IOC Report
8kl5nJ3f9x.exe

loading gif

Files

File Path
Type
Category
Malicious
8kl5nJ3f9x.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_8kl5nJ3f9x.exe_d59be5159240af5cde8d1dc7de3f24bc5daaaf6_9bf9a01d_710e0231-f0f1-4185-96d9-61daeb85b089\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF7D.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:52:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB124.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB182.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8kl5nJ3f9x.exe
"C:\Users\user\Desktop\8kl5nJ3f9x.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2296,i,13278071847370876534,15083286086121155287,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7136 -s 1832
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://chrome.google.com/webstore?hl=enp5m
unknown
http://anglebug.com/38323&
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en3
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
http://anglebug.com/8215-L
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://mail.google.com/mail/installwebapp?usp=chrome_defaultP
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://drive-daily-5.corp.go
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.217.21.36
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
ProgramId
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
FileId
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
LowerCaseLongPath
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
LongPathHash
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
Name
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
OriginalFileName
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
Publisher
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
Version
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
BinFileVersion
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
BinaryType
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
ProductName
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
ProductVersion
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
LinkDate
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
BinProductVersion
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
AppxPackageFullName
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
AppxPackageRelativeId
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
Size
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
Language
\REGISTRY\A\{e5fbdfcb-0da9-fab6-0cb6-778357acd006}\Root\InventoryApplicationFile\8kl5nj3f9x.exe|88cdee2e6ac96a9b
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7E000
unkown
page read and write
70000
unkown
page readonly
8176000
heap
page read and write
7241000
heap
page read and write
7910000
direct allocation
page execute and read and write
35F400890000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C03254000
trusted library allocation
page read and write
1D8C02384000
trusted library allocation
page read and write
1F60000
direct allocation
page read and write
856CFFC000
stack
page read and write
1E276CD2000
trusted library allocation
page read and write
1F74000
heap
page read and write
7A000
unkown
page readonly
1D8C02500000
trusted library allocation
page read and write
1D8C028D0000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C026F8000
trusted library allocation
page read and write
1D8C02908000
trusted library allocation
page read and write
1D8C023DC000
trusted library allocation
page read and write
7241000
heap
page read and write
136F000
stack
page read and write
7241000
heap
page read and write
1D8C02A7C000
trusted library allocation
page read and write
51C002B0000
trusted library allocation
page read and write
7241000
heap
page read and write
1E26EF00000
heap
page read and write
1D8C0281C000
trusted library allocation
page read and write
35F400250000
trusted library allocation
page read and write
1E272596000
heap
page read and write
8500FFC000
stack
page read and write
35F4008C8000
trusted library allocation
page read and write
80B1000
heap
page read and write
1D8C02611000
trusted library allocation
page read and write
7A000
unkown
page readonly
7241000
heap
page read and write
1E277387000
unclassified section
page read and write
11C000
stack
page read and write
1E2767B4000
heap
page read and write
51C002BC000
trusted library allocation
page read and write
1D8C03114000
trusted library allocation
page read and write
1D8C00001000
trusted library allocation
page read and write
83C000
stack
page read and write
7B12000
heap
page read and write
7241000
heap
page read and write
1657000
heap
page read and write
7241000
heap
page read and write
1E27879D000
trusted library section
page read and write
1D8C02F00000
trusted library allocation
page read and write
81000
unkown
page readonly
7241000
heap
page read and write
1D8C02F14000
trusted library allocation
page read and write
35F4008B8000
trusted library allocation
page read and write
ED0000
heap
page read and write
51C002F0000
trusted library allocation
page read and write
1D8C02EBC000
trusted library allocation
page read and write
7241000
heap
page read and write
35F4006E0000
trusted library allocation
page read and write
1D8C02420000
trusted library allocation
page read and write
1D8C03390000
trusted library allocation
page read and write
1D8C0220C000
trusted library allocation
page read and write
1D8C02320000
trusted library allocation
page read and write
16A1000
unkown
page execute and write copy
21A7000
heap
page read and write
4560002AC000
direct allocation
page read and write
1D8C0228C000
trusted library allocation
page read and write
7A000
unkown
page readonly
35F40060C000
trusted library allocation
page read and write
855B7FE000
unkown
page readonly
7241000
heap
page read and write
8568FFE000
stack
page read and write
35F40039C000
trusted library allocation
page read and write
1D8C0256C000
trusted library allocation
page read and write
7241000
heap
page read and write
1E272592000
heap
page read and write
1D8C02A01000
trusted library allocation
page read and write
1D8C02374000
trusted library allocation
page read and write
35F4006AC000
trusted library allocation
page read and write
1F74000
heap
page read and write
35F4008A8000
trusted library allocation
page read and write
1F74000
heap
page read and write
1D8C02430000
trusted library allocation
page read and write
1D8C00601000
trusted library allocation
page read and write
844B000
heap
page read and write
35F40078C000
trusted library allocation
page read and write
13CF000
stack
page read and write
80B0000
heap
page read and write
35F4002EE000
trusted library allocation
page read and write
1D8C022A8000
trusted library allocation
page read and write
1808000
heap
page read and write
81BC000
heap
page read and write
1D8C02354000
trusted library allocation
page read and write
856A7FE000
unkown
page readonly
1D8C02410000
trusted library allocation
page read and write
7241000
heap
page read and write
154E000
stack
page read and write
857C7FE000
unkown
page readonly
1D8C02A4C000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C03401000
trusted library allocation
page read and write
80B4000
heap
page read and write
7241000
heap
page read and write
1D8C028DC000
trusted library allocation
page read and write
823F000
heap
page read and write
1E26F020000
heap
page read and write
81B9000
heap
page read and write
35F40079C000
trusted library allocation
page read and write
837B000
heap
page read and write
7241000
heap
page read and write
1F74000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
21F4000
heap
page read and write
1E26F120000
heap
page read and write
1D8C02E0C000
trusted library allocation
page read and write
1D8C02318000
trusted library allocation
page read and write
1D8C02D30000
trusted library allocation
page read and write
51C00220000
trusted library allocation
page read and write
51C002BC000
trusted library allocation
page read and write
1D8C0246C000
trusted library allocation
page read and write
1E2786F3000
trusted library section
page read and write
7241000
heap
page read and write
1D8C02764000
trusted library allocation
page read and write
51C00260000
trusted library allocation
page read and write
1D8C02D9C000
trusted library allocation
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1D8C02538000
trusted library allocation
page read and write
7241000
heap
page read and write
FBE000
stack
page read and write
1D8C0221C000
trusted library allocation
page read and write
857AFFD000
stack
page read and write
1D8C02494000
trusted library allocation
page read and write
1D8C02F44000
trusted library allocation
page read and write
856F7FE000
unkown
page readonly
70000
unkown
page readonly
7340000
trusted library allocation
page read and write
194F000
stack
page read and write
7241000
heap
page read and write
35F4008AC000
trusted library allocation
page read and write
1D8C02F78000
trusted library allocation
page read and write
7A000
unkown
page readonly
7910000
direct allocation
page execute and read and write
21E6000
heap
page read and write
1D8C03228000
trusted library allocation
page read and write
1D8C03114000
trusted library allocation
page read and write
828D000
heap
page read and write
7241000
heap
page read and write
21F1000
heap
page read and write
856C7FE000
unkown
page readonly
1BE000
stack
page read and write
1D8C024E0000
trusted library allocation
page read and write
1D8C02E0C000
trusted library allocation
page read and write
1D8C02538000
trusted library allocation
page read and write
1E278860000
trusted library section
page read and write
1E270EA3000
heap
page read and write
1D8C02E80000
trusted library allocation
page read and write
51C00288000
trusted library allocation
page read and write
85787FE000
unkown
page readonly
7241000
heap
page read and write
456000294000
direct allocation
page read and write
1D8C02280000
trusted library allocation
page read and write
8560FFD000
stack
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1E26F0BF000
heap
page read and write
7241000
heap
page read and write
1D8C023A8000
trusted library allocation
page read and write
35F400210000
trusted library allocation
page read and write
1D8C00BAA000
trusted library allocation
page read and write
ED8000
heap
page read and write
1D8C02EC9000
trusted library allocation
page read and write
1D8C02590000
trusted library allocation
page read and write
1AFF000
stack
page read and write
1D8C03040000
trusted library allocation
page read and write
71000
unkown
page execute read
7241000
heap
page read and write
45600023C000
direct allocation
page read and write
1E270EA0000
heap
page read and write
4560002A8000
direct allocation
page read and write
1D8C02540000
trusted library allocation
page read and write
7241000
heap
page read and write
1F74000
heap
page read and write
1D8C02E0C000
trusted library allocation
page read and write
71000
unkown
page execute read
1D8C028AC000
trusted library allocation
page read and write
7241000
heap
page read and write
35F40071C000
trusted library allocation
page read and write
1E276970000
trusted library allocation
page read and write
1E274E07000
unclassified section
page read and write
1D8C00DA4000
trusted library allocation
page read and write
1D8C025A0000
trusted library allocation
page read and write
8558FFE000
stack
page read and write
7241000
heap
page read and write
1E26F245000
heap
page read and write
C7F000
stack
page read and write
1D8C02F94000
trusted library allocation
page read and write
7241000
heap
page read and write
8571FFC000
stack
page read and write
35F4008E4000
trusted library allocation
page read and write
1E278692000
trusted library section
page read and write
7241000
heap
page read and write
1D8C031D8000
trusted library allocation
page read and write
71000
unkown
page execute read
856D7FE000
unkown
page readonly
51C00278000
trusted library allocation
page read and write
7241000
heap
page read and write
10E0000
heap
page read and write
7241000
heap
page read and write
ACE000
stack
page read and write
1E279351000
trusted library section
page read and write
1D8C02B8C000
trusted library allocation
page read and write
1E27942D000
trusted library section
page read and write
1D8C02E01000
trusted library allocation
page read and write
8567FFE000
stack
page read and write
E7E000
stack
page read and write
21DC000
heap
page read and write
1F60000
direct allocation
page read and write
80B6000
heap
page read and write
1F74000
heap
page read and write
8201000
heap
page read and write
1D8C03278000
trusted library allocation
page read and write
1D8C02B80000
trusted library allocation
page read and write
1E272B1C000
heap
page read and write
7C30000
heap
page read and write
7241000
heap
page read and write
1D8C02364000
trusted library allocation
page read and write
51C002C0000
trusted library allocation
page read and write
70000
unkown
page readonly
1D8C03298000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C00C01000
trusted library allocation
page read and write
35F40087C000
trusted library allocation
page read and write
820B000
heap
page read and write
7241000
heap
page read and write
1D8C02C01000
trusted library allocation
page read and write
1D8C03034000
trusted library allocation
page read and write
1D8C0288C000
trusted library allocation
page read and write
7B12000
heap
page read and write
21EA000
heap
page read and write
80BE000
heap
page read and write
1D8C02DBC000
trusted library allocation
page read and write
1D8C02500000
trusted library allocation
page read and write
857FFFA000
stack
page read and write
1D8C02C38000
trusted library allocation
page read and write
51C002B0000
trusted library allocation
page read and write
8186000
heap
page read and write
1D8C02828000
trusted library allocation
page read and write
1D8C023C8000
trusted library allocation
page read and write
1D8C02428000
trusted library allocation
page read and write
1D8C02FD0000
trusted library allocation
page read and write
35F400818000
trusted library allocation
page read and write
1E26F140000
trusted library allocation
page read and write
7E000
unkown
page read and write
1E272B29000
heap
page read and write
85717FE000
unkown
page readonly
8555FFE000
unkown
page read and write
855A7FE000
unkown
page readonly
13FC000
stack
page read and write
7A000
unkown
page readonly
7C3A000
heap
page read and write
7241000
heap
page read and write
DFC000
stack
page read and write
B2E000
stack
page read and write
7910000
direct allocation
page execute and read and write
8579FFE000
stack
page read and write
1D8C03238000
trusted library allocation
page read and write
F2E000
stack
page read and write
85707FE000
unkown
page readonly
7241000
heap
page read and write
7241000
heap
page read and write
855C7FE000
unkown
page readonly
1D8C024A4000
trusted library allocation
page read and write
85747FE000
unkown
page readonly
E3E000
stack
page read and write
7241000
heap
page read and write
1D8C02558000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C031D8000
trusted library allocation
page read and write
80BB000
heap
page read and write
7A000
unkown
page readonly
35F4007A0000
trusted library allocation
page read and write
1D8C02CDC000
trusted library allocation
page read and write
80B5000
heap
page read and write
1D8C0313C000
trusted library allocation
page read and write
4560002EC000
direct allocation
page read and write
8239000
heap
page read and write
80B5000
heap
page read and write
1E272B4A000
heap
page read and write
856EFFC000
stack
page read and write
51C00270000
trusted library allocation
page read and write
7B14000
heap
page read and write
A7F000
stack
page read and write
2208000
heap
page read and write
3DA0000
direct allocation
page execute and read and write
7241000
heap
page read and write
8577FFB000
stack
page read and write
1D8C022F0000
trusted library allocation
page read and write
1E272B36000
heap
page read and write
1D8C02538000
trusted library allocation
page read and write
1E272B33000
heap
page read and write
456000234000
direct allocation
page read and write
1D8C023C4000
trusted library allocation
page read and write
1D8C02578000
trusted library allocation
page read and write
7241000
heap
page read and write
1E272B63000
heap
page read and write
35F4002B8000
trusted library allocation
page read and write
1D8C023D8000
trusted library allocation
page read and write
7E000
unkown
page write copy
1D8C02A68000
trusted library allocation
page read and write
1D8C02E1C000
trusted library allocation
page read and write
1D8C03068000
trusted library allocation
page read and write
85627FE000
unkown
page readonly
35F40020C000
trusted library allocation
page read and write
1D8C02AD0000
trusted library allocation
page read and write
1E279460000
trusted library section
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
51C00250000
trusted library allocation
page read and write
35F400778000
trusted library allocation
page read and write
35F40025C000
trusted library allocation
page read and write
85657FE000
unkown
page readonly
35F4006E8000
trusted library allocation
page read and write
1D8C02498000
trusted library allocation
page read and write
1E277360000
heap
page read and write
51C002BC000
trusted library allocation
page read and write
1D8C02498000
trusted library allocation
page read and write
1D8C02ED8000
trusted library allocation
page read and write
1D8C00B74000
trusted library allocation
page read and write
85647FE000
unkown
page readonly
1D8C024C0000
trusted library allocation
page read and write
2B60000
heap
page read and write
1D8C0305C000
trusted library allocation
page read and write
8292000
heap
page read and write
1D8C02FC0000
trusted library allocation
page read and write
A3C000
stack
page read and write
841E000
heap
page read and write
1E2792C0000
trusted library section
page read and write
8502FFE000
stack
page read and write
1D8C031F0000
trusted library allocation
page read and write
E80000
heap
page read and write
1D8C030E4000
trusted library allocation
page read and write
8556FFF000
stack
page read and write
85037FE000
unkown
page readonly
1D8C0226B000
trusted library allocation
page read and write
7241000
heap
page read and write
71000
unkown
page execute read
1D8C02FA4000
trusted library allocation
page read and write
1E2792E0000
trusted library section
page read and write
71000
unkown
page execute read
7241000
heap
page read and write
7C80000
direct allocation
page read and write
7241000
heap
page read and write
1E2773F0000
heap
page read and write
35F400898000
trusted library allocation
page read and write
1E278736000
trusted library section
page read and write
1D8C02690000
trusted library allocation
page read and write
855EFFB000
stack
page read and write
856E7FE000
unkown
page readonly
7241000
heap
page read and write
21EA000
heap
page read and write
823F000
heap
page read and write
1D8C02B9C000
trusted library allocation
page read and write
7241000
heap
page read and write
35F40027C000
trusted library allocation
page read and write
35F4006F4000
trusted library allocation
page read and write
1E2792FE000
trusted library section
page read and write
7241000
heap
page read and write
35F400790000
trusted library allocation
page read and write
1F60000
direct allocation
page read and write
1F60000
direct allocation
page read and write
4560002D0000
direct allocation
page read and write
855DFFE000
stack
page read and write
1D8C03398000
trusted library allocation
page read and write
85797FE000
unkown
page readonly
1D8C0304C000
trusted library allocation
page read and write
7241000
heap
page read and write
80BF000
heap
page read and write
1E276760000
heap
page read and write
1F74000
heap
page read and write
1F60000
direct allocation
page read and write
1E2790C0000
trusted library section
page read and write
7241000
heap
page read and write
8172000
heap
page read and write
1D8C02C80000
trusted library allocation
page read and write
1E26F240000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1D8C02DB0000
trusted library allocation
page read and write
856FFFC000
stack
page read and write
51C002C0000
trusted library allocation
page read and write
1D8C0241C000
trusted library allocation
page read and write
80B8000
heap
page read and write
1E26F028000
heap
page read and write
7241000
heap
page read and write
51C002C0000
trusted library allocation
page read and write
1D8C02B58000
trusted library allocation
page read and write
456000274000
direct allocation
page read and write
7A000
unkown
page readonly
1D8C032A8000
trusted library allocation
page read and write
1D8C02F89000
trusted library allocation
page read and write
81E2000
heap
page read and write
35F4008D8000
trusted library allocation
page read and write
21DD000
heap
page read and write
1D8C02601000
trusted library allocation
page read and write
1D8C0239C000
trusted library allocation
page read and write
80BF000
heap
page read and write
1D8C0269C000
trusted library allocation
page read and write
1D8C03001000
trusted library allocation
page read and write
456000215000
direct allocation
page read and write
1D8C02BBC000
trusted library allocation
page read and write
1D8C028E2000
trusted library allocation
page read and write
836C000
heap
page read and write
C5C000
stack
page read and write
1D8C0242C000
trusted library allocation
page read and write
1D8C02C40000
trusted library allocation
page read and write
1F74000
heap
page read and write
1D8C03040000
trusted library allocation
page read and write
1D8C03334000
trusted library allocation
page read and write
7241000
heap
page read and write
85067FE000
unkown
page readonly
1D8C00968000
trusted library allocation
page read and write
51C002BC000
trusted library allocation
page read and write
846D000
heap
page read and write
1D8C03110000
trusted library allocation
page read and write
1D8C02694000
trusted library allocation
page read and write
920000
heap
page read and write
8148000
heap
page read and write
7241000
heap
page read and write
1E278E7E000
trusted library section
page read and write
456000201000
direct allocation
page read and write
1D8C03348000
trusted library allocation
page read and write
1D8C02E0C000
trusted library allocation
page read and write
80B8000
heap
page read and write
1D8C02788000
trusted library allocation
page read and write
1D8C00801000
trusted library allocation
page read and write
80B8000
heap
page read and write
7910000
direct allocation
page execute and read and write
1D8C02DBC000
trusted library allocation
page read and write
1D8C02C18000
trusted library allocation
page read and write
80B4000
heap
page read and write
EEE000
stack
page read and write
1D8C03018000
trusted library allocation
page read and write
1D8C023F8000
trusted library allocation
page read and write
51C00201000
trusted library allocation
page read and write
1D8C0313C000
trusted library allocation
page read and write
1D8C02C50000
trusted library allocation
page read and write
7241000
heap
page read and write
8406000
heap
page read and write
1E26F0C6000
heap
page read and write
1D8C02980000
trusted library allocation
page read and write
81000
unkown
page readonly
15FE000
stack
page read and write
1D8C02201000
trusted library allocation
page read and write
855BFFA000
stack
page read and write
1D8C02F38000
trusted library allocation
page read and write
51C002A0000
trusted library allocation
page read and write
1E272BB0000
trusted library section
page read and write
1D8C02538000
trusted library allocation
page read and write
71000
unkown
page execute read
35F400850000
trusted library allocation
page read and write
855E7FE000
unkown
page readonly
81E0000
heap
page read and write
1EE0000
heap
page read and write
51C002F8000
trusted library allocation
page read and write
7241000
heap
page read and write
857EFFE000
stack
page read and write
1D8C024F7000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C02A18000
trusted library allocation
page read and write
1E272B2B000
heap
page read and write
7241000
heap
page read and write
1D8C029C8000
trusted library allocation
page read and write
35F4006C8000
trusted library allocation
page read and write
71000
unkown
page execute read
7241000
heap
page read and write
7241000
heap
page read and write
1D8C02494000
trusted library allocation
page read and write
1D8C027B0000
trusted library allocation
page read and write
FA0000
heap
page read and write
81000
unkown
page readonly
51C00294000
trusted library allocation
page read and write
8178000
heap
page read and write
456000220000
direct allocation
page read and write
7241000
heap
page read and write
1D8C024A8000
trusted library allocation
page read and write
7E000
unkown
page write copy
8243000
heap
page read and write
7241000
heap
page read and write
1D8C02CF4000
trusted library allocation
page read and write
1D8C00201000
trusted library allocation
page read and write
1D8C03318000
trusted library allocation
page read and write
35F400864000
trusted library allocation
page read and write
8143000
heap
page read and write
1E272B15000
heap
page read and write
35F4002CC000
trusted library allocation
page read and write
1E2787D0000
trusted library section
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1E272B9B000
heap
page read and write
80B3000
heap
page read and write
81D5000
heap
page read and write
1D8C03244000
trusted library allocation
page read and write
80B5000
heap
page read and write
1580000
heap
page read and write
26A0000
heap
page read and write
35F4007E0000
trusted library allocation
page read and write
1D8C031D8000
trusted library allocation
page read and write
827C000
heap
page read and write
1D8C02E50000
trusted library allocation
page read and write
21C4000
heap
page read and write
80BB000
heap
page read and write
51C002C0000
trusted library allocation
page read and write
1D8C0280C000
trusted library allocation
page read and write
1D8C00F1E000
trusted library allocation
page read and write
1D8C03260000
trusted library allocation
page read and write
8569FFE000
stack
page read and write
456000230000
direct allocation
page read and write
1D8C02D44000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02538000
trusted library allocation
page read and write
170000
heap
page read and write
1D8C03160000
trusted library allocation
page read and write
855CFFA000
stack
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
35F400880000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C023B4000
trusted library allocation
page read and write
856DFFC000
stack
page read and write
1D8C03278000
trusted library allocation
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1E2792D1000
trusted library section
page read and write
1E274D80000
trusted library section
page read and write
7241000
heap
page read and write
1D8C03024000
trusted library allocation
page read and write
7241000
heap
page read and write
35F40082C000
trusted library allocation
page read and write
2120000
direct allocation
page read and write
8578FFD000
stack
page read and write
1F74000
heap
page read and write
1D8C031DC000
trusted library allocation
page read and write
7241000
heap
page read and write
51C0020C000
trusted library allocation
page read and write
70000
unkown
page readonly
7241000
heap
page read and write
71000
unkown
page execute read
1F74000
heap
page read and write
F30000
heap
page read and write
7241000
heap
page read and write
1680000
heap
page read and write
85597FE000
unkown
page readonly
7241000
heap
page read and write
1D8C026B4000
trusted library allocation
page read and write
7A000
unkown
page readonly
7241000
heap
page read and write
1D8C02B60000
trusted library allocation
page read and write
80BE000
heap
page read and write
1D8C023D4000
trusted library allocation
page read and write
FC0000
heap
page read and write
1E2725A0000
heap
page read and write
1D8C03190000
trusted library allocation
page read and write
80B3000
heap
page read and write
1D8C02BB0000
trusted library allocation
page read and write
71000
unkown
page execute read
1D8C0300C000
trusted library allocation
page read and write
7241000
heap
page read and write
1CAF000
stack
page read and write
1D8C024F3000
trusted library allocation
page read and write
1D8C02E80000
trusted library allocation
page read and write
1D8C02E94000
trusted library allocation
page read and write
35F400248000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C0252C000
trusted library allocation
page read and write
7E000
unkown
page read and write
83D8000
heap
page read and write
1D8C028FD000
trusted library allocation
page read and write
80B9000
heap
page read and write
7241000
heap
page read and write
1D8C02E24000
trusted library allocation
page read and write
7241000
heap
page read and write
35F400430000
trusted library allocation
page read and write
7241000
heap
page read and write
1F60000
direct allocation
page read and write
7E000
unkown
page write copy
35F4007BC000
trusted library allocation
page read and write
1D8C02618000
trusted library allocation
page read and write
1D8C02E60000
trusted library allocation
page read and write
7B12000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1800000
heap
page read and write
71000
unkown
page execute read
1D8C0304C000
trusted library allocation
page read and write
1D8C0320C000
trusted library allocation
page read and write
1E272595000
heap
page read and write
1D8C024B4000
trusted library allocation
page read and write
81000
unkown
page readonly
1E2792F2000
trusted library section
page read and write
7E000
unkown
page write copy
51C002F4000
trusted library allocation
page read and write
7241000
heap
page read and write
81000
unkown
page readonly
1D8C030B4000
trusted library allocation
page read and write
1D8C03040000
trusted library allocation
page read and write
7241000
heap
page read and write
AD0000
heap
page read and write
1D8C027C4000
trusted library allocation
page read and write
1D8C02E84000
trusted library allocation
page read and write
7E000
unkown
page read and write
8205000
heap
page read and write
825F000
heap
page read and write
1D8C02C60000
trusted library allocation
page read and write
8559FFE000
stack
page read and write
35F400288000
trusted library allocation
page read and write
1D8C024BA000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C0222C000
trusted library allocation
page read and write
82DF000
heap
page read and write
7910000
direct allocation
page execute and read and write
1D8C02494000
trusted library allocation
page read and write
7241000
heap
page read and write
15BE000
stack
page read and write
35F400418000
trusted library allocation
page read and write
1D8C03214000
trusted library allocation
page read and write
1D8C0316C000
trusted library allocation
page read and write
85047FE000
unkown
page readonly
35F4002FC000
trusted library allocation
page read and write
1D8C00A01000
trusted library allocation
page read and write
35F4006BC000
trusted library allocation
page read and write
1E278C70000
trusted library section
page read and write
21F4000
heap
page read and write
7241000
heap
page read and write
856B7FE000
unkown
page readonly
1D8C02E70000
trusted library allocation
page read and write
1D8C028D0000
trusted library allocation
page read and write
1D8C02EE8000
trusted library allocation
page read and write
35F4006AC000
trusted library allocation
page read and write
456000290000
direct allocation
page read and write
1D8C02E58000
trusted library allocation
page read and write
81000
unkown
page readonly
51C002A0000
trusted library allocation
page read and write
8565FFD000
stack
page read and write
35F40040C000
trusted library allocation
page read and write
81AD000
heap
page read and write
7241000
heap
page read and write
1D8C0240C000
trusted library allocation
page read and write
51C002BC000
trusted library allocation
page read and write
855AFFD000
stack
page read and write
7241000
heap
page read and write
70000
unkown
page readonly
7241000
heap
page read and write
1D8C030A4000
trusted library allocation
page read and write
7241000
heap
page read and write
21D6000
heap
page read and write
1E278792000
trusted library section
page read and write
1F74000
heap
page read and write
35F4007AC000
trusted library allocation
page read and write
274B000
heap
page read and write
7241000
heap
page read and write
1D8C02538000
trusted library allocation
page read and write
EA0000
heap
page read and write
1D8C02E84000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C029DC000
trusted library allocation
page read and write
1D8C02524000
trusted library allocation
page read and write
80B4000
heap
page read and write
835D000
heap
page read and write
1D8C02C13000
trusted library allocation
page read and write
1D8C0339C000
trusted library allocation
page read and write
7E000
unkown
page write copy
1D8C0330C000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
838B000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
2680000
heap
page read and write
7910000
direct allocation
page execute and read and write
1E279330000
trusted library section
page read and write
2120000
direct allocation
page read and write
1D8C032C4000
trusted library allocation
page read and write
1E27259F000
heap
page read and write
81000
unkown
page readonly
1D8C024F0000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C023F0000
trusted library allocation
page read and write
51C002E4000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C0307C000
trusted library allocation
page read and write
8574FFE000
stack
page read and write
7241000
heap
page read and write
81A0000
heap
page read and write
1D8C02270000
trusted library allocation
page read and write
BB0000
heap
page read and write
1E272B38000
heap
page read and write
BE1000
unkown
page execute and write copy
35F4002D4000
trusted library allocation
page read and write
85607FE000
unkown
page readonly
35F400248000
trusted library allocation
page read and write
8563FFE000
stack
page read and write
35F400408000
trusted library allocation
page read and write
51C00248000
trusted library allocation
page read and write
130A000
unkown
page write copy
35F400868000
trusted library allocation
page read and write
7241000
heap
page read and write
80BF000
heap
page read and write
1D8C03238000
trusted library allocation
page read and write
7241000
heap
page read and write
7ABF000
heap
page read and write
7241000
heap
page read and write
1F74000
heap
page read and write
1D8C023E8000
trusted library allocation
page read and write
45600020C000
direct allocation
page read and write
294E000
stack
page read and write
81E7000
heap
page read and write
7241000
heap
page read and write
81000
unkown
page readonly
35F400960000
trusted library allocation
page read and write
1D8C023EC000
trusted library allocation
page read and write
35F400894000
trusted library allocation
page read and write
1D8C02F94000
trusted library allocation
page read and write
1D8C028D0000
trusted library allocation
page read and write
85697FE000
unkown
page readonly
1D8C02318000
trusted library allocation
page read and write
1D8C02BF0000
trusted library allocation
page read and write
7241000
heap
page read and write
1E272592000
heap
page read and write
7241000
heap
page read and write
1D8C028D0000
trusted library allocation
page read and write
1D8C03040000
trusted library allocation
page read and write
8570FFC000
stack
page read and write
1D8C02490000
trusted library allocation
page read and write
1D8C03094000
trusted library allocation
page read and write
1D8C0229F000
trusted library allocation
page read and write
1E272B20000
heap
page read and write
7241000
heap
page read and write
1D8C02260000
trusted library allocation
page read and write
1F60000
direct allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C02FB8000
trusted library allocation
page read and write
1D8C0232C000
trusted library allocation
page read and write
35F400840000
trusted library allocation
page read and write
21E6000
heap
page read and write
81C2000
heap
page read and write
1D8C0294C000
trusted library allocation
page read and write
45600024C000
direct allocation
page read and write
35F4008F4000
trusted library allocation
page read and write
E5C000
stack
page read and write
35F40085C000
trusted library allocation
page read and write
1D8C034A8000
trusted library allocation
page read and write
855F7FE000
unkown
page readonly
F1C000
stack
page read and write
857D7FE000
unkown
page readonly
7241000
heap
page read and write
1D8C026F0000
trusted library allocation
page read and write
1E272B0E000
heap
page read and write
35F4008C4000
trusted library allocation
page read and write
8501FFE000
stack
page read and write
1D8C025B4000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02674000
trusted library allocation
page read and write
1D8C0250C000
trusted library allocation
page read and write
1D8C02A98000
trusted library allocation
page read and write
8561FFA000
stack
page read and write
1D8C02E68000
trusted library allocation
page read and write
1D8C03364000
trusted library allocation
page read and write
1F74000
heap
page read and write
7241000
heap
page read and write
2181000
heap
page read and write
7241000
heap
page read and write
1E278C7C000
trusted library section
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1D8C027F8000
trusted library allocation
page read and write
1D8C023F4000
trusted library allocation
page read and write
1D8C028E8000
trusted library allocation
page read and write
81000
unkown
page readonly
1E276773000
heap
page read and write
85587FE000
unkown
page readonly
1D8C02518000
trusted library allocation
page read and write
1D8C03300000
trusted library allocation
page read and write
1D8C02C94000
trusted library allocation
page read and write
1E2718F0000
unkown
page read and write
7241000
heap
page read and write
FA8000
heap
page read and write
1D8C0254C000
trusted library allocation
page read and write
85727FE000
unkown
page readonly
7680000
trusted library allocation
page read and write
8153000
heap
page read and write
7241000
heap
page read and write
35F4007D0000
trusted library allocation
page read and write
80B2000
heap
page read and write
80B7000
heap
page read and write
71000
unkown
page execute read
51C00238000
trusted library allocation
page read and write
1F74000
heap
page read and write
51C002D8000
trusted library allocation
page read and write
1D8C02E30000
trusted library allocation
page read and write
1D8C02AC4000
trusted library allocation
page read and write
35F400404000
trusted library allocation
page read and write
1C0000
heap
page read and write
35F400920000
trusted library allocation
page read and write
1D8C02F20000
trusted library allocation
page read and write
7241000
heap
page read and write
35F400904000
trusted library allocation
page read and write
BB7000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
7A000
unkown
page readonly
1D8C030C0000
trusted library allocation
page read and write
1E2773F3000
heap
page read and write
1D8C031DC000
trusted library allocation
page read and write
51C002B0000
trusted library allocation
page read and write
1E27259B000
heap
page read and write
1D8C0240C000
trusted library allocation
page read and write
35F400860000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C0289C000
trusted library allocation
page read and write
85767FE000
unkown
page readonly
8267000
heap
page read and write
1D8C02EA0000
trusted library allocation
page read and write
1D8C02D08000
trusted library allocation
page read and write
35F4007D4000
trusted library allocation
page read and write
7AA1000
heap
page read and write
787000
heap
page read and write
71000
unkown
page execute read
7241000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
456000217000
direct allocation
page read and write
7241000
heap
page read and write
70000
unkown
page readonly
8503FFE000
stack
page read and write
7241000
heap
page read and write
7DE6000
direct allocation
page read and write
7241000
heap
page read and write
80BD000
heap
page read and write
1D8C00E01000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
8505FFE000
stack
page read and write
1D8C02DD0000
trusted library allocation
page read and write
80B6000
heap
page read and write
1D8C02434000
trusted library allocation
page read and write
1E27258E000
heap
page read and write
7A000
unkown
page readonly
35F400844000
trusted library allocation
page read and write
1D8C02500000
trusted library allocation
page read and write
1E278E70000
trusted library section
page read and write
814B000
heap
page read and write
7241000
heap
page read and write
21DC000
heap
page read and write
1D8C0340C000
trusted library allocation
page read and write
1D8C03380000
trusted library allocation
page read and write
7241000
heap
page read and write
35F400424000
trusted library allocation
page read and write
1F74000
heap
page read and write
8564FFE000
stack
page read and write
1F74000
heap
page read and write
7900000
direct allocation
page execute and read and write
35F4006AC000
trusted library allocation
page read and write
80B8000
heap
page read and write
35F400830000
trusted library allocation
page read and write
1D8C02B5A000
trusted library allocation
page read and write
857BFFE000
stack
page read and write
1D8C0313C000
trusted library allocation
page read and write
7241000
heap
page read and write
1E26EFE0000
heap
page readonly
1D8C028D0000
trusted library allocation
page read and write
76C0000
direct allocation
page read and write
1E272B3C000
heap
page read and write
1D8C03238000
trusted library allocation
page read and write
7241000
heap
page read and write
35F400828000
trusted library allocation
page read and write
7241000
heap
page read and write
1E276780000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
780000
heap
page read and write
856BFFD000
stack
page read and write
1D8C028D0000
trusted library allocation
page read and write
1D8C02E0C000
trusted library allocation
page read and write
35F4002F4000
trusted library allocation
page read and write
70000
unkown
page readonly
7241000
heap
page read and write
80BC000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1D8C02CCC000
trusted library allocation
page read and write
7241000
heap
page read and write
7E000
unkown
page read and write
1F74000
heap
page read and write
1E26F03E000
heap
page read and write
1D8C0328C000
trusted library allocation
page read and write
81000
unkown
page readonly
456000250000
direct allocation
page read and write
81000
unkown
page readonly
1D8C02418000
trusted library allocation
page read and write
1D8C02878000
trusted library allocation
page read and write
1D8C02E0C000
trusted library allocation
page read and write
857F7FE000
unkown
page readonly
35F400601000
trusted library allocation
page read and write
8851000
heap
page read and write
51C00230000
trusted library allocation
page read and write
35F400201000
trusted library allocation
page read and write
1E272B3A000
heap
page read and write
35F40081C000
trusted library allocation
page read and write
7DE4000
direct allocation
page read and write
1D8C02FE0000
trusted library allocation
page read and write
7241000
heap
page read and write
1E279340000
trusted library section
page read and write
35F4002E4000
trusted library allocation
page read and write
1D8C02518000
trusted library allocation
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
7910000
direct allocation
page execute and read and write
1D8C027E0000
trusted library allocation
page read and write
70000
unkown
page readonly
1D8C02C0C000
trusted library allocation
page read and write
1D8C032F8000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02B4C000
trusted library allocation
page read and write
35F400918000
trusted library allocation
page read and write
7241000
heap
page read and write
35F4009C4000
trusted library allocation
page read and write
1D8C02494000
trusted library allocation
page read and write
1D8C02500000
trusted library allocation
page read and write
DE0000
heap
page read and write
700000
heap
page read and write
7241000
heap
page read and write
5FC000
stack
page read and write
7241000
heap
page read and write
4560002DC000
direct allocation
page read and write
1D8C02DF8000
trusted library allocation
page read and write
35F4007E4000
trusted library allocation
page read and write
1D8C0260C000
trusted library allocation
page read and write
1E27676F000
heap
page read and write
51C002BC000
trusted library allocation
page read and write
1D8C02344000
trusted library allocation
page read and write
35F4006D4000
trusted library allocation
page read and write
1D8C03201000
trusted library allocation
page read and write
1D8C02D1C000
trusted library allocation
page read and write
1600000
heap
page read and write
7241000
heap
page read and write
1D8C030D4000
trusted library allocation
page read and write
35F400878000
trusted library allocation
page read and write
7241000
heap
page read and write
1E27869E000
trusted library section
page read and write
8349000
heap
page read and write
1D8C03040000
trusted library allocation
page read and write
82A7000
heap
page read and write
1D8C02498000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C023E0000
trusted library allocation
page read and write
35F4008F0000
trusted library allocation
page read and write
35F40080C000
trusted library allocation
page read and write
1610000
heap
page read and write
1D8C02934000
trusted library allocation
page read and write
1E278A37000
unclassified section
page read and write
BE0000
unkown
page readonly
1D8C023E4000
trusted library allocation
page read and write
1D8C03418000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02F6C000
trusted library allocation
page read and write
1D8C00401000
trusted library allocation
page read and write
51C002C0000
trusted library allocation
page read and write
857E7FE000
unkown
page readonly
298F000
stack
page read and write
1F60000
direct allocation
page read and write
23CD000
stack
page read and write
7241000
heap
page read and write
1AA0000
heap
page read and write
825D000
heap
page read and write
70000
unkown
page readonly
51C002BC000
trusted library allocation
page read and write
1E272589000
heap
page read and write
70000
unkown
page readonly
7241000
heap
page read and write
1D8C02CBC000
trusted library allocation
page read and write
7241000
heap
page read and write
70000
unkown
page readonly
1D8C030CC000
trusted library allocation
page read and write
1D8C02266000
trusted library allocation
page read and write
35F40095C000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
1D8C02F5C000
trusted library allocation
page read and write
1D8C02718000
trusted library allocation
page read and write
1D8C023B4000
trusted library allocation
page read and write
857DFFD000
stack
page read and write
35F4006E8000
trusted library allocation
page read and write
1D8C02A70000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02540000
trusted library allocation
page read and write
456000260000
direct allocation
page read and write
81000
unkown
page readonly
21EA000
heap
page read and write
1E26F0D8000
heap
page read and write
7241000
heap
page read and write
1F60000
direct allocation
page read and write
1D8C02A0C000
trusted library allocation
page read and write
1D8C02E84000
trusted library allocation
page read and write
1D8C02868000
trusted library allocation
page read and write
1F60000
direct allocation
page read and write
7241000
heap
page read and write
1E279363000
trusted library section
page read and write
1D8C023B4000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02B30000
trusted library allocation
page read and write
7241000
heap
page read and write
7E000
unkown
page read and write
1D8C02590000
trusted library allocation
page read and write
35F4008E8000
trusted library allocation
page read and write
8566FFA000
stack
page read and write
1D8C02494000
trusted library allocation
page read and write
1E26F230000
trusted library section
page readonly
7A000
unkown
page readonly
35F400700000
trusted library allocation
page read and write
1D8C02801000
trusted library allocation
page read and write
35F400728000
trusted library allocation
page read and write
1E272B00000
heap
page read and write
7241000
heap
page read and write
35F400230000
trusted library allocation
page read and write
AE0000
heap
page read and write
8248000
heap
page read and write
7241000
heap
page read and write
1CFF000
stack
page read and write
1E279406000
trusted library section
page read and write
8173000
heap
page read and write
1E272A30000
trusted library section
page read and write
7A000
unkown
page readonly
1E2795D0000
trusted library section
page read and write
7241000
heap
page read and write
35F400964000
trusted library allocation
page read and write
21E6000
heap
page read and write
1D8C02613000
trusted library allocation
page read and write
1E274E10000
trusted library section
page read and write
1D8C02B04000
trusted library allocation
page read and write
51C00264000
trusted library allocation
page read and write
1E26F0BB000
heap
page read and write
7241000
heap
page read and write
7910000
direct allocation
page execute and read and write
1F60000
direct allocation
page read and write
1D8C031DC000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C0252C000
trusted library allocation
page read and write
F70000
heap
page read and write
1D8C02FA4000
trusted library allocation
page read and write
1D8C02E1C000
trusted library allocation
page read and write
1F74000
heap
page read and write
1D8C02EB0000
trusted library allocation
page read and write
1D8C02EC8000
trusted library allocation
page read and write
7E000
unkown
page write copy
1D8C02970000
trusted library allocation
page read and write
8BC000
stack
page read and write
1E2790CE000
trusted library section
page read and write
85677FE000
unkown
page readonly
80BA000
heap
page read and write
1F74000
heap
page read and write
1D8C03328000
trusted library allocation
page read and write
35F4008EC000
trusted library allocation
page read and write
456000270000
direct allocation
page read and write
8573FFB000
stack
page read and write
7241000
heap
page read and write
1500000
heap
page read and write
85017FE000
unkown
page readonly
1E272570000
heap
page read and write
80B9000
heap
page read and write
7241000
heap
page read and write
7910000
direct allocation
page execute and read and write
7241000
heap
page read and write
7E000
unkown
page write copy
272F000
unkown
page read and write
35F4006F0000
trusted library allocation
page read and write
35F4007C0000
trusted library allocation
page read and write
80BE000
heap
page read and write
1D8C025A0000
trusted library allocation
page read and write
8557FFE000
stack
page read and write
1D8C02690000
trusted library allocation
page read and write
70000
unkown
page readonly
1D8C02B23000
trusted library allocation
page read and write
1D8C01001000
trusted library allocation
page read and write
21FD000
heap
page read and write
8212000
heap
page read and write
1D8C024B4000
trusted library allocation
page read and write
1D8C02914000
trusted library allocation
page read and write
85617FE000
unkown
page readonly
35F400401000
trusted library allocation
page read and write
1D8C0308C000
trusted library allocation
page read and write
1D8C030F4000
trusted library allocation
page read and write
7241000
heap
page read and write
81BE000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
7EB1000
heap
page read and write
7241000
heap
page read and write
1E26F150000
trusted library allocation
page read and write
8562FFE000
stack
page read and write
85757FE000
unkown
page readonly
1D8C030D4000
trusted library allocation
page read and write
1D8C031E8000
trusted library allocation
page read and write
7241000
heap
page read and write
1E26F0DB000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
7910000
direct allocation
page execute and read and write
7241000
heap
page read and write
35F4002EC000
trusted library allocation
page read and write
1D8C02680000
trusted library allocation
page read and write
7241000
heap
page read and write
51C00235000
trusted library allocation
page read and write
826B000
heap
page read and write
51C002C8000
trusted library allocation
page read and write
1D8C02394000
trusted library allocation
page read and write
7241000
heap
page read and write
8576FFC000
stack
page read and write
1D8C022E0000
trusted library allocation
page read and write
456000210000
direct allocation
page read and write
156F000
stack
page read and write
857CFFD000
stack
page read and write
1E272AB0000
heap
page read and write
51C002A0000
trusted library allocation
page read and write
80B6000
heap
page read and write
70000
unkown
page readonly
1E27259E000
heap
page read and write
1D8C0279C000
trusted library allocation
page read and write
1D8C03190000
trusted library allocation
page read and write
14A0000
heap
page read and write
F40000
heap
page read and write
83BE000
heap
page read and write
71000
unkown
page execute read
11CF000
stack
page read and write
35F400801000
trusted library allocation
page read and write
1D8C02DEC000
trusted library allocation
page read and write
8572FFD000
stack
page read and write
1F60000
direct allocation
page read and write
35F4002B0000
trusted library allocation
page read and write
1D8C02318000
trusted library allocation
page read and write
8F0000
heap
page read and write
7680000
trusted library allocation
page read and write
821C000
heap
page read and write
1D8C02E30000
trusted library allocation
page read and write
1D8C02D3C000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02A30000
trusted library allocation
page read and write
855D7FE000
unkown
page readonly
7241000
heap
page read and write
1E279097000
unclassified section
page read and write
7A000
unkown
page readonly
21EA000
heap
page read and write
1E26F0DF000
heap
page read and write
7241000
heap
page read and write
1D8C02AF0000
trusted library allocation
page read and write
1D8C02FEC000
trusted library allocation
page read and write
7241000
heap
page read and write
1E276777000
heap
page read and write
7241000
heap
page read and write
456000284000
direct allocation
page read and write
35F400948000
trusted library allocation
page read and write
80B3000
heap
page read and write
35F400238000
trusted library allocation
page read and write
51C00274000
trusted library allocation
page read and write
7241000
heap
page read and write
1E277217000
unclassified section
page read and write
85777FE000
unkown
page readonly
7241000
heap
page read and write
51C002A0000
trusted library allocation
page read and write
1D8C0304C000
trusted library allocation
page read and write
857A7FE000
unkown
page readonly
85687FE000
unkown
page readonly
855FFFB000
stack
page read and write
1D8C02F50000
trusted library allocation
page read and write
827C000
heap
page read and write
12EF000
stack
page read and write
1D8C02CB0000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C022D0000
trusted library allocation
page read and write
85637FE000
unkown
page readonly
7241000
heap
page read and write
74E000
stack
page read and write
831B000
heap
page read and write
7241000
heap
page read and write
7910000
direct allocation
page execute and read and write
7910000
direct allocation
page execute and read and write
1F74000
heap
page read and write
1E279422000
trusted library section
page read and write
7241000
heap
page read and write
1D8C0316C000
trusted library allocation
page read and write
1D8C025A0000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02424000
trusted library allocation
page read and write
7241000
heap
page read and write
35F400848000
trusted library allocation
page read and write
80B3000
heap
page read and write
1D8C02778000
trusted library allocation
page read and write
35F40070C000
trusted library allocation
page read and write
1D8C028BC000
trusted library allocation
page read and write
1D8C0250C000
trusted library allocation
page read and write
7241000
heap
page read and write
8232000
heap
page read and write
35F40091C000
trusted library allocation
page read and write
1E27258E000
heap
page read and write
7241000
heap
page read and write
1E272593000
heap
page read and write
1650000
heap
page read and write
81000
unkown
page readonly
1D8C02414000
trusted library allocation
page read and write
4560002E4000
direct allocation
page read and write
A80000
heap
page read and write
1D8C02580000
trusted library allocation
page read and write
35F40084C000
trusted library allocation
page read and write
1E272B5D000
heap
page read and write
82F8000
heap
page read and write
35F400884000
trusted library allocation
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
85027FE000
unkown
page readonly
263A000
stack
page read and write
2670000
heap
page read and write
1D8C03150000
trusted library allocation
page read and write
7241000
heap
page read and write
125C000
stack
page read and write
1E270E80000
heap
page read and write
35F40039C000
trusted library allocation
page read and write
7241000
heap
page read and write
2740000
heap
page read and write
7241000
heap
page read and write
35F400220000
trusted library allocation
page read and write
7241000
heap
page read and write
85737FE000
unkown
page readonly
7241000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1D8C03350000
trusted library allocation
page read and write
85007FE000
unkown
page readonly
1D8C02540000
trusted library allocation
page read and write
456000280000
direct allocation
page read and write
1F60000
direct allocation
page read and write
1E278A70000
trusted library section
page read and write
7241000
heap
page read and write
856AFFE000
stack
page read and write
7241000
heap
page read and write
35F4006C8000
trusted library allocation
page read and write
7241000
heap
page read and write
1D8C02B1A000
trusted library allocation
page read and write
F7F000
stack
page read and write
1F60000
direct allocation
page read and write
8190000
heap
page read and write
3D90000
direct allocation
page execute and read and write
81E1000
heap
page read and write
8575FFE000
stack
page read and write
1D8C026CC000
trusted library allocation
page read and write
1F74000
heap
page read and write
7241000
heap
page read and write
827D000
heap
page read and write
80B9000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1D8C034A8000
trusted library allocation
page read and write
1D8C02E40000
trusted library allocation
page read and write
81F7000
heap
page read and write
1D8C02494000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
26EE000
unkown
page read and write
8554FEF000
stack
page read and write
1D8C02401000
trusted library allocation
page read and write
85567FE000
unkown
page readonly
1E272560000
heap
page read and write
82CF000
heap
page read and write
1D8C02FA4000
trusted library allocation
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
1D8C02700000
trusted library allocation
page read and write
7910000
direct allocation
page execute and read and write
1D8C02994000
trusted library allocation
page read and write
35F400974000
trusted library allocation
page read and write
80B5000
heap
page read and write
1D8C02D14000
trusted library allocation
page read and write
1E26EFF0000
heap
page read and write
7241000
heap
page read and write
7241000
heap
page read and write
857B7FE000
unkown
page readonly
35F400788000
trusted library allocation
page read and write
1D8C02A28000
trusted library allocation
page read and write
2209000
heap
page read and write
7C25000
heap
page read and write
1D8C02E0C000
trusted library allocation
page read and write
145C000
stack
page read and write
85667FE000
unkown
page readonly
1D8C02FE0000
trusted library allocation
page read and write
80B2000
heap
page read and write
456000303000
direct allocation
page read and write
35F400874000
trusted library allocation
page read and write
1D8C025B4000
trusted library allocation
page read and write
There are 1286 hidden memdumps, click here to show them.