IOC Report
SzXZZDlkVE.exe

loading gif

Files

File Path
Type
Category
Malicious
SzXZZDlkVE.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SzXZZDlkVE.exe_21c5eb634ba7d98ffc51682d4d3de99864f54e2_d6aa8e09_1229cc53-5a86-4c93-b46e-8dedead03e2b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16E2.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:51:46 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18B8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18F7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SzXZZDlkVE.exe
"C:\Users\user\Desktop\SzXZZDlkVE.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2204,i,6742422220409374108,9298232818822931570,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7320 -s 1844

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
https://chrome.google.com/webstorep
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
https://httpbin.org/ip
34.226.108.155
https://anglebug.com/7847
unknown
https://google-ohttp-relay-join.fastly-edge.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
ProgramId
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
FileId
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
LowerCaseLongPath
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
LongPathHash
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
Name
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
OriginalFileName
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
Publisher
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
Version
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
BinFileVersion
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
BinaryType
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
ProductName
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
ProductVersion
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
LinkDate
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
BinProductVersion
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
AppxPackageFullName
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
AppxPackageRelativeId
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
Size
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
Language
\REGISTRY\A\{e35837c4-d3dc-fb8c-25cd-cb5e0530f831}\Root\InventoryApplicationFile\szxzzdlkve.exe|144fc7f92401ceff
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3E7000AFC000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
7D0400248000
trusted library allocation
page read and write
C011FFE000
stack
page read and write
23261C9A000
heap
page read and write
23261C9A000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
1604002CC000
trusted library allocation
page read and write
A31000
heap
page read and write
6701000
heap
page read and write
3C1000
unkown
page execute read
3E70001AC000
trusted library allocation
page read and write
6701000
heap
page read and write
CE0000
heap
page read and write
23261C9A000
heap
page read and write
C019FFC000
stack
page read and write
23261C9A000
heap
page read and write
3E7000384000
trusted library allocation
page read and write
6F01000
heap
page read and write
23261C9F000
heap
page read and write
23261C92000
heap
page read and write
23261C94000
heap
page read and write
7D04002BC000
trusted library allocation
page read and write
23261C94000
heap
page read and write
7D04002B0000
trusted library allocation
page read and write
A35000
heap
page read and write
3E7000708000
trusted library allocation
page read and write
160400688000
trusted library allocation
page read and write
7633000
heap
page read and write
3B0000
heap
page read and write
6701000
heap
page read and write
160400770000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
1604006D4000
trusted library allocation
page read and write
2326228E000
heap
page read and write
6701000
heap
page read and write
23261CA2000
heap
page read and write
3E70005C4000
trusted library allocation
page read and write
160400718000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
6701000
heap
page read and write
1604002B8000
trusted library allocation
page read and write
160400630000
trusted library allocation
page read and write
1B10000
heap
page read and write
23268E80000
trusted library section
page read and write
3E70002A8000
trusted library allocation
page read and write
C02D7FA000
stack
page read and write
3E7000001000
trusted library allocation
page read and write
16040080C000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
1604006AC000
trusted library allocation
page read and write
3E7000064000
trusted library allocation
page read and write
6701000
heap
page read and write
7F4000
heap
page read and write
3E7000508000
trusted library allocation
page read and write
23261C92000
heap
page read and write
23268B20000
trusted library section
page read and write
3E70006CC000
trusted library allocation
page read and write
3CE000
unkown
page write copy
160400714000
trusted library allocation
page read and write
C024FFB000
stack
page read and write
23261C87000
heap
page read and write
730A000
heap
page read and write
23261C94000
heap
page read and write
23261C9A000
heap
page read and write
7F4000
heap
page read and write
3E7000A1C000
trusted library allocation
page read and write
3E7000D40000
trusted library allocation
page read and write
23261CA3000
heap
page read and write
3E70001B4000
trusted library allocation
page read and write
23261C92000
heap
page read and write
3E7000C0C000
trusted library allocation
page read and write
3E70002EB000
trusted library allocation
page read and write
6C141000
unkown
page execute read
C016FFA000
stack
page read and write
2325E658000
heap
page read and write
23261C9F000
heap
page read and write
23261C9A000
heap
page read and write
23261C94000
heap
page read and write
3E70005D8000
trusted library allocation
page read and write
7D04002BC000
trusted library allocation
page read and write
160400310000
trusted library allocation
page read and write
23262249000
heap
page read and write
6701000
heap
page read and write
C0287FE000
unkown
page readonly
A35000
heap
page read and write
7631000
heap
page read and write
3E7000E20000
trusted library allocation
page read and write
72A6000
direct allocation
page read and write
1588002D0000
direct allocation
page read and write
23261C84000
heap
page read and write
23261CC4000
heap
page read and write
C0267FE000
unkown
page readonly
3E7000C2C000
trusted library allocation
page read and write
C01AFFE000
stack
page read and write
A20000
heap
page read and write
3E700057C000
trusted library allocation
page read and write
7860000
heap
page read and write
23261CA6000
heap
page read and write
3E70002E0000
trusted library allocation
page read and write
3E700056C000
trusted library allocation
page read and write
3E70004D0000
trusted library allocation
page read and write
7631000
heap
page read and write
23261C9F000
heap
page read and write
2325E6E9000
heap
page read and write
6701000
heap
page read and write
3E7000E58000
trusted library allocation
page read and write
232681B0000
trusted library section
page read and write
160400610000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
6B80000
direct allocation
page read and write
23267FB7000
unclassified section
page read and write
C0187FE000
unkown
page readonly
CDF000
stack
page read and write
23261C9F000
heap
page read and write
A3D000
heap
page read and write
3E7000B7C000
trusted library allocation
page read and write
23261C92000
heap
page read and write
3E7000AB4000
trusted library allocation
page read and write
3CE000
unkown
page read and write
3E7000EF8000
trusted library allocation
page read and write
3E7000DE0000
trusted library allocation
page read and write
3E7000DA8000
trusted library allocation
page read and write
3E7000E0C000
trusted library allocation
page read and write
3CA000
unkown
page readonly
23261C9A000
heap
page read and write
3E7000C27000
trusted library allocation
page read and write
3E7000FA4000
trusted library allocation
page read and write
1ADF000
stack
page read and write
3E70008E4000
trusted library allocation
page read and write
7D04002B0000
trusted library allocation
page read and write
23268346000
trusted library section
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
7F4000
heap
page read and write
3E7000C74000
trusted library allocation
page read and write
C03BFFE000
stack
page read and write
23261CA3000
heap
page read and write
3E7000558000
trusted library allocation
page read and write
160400694000
trusted library allocation
page read and write
232622E2000
heap
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
2326225D000
heap
page read and write
6701000
heap
page read and write
3C0000
unkown
page readonly
6701000
heap
page read and write
C0297FE000
unkown
page readonly
6701000
heap
page read and write
771E000
heap
page read and write
C00CFEF000
stack
page read and write
23261CA2000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
6701000
heap
page read and write
23261CA2000
heap
page read and write
C01BFFE000
stack
page read and write
3E7000D30000
trusted library allocation
page read and write
3E70001F8000
trusted library allocation
page read and write
3C1000
unkown
page execute read
23261C9F000
heap
page read and write
23261C94000
heap
page read and write
3E7000E01000
trusted library allocation
page read and write
160400320000
trusted library allocation
page read and write
6701000
heap
page read and write
23261CA2000
heap
page read and write
23261CA5000
heap
page read and write
3E700034C000
trusted library allocation
page read and write
6701000
heap
page read and write
3E7000CC0000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
23261C92000
heap
page read and write
6701000
heap
page read and write
23261C92000
heap
page read and write
3E7000E74000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
3E70001B4000
trusted library allocation
page read and write
3E7000774000
trusted library allocation
page read and write
C03E7FE000
unkown
page readonly
C021FFE000
stack
page read and write
23261C9E000
heap
page read and write
3E7000878000
trusted library allocation
page read and write
23268987000
unclassified section
page read and write
3E70007A4000
trusted library allocation
page read and write
A44000
heap
page read and write
77BE000
heap
page read and write
16040075C000
trusted library allocation
page read and write
C0247FE000
unkown
page readonly
23261CA5000
heap
page read and write
23261C94000
heap
page read and write
34C000
stack
page read and write
6B40000
trusted library allocation
page read and write
3C0000
unkown
page readonly
7D04002C0000
trusted library allocation
page read and write
C033FFD000
stack
page read and write
3E700040C000
trusted library allocation
page read and write
DC1000
unkown
page execute and write copy
3E70009E0000
trusted library allocation
page read and write
23261C94000
heap
page read and write
783A000
heap
page read and write
6701000
heap
page read and write
C03AFFC000
stack
page read and write
3E70002A4000
trusted library allocation
page read and write
3E7000980000
trusted library allocation
page read and write
3C1000
unkown
page execute read
23261C9A000
heap
page read and write
763A000
heap
page read and write
6701000
heap
page read and write
2325E930000
trusted library section
page readonly
23261C94000
heap
page read and write
C03DFFE000
stack
page read and write
3E7000D4C000
trusted library allocation
page read and write
6701000
heap
page read and write
3E7000AB0000
trusted library allocation
page read and write
3E7000BA8000
trusted library allocation
page read and write
2325E6ED000
heap
page read and write
23261CA2000
heap
page read and write
6701000
heap
page read and write
23261C9A000
heap
page read and write
23268E8E000
trusted library section
page read and write
6701000
heap
page read and write
23261CC0000
heap
page read and write
23261C92000
heap
page read and write
23261C9F000
heap
page read and write
1450000
heap
page read and write
6F1F000
heap
page read and write
1604003EC000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
14B0000
heap
page read and write
160400320000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
23261C91000
heap
page read and write
23261CAF000
heap
page read and write
77E9000
heap
page read and write
6701000
heap
page read and write
3E70001F4000
trusted library allocation
page read and write
6701000
heap
page read and write
7766000
heap
page read and write
23261CA5000
heap
page read and write
3E7000CD0000
trusted library allocation
page read and write
3E7000C88000
trusted library allocation
page read and write
3E7000F28000
trusted library allocation
page read and write
3E7000C1C000
trusted library allocation
page read and write
A4D000
heap
page read and write
8C0000
heap
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
3C1000
unkown
page execute read
6701000
heap
page read and write
160400684000
trusted library allocation
page read and write
7637000
heap
page read and write
788F000
heap
page read and write
23261C9F000
heap
page read and write
C0277FE000
unkown
page readonly
2326224D000
heap
page read and write
6701000
heap
page read and write
3CE000
unkown
page read and write
23261CA6000
heap
page read and write
23261CA6000
heap
page read and write
23261CA6000
heap
page read and write
3E7000658000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
E50000
heap
page read and write
3E7000384000
trusted library allocation
page read and write
158800230000
direct allocation
page read and write
6701000
heap
page read and write
23261C9A000
heap
page read and write
23261C91000
heap
page read and write
77B0000
heap
page read and write
7E0000
direct allocation
page read and write
23261CA3000
heap
page read and write
1604006B8000
trusted library allocation
page read and write
6701000
heap
page read and write
C012FFD000
stack
page read and write
23261CA2000
heap
page read and write
23261C92000
heap
page read and write
3E7000E8C000
trusted library allocation
page read and write
C030FFE000
stack
page read and write
3E7000EA8000
trusted library allocation
page read and write
160400698000
trusted library allocation
page read and write
3E70006F6000
trusted library allocation
page read and write
3E70007C0000
trusted library allocation
page read and write
3E7000F8C000
trusted library allocation
page read and write
C038FFA000
stack
page read and write
6701000
heap
page read and write
3C1000
unkown
page execute read
3E7000F10000
trusted library allocation
page read and write
23261CC4000
heap
page read and write
6701000
heap
page read and write
C020FFA000
stack
page read and write
6701000
heap
page read and write
160400658000
trusted library allocation
page read and write
6701000
heap
page read and write
23261CA6000
heap
page read and write
232622AC000
heap
page read and write
1604006FC000
trusted library allocation
page read and write
23261C92000
heap
page read and write
23262288000
heap
page read and write
7632000
heap
page read and write
3E7000CD0000
trusted library allocation
page read and write
3CA000
unkown
page readonly
160400368000
trusted library allocation
page read and write
7786000
heap
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
1604002F0000
trusted library allocation
page read and write
1C70000
heap
page read and write
3E7000370000
trusted library allocation
page read and write
3E700048C000
trusted library allocation
page read and write
6701000
heap
page read and write
7431000
heap
page read and write
3E7000EDC000
trusted library allocation
page read and write
23261C92000
heap
page read and write
6701000
heap
page read and write
1604002FC000
trusted library allocation
page read and write
3E700033C000
trusted library allocation
page read and write
6701000
heap
page read and write
900000
heap
page read and write
23261CA3000
heap
page read and write
3E70005EC000
trusted library allocation
page read and write
3E700088C000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
7701000
heap
page read and write
7D0400220000
trusted library allocation
page read and write
23261C92000
heap
page read and write
23261C9A000
heap
page read and write
7D04002C0000
trusted library allocation
page read and write
3E70001D8000
trusted library allocation
page read and write
3E70006C0000
trusted library allocation
page read and write
6701000
heap
page read and write
C02E7FE000
unkown
page readonly
6701000
heap
page read and write
3E70001C4000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
3E70001A0000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
799F000
heap
page read and write
23268BE6000
trusted library section
page read and write
7F4000
heap
page read and write
23261C92000
heap
page read and write
7D0400250000
trusted library allocation
page read and write
3E7000F60000
trusted library allocation
page read and write
3E700000C000
trusted library allocation
page read and write
23261CC2000
heap
page read and write
23261C94000
heap
page read and write
7131000
heap
page read and write
3C0000
unkown
page readonly
7D04002F0000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
77CF000
heap
page read and write
23261CA3000
heap
page read and write
2325E8A0000
trusted library allocation
page read and write
3E7000C50000
trusted library allocation
page read and write
160400374000
trusted library allocation
page read and write
23261F00000
heap
page read and write
3E7000C98000
trusted library allocation
page read and write
3E7000E20000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
C1F000
stack
page read and write
A31000
heap
page read and write
3E7000601000
trusted library allocation
page read and write
23261C8D000
heap
page read and write
7D0400230000
trusted library allocation
page read and write
160400404000
trusted library allocation
page read and write
6701000
heap
page read and write
3E7000201000
trusted library allocation
page read and write
C01E7FE000
unkown
page readonly
3E700017C000
trusted library allocation
page read and write
23261C8D000
heap
page read and write
23268AD2000
trusted library section
page read and write
3E7000B70000
trusted library allocation
page read and write
6701000
heap
page read and write
C02CFFE000
unkown
page readonly
23261C9F000
heap
page read and write
23261C9A000
heap
page read and write
23262272000
heap
page read and write
23261C9A000
heap
page read and write
3E7000D04000
trusted library allocation
page read and write
23261CA2000
heap
page read and write
3E70007CC000
trusted library allocation
page read and write
7D04002F4000
trusted library allocation
page read and write
6701000
heap
page read and write
C0107FE000
unkown
page readonly
23261C91000
heap
page read and write
6701000
heap
page read and write
7633000
heap
page read and write
FA0000
heap
page read and write
23261C9F000
heap
page read and write
2326229B000
heap
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
23261CA6000
heap
page read and write
3D1000
unkown
page readonly
160400330000
trusted library allocation
page read and write
6701000
heap
page read and write
7300000
heap
page read and write
3E7000E34000
trusted library allocation
page read and write
23261CA2000
heap
page read and write
6701000
heap
page read and write
23262286000
heap
page read and write
23261C9A000
heap
page read and write
23261C94000
heap
page read and write
6701000
heap
page read and write
23261CA3000
heap
page read and write
23261C94000
heap
page read and write
7140000
direct allocation
page read and write
23261CA3000
heap
page read and write
6701000
heap
page read and write
7739000
heap
page read and write
1588002DC000
direct allocation
page read and write
A27000
heap
page read and write
23261C92000
heap
page read and write
7F4000
heap
page read and write
6701000
heap
page read and write
232622AC000
heap
page read and write
3E70001B4000
trusted library allocation
page read and write
3E7000F7C000
trusted library allocation
page read and write
C02A7FE000
unkown
page readonly
7D04002D8000
trusted library allocation
page read and write
3D1000
unkown
page readonly
3E7000C22000
trusted library allocation
page read and write
6701000
heap
page read and write
7638000
heap
page read and write
16040025C000
trusted library allocation
page read and write
23268180000
heap
page read and write
160400788000
trusted library allocation
page read and write
23261CA3000
heap
page read and write
23261C96000
heap
page read and write
A31000
heap
page read and write
6701000
heap
page read and write
2325E955000
heap
page read and write
3E7000594000
trusted library allocation
page read and write
C023FFE000
stack
page read and write
158800215000
direct allocation
page read and write
78B6000
heap
page read and write
23261C9A000
heap
page read and write
23261CA5000
heap
page read and write
763E000
heap
page read and write
6701000
heap
page read and write
3E7000F98000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
23261C94000
heap
page read and write
160400354000
trusted library allocation
page read and write
7D0400294000
trusted library allocation
page read and write
7633000
heap
page read and write
3E700009B000
trusted library allocation
page read and write
3E70002B4000
trusted library allocation
page read and write
A80000
heap
page read and write
C0137FE000
unkown
page readonly
6701000
heap
page read and write
C00DFFE000
unkown
page read and write
7E0000
direct allocation
page read and write
3E7000384000
trusted library allocation
page read and write
23262282000
heap
page read and write
6701000
heap
page read and write
C01B7FE000
unkown
page readonly
6701000
heap
page read and write
7F4000
heap
page read and write
6701000
heap
page read and write
6F72000
heap
page read and write
6701000
heap
page read and write
3E70006B0000
trusted library allocation
page read and write
1604006E0000
trusted library allocation
page read and write
7232000
heap
page read and write
2326229B000
heap
page read and write
23261C92000
heap
page read and write
23261C94000
heap
page read and write
6701000
heap
page read and write
7D0400264000
trusted library allocation
page read and write
160400624000
trusted library allocation
page read and write
77FC000
heap
page read and write
23261CC4000
heap
page read and write
23261C9F000
heap
page read and write
7D04002A0000
trusted library allocation
page read and write
232622C5000
heap
page read and write
3E700033C000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
23261C9F000
heap
page read and write
3E70001D4000
trusted library allocation
page read and write
6701000
heap
page read and write
160400288000
trusted library allocation
page read and write
7F4000
heap
page read and write
23261C9A000
heap
page read and write
3E700029E000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
23261C9A000
heap
page read and write
3E7000A64000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
6701000
heap
page read and write
23261C9A000
heap
page read and write
3E7000F60000
trusted library allocation
page read and write
6DE0000
direct allocation
page execute and read and write
6DF0000
direct allocation
page execute and read and write
23261CA6000
heap
page read and write
3E70001DC000
trusted library allocation
page read and write
3E7000358000
trusted library allocation
page read and write
C034FFC000
stack
page read and write
6701000
heap
page read and write
3E70009B4000
trusted library allocation
page read and write
6701000
heap
page read and write
76E3000
heap
page read and write
3E7000918000
trusted library allocation
page read and write
23262282000
heap
page read and write
7712000
heap
page read and write
6DC0000
direct allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
3E7000801000
trusted library allocation
page read and write
1604006D0000
trusted library allocation
page read and write
23261CA3000
heap
page read and write
3E7000C01000
trusted library allocation
page read and write
23261C8D000
heap
page read and write
3E700015C000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
160400744000
trusted library allocation
page read and write
6701000
heap
page read and write
3E70008F8000
trusted library allocation
page read and write
3E7000B1C000
trusted library allocation
page read and write
3E70001E0000
trusted library allocation
page read and write
232644D0000
trusted library allocation
page read and write
6701000
heap
page read and write
A90000
heap
page read and write
158800217000
direct allocation
page read and write
3E70003AC000
trusted library allocation
page read and write
7637000
heap
page read and write
3E70000DC000
trusted library allocation
page read and write
23261CC4000
heap
page read and write
763C000
heap
page read and write
77E2000
heap
page read and write
6701000
heap
page read and write
160400678000
trusted library allocation
page read and write
7D04002BC000
trusted library allocation
page read and write
23268AC0000
trusted library section
page read and write
7631000
heap
page read and write
3E7000298000
trusted library allocation
page read and write
772C000
heap
page read and write
23261C94000
heap
page read and write
A1E000
stack
page read and write
A35000
heap
page read and write
3E7000B70000
trusted library allocation
page read and write
23261C60000
heap
page read and write
7639000
heap
page read and write
7D0400260000
trusted library allocation
page read and write
3CE000
unkown
page read and write
23261CA5000
heap
page read and write
6701000
heap
page read and write
23261C94000
heap
page read and write
23265FA4000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
160400401000
trusted library allocation
page read and write
23261C94000
heap
page read and write
1604006C8000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
7634000
heap
page read and write
23261C9F000
heap
page read and write
3E70003C8000
trusted library allocation
page read and write
16040027C000
trusted library allocation
page read and write
3CE000
unkown
page write copy
23268B43000
trusted library section
page read and write
3E7000118000
trusted library allocation
page read and write
3E7000C78000
trusted library allocation
page read and write
6701000
heap
page read and write
2326228E000
heap
page read and write
23261C9F000
heap
page read and write
3E7000F90000
trusted library allocation
page read and write
3E7000401000
trusted library allocation
page read and write
7804000
heap
page read and write
23261CA3000
heap
page read and write
A9B000
heap
page read and write
232622C0000
heap
page read and write
3CA000
unkown
page readonly
3E7000D14000
trusted library allocation
page read and write
F40000
heap
page read and write
2326228A000
heap
page read and write
160400620000
trusted library allocation
page read and write
7D04002B0000
trusted library allocation
page read and write
3E700064C000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
3E7000230000
trusted library allocation
page read and write
C031FFE000
stack
page read and write
6701000
heap
page read and write
A8E000
heap
page read and write
74D000
stack
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
160400730000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
C013FFB000
stack
page read and write
779C000
heap
page read and write
3CA000
unkown
page readonly
C025FFD000
stack
page read and write
16B7000
heap
page read and write
7E0000
direct allocation
page read and write
6701000
heap
page read and write
3E7000748000
trusted library allocation
page read and write
800000
heap
page read and write
232623C0000
trusted library section
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
6701000
heap
page read and write
6701000
heap
page read and write
3E70004EC000
trusted library allocation
page read and write
3E7000C68000
trusted library allocation
page read and write
7639000
heap
page read and write
3CA000
unkown
page readonly
3E70008D0000
trusted library allocation
page read and write
160400310000
trusted library allocation
page read and write
3D1000
unkown
page readonly
6C140000
unkown
page readonly
23261C9F000
heap
page read and write
3E70003A4000
trusted library allocation
page read and write
78A000
stack
page read and write
23261C9A000
heap
page read and write
6701000
heap
page read and write
3E7000228000
trusted library allocation
page read and write
3E7000E34000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
160400754000
trusted library allocation
page read and write
C0177FE000
unkown
page readonly
3E70000A4000
trusted library allocation
page read and write
1604007D0000
trusted library allocation
page read and write
23261C92000
heap
page read and write
3E70005A8000
trusted library allocation
page read and write
3E7000AC0000
trusted library allocation
page read and write
6701000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
23261C9F000
heap
page read and write
23261C99000
heap
page read and write
158800234000
direct allocation
page read and write
782B000
heap
page read and write
6701000
heap
page read and write
3E700081C000
trusted library allocation
page read and write
6701000
heap
page read and write
3E7000EC4000
trusted library allocation
page read and write
23261CA2000
heap
page read and write
3E70003E8000
trusted library allocation
page read and write
23261C92000
heap
page read and write
3E7000E64000
trusted library allocation
page read and write
6701000
heap
page read and write
3E70001E8000
trusted library allocation
page read and write
6701000
heap
page read and write
23262200000
heap
page read and write
C00E7FE000
unkown
page readonly
18DE000
stack
page read and write
6701000
heap
page read and write
2326228C000
heap
page read and write
23261C9F000
heap
page read and write
3E7000974000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
23261CA7000
heap
page read and write
13FC000
stack
page read and write
3E7000C18000
trusted library allocation
page read and write
C017FFB000
stack
page read and write
3E7000904000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
3E7000294000
trusted library allocation
page read and write
C03D7FE000
unkown
page readonly
23265F00000
trusted library section
page read and write
23261CA2000
heap
page read and write
797A000
heap
page read and write
6701000
heap
page read and write
3E70002BB000
trusted library allocation
page read and write
C032FFD000
stack
page read and write
6701000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
23261CC0000
heap
page read and write
3E7000E28000
trusted library allocation
page read and write
23261C91000
heap
page read and write
23268157000
unclassified section
page read and write
76D6000
heap
page read and write
23261C9A000
heap
page read and write
3CA000
unkown
page readonly
763A000
heap
page read and write
3E70001E4000
trusted library allocation
page read and write
76F4000
heap
page read and write
160400724000
trusted library allocation
page read and write
C03CFFE000
stack
page read and write
160400704000
trusted library allocation
page read and write
23261C94000
heap
page read and write
3E700027C000
trusted library allocation
page read and write
6701000
heap
page read and write
232622BC000
heap
page read and write
7D04002C0000
trusted library allocation
page read and write
A2E000
heap
page read and write
16B0000
heap
page read and write
C010FFE000
stack
page read and write
3E7000850000
trusted library allocation
page read and write
3E70008B4000
trusted library allocation
page read and write
3E7000AA0000
trusted library allocation
page read and write
3E70006A0000
trusted library allocation
page read and write
76D2000
heap
page read and write
3E700038C000
trusted library allocation
page read and write
3E70009E8000
trusted library allocation
page read and write
A4E000
unkown
page read and write
3E700034C000
trusted library allocation
page read and write
C02BFFC000
stack
page read and write
23262286000
heap
page read and write
1604006B4000
trusted library allocation
page read and write
7D0400288000
trusted library allocation
page read and write
77AA000
heap
page read and write
7D04002C0000
trusted library allocation
page read and write
158800274000
direct allocation
page read and write
3E70006D4000
trusted library allocation
page read and write
158800210000
direct allocation
page read and write
3E70003C8000
trusted library allocation
page read and write
158800220000
direct allocation
page read and write
6701000
heap
page read and write
3E7000D94000
trusted library allocation
page read and write
23261C94000
heap
page read and write
3E7000898000
trusted library allocation
page read and write
EEC000
stack
page read and write
23261C9A000
heap
page read and write
3E70001F0000
trusted library allocation
page read and write
3E700033C000
trusted library allocation
page read and write
7D040020C000
trusted library allocation
page read and write
23261C94000
heap
page read and write
C0347FE000
unkown
page readonly
6701000
heap
page read and write
16040069C000
trusted library allocation
page read and write
6701000
heap
page read and write
3C0000
unkown
page readonly
6701000
heap
page read and write
2325E890000
trusted library allocation
page read and write
23261CA3000
heap
page read and write
23261C94000
heap
page read and write
2326227A000
heap
page read and write
3E7000214000
trusted library allocation
page read and write
C0367FE000
unkown
page readonly
7636000
heap
page read and write
14EA000
unkown
page write copy
6701000
heap
page read and write
763B000
heap
page read and write
3E7000C98000
trusted library allocation
page read and write
2326227A000
heap
page read and write
23261CA5000
heap
page read and write
6701000
heap
page read and write
23268780000
trusted library section
page read and write
3E70003B8000
trusted library allocation
page read and write
7D0400235000
trusted library allocation
page read and write
3E70003DC000
trusted library allocation
page read and write
23261C92000
heap
page read and write
160400601000
trusted library allocation
page read and write
6701000
heap
page read and write
3E7000FC8000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
3E700080C000
trusted library allocation
page read and write
3E7000B30000
trusted library allocation
page read and write
6701000
heap
page read and write
23261C92000
heap
page read and write
23261C94000
heap
page read and write
3E70004E0000
trusted library allocation
page read and write
3E7000290000
trusted library allocation
page read and write
C0157FE000
unkown
page readonly
15A0000
heap
page read and write
7637000
heap
page read and write
3E7000D38000
trusted library allocation
page read and write
7996000
heap
page read and write
23261C91000
heap
page read and write
3E700014C000
trusted library allocation
page read and write
23261C94000
heap
page read and write
3E7000F6C000
trusted library allocation
page read and write
6701000
heap
page read and write
C01D7FE000
unkown
page readonly
16040035C000
trusted library allocation
page read and write
76F6000
heap
page read and write
23261C8D000
heap
page read and write
794D000
heap
page read and write
C036FFE000
stack
page read and write
23261C9A000
heap
page read and write
6701000
heap
page read and write
C0387FE000
unkown
page readonly
16040060C000
trusted library allocation
page read and write
7F4000
heap
page read and write
6C26C000
unkown
page readonly
23261CA6000
heap
page read and write
23261C94000
heap
page read and write
23261C9F000
heap
page read and write
C027FFC000
stack
page read and write
6701000
heap
page read and write
3E7000034000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
3E7000480000
trusted library allocation
page read and write
3E700020C000
trusted library allocation
page read and write
23261CAF000
heap
page read and write
6701000
heap
page read and write
3E70002B4000
trusted library allocation
page read and write
23261CC4000
heap
page read and write
3E7000680000
trusted library allocation
page read and write
6701000
heap
page read and write
7F4000
heap
page read and write
3E700029A000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
3D1000
unkown
page readonly
23261CA5000
heap
page read and write
6701000
heap
page read and write
23268203000
trusted library section
page read and write
C03C7FE000
unkown
page readonly
23261C9F000
heap
page read and write
3E70004AC000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
23261C94000
heap
page read and write
3E7000928000
trusted library allocation
page read and write
6701000
heap
page read and write
23261C9F000
heap
page read and write
23261C9A000
heap
page read and write
2326226D000
heap
page read and write
23261CA6000
heap
page read and write
6701000
heap
page read and write
16040085C000
trusted library allocation
page read and write
3E70006E4000
trusted library allocation
page read and write
1604006E4000
trusted library allocation
page read and write
6701000
heap
page read and write
23268C40000
trusted library section
page read and write
3E70002E3000
trusted library allocation
page read and write
7D0400201000
trusted library allocation
page read and write
23261CA2000
heap
page read and write
3E70001C8000
trusted library allocation
page read and write
3E7000C4C000
trusted library allocation
page read and write
A50000
heap
page read and write
C00EFFF000
stack
page read and write
23261CA5000
heap
page read and write
3E70007BA000
trusted library allocation
page read and write
7632000
heap
page read and write
23261CC0000
heap
page read and write
3E7000E80000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
7D0400274000
trusted library allocation
page read and write
2325E870000
heap
page read and write
23261C92000
heap
page read and write
72A4000
direct allocation
page read and write
23261C9F000
heap
page read and write
23261C91000
heap
page read and write
C0167FE000
unkown
page readonly
8A0000
heap
page read and write
3E7000A34000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
6701000
heap
page read and write
779B000
heap
page read and write
6701000
heap
page read and write
158800294000
direct allocation
page read and write
3E7000A01000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
23268C8E000
trusted library section
page read and write
160400750000
trusted library allocation
page read and write
23268C80000
trusted library section
page read and write
6701000
heap
page read and write
1604007C8000
trusted library allocation
page read and write
160400210000
trusted library allocation
page read and write
3E7000184000
trusted library allocation
page read and write
15880024C000
direct allocation
page read and write
3E7000474000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
2325E70A000
heap
page read and write
763D000
heap
page read and write
C01FFFE000
unkown
page readonly
23261CA6000
heap
page read and write
7E0000
direct allocation
page read and write
23261CA6000
heap
page read and write
23268183000
heap
page read and write
23261C9A000
heap
page read and write
3E7000E1C000
trusted library allocation
page read and write
C01F7FE000
stack
page read and write
6701000
heap
page read and write
65C000
stack
page read and write
23261C92000
heap
page read and write
149E000
stack
page read and write
2325E705000
heap
page read and write
3E70001B4000
trusted library allocation
page read and write
6701000
heap
page read and write
3CE000
unkown
page write copy
3E7000298000
trusted library allocation
page read and write
3E7000690000
trusted library allocation
page read and write
160400320000
trusted library allocation
page read and write
3E7000D64000
trusted library allocation
page read and write
3E700034C000
trusted library allocation
page read and write
160400348000
trusted library allocation
page read and write
DA0000
direct allocation
page read and write
7D04002BC000
trusted library allocation
page read and write
23261CA3000
heap
page read and write
158800201000
direct allocation
page read and write
3E7000728000
trusted library allocation
page read and write
3E7000B0C000
trusted library allocation
page read and write
232663F0000
heap
page read and write
77BC000
heap
page read and write
23261C94000
heap
page read and write
23261CA6000
heap
page read and write
C00FFFE000
stack
page read and write
23261C9A000
heap
page read and write
1604006F0000
trusted library allocation
page read and write
23261C9A000
heap
page read and write
3E7000848000
trusted library allocation
page read and write
3E700020C000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
A5E000
heap
page read and write
6701000
heap
page read and write
3E7000294000
trusted library allocation
page read and write
16040035C000
trusted library allocation
page read and write
777B000
heap
page read and write
C5E000
stack
page read and write
6701000
heap
page read and write
23261C9A000
heap
page read and write
3E7000DC0000
trusted library allocation
page read and write
23261C94000
heap
page read and write
6701000
heap
page read and write
15880020C000
direct allocation
page read and write
3E7000954000
trusted library allocation
page read and write
6701000
heap
page read and write
1588002AC000
direct allocation
page read and write
23261CC4000
heap
page read and write
23261C92000
heap
page read and write
6701000
heap
page read and write
23261CA3000
heap
page read and write
3CA000
unkown
page readonly
A27000
heap
page read and write
23261C94000
heap
page read and write
3E70001EC000
trusted library allocation
page read and write
3E70001AC000
trusted library allocation
page read and write
3E7000EB4000
trusted library allocation
page read and write
6701000
heap
page read and write
3E7000364000
trusted library allocation
page read and write
6701000
heap
page read and write
3E700034C000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
C9E000
stack
page read and write
9A0000
heap
page read and write
C01EFFE000
stack
page read and write
3E7000E18000
trusted library allocation
page read and write
23261C94000
heap
page read and write
232622ED000
heap
page read and write
1604002ED000
trusted library allocation
page read and write
3E70001D0000
trusted library allocation
page read and write
158800260000
direct allocation
page read and write
3E7000E40000
trusted library allocation
page read and write
160400614000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
160400248000
trusted library allocation
page read and write
23261C9A000
heap
page read and write
C026FFD000
stack
page read and write
6701000
heap
page read and write
C0207FE000
unkown
page readonly
3E7000398000
trusted library allocation
page read and write
6701000
heap
page read and write
C0357FE000
unkown
page readonly
23261CA5000
heap
page read and write
3E7000210000
trusted library allocation
page read and write
3E7000689000
trusted library allocation
page read and write
6701000
heap
page read and write
189F000
stack
page read and write
1604006EC000
trusted library allocation
page read and write
160400668000
trusted library allocation
page read and write
6701000
heap
page read and write
3E700046D000
trusted library allocation
page read and write
763F000
heap
page read and write
DA0000
direct allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
3C0000
unkown
page readonly
7F4000
heap
page read and write
6701000
heap
page read and write
7D04002BC000
trusted library allocation
page read and write
C022FFE000
stack
page read and write
6DF0000
direct allocation
page execute and read and write
160400700000
trusted library allocation
page read and write
6701000
heap
page read and write
7D0400238000
trusted library allocation
page read and write
3E7000398000
trusted library allocation
page read and write
3E700021C000
trusted library allocation
page read and write
C039FF4000
stack
page read and write
23261C9A000
heap
page read and write
23262288000
heap
page read and write
3CA000
unkown
page readonly
3D1000
unkown
page readonly
6DF0000
direct allocation
page execute and read and write
6701000
heap
page read and write
6701000
heap
page read and write
158800284000
direct allocation
page read and write
3E700000C000
trusted library allocation
page read and write
3E7000224000
trusted library allocation
page read and write
232682A2000
trusted library section
page read and write
3E7000CA8000
trusted library allocation
page read and write
23261CA3000
heap
page read and write
14D8000
heap
page read and write
3E7000F04000
trusted library allocation
page read and write
C01CFFE000
stack
page read and write
C0327FE000
unkown
page readonly
23261C92000
heap
page read and write
23261CA5000
heap
page read and write
3C1000
unkown
page execute read
6701000
heap
page read and write
160400734000
trusted library allocation
page read and write
3E70000CC000
trusted library allocation
page read and write
7D04002E4000
trusted library allocation
page read and write
6701000
heap
page read and write
23261C92000
heap
page read and write
A35000
heap
page read and write
6701000
heap
page read and write
3C1000
unkown
page execute read
14D0000
heap
page read and write
1588002E4000
direct allocation
page read and write
160400230000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
23261C91000
heap
page read and write
3E7000D20000
trusted library allocation
page read and write
23261C9A000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
23261C70000
heap
page read and write
160400760000
trusted library allocation
page read and write
763B000
heap
page read and write
1604002D4000
trusted library allocation
page read and write
6701000
heap
page read and write
C02B7FE000
unkown
page readonly
23261C9F000
heap
page read and write
23261C9F000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
6701000
heap
page read and write
C02C7FD000
stack
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
3E7000378000
trusted library allocation
page read and write
23261C92000
heap
page read and write
23261C9A000
heap
page read and write
FFC000
stack
page read and write
16040020C000
trusted library allocation
page read and write
2325E940000
heap
page read and write
7632000
heap
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
3E7000378000
trusted library allocation
page read and write
23261C94000
heap
page read and write
6701000
heap
page read and write
6C268000
unkown
page readonly
C03B7FE000
unkown
page readonly
3E70003C8000
trusted library allocation
page read and write
7D0400270000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
23261C9F000
heap
page read and write
23261C9F000
heap
page read and write
3E70002E0000
trusted library allocation
page read and write
1604002B0000
trusted library allocation
page read and write
9D3000
heap
page read and write
23261C9A000
heap
page read and write
3CE000
unkown
page write copy
160400364000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
C014FFB000
stack
page read and write
6701000
heap
page read and write
1604006E8000
trusted library allocation
page read and write
7D0400278000
trusted library allocation
page read and write
160400654000
trusted library allocation
page read and write
160400784000
trusted library allocation
page read and write
1604002F4000
trusted library allocation
page read and write
3E7000220000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
23261CA2000
heap
page read and write
6701000
heap
page read and write
23262250000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
6701000
heap
page read and write
2325E950000
heap
page read and write
3E7000E4C000
trusted library allocation
page read and write
23261C91000
heap
page read and write
7D04002A0000
trusted library allocation
page read and write
6701000
heap
page read and write
23268AA0000
trusted library section
page read and write
2325E667000
heap
page read and write
3E7000ECC000
trusted library allocation
page read and write
3E70006B6000
trusted library allocation
page read and write
771D000
heap
page read and write
7630000
heap
page read and write
16040033C000
trusted library allocation
page read and write
160400758000
trusted library allocation
page read and write
232682AE000
trusted library section
page read and write
3E7000DAD000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
6701000
heap
page read and write
23268362000
trusted library section
page read and write
3E7000D6C000
trusted library allocation
page read and write
3E7000AE0000
trusted library allocation
page read and write
160400640000
trusted library allocation
page read and write
C03A7FE000
unkown
page readonly
23261C9A000
heap
page read and write
23261C9A000
heap
page read and write
160400238000
trusted library allocation
page read and write
3E7000A80000
trusted library allocation
page read and write
776B000
heap
page read and write
6DC0000
trusted library allocation
page read and write
3E70002F0000
trusted library allocation
page read and write
7726000
heap
page read and write
7FC000
stack
page read and write
160400201000
trusted library allocation
page read and write
3E7000CD8000
trusted library allocation
page read and write
6701000
heap
page read and write
7632000
heap
page read and write
6F72000
heap
page read and write
774C000
heap
page read and write
6C269000
unkown
page read and write
23261C8D000
heap
page read and write
23261C9A000
heap
page read and write
6701000
heap
page read and write
792C000
heap
page read and write
3E7000FD4000
trusted library allocation
page read and write
3E7000C3C000
trusted library allocation
page read and write
3E70009C4000
trusted library allocation
page read and write
23261C88000
heap
page read and write
23267FF7000
unclassified section
page read and write
6701000
heap
page read and write
7D04002A0000
trusted library allocation
page read and write
7630000
heap
page read and write
EA0000
heap
page read and write
C0127FE000
unkown
page readonly
6701000
heap
page read and write
C0147FE000
unkown
page readonly
6701000
heap
page read and write
3E7000C58000
trusted library allocation
page read and write
C02AFFC000
stack
page read and write
7D04002C8000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
14A0000
heap
page read and write
3E7000020000
trusted library allocation
page read and write
3E70006FD000
trusted library allocation
page read and write
6701000
heap
page read and write
23261C9A000
heap
page read and write
232681C2000
trusted library section
page read and write
3E7000BB8000
trusted library allocation
page read and write
6701000
heap
page read and write
A31000
heap
page read and write
C0337FE000
unkown
page readonly
3E7000294000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
2325E650000
heap
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
2326836D000
trusted library section
page read and write
78E7000
heap
page read and write
1604006B0000
trusted library allocation
page read and write
23261CA3000
heap
page read and write
77D9000
heap
page read and write
23261C9A000
heap
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
7C0000
heap
page read and write
23261C9F000
heap
page read and write
23268303000
trusted library section
page read and write
23261CA5000
heap
page read and write
3E7000BB0000
trusted library allocation
page read and write
3E7000484000
trusted library allocation
page read and write
2325E943000
heap
page read and write
23261C8D000
heap
page read and write
6701000
heap
page read and write
79C4000
heap
page read and write
6701000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
158800270000
direct allocation
page read and write
A8E000
unkown
page read and write
763E000
heap
page read and write
78A4000
heap
page read and write
23268C02000
trusted library section
page read and write
3C0000
unkown
page readonly
6F74000
heap
page read and write
3E700076C000
trusted library allocation
page read and write
1588002EC000
direct allocation
page read and write
6701000
heap
page read and write
23261CA3000
heap
page read and write
15880023C000
direct allocation
page read and write
3E7000CE8000
trusted library allocation
page read and write
3E700016C000
trusted library allocation
page read and write
3E700060C000
trusted library allocation
page read and write
1604007B4000
trusted library allocation
page read and write
3E700007C000
trusted library allocation
page read and write
C0117FE000
unkown
page readonly
DC0000
unkown
page readonly
3E7000C64000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
23261C91000
heap
page read and write
6701000
heap
page read and write
C01DFFE000
stack
page read and write
C0257FE000
unkown
page readonly
A35000
heap
page read and write
2326228C000
heap
page read and write
6701000
heap
page read and write
C018FFB000
stack
page read and write
7D04002BC000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
7F4000
heap
page read and write
3E7000AF0000
trusted library allocation
page read and write
160400644000
trusted library allocation
page read and write
7F4000
heap
page read and write
160400664000
trusted library allocation
page read and write
763E000
heap
page read and write
23261C92000
heap
page read and write
23261C94000
heap
page read and write
23261C9A000
heap
page read and write
3E7000134000
trusted library allocation
page read and write
C0377FE000
unkown
page readonly
160400430000
trusted library allocation
page read and write
7632000
heap
page read and write
3E7000548000
trusted library allocation
page read and write
23261CC4000
heap
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
3E7000718000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
F90000
heap
page read and write
3E7000EE8000
trusted library allocation
page read and write
A45000
heap
page read and write
6701000
heap
page read and write
7908000
heap
page read and write
160400354000
trusted library allocation
page read and write
23261C91000
heap
page read and write
3E7000C1C000
trusted library allocation
page read and write
16040040C000
trusted library allocation
page read and write
23261C94000
heap
page read and write
23261C9A000
heap
page read and write
23261C9A000
heap
page read and write
A48000
heap
page read and write
23261C92000
heap
page read and write
23261CA7000
heap
page read and write
158800280000
direct allocation
page read and write
C02FFFE000
stack
page read and write
3E70001AC000
trusted library allocation
page read and write
232680D0000
heap
page read and write
23261C94000
heap
page read and write
3E70007B0000
trusted library allocation
page read and write
2326228A000
heap
page read and write
23261CAA000
heap
page read and write
23261C94000
heap
page read and write
3E7000DEC000
trusted library allocation
page read and write
16040078C000
trusted library allocation
page read and write
232681CE000
trusted library section
page read and write
23261C9A000
heap
page read and write
23261C94000
heap
page read and write
3E700033C000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
23261CA6000
heap
page read and write
3D1000
unkown
page readonly
7E0000
direct allocation
page read and write
3E7000EDC000
trusted library allocation
page read and write
3E7000740000
trusted library allocation
page read and write
6701000
heap
page read and write
23261C8A000
heap
page read and write
C0397FE000
unkown
page readonly
23261C9F000
heap
page read and write
23261C92000
heap
page read and write
23261C9F000
heap
page read and write
C01A7FE000
unkown
page readonly
6701000
heap
page read and write
3E7000E98000
trusted library allocation
page read and write
23268ADE000
trusted library section
page read and write
23261C9F000
heap
page read and write
23261CA5000
heap
page read and write
2325E750000
heap
page read and write
1588002A8000
direct allocation
page read and write
3E7000B94000
trusted library allocation
page read and write
3E7000358000
trusted library allocation
page read and write
3E7000F6C000
trusted library allocation
page read and write
23261C92000
heap
page read and write
C0237FE000
unkown
page readonly
7F4000
heap
page read and write
C02EFFE000
stack
page read and write
3E7000194000
trusted library allocation
page read and write
3CE000
unkown
page read and write
7E0000
direct allocation
page read and write
C0217FE000
unkown
page readonly
76E7000
heap
page read and write
160400408000
trusted library allocation
page read and write
23261CA5000
heap
page read and write
A27000
heap
page read and write
23261C94000
heap
page read and write
7F4000
heap
page read and write
23268580000
trusted library section
page read and write
232622BE000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
6701000
heap
page read and write
23260E80000
unkown
page read and write
23261CA2000
heap
page read and write
3E7000F38000
trusted library allocation
page read and write
23261C9A000
heap
page read and write
6701000
heap
page read and write
C0317FE000
unkown
page readonly
6701000
heap
page read and write
7F4000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
7966000
heap
page read and write
76CA000
heap
page read and write
7633000
heap
page read and write
6701000
heap
page read and write
3C0000
unkown
page readonly
158800290000
direct allocation
page read and write
7E0000
direct allocation
page read and write
6701000
heap
page read and write
3D1000
unkown
page readonly
23268AB1000
trusted library section
page read and write
3E7000C22000
trusted library allocation
page read and write
6701000
heap
page read and write
3E70002C0000
trusted library allocation
page read and write
23261C92000
heap
page read and write
13FC000
stack
page read and write
6DF0000
direct allocation
page execute and read and write
C015FFE000
stack
page read and write
6701000
heap
page read and write
23261C92000
heap
page read and write
23261C92000
heap
page read and write
16040039C000
trusted library allocation
page read and write
7803000
heap
page read and write
6701000
heap
page read and write
23261C94000
heap
page read and write
3E7000618000
trusted library allocation
page read and write
3E70009F8000
trusted library allocation
page read and write
3E7000C94000
trusted library allocation
page read and write
C0307FE000
unkown
page readonly
23262190000
trusted library section
page read and write
807000
heap
page read and write
1604006CC000
trusted library allocation
page read and write
6701000
heap
page read and write
3C1000
unkown
page execute read
23261C8D000
heap
page read and write
6701000
heap
page read and write
23262271000
heap
page read and write
23261C92000
heap
page read and write
C02F7FE000
unkown
page readonly
3E7000128000
trusted library allocation
page read and write
6701000
heap
page read and write
1604006C4000
trusted library allocation
page read and write
23261C9A000
heap
page read and write
3E7000E6F000
trusted library allocation
page read and write
A62000
heap
page read and write
3E700022C000
trusted library allocation
page read and write
77BD000
heap
page read and write
C01C7FE000
unkown
page readonly
7632000
heap
page read and write
774F000
heap
page read and write
23261CA5000
heap
page read and write
778A000
heap
page read and write
23266404000
heap
page read and write
23261C9F000
heap
page read and write
3E70006CF000
trusted library allocation
page read and write
23266429000
heap
page read and write
7D04002BC000
trusted library allocation
page read and write
7F4000
heap
page read and write
160400220000
trusted library allocation
page read and write
3E7000D84000
trusted library allocation
page read and write
6701000
heap
page read and write
6C21F000
unkown
page readonly
1604002E4000
trusted library allocation
page read and write
A8A000
heap
page read and write
3E7000FC8000
trusted library allocation
page read and write
3E7000CF8000
trusted library allocation
page read and write
6701000
heap
page read and write
6DF0000
direct allocation
page execute and read and write
3C0000
unkown
page readonly
763D000
heap
page read and write
23261CA2000
heap
page read and write
C02DFFE000
unkown
page readonly
C0227FE000
unkown
page readonly
23261CA5000
heap
page read and write
C029FFC000
stack
page read and write
3E7000218000
trusted library allocation
page read and write
6C21D000
unkown
page read and write
3E7000DD0000
trusted library allocation
page read and write
23261CA2000
heap
page read and write
789E000
heap
page read and write
C035FFE000
stack
page read and write
3E7000A40000
trusted library allocation
page read and write
6701000
heap
page read and write
77F3000
heap
page read and write
6701000
heap
page read and write
160400320000
trusted library allocation
page read and write
23261C94000
heap
page read and write
C028FFC000
stack
page read and write
160400390000
trusted library allocation
page read and write
23261C9F000
heap
page read and write
775C000
heap
page read and write
160400424000
trusted library allocation
page read and write
7F4000
heap
page read and write
2325E721000
heap
page read and write
3E7000D78000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
6701000
heap
page read and write
6DC0000
trusted library allocation
page read and write
77AC000
heap
page read and write
1604007CC000
trusted library allocation
page read and write
3E700008D000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
775E000
heap
page read and write
7630000
heap
page read and write
23268B31000
trusted library section
page read and write
23261C9F000
heap
page read and write
6701000
heap
page read and write
158800303000
direct allocation
page read and write
2325E840000
heap
page read and write
7773000
heap
page read and write
7A1F000
heap
page read and write
6701000
heap
page read and write
23261CA5000
heap
page read and write
23261C94000
heap
page read and write
6701000
heap
page read and write
158800250000
direct allocation
page read and write
7743000
heap
page read and write
3E70000EC000
trusted library allocation
page read and write
3E7000CD8000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
160400330000
trusted library allocation
page read and write
A35000
heap
page read and write
6701000
heap
page read and write
3E7000F20000
trusted library allocation
page read and write
3E700038C000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
23261C94000
heap
page read and write
3D1000
unkown
page readonly
160400250000
trusted library allocation
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
7D04002F8000
trusted library allocation
page read and write
23261CA6000
heap
page read and write
1872000
unkown
page execute and write copy
3E700075C000
trusted library allocation
page read and write
6DF0000
direct allocation
page execute and read and write
23261C8C000
heap
page read and write
160400418000
trusted library allocation
page read and write
C0197FE000
unkown
page readonly
23268C0D000
trusted library section
page read and write
160400248000
trusted library allocation
page read and write
6701000
heap
page read and write
7636000
heap
page read and write
23261C9A000
heap
page read and write
3E70007E4000
trusted library allocation
page read and write
3E7000CD0000
trusted library allocation
page read and write
C037FFE000
stack
page read and write
6701000
heap
page read and write
23265FC2000
trusted library allocation
page read and write
16040033C000
trusted library allocation
page read and write
7F4000
heap
page read and write
3E7000DB4000
trusted library allocation
page read and write
6701000
heap
page read and write
160400380000
trusted library allocation
page read and write
3E70004D7000
trusted library allocation
page read and write
23261C92000
heap
page read and write
23261CA5000
heap
page read and write
23261C9F000
heap
page read and write
85C000
stack
page read and write
23261CA2000
heap
page read and write
23261CA3000
heap
page read and write
7638000
heap
page read and write
3E7000A0C000
trusted library allocation
page read and write
6701000
heap
page read and write
3E70001AC000
trusted library allocation
page read and write
7754000
heap
page read and write
23261C94000
heap
page read and write
7D04002C0000
trusted library allocation
page read and write
6701000
heap
page read and write
6F72000
heap
page read and write
6701000
heap
page read and write
6701000
heap
page read and write
23268290000
trusted library section
page read and write
76C0000
heap
page read and write
23261CA6000
heap
page read and write
23268B10000
trusted library section
page read and write
A58000
heap
page read and write
A00000
heap
page read and write
6701000
heap
page read and write
3E7000638000
trusted library allocation
page read and write
3E7000469000
trusted library allocation
page read and write
9FB000
heap
page read and write
160400330000
trusted library allocation
page read and write
E5E000
stack
page read and write
77DE000
heap
page read and write
3E7000070000
trusted library allocation
page read and write
23261C8D000
heap
page read and write
6701000
heap
page read and write
23261CAF000
heap
page read and write
3E70003E8000
trusted library allocation
page read and write
2325E830000
heap
page readonly
3A0000
heap
page read and write
7D04002A0000
trusted library allocation
page read and write
23262244000
heap
page read and write
There are 1480 hidden memdumps, click here to show them.