page read and write
4BF4001D4000
trusted library allocation
page read and write
14C36799000
heap
page read and write
4BF400560000
trusted library allocation
page read and write
1DF4000
heap
page read and write
530800760000
trusted library allocation
page read and write
961000
unkown
page readonly
4BF40081C000
trusted library allocation
page read and write
2571FFE000
unkown
page readonly
14C36253000
heap
page read and write
14C32E17000
heap
page read and write
4BF4003C8000
trusted library allocation
page read and write
1970000
heap
page read and write
14C3624A000
heap
page read and write
5E1800201000
direct allocation
page read and write
4BF400294000
trusted library allocation
page read and write
7650000
direct allocation
page execute and read and write
4BF4009D8000
trusted library allocation
page read and write
53080075C000
trusted library allocation
page read and write
257A7FC000
stack
page read and write
5E18002D0000
direct allocation
page read and write
511800270000
trusted library allocation
page read and write
95A000
unkown
page readonly
250BFFE000
unkown
page readonly
1DF4000
heap
page read and write
6F41000
heap
page read and write
25647EF000
stack
page read and write
25797FE000
stack
page read and write
6C1F9000
unkown
page read and write
4BF400B30000
trusted library allocation
page read and write
14C36239000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C32F10000
heap
page read and write
4BF400194000
trusted library allocation
page read and write
14C3D04E000
trusted library section
page read and write
2577FFE000
unkown
page readonly
8027000
heap
page read and write
6C0D0000
unkown
page readonly
14C3624A000
heap
page read and write
7630000
trusted library allocation
page read and write
6F41000
heap
page read and write
C80000
heap
page read and write
7CC1000
heap
page read and write
6F41000
heap
page read and write
950000
unkown
page readonly
4BF40005A000
trusted library allocation
page read and write
5E1800220000
direct allocation
page read and write
257BFFE000
unkown
page readonly
807C000
heap
page read and write
6F41000
heap
page read and write
7F81000
heap
page read and write
5308006D4000
trusted library allocation
page read and write
14C36244000
heap
page read and write
330F000
stack
page read and write
4BF400C36000
trusted library allocation
page read and write
4BF400DA0000
trusted library allocation
page read and write
5308007D0000
trusted library allocation
page read and write
7F62000
heap
page read and write
530800408000
trusted library allocation
page read and write
14C3623E000
heap
page read and write
4BF40034C000
trusted library allocation
page read and write
5118002C0000
trusted library allocation
page read and write
7FC6000
heap
page read and write
14C36253000
heap
page read and write
4BF400CDC000
trusted library allocation
page read and write
4BF4003A8000
trusted library allocation
page read and write
4BF400A74000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C36242000
heap
page read and write
5118002D8000
trusted library allocation
page read and write
14C36244000
heap
page read and write
257CFFE000
unkown
page readonly
6F41000
heap
page read and write
14C36257000
heap
page read and write
6F41000
heap
page read and write
5308007B4000
trusted library allocation
page read and write
53080035C000
trusted library allocation
page read and write
6F41000
heap
page read and write
8072000
heap
page read and write
4BF400220000
trusted library allocation
page read and write
14C3D040000
trusted library section
page read and write
14C36244000
heap
page read and write
6F41000
heap
page read and write
9AE000
stack
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
5308006AC000
trusted library allocation
page read and write
7ECF000
heap
page read and write
5308006B8000
trusted library allocation
page read and write
7A17000
heap
page read and write
25057FB000
stack
page read and write
14C3624A000
heap
page read and write
950000
unkown
page readonly
14C36210000
heap
page read and write
6F41000
heap
page read and write
9EE000
stack
page read and write
806F000
heap
page read and write
4BF400C8C000
trusted library allocation
page read and write
81CE000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
14C367AA000
heap
page read and write
4BF4006FC000
trusted library allocation
page read and write
4BF4006D0000
trusted library allocation
page read and write
4BF400C54000
trusted library allocation
page read and write
5308006B0000
trusted library allocation
page read and write
817A000
heap
page read and write
6F41000
heap
page read and write
14C36244000
heap
page read and write
5118002B0000
trusted library allocation
page read and write
530800750000
trusted library allocation
page read and write
4BF400304000
trusted library allocation
page read and write
4BF400ECC000
trusted library allocation
page read and write
951000
unkown
page execute read
4BF400874000
trusted library allocation
page read and write
961000
unkown
page readonly
7EC7000
heap
page read and write
4BF400D49000
trusted library allocation
page read and write
4BF400F5C000
trusted library allocation
page read and write
95A000
unkown
page readonly
4BF400D3C000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF4002A4000
trusted library allocation
page read and write
250D7FE000
stack
page read and write
14C36244000
heap
page read and write
2513FFE000
unkown
page readonly
25077FE000
stack
page read and write
2574FFE000
unkown
page readonly
5308006FC000
trusted library allocation
page read and write
4BF400074000
trusted library allocation
page read and write
5308007C8000
trusted library allocation
page read and write
4BF4003C0000
trusted library allocation
page read and write
4BF400040000
trusted library allocation
page read and write
14C36253000
heap
page read and write
14C3D24E000
trusted library section
page read and write
7EC7000
heap
page read and write
6F41000
heap
page read and write
3B20000
direct allocation
page read and write
530800700000
trusted library allocation
page read and write
951000
unkown
page execute read
5E1800210000
direct allocation
page read and write
5E18002E4000
direct allocation
page read and write
4BF4001AC000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C3C407000
unclassified section
page read and write
4BF4001D8000
trusted library allocation
page read and write
2FDE000
stack
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
5E180024C000
direct allocation
page read and write
6F41000
heap
page read and write
7ECA000
heap
page read and write
6F41000
heap
page read and write
5E1800274000
direct allocation
page read and write
4BF400E01000
trusted library allocation
page read and write
4BF4003D4000
trusted library allocation
page read and write
14C36243000
heap
page read and write
6F41000
heap
page read and write
530800788000
trusted library allocation
page read and write
4BF4002F0000
trusted library allocation
page read and write
6F41000
heap
page read and write
4BF400D90000
trusted library allocation
page read and write
2500FFE000
unkown
page readonly
6F41000
heap
page read and write
6F41000
heap
page read and write
4BF400E90000
trusted library allocation
page read and write
1965000
heap
page read and write
1DF4000
heap
page read and write
7781000
heap
page read and write
4BF4009F4000
trusted library allocation
page read and write
6F41000
heap
page read and write
530800368000
trusted library allocation
page read and write
250DFFE000
unkown
page readonly
14C36244000
heap
page read and write
4BF4001A0000
trusted library allocation
page read and write
530800330000
trusted library allocation
page read and write
14C36244000
heap
page read and write
4BF400A1C000
trusted library allocation
page read and write
7660000
direct allocation
page execute and read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
7660000
direct allocation
page execute and read and write
4BF400E80000
trusted library allocation
page read and write
530800248000
trusted library allocation
page read and write
4BF4001AC000
trusted library allocation
page read and write
53C000
stack
page read and write
951000
unkown
page execute read
6F41000
heap
page read and write
83C000
stack
page read and write
1DF4000
heap
page read and write
14C36253000
heap
page read and write
5E0000
heap
page read and write
4BF400534000
trusted library allocation
page read and write
14C3624F000
heap
page read and write
530800601000
trusted library allocation
page read and write
530800320000
trusted library allocation
page read and write
4BF400AA8000
trusted library allocation
page read and write
4BF400C64000
trusted library allocation
page read and write
4BF4002B9000
trusted library allocation
page read and write
250F7FE000
stack
page read and write
3B20000
direct allocation
page read and write
5118002BC000
trusted library allocation
page read and write
4BF400B3C000
trusted library allocation
page read and write
14C3623E000
heap
page read and write
4BF40000C000
trusted library allocation
page read and write
14C3C3F0000
heap
page read and write
8000000
heap
page read and write
4BF400298000
trusted library allocation
page read and write
4BF400F28000
trusted library allocation
page read and write
4BF400C9C000
trusted library allocation
page read and write
14C32F80000
heap
page read and write
1955000
heap
page read and write
14C36253000
heap
page read and write
4BF4007C9000
trusted library allocation
page read and write
6F41000
heap
page read and write
5308002EE000
trusted library allocation
page read and write
950000
unkown
page readonly
4BF4004BC000
trusted library allocation
page read and write
14C3624A000
heap
page read and write
25027FE000
stack
page read and write
25107FE000
stack
page read and write
14C3626A000
heap
page read and write
4BF4005C0000
trusted library allocation
page read and write
5E1800284000
direct allocation
page read and write
14C3C5C2000
trusted library section
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
4BF400CE4000
trusted library allocation
page read and write
6F41000
heap
page read and write
530800654000
trusted library allocation
page read and write
4BF4009C8000
trusted library allocation
page read and write
2514FFE000
unkown
page readonly
8073000
heap
page read and write
14C3626C000
heap
page read and write
5308002B8000
trusted library allocation
page read and write
14C36255000
heap
page read and write
51180020C000
trusted library allocation
page read and write
530800424000
trusted library allocation
page read and write
6F41000
heap
page read and write
25657FD000
unkown
page read and write
F30000
heap
page read and write
4BF400A34000
trusted library allocation
page read and write
530800694000
trusted library allocation
page read and write
14C36244000
heap
page read and write
339A000
heap
page read and write
511800238000
trusted library allocation
page read and write
256D7FE000
stack
page read and write
6F41000
heap
page read and write
63C000
stack
page read and write
5308007CC000
trusted library allocation
page read and write
4BF400294000
trusted library allocation
page read and write
1DF4000
heap
page read and write
2575FFE000
unkown
page readonly
14C3625B000
heap
page read and write
14C3C646000
trusted library section
page read and write
6F41000
heap
page read and write
25667FE000
stack
page read and write
3B20000
direct allocation
page read and write
790A000
heap
page read and write
257AFFE000
unkown
page readonly
4BF400494000
trusted library allocation
page read and write
14C3624F000
heap
page read and write
14C3C3F3000
heap
page read and write
5E1800290000
direct allocation
page read and write
6F41000
heap
page read and write
4BF4002B4000
trusted library allocation
page read and write
530800320000
trusted library allocation
page read and write
6F41000
heap
page read and write
14C3624A000
heap
page read and write
14C36253000
heap
page read and write
4BF400A48000
trusted library allocation
page read and write
5118002B0000
trusted library allocation
page read and write
256F7FB000
stack
page read and write
961000
unkown
page readonly
530800630000
trusted library allocation
page read and write
4BF4003A0000
trusted library allocation
page read and write
6F41000
heap
page read and write
15A0000
heap
page read and write
6F41000
heap
page read and write
4BF4003A0000
trusted library allocation
page read and write
4BF40040C000
trusted library allocation
page read and write
14C36244000
heap
page read and write
257B7FC000
stack
page read and write
14C3CEF3000
trusted library section
page read and write
6C0D1000
unkown
page execute read
961000
unkown
page readonly
7EC1000
heap
page read and write
6F41000
heap
page read and write
8073000
heap
page read and write
6F41000
heap
page read and write
6F41000
heap
page read and write
4BF4000DC000
trusted library allocation
page read and write
7ECA000
heap
page read and write
256B7FB000
stack
page read and write
4BF4007DC000
trusted library allocation
page read and write
4BF400B04000
trusted library allocation
page read and write
5E180023C000
direct allocation
page read and write
4BF400A01000
trusted library allocation
page read and write
530800614000
trusted library allocation
page read and write
2576FFE000
unkown
page readonly
6F41000
heap
page read and write
14C36244000
heap
page read and write
4BF400C34000
trusted library allocation
page read and write
4BF400B84000
trusted library allocation
page read and write
There are 1337 hidden memdumps, click here to show them.