IOC Report
0HUxKfIvSV.exe

loading gif

Files

File Path
Type
Category
Malicious
0HUxKfIvSV.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0HUxKfIvSV.exe_20efba58e27eb82cc3aa7c4a35eaa55b9aaa49f2_5d26a63a_be2bf83d-60d4-4b52-86b0-49811e1707df\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1904.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Oct 29 23:30:33 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A9B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D5B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\vaHFhUMFeORvODihvYyD.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0HUxKfIvSV.exe
"C:\Users\user\Desktop\0HUxKfIvSV.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 --field-trial-handle=2224,i,14967276885741329325,4792044077249876975,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6904 -s 1704

URLs

Name
IP
Malicious
http://thirtjo13vt.top/v1/upload.php
46.173.214.92
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/6755U
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://anglebug.com/5750)
unknown
https://issuetracker.google.com/255411748
unknown
https://www.google.com/Char:i3
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://duckduckgo.com/chrome_newtab&
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
http://anglebug.com/3498:
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://anglebug.com/4551F
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://thirtjo13vt.top/v1/uploaE_
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/29708
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
thirtjo13vt.top
46.173.214.92
malicious
home.thirtjo13vt.top
46.173.214.92
malicious
www.google.com
142.250.186.132
241.42.69.40.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
46.173.214.92
thirtjo13vt.top
Russian Federation
malicious
239.255.255.250
unknown
Reserved
142.250.186.132
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
ProgramId
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
FileId
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
LowerCaseLongPath
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
LongPathHash
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
Name
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
OriginalFileName
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
Publisher
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
Version
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
BinFileVersion
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
BinaryType
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
ProductName
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
ProductVersion
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
LinkDate
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
BinProductVersion
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
AppxPackageFullName
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
AppxPackageRelativeId
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
Size
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
Language
\REGISTRY\A\{f8d682ea-7f12-8978-653d-8f1c3b214ac1}\Root\InventoryApplicationFile\0huxkfivsv.exe|6d60ae65872af0a7
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
275802750000
trusted library allocation
page read and write
27580314C000
trusted library allocation
page read and write
36D000
stack
page read and write
275802A58000
trusted library allocation
page read and write
1DC3000
heap
page read and write
5D30007B4000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
275802EBC000
trusted library allocation
page read and write
41C9000
heap
page read and write
5D30003EC000
trusted library allocation
page read and write
4241000
heap
page read and write
84645FB000
stack
page read and write
237CD688000
heap
page read and write
845BDFE000
unkown
page readonly
2758028E4000
trusted library allocation
page read and write
41DF000
heap
page read and write
237CD690000
heap
page read and write
237CD69F000
heap
page read and write
237CD690000
heap
page read and write
275802A0C000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
8459DFE000
unkown
page readonly
275803034000
trusted library allocation
page read and write
8460DFE000
unkown
page readonly
16E4002C0000
trusted library allocation
page read and write
2A2C00303000
direct allocation
page read and write
4202000
heap
page read and write
237CD691000
heap
page read and write
1DC3000
heap
page read and write
237CD6A1000
heap
page read and write
237D37D7000
unclassified section
page read and write
2758028FB000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
2758028BC000
trusted library allocation
page read and write
275802D70000
trusted library allocation
page read and write
2758023EC000
trusted library allocation
page read and write
8453DFE000
unkown
page readonly
275802E88000
trusted library allocation
page read and write
5D300033C000
trusted library allocation
page read and write
275802960000
trusted library allocation
page read and write
275803070000
trusted library allocation
page read and write
40A3000
heap
page read and write
5D300039C000
trusted library allocation
page read and write
237CDCAC000
heap
page read and write
275802394000
trusted library allocation
page read and write
275802C7C000
trusted library allocation
page read and write
237CDE30000
trusted library section
page read and write
4171000
heap
page read and write
237CD68A000
heap
page read and write
EF25000
heap
page read and write
275802E9C000
trusted library allocation
page read and write
2758023C8000
trusted library allocation
page read and write
237CD688000
heap
page read and write
275802AC0000
trusted library allocation
page read and write
16E4002E4000
trusted library allocation
page read and write
237CBED3000
heap
page read and write
5D30007D0000
trusted library allocation
page read and write
5D3000698000
trusted library allocation
page read and write
275802538000
trusted library allocation
page read and write
237CA228000
heap
page read and write
B3E000
stack
page read and write
16E4002A0000
trusted library allocation
page read and write
275802618000
trusted library allocation
page read and write
275802560000
trusted library allocation
page read and write
16E4002BC000
trusted library allocation
page read and write
2758028AC000
trusted library allocation
page read and write
275802540000
trusted library allocation
page read and write
5D3000700000
trusted library allocation
page read and write
2758031B4000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
2A2C002E4000
direct allocation
page read and write
41AB000
heap
page read and write
275802801000
trusted library allocation
page read and write
275802280000
trusted library allocation
page read and write
275802494000
trusted library allocation
page read and write
237CD694000
heap
page read and write
237CD69F000
heap
page read and write
237CD68A000
heap
page read and write
275802500000
trusted library allocation
page read and write
87F000
unkown
page read and write
4367000
heap
page read and write
237CD688000
heap
page read and write
2A2C00274000
direct allocation
page read and write
237D3D40000
trusted library section
page read and write
275802590000
trusted library allocation
page read and write
237D4540000
trusted library section
page read and write
5D30002F4000
trusted library allocation
page read and write
237CD690000
heap
page read and write
237D4410000
trusted library section
page read and write
84625FE000
stack
page read and write
43DC000
heap
page read and write
275803064000
trusted library allocation
page read and write
16E400235000
trusted library allocation
page read and write
5D300035C000
trusted library allocation
page read and write
5D30002FC000
trusted library allocation
page read and write
237CD696000
heap
page read and write
237CA230000
trusted library allocation
page read and write
6C31F000
unkown
page readonly
2A2C00294000
direct allocation
page read and write
275802E40000
trusted library allocation
page read and write
237CD690000
heap
page read and write
27580235C000
trusted library allocation
page read and write
84435FE000
stack
page read and write
2A2C00217000
direct allocation
page read and write
237CD69F000
heap
page read and write
41F2000
heap
page read and write
5D3000364000
trusted library allocation
page read and write
4203000
heap
page read and write
660000
unkown
page readonly
2758023F0000
trusted library allocation
page read and write
8444DFE000
unkown
page readonly
275802FD4000
trusted library allocation
page read and write
66E000
unkown
page read and write
5D300075C000
trusted library allocation
page read and write
237CDC87000
heap
page read and write
AE7000
heap
page read and write
237CD68A000
heap
page read and write
237CD699000
heap
page read and write
5D3000210000
trusted library allocation
page read and write
8462DFE000
unkown
page readonly
237CD69F000
heap
page read and write
237CD688000
heap
page read and write
237CDC45000
heap
page read and write
275802334000
trusted library allocation
page read and write
8EE000
stack
page read and write
237D4443000
trusted library section
page read and write
41C2000
heap
page read and write
237CD69F000
heap
page read and write
237CA315000
heap
page read and write
843DDFE000
unkown
page readonly
5D3000354000
trusted library allocation
page read and write
3E0000
heap
page read and write
237CD699000
heap
page read and write
237CD677000
heap
page read and write
275800F56000
trusted library allocation
page read and write
237CDC9B000
heap
page read and write
5D30006C4000
trusted library allocation
page read and write
27580220C000
trusted library allocation
page read and write
16E4002BC000
trusted library allocation
page read and write
8448DFE000
unkown
page readonly
237CA240000
trusted library allocation
page read and write
1D56000
heap
page read and write
275802EEC000
trusted library allocation
page read and write
27580294A000
trusted library allocation
page read and write
275802FB8000
trusted library allocation
page read and write
843C5FE000
stack
page read and write
16E400278000
trusted library allocation
page read and write
2758030E0000
trusted library allocation
page read and write
4315000
heap
page read and write
237D37E0000
heap
page read and write
275802B0C000
trusted library allocation
page read and write
84425FB000
stack
page read and write
27580257C000
trusted library allocation
page read and write
237CD660000
heap
page read and write
1477000
unkown
page readonly
4346000
heap
page read and write
237CD695000
heap
page read and write
2758029D8000
trusted library allocation
page read and write
8461DFE000
unkown
page readonly
40AF000
heap
page read and write
5D3000601000
trusted library allocation
page read and write
27580229E000
trusted library allocation
page read and write
275802E64000
trusted library allocation
page read and write
275802594000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
275802830000
trusted library allocation
page read and write
275802E3C000
trusted library allocation
page read and write
5D3000694000
trusted library allocation
page read and write
84595FE000
stack
page read and write
425F000
heap
page read and write
4185000
heap
page read and write
16E400264000
trusted library allocation
page read and write
843B5FE000
unkown
page read and write
2758030E4000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
237CD688000
heap
page read and write
66A000
unkown
page readonly
4243000
heap
page read and write
275803020000
trusted library allocation
page read and write
84525FC000
stack
page read and write
237CD69F000
heap
page read and write
413B000
heap
page read and write
1DC3000
heap
page read and write
2758028C4000
trusted library allocation
page read and write
237CD6AB000
heap
page read and write
5D3000704000
trusted library allocation
page read and write
275802621000
trusted library allocation
page read and write
275802318000
trusted library allocation
page read and write
4253000
heap
page read and write
2758028D4000
trusted library allocation
page read and write
275803058000
trusted library allocation
page read and write
275802F1C000
trusted library allocation
page read and write
660000
unkown
page readonly
5D3000368000
trusted library allocation
page read and write
148C000
unkown
page write copy
237CD6BC000
heap
page read and write
237CA20A000
heap
page read and write
275802B48000
trusted library allocation
page read and write
4151000
heap
page read and write
2758023E4000
trusted library allocation
page read and write
237CD6AB000
heap
page read and write
2758022A3000
trusted library allocation
page read and write
27580315C000
trusted library allocation
page read and write
415E000
heap
page read and write
40AF000
heap
page read and write
237CD694000
heap
page read and write
43EA000
heap
page read and write
432F000
heap
page read and write
275802978000
trusted library allocation
page read and write
2758024F3000
trusted library allocation
page read and write
845E5FE000
stack
page read and write
2A2C0020C000
direct allocation
page read and write
237CD69F000
heap
page read and write
8445DFE000
unkown
page readonly
237CD69F000
heap
page read and write
275802E6C000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
5D3000750000
trusted library allocation
page read and write
237D43D2000
trusted library section
page read and write
133E000
unkown
page readonly
275802F64000
trusted library allocation
page read and write
421C000
heap
page read and write
2758024A8000
trusted library allocation
page read and write
237CF8C4000
trusted library allocation
page read and write
16E400260000
trusted library allocation
page read and write
40A3000
heap
page read and write
237CD688000
heap
page read and write
AE0000
heap
page read and write
275802434000
trusted library allocation
page read and write
27580237C000
trusted library allocation
page read and write
275802494000
trusted library allocation
page read and write
237CD694000
heap
page read and write
419A000
heap
page read and write
2A2C00290000
direct allocation
page read and write
844A5FE000
stack
page read and write
8458DFE000
unkown
page readonly
2758027AC000
trusted library allocation
page read and write
275802414000
trusted library allocation
page read and write
2758030B0000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
84565FC000
stack
page read and write
1D9D000
heap
page read and write
237CD69F000
heap
page read and write
237CD6B7000
heap
page read and write
5D3000758000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
275800401000
trusted library allocation
page read and write
2758022DC000
trusted library allocation
page read and write
5D3000718000
trusted library allocation
page read and write
661000
unkown
page execute read
40A6000
heap
page read and write
275803104000
trusted library allocation
page read and write
5D30006D4000
trusted library allocation
page read and write
237CD688000
heap
page read and write
5D30006B8000
trusted library allocation
page read and write
1D41000
heap
page read and write
275802D30000
trusted library allocation
page read and write
275802A48000
trusted library allocation
page read and write
27580250C000
trusted library allocation
page read and write
237CD6A1000
heap
page read and write
66A000
unkown
page readonly
237CD6BF000
heap
page read and write
660000
unkown
page readonly
4236000
heap
page read and write
2758023B4000
trusted library allocation
page read and write
2758028E4000
trusted library allocation
page read and write
275801001000
trusted library allocation
page read and write
2A2C002DC000
direct allocation
page read and write
27580302C000
trusted library allocation
page read and write
237CD695000
heap
page read and write
1491000
unkown
page readonly
275802518000
trusted library allocation
page read and write
83E000
unkown
page read and write
237CA0E0000
heap
page read and write
237CD690000
heap
page read and write
237CD69F000
heap
page read and write
84495FE000
stack
page read and write
237CD69F000
heap
page read and write
237CD68A000
heap
page read and write
275802518000
trusted library allocation
page read and write
237CD6A4000
heap
page read and write
237CA225000
heap
page read and write
275802628000
trusted library allocation
page read and write
2758029A5000
trusted library allocation
page read and write
40A3000
heap
page read and write
422A000
heap
page read and write
237CD69F000
heap
page read and write
16E4002B0000
trusted library allocation
page read and write
237CD688000
heap
page read and write
5D3000760000
trusted library allocation
page read and write
4170000
heap
page read and write
237CD688000
heap
page read and write
40A0000
heap
page read and write
237CD691000
heap
page read and write
237CD699000
heap
page read and write
237CD688000
heap
page read and write
5D3000640000
trusted library allocation
page read and write
845D5FE000
stack
page read and write
40AC000
heap
page read and write
2758023B4000
trusted library allocation
page read and write
E64A000
heap
page read and write
5D3000230000
trusted library allocation
page read and write
237CDEB7000
unclassified section
page read and write
237CD69F000
heap
page read and write
275802274000
trusted library allocation
page read and write
275802500000
trusted library allocation
page read and write
16E400288000
trusted library allocation
page read and write
275802C58000
trusted library allocation
page read and write
275802BAC000
trusted library allocation
page read and write
8468DFE000
unkown
page readonly
16E400238000
trusted library allocation
page read and write
2758023A0000
trusted library allocation
page read and write
6C36C000
unkown
page readonly
237CD69F000
heap
page read and write
660000
unkown
page readonly
1D4B000
heap
page read and write
237CD690000
heap
page read and write
275802DC0000
trusted library allocation
page read and write
237CD688000
heap
page read and write
275802E34000
trusted library allocation
page read and write
275802B68000
trusted library allocation
page read and write
1D99000
heap
page read and write
40A2000
heap
page read and write
275802F8C000
trusted library allocation
page read and write
237D37E3000
heap
page read and write
5D30007C8000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
237CD68D000
heap
page read and write
237CDC28000
heap
page read and write
6A6F8000
direct allocation
page read and write
66A000
unkown
page readonly
845CDFE000
unkown
page readonly
237CD679000
heap
page read and write
237C9FF0000
heap
page read and write
237CA21D000
heap
page read and write
237CD694000
heap
page read and write
F80000
heap
page read and write
275802F7C000
trusted library allocation
page read and write
275802D1C000
trusted library allocation
page read and write
2A2C002A8000
direct allocation
page read and write
16E4002BC000
trusted library allocation
page read and write
40A3000
heap
page read and write
275802E40000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
237CD694000
heap
page read and write
275802FAC000
trusted library allocation
page read and write
1BE000
stack
page read and write
275803144000
trusted library allocation
page read and write
5D3000330000
trusted library allocation
page read and write
27580301F000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
275800450000
trusted library allocation
page read and write
556F000
heap
page read and write
237CD69F000
heap
page read and write
5D3000424000
trusted library allocation
page read and write
84685FE000
stack
page read and write
2758023E8000
trusted library allocation
page read and write
844CDFE000
unkown
page readonly
1DC3000
heap
page read and write
5D3000248000
trusted library allocation
page read and write
4195000
heap
page read and write
5D3000310000
trusted library allocation
page read and write
2758024FB000
trusted library allocation
page read and write
16E4002B0000
trusted library allocation
page read and write
5D3000354000
trusted library allocation
page read and write
66E000
unkown
page read and write
2A2C00284000
direct allocation
page read and write
5D30002E4000
trusted library allocation
page read and write
237CD690000
heap
page read and write
275802E0C000
trusted library allocation
page read and write
5D3000664000
trusted library allocation
page read and write
D71000
unkown
page execute read
237D1E00000
trusted library allocation
page read and write
66E000
unkown
page write copy
1DA3000
heap
page read and write
237CD692000
heap
page read and write
2758030AC000
trusted library allocation
page read and write
844F5FD000
stack
page read and write
2758028CF000
trusted library allocation
page read and write
237CDC9F000
heap
page read and write
844C5FA000
stack
page read and write
40AD000
heap
page read and write
16E4002C0000
trusted library allocation
page read and write
275803114000
trusted library allocation
page read and write
41BC000
heap
page read and write
5D3000330000
trusted library allocation
page read and write
66A000
unkown
page readonly
275802688000
trusted library allocation
page read and write
14E0000
heap
page read and write
5D3000620000
trusted library allocation
page read and write
2758024B4000
trusted library allocation
page read and write
237CD690000
heap
page read and write
16E400294000
trusted library allocation
page read and write
5D30007CC000
trusted library allocation
page read and write
2758030FC000
trusted library allocation
page read and write
84555FB000
stack
page read and write
1DC1000
heap
page read and write
164E000
heap
page read and write
16E4002A0000
trusted library allocation
page read and write
237CDC9D000
heap
page read and write
275802EE4000
trusted library allocation
page read and write
1640000
heap
page read and write
275802F48000
trusted library allocation
page read and write
40AB000
heap
page read and write
5D300069C000
trusted library allocation
page read and write
42ED000
heap
page read and write
2758025B4000
trusted library allocation
page read and write
237CD6BC000
heap
page read and write
6C31D000
unkown
page read and write
5D3000658000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
27580234C000
trusted library allocation
page read and write
237CD694000
heap
page read and write
84535FC000
stack
page read and write
2758022EC000
trusted library allocation
page read and write
275800001000
trusted library allocation
page read and write
5D30006F0000
trusted library allocation
page read and write
275802F40000
trusted library allocation
page read and write
27580285C000
trusted library allocation
page read and write
16E4002BC000
trusted library allocation
page read and write
275802BC4000
trusted library allocation
page read and write
5D3000668000
trusted library allocation
page read and write
275802DB0000
trusted library allocation
page read and write
2758024F0000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
84485FE000
stack
page read and write
2758028F0000
trusted library allocation
page read and write
275802955000
trusted library allocation
page read and write
237CD694000
heap
page read and write
237CD68A000
heap
page read and write
5D3000724000
trusted library allocation
page read and write
40A7000
heap
page read and write
275802F98000
trusted library allocation
page read and write
237CD690000
heap
page read and write
845C5FE000
stack
page read and write
1D61000
heap
page read and write
8456DFE000
unkown
page readonly
16E40020D000
trusted library allocation
page read and write
41F5000
heap
page read and write
275802EE4000
trusted library allocation
page read and write
27580254C000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
237CDBEF000
heap
page read and write
275802B2C000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
275802AE4000
trusted library allocation
page read and write
237CD6A1000
heap
page read and write
3AA000
stack
page read and write
5D3000320000
trusted library allocation
page read and write
237CDC6F000
heap
page read and write
1D51000
heap
page read and write
237CD695000
heap
page read and write
8440DFE000
unkown
page readonly
237CD69F000
heap
page read and write
237CA204000
heap
page read and write
4211000
heap
page read and write
237CD690000
heap
page read and write
237CD690000
heap
page read and write
413B000
heap
page read and write
275802EFC000
trusted library allocation
page read and write
237D4590000
trusted library section
page read and write
2758023B4000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
2A2C002EC000
direct allocation
page read and write
27580280C000
trusted library allocation
page read and write
237CD688000
heap
page read and write
237CD69F000
heap
page read and write
600000
heap
page read and write
275802968000
trusted library allocation
page read and write
2A2C00260000
direct allocation
page read and write
237CD69F000
heap
page read and write
40A6000
heap
page read and write
4257000
heap
page read and write
275802201000
trusted library allocation
page read and write
5D3000418000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
275802498000
trusted library allocation
page read and write
237CD688000
heap
page read and write
84615FE000
stack
page read and write
237CD690000
heap
page read and write
237CD69F000
heap
page read and write
16E4002C0000
trusted library allocation
page read and write
5D3000320000
trusted library allocation
page read and write
237CD690000
heap
page read and write
671000
unkown
page readonly
4170000
heap
page read and write
439D000
heap
page read and write
237CD690000
heap
page read and write
300000
heap
page read and write
D3F000
stack
page read and write
5D3000201000
trusted library allocation
page read and write
275802A34000
trusted library allocation
page read and write
275802F6C000
trusted library allocation
page read and write
237CD68C000
heap
page read and write
843A5EF000
stack
page read and write
237CD69F000
heap
page read and write
16E4002B0000
trusted library allocation
page read and write
275802EAC000
trusted library allocation
page read and write
237CA21E000
heap
page read and write
237CDB20000
trusted library section
page read and write
9C0000
heap
page read and write
41DD000
heap
page read and write
237D479E000
trusted library section
page read and write
84405FD000
stack
page read and write
237CD69F000
heap
page read and write
843EDFE000
unkown
page readonly
8465DFE000
unkown
page readonly
237CD68A000
heap
page read and write
845FDFE000
unkown
page readonly
275802BF0000
trusted library allocation
page read and write
5D300020C000
trusted library allocation
page read and write
237CD690000
heap
page read and write
237CD68F000
heap
page read and write
27580250C000
trusted library allocation
page read and write
40A1000
heap
page read and write
275802C90000
trusted library allocation
page read and write
2A2C0024C000
direct allocation
page read and write
4212000
heap
page read and write
16E400248000
trusted library allocation
page read and write
40A9000
heap
page read and write
8467DFE000
unkown
page readonly
4157000
heap
page read and write
237CD69F000
heap
page read and write
84445FA000
stack
page read and write
237CD688000
heap
page read and write
275802694000
trusted library allocation
page read and write
2758027C0000
trusted library allocation
page read and write
275802C34000
trusted library allocation
page read and write
237CD699000
heap
page read and write
2758023F8000
trusted library allocation
page read and write
237CD679000
heap
page read and write
237CA0D0000
heap
page readonly
237CD688000
heap
page read and write
84475FE000
stack
page read and write
5D30006EC000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
27580236C000
trusted library allocation
page read and write
2758026E0000
trusted library allocation
page read and write
237CD67C000
heap
page read and write
8F0000
heap
page read and write
27580307C000
trusted library allocation
page read and write
275802CC8000
trusted library allocation
page read and write
8449DFE000
unkown
page readonly
630000
heap
page read and write
275802D10000
trusted library allocation
page read and write
41F4000
heap
page read and write
5D30002B8000
trusted library allocation
page read and write
237CD650000
heap
page read and write
237CD690000
heap
page read and write
237CD699000
heap
page read and write
237CD679000
heap
page read and write
237CD68A000
heap
page read and write
661000
unkown
page execute read
237CA130000
heap
page read and write
5D300085C000
trusted library allocation
page read and write
40A4000
heap
page read and write
5D3000404000
trusted library allocation
page read and write
16E400274000
trusted library allocation
page read and write
275802A9C000
trusted library allocation
page read and write
237CA225000
heap
page read and write
40AC000
heap
page read and write
5D3000744000
trusted library allocation
page read and write
237CD697000
heap
page read and write
237D450D000
trusted library section
page read and write
237CD68A000
heap
page read and write
275802E01000
trusted library allocation
page read and write
422D000
heap
page read and write
275802F30000
trusted library allocation
page read and write
843F5FE000
stack
page read and write
237CD69F000
heap
page read and write
237CD688000
heap
page read and write
6C368000
unkown
page readonly
237D43B1000
trusted library section
page read and write
237CD69F000
heap
page read and write
237CD6BC000
heap
page read and write
5D3000614000
trusted library allocation
page read and write
237CA310000
heap
page read and write
1DA5000
heap
page read and write
275802DA8000
trusted library allocation
page read and write
84605FE000
stack
page read and write
4133000
heap
page read and write
275802FC0000
trusted library allocation
page read and write
237CBED0000
heap
page read and write
5D30002B0000
trusted library allocation
page read and write
2758031A4000
trusted library allocation
page read and write
2758030A0000
trusted library allocation
page read and write
237D2220000
trusted library allocation
page read and write
844E5FA000
stack
page read and write
16E4002C0000
trusted library allocation
page read and write
275803134000
trusted library allocation
page read and write
417E000
heap
page read and write
5D30006E8000
trusted library allocation
page read and write
2758023DC000
trusted library allocation
page read and write
84545FC000
stack
page read and write
5D30002D4000
trusted library allocation
page read and write
275802A6C000
trusted library allocation
page read and write
275802710000
trusted library allocation
page read and write
42D8000
heap
page read and write
8451DFE000
unkown
page readonly
275802D9C000
trusted library allocation
page read and write
5D300035C000
trusted library allocation
page read and write
237CD691000
heap
page read and write
5D300033C000
trusted library allocation
page read and write
237CA1D1000
heap
page read and write
275802778000
trusted library allocation
page read and write
40A0000
heap
page read and write
170000
heap
page read and write
5D3000408000
trusted library allocation
page read and write
8446DFE000
unkown
page readonly
275802F50000
trusted library allocation
page read and write
40A8000
heap
page read and write
237CD69F000
heap
page read and write
237CD69F000
heap
page read and write
43F2000
heap
page read and write
8450DFE000
unkown
page readonly
275802558000
trusted library allocation
page read and write
2758024C0000
trusted library allocation
page read and write
5D3000788000
trusted library allocation
page read and write
4157000
heap
page read and write
27580300C000
trusted library allocation
page read and write
5D30006FC000
trusted library allocation
page read and write
1DAF000
heap
page read and write
275802498000
trusted library allocation
page read and write
237CF8E2000
trusted library allocation
page read and write
237CD692000
heap
page read and write
237CDC79000
heap
page read and write
84455FB000
stack
page read and write
84695FE000
stack
page read and write
16E4002F0000
trusted library allocation
page read and write
16E400201000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
1D56000
heap
page read and write
237CD69F000
heap
page read and write
40A5000
heap
page read and write
237CD69F000
heap
page read and write
237CDBC0000
heap
page read and write
5D30006B0000
trusted library allocation
page read and write
5D3000734000
trusted library allocation
page read and write
237CC920000
unkown
page read and write
237CD699000
heap
page read and write
16E4002C0000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
92F000
stack
page read and write
84665FE000
stack
page read and write
275802538000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
2758024A4000
trusted library allocation
page read and write
5D3000374000
trusted library allocation
page read and write
8454DFE000
unkown
page readonly
40A3000
heap
page read and write
5D3000430000
trusted library allocation
page read and write
87C000
stack
page read and write
275803001000
trusted library allocation
page read and write
40A7000
heap
page read and write
5D3000770000
trusted library allocation
page read and write
860000
heap
page read and write
275802490000
trusted library allocation
page read and write
275802CF0000
trusted library allocation
page read and write
237CDC97000
heap
page read and write
3CCC000
heap
page read and write
237CD6A1000
heap
page read and write
3C61000
heap
page read and write
237CD69F000
heap
page read and write
275800201000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
5D3000630000
trusted library allocation
page read and write
237CA202000
heap
page read and write
5D30006B4000
trusted library allocation
page read and write
275802F0C000
trusted library allocation
page read and write
40A1000
heap
page read and write
3DA1000
heap
page read and write
2A2C00230000
direct allocation
page read and write
16E4002C8000
trusted library allocation
page read and write
237CDC95000
heap
page read and write
237CD690000
heap
page read and write
3F0000
heap
page read and write
27580242C000
trusted library allocation
page read and write
843D5FE000
stack
page read and write
8464DFE000
unkown
page readonly
237CDC49000
heap
page read and write
5D3000330000
trusted library allocation
page read and write
40A9000
heap
page read and write
237CD69F000
heap
page read and write
5D30006CC000
trusted library allocation
page read and write
2AC000
stack
page read and write
237CD69F000
heap
page read and write
8443DFE000
unkown
page readonly
423E000
heap
page read and write
84465FC000
stack
page read and write
275802FF8000
trusted library allocation
page read and write
27580294F000
trusted library allocation
page read and write
237CD6BC000
heap
page read and write
2A2C00201000
direct allocation
page read and write
237CD690000
heap
page read and write
237CD690000
heap
page read and write
275802CFC000
trusted library allocation
page read and write
2A2C00210000
direct allocation
page read and write
237CD6BC000
heap
page read and write
237CD69F000
heap
page read and write
237CD69F000
heap
page read and write
844ADFE000
unkown
page readonly
27580249A000
trusted library allocation
page read and write
5D30006AC000
trusted library allocation
page read and write
27580256C000
trusted library allocation
page read and write
237CD6BC000
heap
page read and write
275802498000
trusted library allocation
page read and write
2758026BC000
trusted library allocation
page read and write
27580304C000
trusted library allocation
page read and write
27580246C000
trusted library allocation
page read and write
237CD690000
heap
page read and write
2758028F5000
trusted library allocation
page read and write
237CD6A1000
heap
page read and write
661000
unkown
page execute read
237CD690000
heap
page read and write
2758024B4000
trusted library allocation
page read and write
5D3000220000
trusted library allocation
page read and write
237CD6A3000
heap
page read and write
16E4002A0000
trusted library allocation
page read and write
41BA000
heap
page read and write
237CD690000
heap
page read and write
237D43A0000
trusted library section
page read and write
237CD690000
heap
page read and write
84575FD000
stack
page read and write
41C7000
heap
page read and write
275803124000
trusted library allocation
page read and write
2758029B0000
trusted library allocation
page read and write
237CD6AB000
heap
page read and write
275802494000
trusted library allocation
page read and write
27580241C000
trusted library allocation
page read and write
3EA1000
heap
page read and write
671000
unkown
page readonly
2758026EC000
trusted library allocation
page read and write
237CBEB0000
heap
page read and write
40A4000
heap
page read and write
275802C0C000
trusted library allocation
page read and write
237CA212000
heap
page read and write
275803041000
trusted library allocation
page read and write
2758023D4000
trusted library allocation
page read and write
237CDBB0000
heap
page read and write
237CD69F000
heap
page read and write
237CD688000
heap
page read and write
661000
unkown
page execute read
42B7000
heap
page read and write
275802698000
trusted library allocation
page read and write
237CD688000
heap
page read and write
237CDAD0000
trusted library section
page read and write
237CD684000
heap
page read and write
275802C24000
trusted library allocation
page read and write
275802ED4000
trusted library allocation
page read and write
275802410000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
5D3000348000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
237CD68A000
heap
page read and write
275800A01000
trusted library allocation
page read and write
40A7000
heap
page read and write
237CD69F000
heap
page read and write
8455DFE000
unkown
page readonly
275803168000
trusted library allocation
page read and write
5D3000238000
trusted library allocation
page read and write
237CD686000
heap
page read and write
8463DFE000
unkown
page readonly
237CD69F000
heap
page read and write
5D3000610000
trusted library allocation
page read and write
275802538000
trusted library allocation
page read and write
84675FE000
stack
page read and write
16E400220000
trusted library allocation
page read and write
1DA6000
heap
page read and write
237CD69F000
heap
page read and write
237D43DE000
trusted library section
page read and write
237CD69F000
heap
page read and write
5D30006E0000
trusted library allocation
page read and write
275803024000
trusted library allocation
page read and write
27580257C000
trusted library allocation
page read and write
671000
unkown
page readonly
6A8000
heap
page read and write
275802524000
trusted library allocation
page read and write
5D3000684000
trusted library allocation
page read and write
237CD688000
heap
page read and write
1335000
unkown
page write copy
275802601000
trusted library allocation
page read and write
2758029A1000
trusted library allocation
page read and write
275802A01000
trusted library allocation
page read and write
2758030F4000
trusted library allocation
page read and write
15B0000
heap
page read and write
237CD690000
heap
page read and write
237CD69F000
heap
page read and write
237CD68A000
heap
page read and write
5D3000784000
trusted library allocation
page read and write
275803170000
trusted library allocation
page read and write
5D3000678000
trusted library allocation
page read and write
275802C18000
trusted library allocation
page read and write
237CD677000
heap
page read and write
275802328000
trusted library allocation
page read and write
2758030CC000
trusted library allocation
page read and write
845ADFE000
unkown
page readonly
275802240000
trusted library allocation
page read and write
237CDC99000
heap
page read and write
6A0000
heap
page read and write
844B5FD000
stack
page read and write
661000
unkown
page execute read
237CD69F000
heap
page read and write
237CD677000
heap
page read and write
1D49000
heap
page read and write
237CDC3C000
heap
page read and write
275802E2C000
trusted library allocation
page read and write
237CD688000
heap
page read and write
237D3870000
heap
page read and write
237CD69F000
heap
page read and write
8457DFE000
unkown
page readonly
660000
unkown
page readonly
237CD69F000
heap
page read and write
275802424000
trusted library allocation
page read and write
237CD688000
heap
page read and write
237D4431000
trusted library section
page read and write
237CD68A000
heap
page read and write
275802884000
trusted library allocation
page read and write
844D5FE000
stack
page read and write
275802430000
trusted library allocation
page read and write
237CD699000
heap
page read and write
84515FD000
stack
page read and write
8469DFE000
unkown
page readonly
275803088000
trusted library allocation
page read and write
40A4000
heap
page read and write
40A2000
heap
page read and write
237CD690000
heap
page read and write
237CD68D000
heap
page read and write
6C241000
unkown
page execute read
42DA000
heap
page read and write
237CD690000
heap
page read and write
844EDFE000
unkown
page readonly
275802900000
trusted library allocation
page read and write
237CDC6C000
heap
page read and write
2758031D8000
trusted library allocation
page read and write
16E4002F8000
trusted library allocation
page read and write
2A2C00270000
direct allocation
page read and write
40A1000
heap
page read and write
600000
heap
page read and write
5D3000310000
trusted library allocation
page read and write
11C000
stack
page read and write
16E400230000
trusted library allocation
page read and write
5D3000248000
trusted library allocation
page read and write
40A1000
heap
page read and write
5D3000654000
trusted library allocation
page read and write
5D300080C000
trusted library allocation
page read and write
2758030D0000
trusted library allocation
page read and write
237CD694000
heap
page read and write
2758026F8000
trusted library allocation
page read and write
2758024A8000
trusted library allocation
page read and write
27580281C000
trusted library allocation
page read and write
3DA1000
heap
page read and write
40A0000
heap
page read and write
275802FE8000
trusted library allocation
page read and write
275802428000
trusted library allocation
page read and write
845DDFE000
unkown
page readonly
237D3F90000
trusted library section
page read and write
237CD69F000
heap
page read and write
275802798000
trusted library allocation
page read and write
2758023D8000
trusted library allocation
page read and write
275803024000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
237CD690000
heap
page read and write
237CDC8F000
heap
page read and write
237CD69F000
heap
page read and write
237CA138000
heap
page read and write
844BDFE000
unkown
page readonly
275800E01000
trusted library allocation
page read and write
5D3000730000
trusted library allocation
page read and write
5D3000320000
trusted library allocation
page read and write
275802E7D000
trusted library allocation
page read and write
275802420000
trusted library allocation
page read and write
237CA110000
heap
page read and write
60A000
heap
page read and write
13FC000
stack
page read and write
2758025A4000
trusted library allocation
page read and write
2758023E0000
trusted library allocation
page read and write
237CD690000
heap
page read and write
40A8000
heap
page read and write
237CD68A000
heap
page read and write
2A2C00280000
direct allocation
page read and write
843BDFE000
unkown
page readonly
27580294C000
trusted library allocation
page read and write
275802268000
trusted library allocation
page read and write
237CD688000
heap
page read and write
5FC000
stack
page read and write
275802AF8000
trusted library allocation
page read and write
1DAB000
heap
page read and write
2758030C8000
trusted library allocation
page read and write
1DC3000
heap
page read and write
275802FE0000
trusted library allocation
page read and write
5D3000320000
trusted library allocation
page read and write
845F5FD000
stack
page read and write
237CA1CD000
heap
page read and write
1D44000
heap
page read and write
66E000
unkown
page read and write
5D30006D0000
trusted library allocation
page read and write
40A7000
heap
page read and write
5D30006E4000
trusted library allocation
page read and write
661000
unkown
page execute read
237D42C7000
unclassified section
page read and write
237CD69F000
heap
page read and write
43B6000
heap
page read and write
237CD69F000
heap
page read and write
237CD688000
heap
page read and write
275803198000
trusted library allocation
page read and write
275802A84000
trusted library allocation
page read and write
2758023AC000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
F90000
heap
page read and write
84505FB000
stack
page read and write
237CD68A000
heap
page read and write
237D4502000
trusted library section
page read and write
880000
heap
page read and write
275802540000
trusted library allocation
page read and write
40AA000
heap
page read and write
237CD692000
heap
page read and write
275802788000
trusted library allocation
page read and write
2758029C0000
trusted library allocation
page read and write
66E000
unkown
page write copy
275803094000
trusted library allocation
page read and write
2A2C0023C000
direct allocation
page read and write
5D3000390000
trusted library allocation
page read and write
5D3000380000
trusted library allocation
page read and write
16E4002BC000
trusted library allocation
page read and write
5D3000714000
trusted library allocation
page read and write
5D30002CC000
trusted library allocation
page read and write
237CD690000
heap
page read and write
16E400270000
trusted library allocation
page read and write
237D43C0000
trusted library section
page read and write
5D300040C000
trusted library allocation
page read and write
2A2C002AC000
direct allocation
page read and write
84415FB000
stack
page read and write
237CD69F000
heap
page read and write
40A5000
heap
page read and write
237CD690000
heap
page read and write
1DA0000
heap
page read and write
237D37A7000
unclassified section
page read and write
275802401000
trusted library allocation
page read and write
237CD688000
heap
page read and write
237CD688000
heap
page read and write
4136000
heap
page read and write
275802E1C000
trusted library allocation
page read and write
843E5FE000
stack
page read and write
237CD67C000
heap
page read and write
2758024B4000
trusted library allocation
page read and write
237D459E000
trusted library section
page read and write
8447DFE000
unkown
page readonly
66A000
unkown
page readonly
275802709000
trusted library allocation
page read and write
414B000
heap
page read and write
237CD69F000
heap
page read and write
27580252C000
trusted library allocation
page read and write
2758023C4000
trusted library allocation
page read and write
8441DFE000
unkown
page readonly
720000
heap
page read and write
5D3000250000
trusted library allocation
page read and write
237CA2D0000
trusted library section
page readonly
843FDFE000
unkown
page readonly
8442DFE000
unkown
page readonly
275800601000
trusted library allocation
page read and write
27580283C000
trusted library allocation
page read and write
845A5FE000
stack
page read and write
66E000
unkown
page write copy
1D4F000
heap
page read and write
5D3000688000
trusted library allocation
page read and write
237CDBE0000
heap
page read and write
11DC000
unkown
page write copy
16E4002BC000
trusted library allocation
page read and write
275802938000
trusted library allocation
page read and write
275802D88000
trusted library allocation
page read and write
5D3000401000
trusted library allocation
page read and write
84585FB000
stack
page read and write
275802BDC000
trusted library allocation
page read and write
27580257C000
trusted library allocation
page read and write
164A000
heap
page read and write
2758023AC000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
2758026A0000
trusted library allocation
page read and write
2BA0000
heap
page read and write
275802AEC000
trusted library allocation
page read and write
237CD690000
heap
page read and write
2A2C00220000
direct allocation
page read and write
275802218000
trusted library allocation
page read and write
1DC1000
heap
page read and write
5D300060C000
trusted library allocation
page read and write
275800C01000
trusted library allocation
page read and write
275802F28000
trusted library allocation
page read and write
275802D70000
trusted library allocation
page read and write
237CD688000
heap
page read and write
1DC1000
heap
page read and write
275802EA8000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
5F6F000
heap
page read and write
237D4790000
trusted library section
page read and write
4294000
heap
page read and write
16E4002A0000
trusted library allocation
page read and write
5D3000288000
trusted library allocation
page read and write
237CD6A1000
heap
page read and write
8452DFE000
unkown
page readonly
237CD692000
heap
page read and write
84635FE000
stack
page read and write
275802494000
trusted library allocation
page read and write
275802CB8000
trusted library allocation
page read and write
2758030BC000
trusted library allocation
page read and write
275802C01000
trusted library allocation
page read and write
5D300027C000
trusted library allocation
page read and write
2758028E4000
trusted library allocation
page read and write
5D3000754000
trusted library allocation
page read and write
237CD698000
heap
page read and write
660000
unkown
page readonly
237CD690000
heap
page read and write
845EDFE000
unkown
page readonly
237CD69F000
heap
page read and write
27580260C000
trusted library allocation
page read and write
16E4002F4000
trusted library allocation
page read and write
40A1000
heap
page read and write
275802418000
trusted library allocation
page read and write
27580305D000
trusted library allocation
page read and write
275802EC8000
trusted library allocation
page read and write
D70000
unkown
page readonly
40AD000
heap
page read and write
237CD688000
heap
page read and write
237CD69F000
heap
page read and write
41E6000
heap
page read and write
27580238C000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
6C369000
unkown
page read and write
275802890000
trusted library allocation
page read and write
237CD6A1000
heap
page read and write
237CD699000
heap
page read and write
237CD69F000
heap
page read and write
275802EAC000
trusted library allocation
page read and write
844DDFE000
unkown
page readonly
275802EEC000
trusted library allocation
page read and write
16E4002BC000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
2A2C00215000
direct allocation
page read and write
415A000
heap
page read and write
27580301C000
trusted library allocation
page read and write
2758022FC000
trusted library allocation
page read and write
275802ED4000
trusted library allocation
page read and write
275800801000
trusted library allocation
page read and write
237CD690000
heap
page read and write
2758023F4000
trusted library allocation
page read and write
66A000
unkown
page readonly
2758024E0000
trusted library allocation
page read and write
84655FC000
stack
page read and write
237CD69B000
heap
page read and write
41DE000
heap
page read and write
845B5FB000
stack
page read and write
237CDC3E000
heap
page read and write
275802705000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
F2C000
stack
page read and write
275802918000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
2A2C002D0000
direct allocation
page read and write
8466DFE000
unkown
page readonly
237CD679000
heap
page read and write
16E4002D8000
trusted library allocation
page read and write
237CD690000
heap
page read and write
2758023AC000
trusted library allocation
page read and write
671000
unkown
page readonly
422A000
heap
page read and write
237CD688000
heap
page read and write
275802BD0000
trusted library allocation
page read and write
E437000
heap
page read and write
40A1000
heap
page read and write
671000
unkown
page readonly
5D30006C8000
trusted library allocation
page read and write
237CD6BC000
heap
page read and write
671000
unkown
page readonly
275803140000
trusted library allocation
page read and write
5D30002ED000
trusted library allocation
page read and write
1D51000
heap
page read and write
275802CE4000
trusted library allocation
page read and write
237CD69F000
heap
page read and write
237D4420000
trusted library section
page read and write
2A2C00250000
direct allocation
page read and write
237CD69F000
heap
page read and write
2758022B4000
trusted library allocation
page read and write
2A2C00234000
direct allocation
page read and write
16E400250000
trusted library allocation
page read and write
275802ED4000
trusted library allocation
page read and write
2758029F8000
trusted library allocation
page read and write
275802F18000
trusted library allocation
page read and write
275802500000
trusted library allocation
page read and write
237CD68A000
heap
page read and write
237CD68A000
heap
page read and write
844FDFE000
unkown
page readonly
27580240C000
trusted library allocation
page read and write
40A4000
heap
page read and write
27580252C000
trusted library allocation
page read and write
237D44E6000
trusted library section
page read and write
5D3000644000
trusted library allocation
page read and write
237CD692000
heap
page read and write
237CD688000
heap
page read and write
237CD69F000
heap
page read and write
5D3000624000
trusted library allocation
page read and write
5D300078C000
trusted library allocation
page read and write
237D1FE0000
heap
page read and write
5D300025C000
trusted library allocation
page read and write
27580240C000
trusted library allocation
page read and write
237CD6A1000
heap
page read and write
427E000
heap
page read and write
275802AAC000
trusted library allocation
page read and write
237CD688000
heap
page read and write
275802D80000
trusted library allocation
page read and write
1FE000
stack
page read and write
6C240000
unkown
page readonly
27580228C000
trusted library allocation
page read and write
2758022A8000
trusted library allocation
page read and write
There are 1102 hidden memdumps, click here to show them.