IOC Report
oRu3cWBChq.exe

loading gif

Files

File Path
Type
Category
Malicious
oRu3cWBChq.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_oRu3cWBChq.exe_da7bbdf090bef74ee177dbaed143b999951e7c_fb6c3755_5a622457-cb16-49f3-a0ed-c4970ffb2239\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11D2.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Oct 29 13:08:30 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1388.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13C8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\FebhmzvlXmYcFFIxCzuX.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\oRu3cWBChq.exe
"C:\Users\user\Desktop\oRu3cWBChq.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2308,i,8530634217441217944,11485973606428198520,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5628 -s 1600

URLs

Name
IP
Malicious
http://home.fivejo5vt.top/zViguzTHOAJchzMFSLOa1730123672
109.207.173.223
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj$b
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
http://home.fivejo5vt.top/zViguzTHOAJchzMFSLOa17
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
https://anglebug.com/7847
unknown
https://google-ohttp-relay-join.fastly-edge.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fivejo5vt.top
109.207.173.223
malicious
fivejo5vt.top
109.207.173.223
malicious
www.google.com
142.250.186.68

IPs

IP
Domain
Country
Malicious
109.207.173.223
home.fivejo5vt.top
Russian Federation
malicious
142.250.186.68
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
ProgramId
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
FileId
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
LowerCaseLongPath
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
LongPathHash
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
Name
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
OriginalFileName
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
Publisher
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
Version
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
BinFileVersion
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
BinaryType
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
ProductName
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
ProductVersion
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
LinkDate
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
BinProductVersion
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
AppxPackageFullName
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
AppxPackageRelativeId
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
Size
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
Language
\REGISTRY\A\{3c04ff54-cc64-e07d-74d5-c22f66d55379}\Root\InventoryApplicationFile\oru3cwbchq.exe|76e37aae565dc7a0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
AB400C34000
trusted library allocation
page read and write
1C803134000
heap
page read and write
1C80312A000
heap
page read and write
1C803154000
heap
page read and write
AB400670000
trusted library allocation
page read and write
AB4009F4000
trusted library allocation
page read and write
1C803137000
heap
page read and write
32969FE000
unkown
page readonly
1C803132000
heap
page read and write
32B71FC000
stack
page read and write
1C80312A000
heap
page read and write
AB400C3C000
trusted library allocation
page read and write
1C803132000
heap
page read and write
329B1FD000
stack
page read and write
740000
heap
page read and write
1010000
heap
page read and write
AB4002F3000
trusted library allocation
page read and write
62240040C000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
AB4008E8000
trusted library allocation
page read and write
1C80313B000
heap
page read and write
1C803132000
heap
page read and write
6224006AC000
trusted library allocation
page read and write
3C50000
heap
page read and write
32911FB000
stack
page read and write
1C803100000
heap
page read and write
1C8036B5000
heap
page read and write
1908002BC000
trusted library allocation
page read and write
3E51000
heap
page read and write
3F2D000
heap
page read and write
AB400268000
trusted library allocation
page read and write
3EBC000
heap
page read and write
AB4006D4000
trusted library allocation
page read and write
3FF8000
heap
page read and write
1C80312C000
heap
page read and write
1D1000
unkown
page readonly
3EAB000
heap
page read and write
1C80A06D000
trusted library section
page read and write
1C875D80000
trusted library allocation
page read and write
AB400D14000
trusted library allocation
page read and write
AB400EBA000
trusted library allocation
page read and write
3D7E000
heap
page read and write
6224002B0000
trusted library allocation
page read and write
32901FD000
stack
page read and write
3DF4000
heap
page read and write
32B29FE000
unkown
page readonly
1C803132000
heap
page read and write
622400704000
trusted library allocation
page read and write
AB4009DC000
trusted library allocation
page read and write
AB400A0C000
trusted library allocation
page read and write
1C809F3E000
trusted library section
page read and write
1C80312C000
heap
page read and write
1C803132000
heap
page read and write
18AF000
heap
page read and write
3C56000
heap
page read and write
1C803132000
heap
page read and write
1C803151000
heap
page read and write
1C803138000
heap
page read and write
1C803151000
heap
page read and write
1C80314E000
heap
page read and write
BBA000
heap
page read and write
1908002D8000
trusted library allocation
page read and write
10F0000
heap
page read and write
1C80362F000
heap
page read and write
1908002F8000
trusted library allocation
page read and write
190800248000
trusted library allocation
page read and write
AB4004AC000
trusted library allocation
page read and write
3E1C000
heap
page read and write
1C80313E000
heap
page read and write
328E9FE000
unkown
page readonly
1C803132000
heap
page read and write
AB4009B8000
trusted library allocation
page read and write
AB400218000
trusted library allocation
page read and write
1C809190000
heap
page read and write
AB40099C000
trusted library allocation
page read and write
AB400E78000
trusted library allocation
page read and write
32931FE000
stack
page read and write
441800260000
direct allocation
page read and write
1C803154000
heap
page read and write
622400354000
trusted library allocation
page read and write
AB400FDC000
trusted library allocation
page read and write
32B69FE000
unkown
page readonly
622400201000
trusted library allocation
page read and write
6224003EC000
trusted library allocation
page read and write
AB400A30000
trusted library allocation
page read and write
1C875D60000
heap
page read and write
32B89FE000
unkown
page readonly
1980000
heap
page read and write
3C5C000
heap
page read and write
AB4005B8000
trusted library allocation
page read and write
AB400CFC000
trusted library allocation
page read and write
1C803150000
heap
page read and write
622400630000
trusted library allocation
page read and write
A60000
heap
page read and write
AB400124000
trusted library allocation
page read and write
6C3E9000
unkown
page read and write
1C803154000
heap
page read and write
1C80315A000
heap
page read and write
18A5000
heap
page read and write
AB4007C4000
trusted library allocation
page read and write
AB4002A4000
trusted library allocation
page read and write
1C803132000
heap
page read and write
AB400D80000
trusted library allocation
page read and write
32971FA000
stack
page read and write
AB400380000
trusted library allocation
page read and write
1C0000
unkown
page readonly
AB400EF4000
trusted library allocation
page read and write
AB400412000
trusted library allocation
page read and write
AB40020C000
trusted library allocation
page read and write
1C80313E000
heap
page read and write
1C8018D0000
trusted library section
page readonly
AB400AD8000
trusted library allocation
page read and write
62240035C000
trusted library allocation
page read and write
AB4001E0000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
1C803159000
heap
page read and write
1C80312C000
heap
page read and write
3C55000
heap
page read and write
AB400CEC000
trusted library allocation
page read and write
AB400378000
trusted library allocation
page read and write
AB4002B8000
trusted library allocation
page read and write
1C809F80000
trusted library section
page read and write
1908002A0000
trusted library allocation
page read and write
1C803137000
heap
page read and write
AB400201000
trusted library allocation
page read and write
6C39F000
unkown
page readonly
AB400764000
trusted library allocation
page read and write
1C8036D5000
heap
page read and write
1C803154000
heap
page read and write
1C803154000
heap
page read and write
1C803154000
heap
page read and write
32B61FA000
stack
page read and write
AB400B48000
trusted library allocation
page read and write
190800274000
trusted library allocation
page read and write
328A1EF000
stack
page read and write
32AE1FE000
stack
page read and write
441800284000
direct allocation
page read and write
1C803143000
heap
page read and write
1C80312A000
heap
page read and write
441800201000
direct allocation
page read and write
1C803151000
heap
page read and write
AB40021C000
trusted library allocation
page read and write
1C801983000
heap
page read and write
1C80314C000
heap
page read and write
622400754000
trusted library allocation
page read and write
18A4000
heap
page read and write
1908002A0000
trusted library allocation
page read and write
1C803138000
heap
page read and write
AB40079B000
trusted library allocation
page read and write
1CE000
unkown
page write copy
AB40001C000
trusted library allocation
page read and write
DA000
stack
page read and write
1C803154000
heap
page read and write
1C8036B5000
heap
page read and write
32A69FE000
unkown
page readonly
44180023C000
direct allocation
page read and write
441800215000
direct allocation
page read and write
1C803143000
heap
page read and write
622400210000
trusted library allocation
page read and write
AB400E50000
trusted library allocation
page read and write
9F0000
heap
page read and write
AB4001B4000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
198A000
heap
page read and write
1C803140000
heap
page read and write
AB4002B4000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
3C57000
heap
page read and write
AB400340000
trusted library allocation
page read and write
AB4000EC000
trusted library allocation
page read and write
1C80A046000
trusted library section
page read and write
1C803132000
heap
page read and write
3E30000
heap
page read and write
130F000
stack
page read and write
1C80312A000
heap
page read and write
1C803158000
heap
page read and write
1C803154000
heap
page read and write
AB400F70000
trusted library allocation
page read and write
3DBA000
heap
page read and write
AB400210000
trusted library allocation
page read and write
1C803132000
heap
page read and write
441800303000
direct allocation
page read and write
FA1000
unkown
page execute read
1C803130000
heap
page read and write
622400310000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
4418002EC000
direct allocation
page read and write
32A39FE000
unkown
page readonly
62240035C000
trusted library allocation
page read and write
1C803151000
heap
page read and write
1C80312C000
heap
page read and write
1C809270000
heap
page read and write
1C803645000
heap
page read and write
AB4001A0000
trusted library allocation
page read and write
AB400CA4000
trusted library allocation
page read and write
32919FE000
unkown
page readonly
1C875CD7000
heap
page read and write
AB400900000
trusted library allocation
page read and write
622400248000
trusted library allocation
page read and write
1C8036D9000
heap
page read and write
1C803134000
heap
page read and write
6224007CC000
trusted library allocation
page read and write
1C803137000
heap
page read and write
778000
heap
page read and write
1C80314C000
heap
page read and write
AB400C01000
trusted library allocation
page read and write
1C803146000
heap
page read and write
AB400D34000
trusted library allocation
page read and write
1C803154000
heap
page read and write
4418002AC000
direct allocation
page read and write
3C5D000
heap
page read and write
622400408000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
1C803138000
heap
page read and write
AB4001E4000
trusted library allocation
page read and write
32A31FC000
stack
page read and write
AB4004EC000
trusted library allocation
page read and write
3E24000
heap
page read and write
622400698000
trusted library allocation
page read and write
1C80368E000
heap
page read and write
1C803154000
heap
page read and write
AB400228000
trusted library allocation
page read and write
1C807352000
trusted library allocation
page read and write
AB400A68000
trusted library allocation
page read and write
18A8000
heap
page read and write
1C803132000
heap
page read and write
1518000
unkown
page readonly
1C80312C000
heap
page read and write
1908002C8000
trusted library allocation
page read and write
AB400078000
trusted library allocation
page read and write
441800234000
direct allocation
page read and write
329C1FE000
stack
page read and write
1C803621000
heap
page read and write
32AB9FE000
unkown
page readonly
1C80312C000
heap
page read and write
6224002C4000
trusted library allocation
page read and write
1908002C0000
trusted library allocation
page read and write
3DD3000
heap
page read and write
AB400C38000
trusted library allocation
page read and write
1C803161000
heap
page read and write
622400640000
trusted library allocation
page read and write
AB4002A4000
trusted library allocation
page read and write
622400724000
trusted library allocation
page read and write
1C8036B6000
heap
page read and write
622400620000
trusted library allocation
page read and write
1C803138000
heap
page read and write
AB400E84000
trusted library allocation
page read and write
1C803154000
heap
page read and write
441800230000
direct allocation
page read and write
7B0000
heap
page read and write
AB400E98000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
1C803151000
heap
page read and write
32A19FE000
unkown
page readonly
1C80312C000
heap
page read and write
32A61FC000
stack
page read and write
32A29FE000
unkown
page readonly
AB4000FC000
trusted library allocation
page read and write
32949FE000
unkown
page readonly
6224002F2000
trusted library allocation
page read and write
1C803151000
heap
page read and write
1C80312C000
heap
page read and write
622400770000
trusted library allocation
page read and write
1CA000
unkown
page readonly
32B19FE000
unkown
page readonly
AB400390000
trusted library allocation
page read and write
32AD1FE000
stack
page read and write
1C80313D000
heap
page read and write
1C80312C000
heap
page read and write
62240078C000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
190800264000
trusted library allocation
page read and write
1CA000
unkown
page readonly
1C803150000
heap
page read and write
AB400CEC000
trusted library allocation
page read and write
AB400D4C000
trusted library allocation
page read and write
622400644000
trusted library allocation
page read and write
1CA000
unkown
page readonly
622400744000
trusted library allocation
page read and write
3E5F000
heap
page read and write
1C803161000
heap
page read and write
32A99FE000
unkown
page readonly
1C8035B0000
trusted library section
page read and write
32959FE000
unkown
page readonly
32A89FE000
unkown
page readonly
1C875C40000
heap
page read and write
32B79FE000
unkown
page readonly
622400760000
trusted library allocation
page read and write
62240080C000
trusted library allocation
page read and write
AB40022C000
trusted library allocation
page read and write
140000
heap
page read and write
1CE000
unkown
page read and write
1C803138000
heap
page read and write
1C803138000
heap
page read and write
AB4002A8000
trusted library allocation
page read and write
AB400E60000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
1C803138000
heap
page read and write
1C0000
unkown
page readonly
32941FB000
stack
page read and write
AB4000B4000
trusted library allocation
page read and write
AB400788000
trusted library allocation
page read and write
1C803143000
heap
page read and write
10C0000
heap
page read and write
1C803672000
heap
page read and write
1C803158000
heap
page read and write
AB400C0C000
trusted library allocation
page read and write
1C803154000
heap
page read and write
3C5A000
heap
page read and write
1C803143000
heap
page read and write
1C803146000
heap
page read and write
1C80312A000
heap
page read and write
441800290000
direct allocation
page read and write
AB400EBC000
trusted library allocation
page read and write
6224006F0000
trusted library allocation
page read and write
1C80313D000
heap
page read and write
62240033C000
trusted library allocation
page read and write
1908002BC000
trusted library allocation
page read and write
1C1000
unkown
page execute read
3D61000
heap
page read and write
1C803143000
heap
page read and write
1C803137000
heap
page read and write
3C56000
heap
page read and write
AB400708000
trusted library allocation
page read and write
622400430000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
190800235000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
1C803154000
heap
page read and write
622400348000
trusted library allocation
page read and write
1C803154000
heap
page read and write
1C803161000
heap
page read and write
1C803132000
heap
page read and write
AB400A40000
trusted library allocation
page read and write
AB400BDC000
trusted library allocation
page read and write
1C875D90000
trusted library allocation
page read and write
1C80368D000
heap
page read and write
1C80314B000
heap
page read and write
1C803151000
heap
page read and write
3C58000
heap
page read and write
AB400EE4000
trusted library allocation
page read and write
1C809C30000
trusted library section
page read and write
105F000
stack
page read and write
AB4001AC000
trusted library allocation
page read and write
3F6C000
heap
page read and write
1C809C17000
unclassified section
page read and write
AB400690000
trusted library allocation
page read and write
1C803300000
heap
page read and write
AB400310000
trusted library allocation
page read and write
AB4001AC000
trusted library allocation
page read and write
1C803138000
heap
page read and write
1C8036AB000
heap
page read and write
AB4000AC000
trusted library allocation
page read and write
6224006D0000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
32B11FE000
stack
page read and write
622400714000
trusted library allocation
page read and write
AB400F58000
trusted library allocation
page read and write
1C803138000
heap
page read and write
1C803144000
heap
page read and write
622400601000
trusted library allocation
page read and write
AB400E70000
trusted library allocation
page read and write
622400368000
trusted library allocation
page read and write
1651000
unkown
page readonly
BBE000
heap
page read and write
1989000
heap
page read and write
1C803138000
heap
page read and write
AB4003EC000
trusted library allocation
page read and write
622400320000
trusted library allocation
page read and write
32B09FE000
unkown
page readonly
3C5D000
heap
page read and write
622400354000
trusted library allocation
page read and write
1C803138000
heap
page read and write
1C803151000
heap
page read and write
AB400884000
trusted library allocation
page read and write
AB400BC4000
trusted library allocation
page read and write
AB400F34000
trusted library allocation
page read and write
AB4001D8000
trusted library allocation
page read and write
AB400E34000
trusted library allocation
page read and write
622400418000
trusted library allocation
page read and write
198C000
heap
page read and write
1C803132000
heap
page read and write
1C803138000
heap
page read and write
AB4002AC000
trusted library allocation
page read and write
622400730000
trusted library allocation
page read and write
AB40020C000
trusted library allocation
page read and write
1908002B0000
trusted library allocation
page read and write
190800288000
trusted library allocation
page read and write
6224007B4000
trusted library allocation
page read and write
AB40050A000
trusted library allocation
page read and write
1C803154000
heap
page read and write
1C803154000
heap
page read and write
183F000
stack
page read and write
3D5A000
heap
page read and write
AB4006A0000
trusted library allocation
page read and write
AB400354000
trusted library allocation
page read and write
1C803132000
heap
page read and write
3C59000
heap
page read and write
79E000
stack
page read and write
AB400290000
trusted library allocation
page read and write
AB400C5C000
trusted library allocation
page read and write
1C80314C000
heap
page read and write
AB40015C000
trusted library allocation
page read and write
328C1FF000
stack
page read and write
1C80314D000
heap
page read and write
1C875CFE000
heap
page read and write
6224006E0000
trusted library allocation
page read and write
1908002C0000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
32A91FC000
stack
page read and write
622400424000
trusted library allocation
page read and write
AB4002A4000
trusted library allocation
page read and write
6224006E4000
trusted library allocation
page read and write
3DDB000
heap
page read and write
32B21FE000
stack
page read and write
1D0000
heap
page read and write
1C803143000
heap
page read and write
AB4003EC000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
6224002EC000
trusted library allocation
page read and write
AB40065C000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
AB4007E0000
trusted library allocation
page read and write
3C5A000
heap
page read and write
3E38000
heap
page read and write
AB4007A0000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
1C80312C000
heap
page read and write
32B99FE000
unkown
page readonly
1C803132000
heap
page read and write
1C803156000
heap
page read and write
AB400AFC000
trusted library allocation
page read and write
AB400770000
trusted library allocation
page read and write
32AE9FE000
unkown
page readonly
622400758000
trusted library allocation
page read and write
622400248000
trusted library allocation
page read and write
3C5D000
heap
page read and write
622400320000
trusted library allocation
page read and write
622400320000
trusted library allocation
page read and write
3C5B000
heap
page read and write
AB400794000
trusted library allocation
page read and write
AB400B18000
trusted library allocation
page read and write
1C80313A000
heap
page read and write
1C803150000
heap
page read and write
62240033C000
trusted library allocation
page read and write
1CE000
unkown
page read and write
1C803138000
heap
page read and write
1908002BC000
trusted library allocation
page read and write
1C803628000
heap
page read and write
AB4001E8000
trusted library allocation
page read and write
AB400FBC000
trusted library allocation
page read and write
3FBE000
heap
page read and write
6224002CC000
trusted library allocation
page read and write
AB400505000
trusted library allocation
page read and write
1C803138000
heap
page read and write
AB400B38000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
1C80312A000
heap
page read and write
19080020C000
trusted library allocation
page read and write
1C803137000
heap
page read and write
1C803138000
heap
page read and write
329A9FE000
unkown
page readonly
AB40063C000
trusted library allocation
page read and write
AB4002C4000
trusted library allocation
page read and write
1C8036AB000
heap
page read and write
1C803154000
heap
page read and write
1C803151000
heap
page read and write
6A0000
heap
page read and write
328D9FE000
unkown
page readonly
AB4004E0000
trusted library allocation
page read and write
AB4001D0000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
1C803137000
heap
page read and write
B20000
heap
page read and write
AB400DE0000
trusted library allocation
page read and write
18A8000
heap
page read and write
AB400304000
trusted library allocation
page read and write
32AC9FE000
unkown
page readonly
F60000
heap
page read and write
32999FE000
unkown
page readonly
328F1FE000
stack
page read and write
1C809F70000
trusted library section
page read and write
1C807334000
trusted library allocation
page read and write
1C809F32000
trusted library section
page read and write
4056000
heap
page read and write
AB400CA0000
trusted library allocation
page read and write
AB4009A8000
trusted library allocation
page read and write
1C803151000
heap
page read and write
1C803134000
heap
page read and write
1908002C0000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
1C80312C000
heap
page read and write
AB40080C000
trusted library allocation
page read and write
1C803158000
heap
page read and write
ED0000
heap
page read and write
1C8036B5000
heap
page read and write
1C80365D000
heap
page read and write
1C809157000
unclassified section
page read and write
1C8058A0000
trusted library section
page read and write
1C803161000
heap
page read and write
3C52000
heap
page read and write
622400658000
trusted library allocation
page read and write
AB400BA4000
trusted library allocation
page read and write
1C0000
unkown
page readonly
190800260000
trusted library allocation
page read and write
1C803154000
heap
page read and write
3C57000
heap
page read and write
AB40100C000
trusted library allocation
page read and write
190800278000
trusted library allocation
page read and write
AB40018C000
trusted library allocation
page read and write
3C5D000
heap
page read and write
622400668000
trusted library allocation
page read and write
6224006B0000
trusted library allocation
page read and write
329F9FE000
unkown
page readonly
1C803137000
heap
page read and write
32981FE000
stack
page read and write
AB400584000
trusted library allocation
page read and write
BFC000
stack
page read and write
3DB4000
heap
page read and write
1C803161000
heap
page read and write
AB4002B8000
trusted library allocation
page read and write
AB400724000
trusted library allocation
page read and write
1C8091A7000
unclassified section
page read and write
1C803132000
heap
page read and write
1C803154000
heap
page read and write
AB400E5C000
trusted library allocation
page read and write
1C803151000
heap
page read and write
1908002F0000
trusted library allocation
page read and write
AB400B2C000
trusted library allocation
page read and write
AB400060000
trusted library allocation
page read and write
1C875C20000
heap
page readonly
AB400E0C000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
AB400D04000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
1C803146000
heap
page read and write
AB4002AE000
trusted library allocation
page read and write
329D9FE000
unkown
page readonly
AB4002F0000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
AB40067C000
trusted library allocation
page read and write
AB400A94000
trusted library allocation
page read and write
AB4002A8000
trusted library allocation
page read and write
150E000
stack
page read and write
441800210000
direct allocation
page read and write
AB4002C4000
trusted library allocation
page read and write
1C803138000
heap
page read and write
329F1FE000
stack
page read and write
3E1D000
heap
page read and write
1C80314B000
heap
page read and write
AB400CD4000
trusted library allocation
page read and write
1C803151000
heap
page read and write
1C80A0A0000
trusted library section
page read and write
6C3EC000
unkown
page readonly
1908002A0000
trusted library allocation
page read and write
1C8023D0000
unkown
page read and write
1C803161000
heap
page read and write
1C803138000
heap
page read and write
1C8098F0000
trusted library section
page read and write
1C80312C000
heap
page read and write
1C803151000
heap
page read and write
1C803158000
heap
page read and write
4418002A8000
direct allocation
page read and write
AB4000A0000
trusted library allocation
page read and write
AB4001DC000
trusted library allocation
page read and write
1908002BC000
trusted library allocation
page read and write
AB4003A4000
trusted library allocation
page read and write
622400404000
trusted library allocation
page read and write
1C803132000
heap
page read and write
AB40036C000
trusted library allocation
page read and write
441800250000
direct allocation
page read and write
AB400B90000
trusted library allocation
page read and write
1CE000
unkown
page write copy
1C8096A0000
trusted library section
page read and write
AB400BE8000
trusted library allocation
page read and write
1C803132000
heap
page read and write
AB4002A4000
trusted library allocation
page read and write
3EDE000
heap
page read and write
1C80314B000
heap
page read and write
1C80A0FE000
trusted library section
page read and write
62240020C000
trusted library allocation
page read and write
3C5D000
heap
page read and write
AB4004A4000
trusted library allocation
page read and write
6224002B8000
trusted library allocation
page read and write
1C1000
unkown
page execute read
328F9FE000
unkown
page readonly
622400288000
trusted library allocation
page read and write
1C803150000
heap
page read and write
AB4001EC000
trusted library allocation
page read and write
AB400134000
trusted library allocation
page read and write
AB400198000
trusted library allocation
page read and write
622400654000
trusted library allocation
page read and write
3C54000
heap
page read and write
1C875D40000
heap
page read and write
AB400214000
trusted library allocation
page read and write
32989FE000
unkown
page readonly
AB400ED4000
trusted library allocation
page read and write
441800280000
direct allocation
page read and write
1C803154000
heap
page read and write
1C803150000
heap
page read and write
1C803138000
heap
page read and write
32B41FE000
stack
page read and write
1C803132000
heap
page read and write
AB400F48000
trusted library allocation
page read and write
AB400D9C000
trusted library allocation
page read and write
32AA9FE000
unkown
page readonly
190800238000
trusted library allocation
page read and write
402D000
heap
page read and write
3C52000
heap
page read and write
1C803600000
heap
page read and write
6224006CC000
trusted library allocation
page read and write
1C80363A000
heap
page read and write
AB400B88000
trusted library allocation
page read and write
329B9FE000
unkown
page readonly
AB400F24000
trusted library allocation
page read and write
AB400C4C000
trusted library allocation
page read and write
AB400ABC000
trusted library allocation
page read and write
1908002E4000
trusted library allocation
page read and write
AB400488000
trusted library allocation
page read and write
1908002C0000
trusted library allocation
page read and write
AB400001000
trusted library allocation
page read and write
32AF1FE000
stack
page read and write
1C80312C000
heap
page read and write
1908002B0000
trusted library allocation
page read and write
1C803132000
heap
page read and write
1C803151000
heap
page read and write
1C803154000
heap
page read and write
622400684000
trusted library allocation
page read and write
3DA4000
heap
page read and write
622400718000
trusted library allocation
page read and write
AB4006F8000
trusted library allocation
page read and write
1C803146000
heap
page read and write
1C0000
unkown
page readonly
3E7F000
heap
page read and write
32B91FE000
stack
page read and write
A3C000
stack
page read and write
AB400390000
trusted library allocation
page read and write
1C803138000
heap
page read and write
1908002BC000
trusted library allocation
page read and write
AB40017C000
trusted library allocation
page read and write
AB400354000
trusted library allocation
page read and write
1C803138000
heap
page read and write
1CA000
unkown
page readonly
1C80314B000
heap
page read and write
3C57000
heap
page read and write
166B000
unkown
page readonly
1C803132000
heap
page read and write
1C80312C000
heap
page read and write
1C80313E000
heap
page read and write
32A59FE000
unkown
page readonly
1CE000
unkown
page read and write
AB400E3C000
trusted library allocation
page read and write
190800220000
trusted library allocation
page read and write
1C80314A000
heap
page read and write
32961FD000
stack
page read and write
6224002FC000
trusted library allocation
page read and write
1C875B40000
heap
page read and write
AB400220000
trusted library allocation
page read and write
441800217000
direct allocation
page read and write
1C803138000
heap
page read and write
622400310000
trusted library allocation
page read and write
1C803143000
heap
page read and write
AB400DA8000
trusted library allocation
page read and write
AB400740000
trusted library allocation
page read and write
1C80313E000
heap
page read and write
AB4005A8000
trusted library allocation
page read and write
AB400F04000
trusted library allocation
page read and write
1C803154000
heap
page read and write
1C807A8B000
heap
page read and write
3D81000
heap
page read and write
1985000
heap
page read and write
1C803700000
trusted library section
page read and write
32951FB000
stack
page read and write
1C803132000
heap
page read and write
1C803156000
heap
page read and write
1C803151000
heap
page read and write
AB400D24000
trusted library allocation
page read and write
AB4008B0000
trusted library allocation
page read and write
1C803151000
heap
page read and write
32B59FE000
unkown
page readonly
1C803645000
heap
page read and write
1C80312A000
heap
page read and write
1C803151000
heap
page read and write
1C803151000
heap
page read and write
AB40060C000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
AB4001F4000
trusted library allocation
page read and write
1908002A0000
trusted library allocation
page read and write
3E50000
heap
page read and write
1C80313E000
heap
page read and write
AB40091C000
trusted library allocation
page read and write
3E55000
heap
page read and write
1C803152000
heap
page read and write
198C000
heap
page read and write
AB400FC0000
trusted library allocation
page read and write
AB400360000
trusted library allocation
page read and write
1C80313C000
heap
page read and write
AB40034C000
trusted library allocation
page read and write
AB400098000
trusted library allocation
page read and write
32A81FB000
stack
page read and write
1908002C0000
trusted library allocation
page read and write
AB400CB4000
trusted library allocation
page read and write
1C803138000
heap
page read and write
441800270000
direct allocation
page read and write
AB400224000
trusted library allocation
page read and write
1C803151000
heap
page read and write
AB400601000
trusted library allocation
page read and write
AB4005CC000
trusted library allocation
page read and write
1C803143000
heap
page read and write
AB400714000
trusted library allocation
page read and write
1C803154000
heap
page read and write
AB4007BB000
trusted library allocation
page read and write
1C8036C5000
heap
page read and write
AB400858000
trusted library allocation
page read and write
32AD9FE000
unkown
page readonly
1C80312A000
heap
page read and write
AB4001C4000
trusted library allocation
page read and write
1D1000
unkown
page readonly
1C80312C000
heap
page read and write
1C80313E000
heap
page read and write
1C8036A7000
heap
page read and write
1C803137000
heap
page read and write
32B81FE000
stack
page read and write
6224007C8000
trusted library allocation
page read and write
1C875CDB000
heap
page read and write
F1E000
stack
page read and write
AB400650000
trusted library allocation
page read and write
1C803132000
heap
page read and write
AB400ACC000
trusted library allocation
page read and write
441800274000
direct allocation
page read and write
AB4003EC000
trusted library allocation
page read and write
622400614000
trusted library allocation
page read and write
622400624000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
AB4001AC000
trusted library allocation
page read and write
62240060C000
trusted library allocation
page read and write
AB400418000
trusted library allocation
page read and write
622400610000
trusted library allocation
page read and write
1C809193000
heap
page read and write
AB400E6C000
trusted library allocation
page read and write
32AF9FE000
unkown
page readonly
AB40096C000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
1908002BC000
trusted library allocation
page read and write
AB400234000
trusted library allocation
page read and write
6C2C0000
unkown
page readonly
1C809F00000
trusted library section
page read and write
32929FE000
unkown
page readonly
1C803151000
heap
page read and write
622400788000
trusted library allocation
page read and write
622400330000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
32A51FC000
stack
page read and write
1C803151000
heap
page read and write
AB400230000
trusted library allocation
page read and write
622400401000
trusted library allocation
page read and write
AB400EB4000
trusted library allocation
page read and write
4418002DC000
direct allocation
page read and write
1C809F11000
trusted library section
page read and write
622400220000
trusted library allocation
page read and write
1C803132000
heap
page read and write
AB400DC8000
trusted library allocation
page read and write
3C59000
heap
page read and write
1C801980000
heap
page read and write
32921FA000
stack
page read and write
32B49FE000
unkown
page readonly
AB40000C000
trusted library allocation
page read and write
1C803648000
heap
page read and write
622400734000
trusted library allocation
page read and write
622400700000
trusted library allocation
page read and write
1C803138000
heap
page read and write
190800294000
trusted library allocation
page read and write
622400237000
trusted library allocation
page read and write
329E9FE000
unkown
page readonly
AB400E18000
trusted library allocation
page read and write
622400750000
trusted library allocation
page read and write
AB400E10000
trusted library allocation
page read and write
AB40008F000
trusted library allocation
page read and write
5F0000
heap
page read and write
AB400DBC000
trusted library allocation
page read and write
AB400D70000
trusted library allocation
page read and write
AB4006C0000
trusted library allocation
page read and write
1C803132000
heap
page read and write
AB40081C000
trusted library allocation
page read and write
1C803132000
heap
page read and write
1C1000
unkown
page execute read
18A6000
heap
page read and write
1C803132000
heap
page read and write
622400330000
trusted library allocation
page read and write
1CA000
unkown
page readonly
62240027C000
trusted library allocation
page read and write
622400364000
trusted library allocation
page read and write
6224007D0000
trusted library allocation
page read and write
1980000
heap
page read and write
AB400719000
trusted library allocation
page read and write
622400694000
trusted library allocation
page read and write
1018000
heap
page read and write
1C803150000
heap
page read and write
1C803151000
heap
page read and write
1C803132000
heap
page read and write
32AA1FD000
stack
page read and write
1C803137000
heap
page read and write
32A49FE000
unkown
page readonly
3D8F000
heap
page read and write
1C80312C000
heap
page read and write
AB400340000
trusted library allocation
page read and write
AB400930000
trusted library allocation
page read and write
1AC0000
heap
page read and write
190800230000
trusted library allocation
page read and write
1C1000
unkown
page execute read
32B31FE000
stack
page read and write
1C1000
unkown
page execute read
50E000
stack
page read and write
1C8036EE000
heap
page read and write
62240075C000
trusted library allocation
page read and write
622400784000
trusted library allocation
page read and write
AB400D5C000
trusted library allocation
page read and write
1C803132000
heap
page read and write
1C803132000
heap
page read and write
1C803154000
heap
page read and write
AB4002FB000
trusted library allocation
page read and write
1C803655000
heap
page read and write
1C875C48000
heap
page read and write
1CE000
unkown
page read and write
1C8036A1000
heap
page read and write
D67000
heap
page read and write
3D6F000
heap
page read and write
3F1B000
heap
page read and write
AB400C70000
trusted library allocation
page read and write
AB4001F0000
trusted library allocation
page read and write
1C803132000
heap
page read and write
1C8036DF000
heap
page read and write
1C803144000
heap
page read and write
AB400390000
trusted library allocation
page read and write
1C803132000
heap
page read and write
1C80312C000
heap
page read and write
AB400FCC000
trusted library allocation
page read and write
1C1000
unkown
page execute read
1C875D26000
heap
page read and write
3C5B000
heap
page read and write
AB4004BC000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
AB4009CC000
trusted library allocation
page read and write
3E0C000
heap
page read and write
1C803137000
heap
page read and write
6224006C8000
trusted library allocation
page read and write
32A01FB000
stack
page read and write
1C803151000
heap
page read and write
AB40075C000
trusted library allocation
page read and write
1C803154000
heap
page read and write
AB4002D0000
trusted library allocation
page read and write
3E28000
heap
page read and write
6C3E8000
unkown
page readonly
1C803151000
heap
page read and write
1C80A062000
trusted library section
page read and write
32AC1FE000
stack
page read and write
1C803132000
heap
page read and write
DFC000
stack
page read and write
3C57000
heap
page read and write
1C803154000
heap
page read and write
AB400510000
trusted library allocation
page read and write
6224006B4000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
3C50000
heap
page read and write
1C809FA3000
trusted library section
page read and write
1908002B0000
trusted library allocation
page read and write
AB400401000
trusted library allocation
page read and write
73E000
stack
page read and write
1C80312A000
heap
page read and write
328B9FE000
unkown
page readonly
AB4000DC000
trusted library allocation
page read and write
AB400EA8000
trusted library allocation
page read and write
190800270000
trusted library allocation
page read and write
32979FE000
unkown
page readonly
1630000
heap
page read and write
3D94000
heap
page read and write
1C803132000
heap
page read and write
F5E000
stack
page read and write
3DF5000
heap
page read and write
1908002F4000
trusted library allocation
page read and write
32A09FE000
unkown
page readonly
AB400A1C000
trusted library allocation
page read and write
1426000
unkown
page write copy
3EFF000
heap
page read and write
1C803154000
heap
page read and write
1C803138000
heap
page read and write
32939FE000
unkown
page readonly
329D1FE000
stack
page read and write
AB4002A4000
trusted library allocation
page read and write
1C803154000
heap
page read and write
190800250000
trusted library allocation
page read and write
1C803154000
heap
page read and write
AB4002CA000
trusted library allocation
page read and write
3C5E000
heap
page read and write
1C803138000
heap
page read and write
AB4001F8000
trusted library allocation
page read and write
1C80314A000
heap
page read and write
62240039C000
trusted library allocation
page read and write
1C803132000
heap
page read and write
1C803138000
heap
page read and write
AB400894000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
190800201000
trusted library allocation
page read and write
1C80313E000
heap
page read and write
3FDD000
heap
page read and write
1C809C27000
unclassified section
page read and write
622400320000
trusted library allocation
page read and write
1C803151000
heap
page read and write
3E33000
heap
page read and write
AB400550000
trusted library allocation
page read and write
AB400A34000
trusted library allocation
page read and write
AB400304000
trusted library allocation
page read and write
1C875D03000
heap
page read and write
1C80312A000
heap
page read and write
622400230000
trusted library allocation
page read and write
3C54000
heap
page read and write
150F000
unkown
page write copy
328B1FE000
unkown
page read and write
AB400E24000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
AB400F18000
trusted library allocation
page read and write
3F5D000
heap
page read and write
62240069C000
trusted library allocation
page read and write
1C809C3E000
trusted library section
page read and write
1C803154000
heap
page read and write
1C803138000
heap
page read and write
1C80314D000
heap
page read and write
32B01FE000
stack
page read and write
AB400910000
trusted library allocation
page read and write
AB400B88000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
AB40006C000
trusted library allocation
page read and write
AB400801000
trusted library allocation
page read and write
FA0000
unkown
page readonly
1C80312C000
heap
page read and write
32A21FC000
stack
page read and write
AB400E90000
trusted library allocation
page read and write
6224006EC000
trusted library allocation
page read and write
1C803154000
heap
page read and write
1C807A80000
heap
page read and write
AB4006CA000
trusted library allocation
page read and write
AB400300000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
1C80312A000
heap
page read and write
3DB2000
heap
page read and write
1C809F91000
trusted library section
page read and write
32991FE000
stack
page read and write
1C803151000
heap
page read and write
1C80312C000
heap
page read and write
1C80312C000
heap
page read and write
1C80314C000
heap
page read and write
329C9FE000
unkown
page readonly
AB400DD4000
trusted library allocation
page read and write
3D50000
heap
page read and write
1C80312C000
heap
page read and write
AB4002C4000
trusted library allocation
page read and write
AB400DC4000
trusted library allocation
page read and write
1C803151000
heap
page read and write
1C803138000
heap
page read and write
AB40034C000
trusted library allocation
page read and write
622400688000
trusted library allocation
page read and write
18E000
unkown
page read and write
1C803155000
heap
page read and write
AB4001CC000
trusted library allocation
page read and write
329E1FE000
stack
page read and write
1C803154000
heap
page read and write
1C803132000
heap
page read and write
1C803138000
heap
page read and write
AB4001B4000
trusted library allocation
page read and write
AB4006C5000
trusted library allocation
page read and write
32A71FC000
stack
page read and write
AB40086C000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
1C803154000
heap
page read and write
AB400320000
trusted library allocation
page read and write
AB40032C000
trusted library allocation
page read and write
AB4008CC000
trusted library allocation
page read and write
BB0000
heap
page read and write
441800220000
direct allocation
page read and write
AB400FD8000
trusted library allocation
page read and write
1C8036A1000
heap
page read and write
4418002D0000
direct allocation
page read and write
198D000
heap
page read and write
1C803143000
heap
page read and write
AB400C68000
trusted library allocation
page read and write
32A41FC000
stack
page read and write
6224006FC000
trusted library allocation
page read and write
AB400CEC000
trusted library allocation
page read and write
198C000
heap
page read and write
44180024C000
direct allocation
page read and write
AB400320000
trusted library allocation
page read and write
622400678000
trusted library allocation
page read and write
AB400428000
trusted library allocation
page read and write
622400250000
trusted library allocation
page read and write
1C803138000
heap
page read and write
1C803151000
heap
page read and write
AB400F98000
trusted library allocation
page read and write
1C803151000
heap
page read and write
32B39FE000
unkown
page readonly
9D000
stack
page read and write
6224002F4000
trusted library allocation
page read and write
AB400CC0000
trusted library allocation
page read and write
AB400F60000
trusted library allocation
page read and write
1C80313C000
heap
page read and write
1C803151000
heap
page read and write
AB40034C000
trusted library allocation
page read and write
AB4004A0000
trusted library allocation
page read and write
1C803151000
heap
page read and write
AB4007B1000
trusted library allocation
page read and write
83C000
stack
page read and write
6F0000
heap
page read and write
32B51FE000
stack
page read and write
4418002E4000
direct allocation
page read and write
1C803138000
heap
page read and write
1C803132000
heap
page read and write
1C80312C000
heap
page read and write
32909FE000
unkown
page readonly
AB400338000
trusted library allocation
page read and write
1C80314B000
heap
page read and write
1C875F55000
heap
page read and write
AB400FE4000
trusted library allocation
page read and write
32A79FE000
unkown
page readonly
328E1FE000
stack
page read and write
1986000
heap
page read and write
3C53000
heap
page read and write
3DD8000
heap
page read and write
AB400054000
trusted library allocation
page read and write
AB400844000
trusted library allocation
page read and write
69C000
stack
page read and write
44180020C000
direct allocation
page read and write
1C803151000
heap
page read and write
1D1000
unkown
page readonly
AB400E01000
trusted library allocation
page read and write
3C50000
heap
page read and write
1C803137000
heap
page read and write
AB400B0C000
trusted library allocation
page read and write
AB4001D4000
trusted library allocation
page read and write
AB400AEC000
trusted library allocation
page read and write
AB400D54000
trusted library allocation
page read and write
622400330000
trusted library allocation
page read and write
1CA000
unkown
page readonly
18A5000
heap
page read and write
198B000
heap
page read and write
329A1FE000
stack
page read and write
1C803110000
heap
page read and write
AB400EC8000
trusted library allocation
page read and write
1666000
unkown
page write copy
6224006B8000
trusted library allocation
page read and write
6224006E8000
trusted library allocation
page read and write
AB400C3C000
trusted library allocation
page read and write
AB4003F8000
trusted library allocation
page read and write
1C803132000
heap
page read and write
AB400E70000
trusted library allocation
page read and write
441800294000
direct allocation
page read and write
1C803134000
heap
page read and write
AB40014C000
trusted library allocation
page read and write
1C803132000
heap
page read and write
62240025C000
trusted library allocation
page read and write
1984000
heap
page read and write
622400374000
trusted library allocation
page read and write
1C80312C000
heap
page read and write
1C8036DD000
heap
page read and write
1C80312A000
heap
page read and write
AB40101C000
trusted library allocation
page read and write
1C803144000
heap
page read and write
1C803151000
heap
page read and write
1C803155000
heap
page read and write
1C803138000
heap
page read and write
1C803154000
heap
page read and write
6224006D4000
trusted library allocation
page read and write
32AB1FB000
stack
page read and write
6C2C1000
unkown
page execute read
1C803154000
heap
page read and write
AB400DE8000
trusted library allocation
page read and write
1C80314C000
heap
page read and write
AB400944000
trusted library allocation
page read and write
AB400BAC000
trusted library allocation
page read and write
1C803143000
heap
page read and write
1C0000
unkown
page readonly
AB400594000
trusted library allocation
page read and write
AB400870000
trusted library allocation
page read and write
1C80313E000
heap
page read and write
D60000
heap
page read and write
A70000
heap
page read and write
1C8036E7000
heap
page read and write
1C80312C000
heap
page read and write
1C875F50000
heap
page read and write
99C000
stack
page read and write
1C803133000
heap
page read and write
1C803151000
heap
page read and write
1C803151000
heap
page read and write
AB400DD4000
trusted library allocation
page read and write
1C803132000
heap
page read and write
1C803132000
heap
page read and write
1C803143000
heap
page read and write
1C80312C000
heap
page read and write
AB400D78000
trusted library allocation
page read and write
1C875D3D000
heap
page read and write
6C39D000
unkown
page read and write
AB400A01000
trusted library allocation
page read and write
1C80A0F0000
trusted library section
page read and write
AB4002A4000
trusted library allocation
page read and write
1D1000
unkown
page readonly
AB400C64000
trusted library allocation
page read and write
3C5E000
heap
page read and write
1C80312A000
heap
page read and write
6224006C4000
trusted library allocation
page read and write
1C809F20000
trusted library section
page read and write
1C80368B000
heap
page read and write
18A7000
heap
page read and write
54F000
stack
page read and write
AB40032C000
trusted library allocation
page read and write
1D1000
unkown
page readonly
622400664000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
1D1000
unkown
page readonly
1C80312A000
heap
page read and write
AB400304000
trusted library allocation
page read and write
AB4002F0000
trusted library allocation
page read and write
AB40040C000
trusted library allocation
page read and write
1C805990000
trusted library allocation
page read and write
1C803138000
heap
page read and write
AB400A78000
trusted library allocation
page read and write
AB400D44000
trusted library allocation
page read and write
622400390000
trusted library allocation
page read and write
1C807AA5000
heap
page read and write
1C80313D000
heap
page read and write
18AA000
heap
page read and write
1C803137000
heap
page read and write
1C803138000
heap
page read and write
1C803138000
heap
page read and write
3C57000
heap
page read and write
1CE000
unkown
page write copy
AB400C8C000
trusted library allocation
page read and write
1C803151000
heap
page read and write
328D1FE000
stack
page read and write
1C0000
unkown
page readonly
AB4001B4000
trusted library allocation
page read and write
198B000
heap
page read and write
1C80312A000
heap
page read and write
1C803132000
heap
page read and write
32A11FD000
stack
page read and write
AB4003EC000
trusted library allocation
page read and write
3F9B000
heap
page read and write
1908002BC000
trusted library allocation
page read and write
1C803138000
heap
page read and write
3C5D000
heap
page read and write
622400380000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
AB40016C000
trusted library allocation
page read and write
770000
heap
page read and write
1C80312A000
heap
page read and write
AB400F38000
trusted library allocation
page read and write
1C80313E000
heap
page read and write
1C80314B000
heap
page read and write
6224002DC000
trusted library allocation
page read and write
1C80312A000
heap
page read and write
1C803642000
heap
page read and write
There are 1148 hidden memdumps, click here to show them.