IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_ad8e99f4-1128-4a88-8ad8-b8de07056b8d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E04.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 13:29:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FDA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2039.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2284,i,475624526408043289,8302134231628123447,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 1140

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collections?rt=b--time-ticks-at-unix-epoc
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
https://docs.google.com/presentation/installwebapp?usp=chrome_defaultouch
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
https://chrome.google.cou
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{cbc6138a-9087-0225-dcbf-bcecff3af89f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6C50000
direct allocation
page read and write
76DC000
heap
page read and write
4D7C00210000
trusted library allocation
page read and write
3EAC00274000
trusted library allocation
page read and write
7644000
heap
page read and write
4D7C0069C000
trusted library allocation
page read and write
196DC471000
trusted library section
page read and write
196D5629000
heap
page read and write
181400DCC000
trusted library allocation
page read and write
196D5608000
heap
page read and write
196D5610000
heap
page read and write
196D5608000
heap
page read and write
7643000
heap
page read and write
18140098C000
trusted library allocation
page read and write
764E000
heap
page read and write
196DC503000
trusted library section
page read and write
196D55FD000
heap
page read and write
6C61000
heap
page read and write
77F6000
heap
page read and write
181400D18000
trusted library allocation
page read and write
196D5608000
heap
page read and write
196D561A000
heap
page read and write
196D5618000
heap
page read and write
196D5605000
heap
page read and write
7370000
direct allocation
page execute and read and write
196D5618000
heap
page read and write
8E1DDFE000
stack
page read and write
181400EB0000
trusted library allocation
page read and write
8E3B5FE000
unkown
page readonly
181400338000
trusted library allocation
page read and write
196D561E000
heap
page read and write
196D5616000
heap
page read and write
7646000
heap
page read and write
181400F68000
trusted library allocation
page read and write
4D7C007CC000
trusted library allocation
page read and write
3EAC002C0000
trusted library allocation
page read and write
196D5AE0000
heap
page read and write
3EAC002BC000
trusted library allocation
page read and write
7754000
heap
page read and write
8E3ADFA000
stack
page read and write
196D5B75000
heap
page read and write
1814007F4000
trusted library allocation
page read and write
196D5605000
heap
page read and write
181400C7C000
trusted library allocation
page read and write
181400C60000
trusted library allocation
page read and write
2BF000284000
direct allocation
page read and write
6C1AD000
unkown
page read and write
196D5616000
heap
page read and write
8E2EDFD000
stack
page read and write
196D5B1D000
heap
page read and write
2BF000294000
direct allocation
page read and write
6C61000
heap
page read and write
764F000
heap
page read and write
6C61000
heap
page read and write
60A000
unkown
page readonly
181400064000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5616000
heap
page read and write
181400E01000
trusted library allocation
page read and write
7370000
direct allocation
page execute and read and write
4D7C006D0000
trusted library allocation
page read and write
181400C38000
trusted library allocation
page read and write
196D212B000
heap
page read and write
6C61000
heap
page read and write
196D5616000
heap
page read and write
1814009D4000
trusted library allocation
page read and write
196D5600000
heap
page read and write
6C50000
direct allocation
page read and write
77CC000
heap
page read and write
611000
unkown
page readonly
196D5605000
heap
page read and write
196D5608000
heap
page read and write
7735000
heap
page read and write
196D5616000
heap
page read and write
1814001D4000
trusted library allocation
page read and write
196D5616000
heap
page read and write
181400888000
trusted library allocation
page read and write
1D68000
heap
page read and write
4D7C00418000
trusted library allocation
page read and write
6C50000
direct allocation
page read and write
196D5605000
heap
page read and write
775A000
heap
page read and write
196D561A000
heap
page read and write
196DC4D0000
trusted library section
page read and write
181400CA4000
trusted library allocation
page read and write
1814002D0000
trusted library allocation
page read and write
196D5623000
heap
page read and write
181400230000
trusted library allocation
page read and write
196D5608000
heap
page read and write
196D5A60000
trusted library section
page read and write
6C61000
heap
page read and write
181400B68000
trusted library allocation
page read and write
181400E44000
trusted library allocation
page read and write
601000
unkown
page execute read
4D7C00614000
trusted library allocation
page read and write
196D1FD0000
heap
page read and write
4D7C00630000
trusted library allocation
page read and write
3EAC002F0000
trusted library allocation
page read and write
196D5618000
heap
page read and write
8E31DFE000
stack
page read and write
196D5600000
heap
page read and write
6C61000
heap
page read and write
6C61000
heap
page read and write
8E1D5FE000
unkown
page readonly
196D5616000
heap
page read and write
196D5620000
heap
page read and write
196D5605000
heap
page read and write
196D5610000
heap
page read and write
296A000
heap
page read and write
196D55E0000
heap
page read and write
7640000
heap
page read and write
196D5605000
heap
page read and write
8E2C5FE000
unkown
page readonly
181400AF8000
trusted library allocation
page read and write
181400CA8000
trusted library allocation
page read and write
196D5613000
heap
page read and write
1814001E4000
trusted library allocation
page read and write
6C61000
heap
page read and write
1814000A0000
trusted library allocation
page read and write
18140037C000
trusted library allocation
page read and write
196D5617000
heap
page read and write
4D7C00668000
trusted library allocation
page read and write
1814003DC000
trusted library allocation
page read and write
196DC49E000
trusted library section
page read and write
181400CE0000
trusted library allocation
page read and write
196D5616000
heap
page read and write
600000
unkown
page readonly
3EAC002B0000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5600000
heap
page read and write
196D9AD4000
trusted library allocation
page read and write
181400D48000
trusted library allocation
page read and write
8E37DFE000
stack
page read and write
196D561E000
heap
page read and write
181400BC8000
trusted library allocation
page read and write
4D7C006B8000
trusted library allocation
page read and write
196D5622000
heap
page read and write
D40000
unkown
page readonly
6C0D0000
unkown
page readonly
181400E50000
trusted library allocation
page read and write
4D7C00664000
trusted library allocation
page read and write
196D59F0000
trusted library section
page read and write
196D561E000
heap
page read and write
8E1EDFE000
stack
page read and write
4D7C00698000
trusted library allocation
page read and write
196D5618000
heap
page read and write
181400300000
trusted library allocation
page read and write
196D5616000
heap
page read and write
8E12DFE000
stack
page read and write
8E315FE000
unkown
page readonly
784D000
heap
page read and write
18140009E000
trusted library allocation
page read and write
6C61000
heap
page read and write
8E345FE000
unkown
page readonly
196D5622000
heap
page read and write
4D7C00700000
trusted library allocation
page read and write
181400554000
trusted library allocation
page read and write
196D5608000
heap
page read and write
8E335FE000
unkown
page readonly
77A8000
heap
page read and write
196D561E000
heap
page read and write
181400EA8000
trusted library allocation
page read and write
7645000
heap
page read and write
196D2000000
trusted library allocation
page read and write
196D5610000
heap
page read and write
196D20DF000
heap
page read and write
76E7000
heap
page read and write
196D5605000
heap
page read and write
196D5610000
heap
page read and write
196D5B1B000
heap
page read and write
18140080C000
trusted library allocation
page read and write
6C61000
heap
page read and write
4D7C00718000
trusted library allocation
page read and write
1814002C0000
trusted library allocation
page read and write
77E9000
heap
page read and write
600000
unkown
page readonly
8E40DFE000
stack
page read and write
196D5608000
heap
page read and write
76E4000
heap
page read and write
181400E80000
trusted library allocation
page read and write
7645000
heap
page read and write
8E2F5FE000
unkown
page readonly
8E22DFE000
stack
page read and write
6C61000
heap
page read and write
196DC4E0000
trusted library section
page read and write
181400944000
trusted library allocation
page read and write
196D561E000
heap
page read and write
2BF000215000
direct allocation
page read and write
196D561E000
heap
page read and write
196D561E000
heap
page read and write
196D5618000
heap
page read and write
181400D70000
trusted library allocation
page read and write
2BF0002E4000
direct allocation
page read and write
196D5608000
heap
page read and write
76A2000
direct allocation
page read and write
181400F20000
trusted library allocation
page read and write
3EAC00270000
trusted library allocation
page read and write
196D55F6000
heap
page read and write
196D5605000
heap
page read and write
6C61000
heap
page read and write
2BF000201000
direct allocation
page read and write
8E325FE000
unkown
page readonly
1B74000
heap
page read and write
196D5608000
heap
page read and write
3EAC002A0000
trusted library allocation
page read and write
7640000
heap
page read and write
8E395FE000
unkown
page readonly
76E6000
heap
page read and write
181400194000
trusted library allocation
page read and write
181400F80000
trusted library allocation
page read and write
196D5AE8000
heap
page read and write
1814006DC000
trusted library allocation
page read and write
196D5616000
heap
page read and write
1814002A4000
trusted library allocation
page read and write
196D5610000
heap
page read and write
196D561E000
heap
page read and write
181400214000
trusted library allocation
page read and write
196D5610000
heap
page read and write
6C61000
heap
page read and write
8E2FDFD000
stack
page read and write
196D5610000
heap
page read and write
181400A44000
trusted library allocation
page read and write
196D3F20000
heap
page read and write
196D5618000
heap
page read and write
196D5616000
heap
page read and write
181400840000
trusted library allocation
page read and write
6C61000
heap
page read and write
7737000
heap
page read and write
1814001F4000
trusted library allocation
page read and write
196D5618000
heap
page read and write
196D5608000
heap
page read and write
196D55FB000
heap
page read and write
4D7C0075C000
trusted library allocation
page read and write
2BF000210000
direct allocation
page read and write
9FC000
stack
page read and write
196D5608000
heap
page read and write
4D7C003EC000
trusted library allocation
page read and write
60A000
unkown
page readonly
196D5610000
heap
page read and write
181400338000
trusted library allocation
page read and write
196D5610000
heap
page read and write
18140021C000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5600000
heap
page read and write
181400318000
trusted library allocation
page read and write
196D55FB000
heap
page read and write
196D561E000
heap
page read and write
196D5608000
heap
page read and write
181400CF8000
trusted library allocation
page read and write
4D7C006C8000
trusted library allocation
page read and write
8E1B5FE000
unkown
page readonly
181400F04000
trusted library allocation
page read and write
196D5616000
heap
page read and write
8E19DFE000
stack
page read and write
196D5610000
heap
page read and write
8E3A5FE000
unkown
page readonly
7370000
direct allocation
page execute and read and write
2BF00020C000
direct allocation
page read and write
196D5608000
heap
page read and write
181400504000
trusted library allocation
page read and write
196D563A000
heap
page read and write
60E000
unkown
page read and write
196D5616000
heap
page read and write
4D7C00694000
trusted library allocation
page read and write
196D1F90000
heap
page readonly
1B74000
heap
page read and write
2BF0002EC000
direct allocation
page read and write
181400E0C000
trusted library allocation
page read and write
1814002AA000
trusted library allocation
page read and write
181400C55000
trusted library allocation
page read and write
4D7C00320000
trusted library allocation
page read and write
8E26DFC000
stack
page read and write
181400454000
trusted library allocation
page read and write
196D5610000
heap
page read and write
196DBC00000
trusted library section
page read and write
181400824000
trusted library allocation
page read and write
196D5B8A000
heap
page read and write
7787000
heap
page read and write
196D2113000
heap
page read and write
101E000
heap
page read and write
8E33DFD000
stack
page read and write
3EAC00235000
trusted library allocation
page read and write
77AD000
heap
page read and write
3EAC00264000
trusted library allocation
page read and write
8E375FE000
unkown
page readonly
2BF000230000
direct allocation
page read and write
181400CA4000
trusted library allocation
page read and write
1814002E0000
trusted library allocation
page read and write
196D5618000
heap
page read and write
8E29DFB000
stack
page read and write
1B74000
heap
page read and write
1814008F0000
trusted library allocation
page read and write
181400A0C000
trusted library allocation
page read and write
4D7C00248000
trusted library allocation
page read and write
4D7C006E4000
trusted library allocation
page read and write
181400F9C000
trusted library allocation
page read and write
181400338000
trusted library allocation
page read and write
1B74000
heap
page read and write
196D5610000
heap
page read and write
18140027C000
trusted library allocation
page read and write
196D2240000
trusted library section
page readonly
181400CF0000
trusted library allocation
page read and write
CA0000
heap
page read and write
181400F10000
trusted library allocation
page read and write
196D563A000
heap
page read and write
7370000
direct allocation
page execute and read and write
196D5616000
heap
page read and write
196D5610000
heap
page read and write
196D5605000
heap
page read and write
181400300000
trusted library allocation
page read and write
778D000
heap
page read and write
196D5610000
heap
page read and write
2BF000280000
direct allocation
page read and write
8E1C5FE000
unkown
page readonly
181400444000
trusted library allocation
page read and write
6C50000
direct allocation
page read and write
8E3BDFE000
stack
page read and write
8E15DFE000
stack
page read and write
181400CF8000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5605000
heap
page read and write
181400ED0000
trusted library allocation
page read and write
770000
heap
page read and write
196D5B13000
heap
page read and write
7645000
heap
page read and write
14D0000
heap
page read and write
181400E8C000
trusted library allocation
page read and write
8E2D5FE000
unkown
page readonly
181400BA4000
trusted library allocation
page read and write
1814004E4000
trusted library allocation
page read and write
6C61000
heap
page read and write
8E10DEF000
stack
page read and write
4D7C0027C000
trusted library allocation
page read and write
181400904000
trusted library allocation
page read and write
196D5610000
heap
page read and write
8E30DFB000
stack
page read and write
196D561E000
heap
page read and write
196D5600000
heap
page read and write
1814002AA000
trusted library allocation
page read and write
181400AEB000
trusted library allocation
page read and write
70F0000
direct allocation
page read and write
196D9220000
trusted library allocation
page read and write
181400C50000
trusted library allocation
page read and write
196D561E000
heap
page read and write
4D7C00724000
trusted library allocation
page read and write
76DF000
heap
page read and write
196D5610000
heap
page read and write
130F000
stack
page read and write
181400B7C000
trusted library allocation
page read and write
196DC5A6000
trusted library section
page read and write
196D5616000
heap
page read and write
181400CF0000
trusted library allocation
page read and write
196D5616000
heap
page read and write
4D7C006E0000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5CB0000
trusted library section
page read and write
2B30000
heap
page read and write
196D5618000
heap
page read and write
1814001F8000
trusted library allocation
page read and write
196D5605000
heap
page read and write
80A9000
heap
page read and write
18140030C000
trusted library allocation
page read and write
181400E24000
trusted library allocation
page read and write
8E21DFA000
stack
page read and write
1814002B4000
trusted library allocation
page read and write
196D5616000
heap
page read and write
18140032C000
trusted library allocation
page read and write
7646000
heap
page read and write
196D5610000
heap
page read and write
6C61000
heap
page read and write
181400A44000
trusted library allocation
page read and write
181400690000
trusted library allocation
page read and write
4D7C0035C000
trusted library allocation
page read and write
196D5AE4000
heap
page read and write
796F000
heap
page read and write
4D7C006CC000
trusted library allocation
page read and write
6C1FC000
unkown
page readonly
18140020C000
trusted library allocation
page read and write
1814006C8000
trusted library allocation
page read and write
196D5605000
heap
page read and write
196D5616000
heap
page read and write
196D561E000
heap
page read and write
196D561E000
heap
page read and write
4D7C0035C000
trusted library allocation
page read and write
18140074C000
trusted library allocation
page read and write
196D5605000
heap
page read and write
8E17DFB000
stack
page read and write
196D5610000
heap
page read and write
6C61000
heap
page read and write
196D5605000
heap
page read and write
196D9012000
heap
page read and write
8E27DFC000
stack
page read and write
18140030C000
trusted library allocation
page read and write
196D560D000
heap
page read and write
196D5605000
heap
page read and write
196D561E000
heap
page read and write
196D5610000
heap
page read and write
196D561E000
heap
page read and write
196D562B000
heap
page read and write
8E3F5FE000
unkown
page readonly
4D7C006B0000
trusted library allocation
page read and write
196D5B4C000
heap
page read and write
7788000
heap
page read and write
196D5610000
heap
page read and write
1814002A4000
trusted library allocation
page read and write
28DF000
unkown
page read and write
8E145FE000
unkown
page readonly
7370000
direct allocation
page execute and read and write
795C000
heap
page read and write
181400074000
trusted library allocation
page read and write
196D5608000
heap
page read and write
3EAC002A0000
trusted library allocation
page read and write
181400910000
trusted library allocation
page read and write
196D561E000
heap
page read and write
3EAC002BC000
trusted library allocation
page read and write
196D5612000
heap
page read and write
6C50000
direct allocation
page read and write
1814001B4000
trusted library allocation
page read and write
181400B74000
trusted library allocation
page read and write
196D55FB000
heap
page read and write
196D5616000
heap
page read and write
289E000
unkown
page read and write
196D5610000
heap
page read and write
196D5605000
heap
page read and write
196D5D47000
unclassified section
page read and write
1814001DC000
trusted library allocation
page read and write
3EAC002BC000
trusted library allocation
page read and write
196D560D000
heap
page read and write
4D7C00620000
trusted library allocation
page read and write
8E3FDFE000
stack
page read and write
196D5618000
heap
page read and write
77BF000
heap
page read and write
4D7C0033C000
trusted library allocation
page read and write
196D5617000
heap
page read and write
1814006A0000
trusted library allocation
page read and write
18140079E000
trusted library allocation
page read and write
196D5616000
heap
page read and write
181400F64000
trusted library allocation
page read and write
2BF000290000
direct allocation
page read and write
181400201000
trusted library allocation
page read and write
8E405FE000
unkown
page readonly
6C61000
heap
page read and write
196D8FE0000
heap
page read and write
196D5610000
heap
page read and write
181400DA8000
trusted library allocation
page read and write
196D561E000
heap
page read and write
6C61000
heap
page read and write
196D5618000
heap
page read and write
1814007A8000
trusted library allocation
page read and write
8E3EDFE000
stack
page read and write
181400728000
trusted library allocation
page read and write
1814001EC000
trusted library allocation
page read and write
196D5618000
heap
page read and write
1814006B0000
trusted library allocation
page read and write
789E000
heap
page read and write
196D5607000
heap
page read and write
196D5605000
heap
page read and write
780B000
heap
page read and write
196D5605000
heap
page read and write
181400E6B000
trusted library allocation
page read and write
7649000
heap
page read and write
196D5616000
heap
page read and write
181400340000
trusted library allocation
page read and write
3EAC00294000
trusted library allocation
page read and write
181400ABC000
trusted library allocation
page read and write
7640000
heap
page read and write
601000
unkown
page execute read
7340000
direct allocation
page execute and read and write
8E3CDFC000
stack
page read and write
7641000
heap
page read and write
D41000
unkown
page execute and write copy
196D5B27000
heap
page read and write
18140022C000
trusted library allocation
page read and write
196D5610000
heap
page read and write
4D7C006EC000
trusted library allocation
page read and write
181400218000
trusted library allocation
page read and write
4D7C00784000
trusted library allocation
page read and write
7640000
heap
page read and write
8E245FE000
unkown
page readonly
1B74000
heap
page read and write
611000
unkown
page readonly
196D5616000
heap
page read and write
6C50000
direct allocation
page read and write
196D5608000
heap
page read and write
1814002F0000
trusted library allocation
page read and write
2BF000260000
direct allocation
page read and write
8E125FE000
unkown
page readonly
787B000
heap
page read and write
181400128000
trusted library allocation
page read and write
3EAC002B0000
trusted library allocation
page read and write
196D5B65000
heap
page read and write
3EAC002C8000
trusted library allocation
page read and write
6F0000
heap
page read and write
60E000
unkown
page write copy
196D5610000
heap
page read and write
196D5616000
heap
page read and write
181400E44000
trusted library allocation
page read and write
79C9000
heap
page read and write
4D7C00424000
trusted library allocation
page read and write
7649000
heap
page read and write
181400980000
trusted library allocation
page read and write
196D5616000
heap
page read and write
18140063C000
trusted library allocation
page read and write
196D5618000
heap
page read and write
764F000
heap
page read and write
196D5608000
heap
page read and write
4D7C00230000
trusted library allocation
page read and write
196D5618000
heap
page read and write
8E36DFE000
stack
page read and write
3EAC002E4000
trusted library allocation
page read and write
18140018C000
trusted library allocation
page read and write
1814008B4000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5605000
heap
page read and write
196D5608000
heap
page read and write
181400838000
trusted library allocation
page read and write
196D2295000
heap
page read and write
4D7C00310000
trusted library allocation
page read and write
196D5610000
heap
page read and write
70F0000
direct allocation
page read and write
1814004A4000
trusted library allocation
page read and write
1814001E8000
trusted library allocation
page read and write
181400B68000
trusted library allocation
page read and write
3EAC002BC000
trusted library allocation
page read and write
CA7000
heap
page read and write
196DC492000
trusted library section
page read and write
181400E28000
trusted library allocation
page read and write
196D5605000
heap
page read and write
196D5616000
heap
page read and write
4D7C00714000
trusted library allocation
page read and write
196D900E000
heap
page read and write
196D5618000
heap
page read and write
2BF0002AC000
direct allocation
page read and write
6C61000
heap
page read and write
1814006F8000
trusted library allocation
page read and write
181400770000
trusted library allocation
page read and write
4D7C00238000
trusted library allocation
page read and write
181400001000
trusted library allocation
page read and write
196D560B000
heap
page read and write
1814004DC000
trusted library allocation
page read and write
181400EAC000
trusted library allocation
page read and write
1B74000
heap
page read and write
6C61000
heap
page read and write
8E2BDFB000
stack
page read and write
7649000
heap
page read and write
196D5616000
heap
page read and write
2BF000270000
direct allocation
page read and write
7645000
heap
page read and write
181400A28000
trusted library allocation
page read and write
196D1FF0000
trusted library allocation
page read and write
196D5BA6000
heap
page read and write
181400AC4000
trusted library allocation
page read and write
196D5618000
heap
page read and write
4D7C00248000
trusted library allocation
page read and write
6C61000
heap
page read and write
1814004A4000
trusted library allocation
page read and write
196D5605000
heap
page read and write
181400788000
trusted library allocation
page read and write
4D7C007B4000
trusted library allocation
page read and write
181400C01000
trusted library allocation
page read and write
1814002FB000
trusted library allocation
page read and write
8E1E5FE000
unkown
page readonly
6C1AF000
unkown
page readonly
196D5616000
heap
page read and write
EE0000
heap
page read and write
7370000
direct allocation
page execute and read and write
780A000
heap
page read and write
7701000
heap
page read and write
196D55F8000
heap
page read and write
181400338000
trusted library allocation
page read and write
196D5608000
heap
page read and write
3EAC002BC000
trusted library allocation
page read and write
6C61000
heap
page read and write
196D5608000
heap
page read and write
196D5610000
heap
page read and write
181400C0C000
trusted library allocation
page read and write
196D561E000
heap
page read and write
3EAC002F8000
trusted library allocation
page read and write
196D9AF2000
trusted library allocation
page read and write
196D5618000
heap
page read and write
4D7C0025C000
trusted library allocation
page read and write
196D5605000
heap
page read and write
77A7000
heap
page read and write
196D55FC000
heap
page read and write
181400EE0000
trusted library allocation
page read and write
6C61000
heap
page read and write
196D3F73000
heap
page read and write
196D561E000
heap
page read and write
4D7C00688000
trusted library allocation
page read and write
4D7C00354000
trusted library allocation
page read and write
181400F8C000
trusted library allocation
page read and write
1814001B4000
trusted library allocation
page read and write
18140070B000
trusted library allocation
page read and write
18140015C000
trusted library allocation
page read and write
196DC480000
trusted library section
page read and write
196D55F6000
heap
page read and write
196DC0AE000
trusted library section
page read and write
6C50000
direct allocation
page read and write
196D5616000
heap
page read and write
181400E38000
trusted library allocation
page read and write
196D5610000
heap
page read and write
2BF0002D0000
direct allocation
page read and write
8E34DFD000
stack
page read and write
196D5618000
heap
page read and write
7647000
heap
page read and write
76E9000
heap
page read and write
4D7C0078C000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5612000
heap
page read and write
4D7C00658000
trusted library allocation
page read and write
4D7C00610000
trusted library allocation
page read and write
181400C90000
trusted library allocation
page read and write
4D7C00644000
trusted library allocation
page read and write
764A000
heap
page read and write
196D55F7000
heap
page read and write
181400DE8000
trusted library allocation
page read and write
181400D64000
trusted library allocation
page read and write
6C61000
heap
page read and write
3EAC002B0000
trusted library allocation
page read and write
196DC64E000
trusted library section
page read and write
1814007B4000
trusted library allocation
page read and write
1B74000
heap
page read and write
4D7C00320000
trusted library allocation
page read and write
181400134000
trusted library allocation
page read and write
8E235FE000
unkown
page readonly
196D5616000
heap
page read and write
8E1F5FE000
unkown
page readonly
6C61000
heap
page read and write
77FB000
direct allocation
page read and write
8E255FE000
unkown
page readonly
196D5605000
heap
page read and write
6C61000
heap
page read and write
196D5608000
heap
page read and write
1814003A4000
trusted library allocation
page read and write
1B74000
heap
page read and write
6C61000
heap
page read and write
181400390000
trusted library allocation
page read and write
181400B94000
trusted library allocation
page read and write
1814001D8000
trusted library allocation
page read and write
181400450000
trusted library allocation
page read and write
196D5610000
heap
page read and write
196D55F4000
heap
page read and write
764F000
heap
page read and write
181400E5C000
trusted library allocation
page read and write
181400F04000
trusted library allocation
page read and write
1814005D0000
trusted library allocation
page read and write
77D2000
heap
page read and write
196D5616000
heap
page read and write
1B74000
heap
page read and write
6C50000
direct allocation
page read and write
196DC600000
trusted library section
page read and write
196D5605000
heap
page read and write
196D5610000
heap
page read and write
1814004EC000
trusted library allocation
page read and write
6C1F8000
unkown
page readonly
181400960000
trusted library allocation
page read and write
196D5616000
heap
page read and write
8E355FE000
unkown
page readonly
DFC000
stack
page read and write
8E2CDFC000
stack
page read and write
196D5608000
heap
page read and write
6C1F9000
unkown
page read and write
181400AAC000
trusted library allocation
page read and write
3EAC002C0000
trusted library allocation
page read and write
196D5610000
heap
page read and write
181400A01000
trusted library allocation
page read and write
196D560D000
heap
page read and write
4D7C00390000
trusted library allocation
page read and write
6C50000
direct allocation
page read and write
181400E1C000
trusted library allocation
page read and write
181400F3C000
trusted library allocation
page read and write
65D000
stack
page read and write
2BF000220000
direct allocation
page read and write
6C61000
heap
page read and write
196D5608000
heap
page read and write
6C61000
heap
page read and write
196D5607000
heap
page read and write
1814004B8000
trusted library allocation
page read and write
196D5618000
heap
page read and write
181400E44000
trusted library allocation
page read and write
18140041E000
trusted library allocation
page read and write
4D7C0039C000
trusted library allocation
page read and write
181400020000
trusted library allocation
page read and write
E50000
heap
page read and write
196D5616000
heap
page read and write
196D5610000
heap
page read and write
7646000
heap
page read and write
196D5620000
heap
page read and write
196D5600000
heap
page read and write
181400338000
trusted library allocation
page read and write
181400220000
trusted library allocation
page read and write
196D561E000
heap
page read and write
196D5610000
heap
page read and write
4D7C00770000
trusted library allocation
page read and write
196D5608000
heap
page read and write
181400224000
trusted library allocation
page read and write
3EAC00260000
trusted library allocation
page read and write
779B000
heap
page read and write
196D5618000
heap
page read and write
2BF000234000
direct allocation
page read and write
6C61000
heap
page read and write
181400E74000
trusted library allocation
page read and write
196D5610000
heap
page read and write
8E165FE000
unkown
page readonly
196D5616000
heap
page read and write
181400D30000
trusted library allocation
page read and write
18140032C000
trusted library allocation
page read and write
6C61000
heap
page read and write
196D5610000
heap
page read and write
3EAC002C0000
trusted library allocation
page read and write
196D5616000
heap
page read and write
3EAC002C0000
trusted library allocation
page read and write
196D5605000
heap
page read and write
8E225FE000
unkown
page readonly
764F000
heap
page read and write
181400ECC000
trusted library allocation
page read and write
77E0000
heap
page read and write
181400CB4000
trusted library allocation
page read and write
181400D5C000
trusted library allocation
page read and write
8E24DFE000
stack
page read and write
7370000
direct allocation
page execute and read and write
181400290000
trusted library allocation
page read and write
196D5616000
heap
page read and write
7939000
heap
page read and write
4D7C002E4000
trusted library allocation
page read and write
196D55F8000
heap
page read and write
196D5B7D000
heap
page read and write
196D5610000
heap
page read and write
8E39DFE000
stack
page read and write
181400CC8000
trusted library allocation
page read and write
181400C68000
trusted library allocation
page read and write
196D5616000
heap
page read and write
3EAC002C0000
trusted library allocation
page read and write
6C61000
heap
page read and write
7643000
heap
page read and write
196D5B17000
heap
page read and write
196D20EA000
heap
page read and write
196D5BB6000
heap
page read and write
196D55F8000
heap
page read and write
196D5620000
heap
page read and write
196D5605000
heap
page read and write
6C50000
direct allocation
page read and write
196D5620000
heap
page read and write
196D2102000
heap
page read and write
196D5605000
heap
page read and write
EAE000
stack
page read and write
196D5616000
heap
page read and write
7646000
heap
page read and write
181400C2C000
trusted library allocation
page read and write
77E9000
heap
page read and write
196D20C1000
heap
page read and write
6C50000
direct allocation
page read and write
196D5610000
heap
page read and write
196DB6E7000
unclassified section
page read and write
1814005E4000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
7370000
direct allocation
page execute and read and write
196D1FA0000
heap
page read and write
196D5610000
heap
page read and write
780D000
heap
page read and write
4D7C00640000
trusted library allocation
page read and write
196D5620000
heap
page read and write
1814001C4000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5605000
heap
page read and write
181400648000
trusted library allocation
page read and write
196D5610000
heap
page read and write
8E275FE000
unkown
page readonly
181400798000
trusted library allocation
page read and write
4D7C00734000
trusted library allocation
page read and write
4D7C00354000
trusted library allocation
page read and write
181400D9C000
trusted library allocation
page read and write
1814001A0000
trusted library allocation
page read and write
196D5616000
heap
page read and write
6C50000
direct allocation
page read and write
4D7C00678000
trusted library allocation
page read and write
8E35DFE000
stack
page read and write
4D7C00330000
trusted library allocation
page read and write
181400BF4000
trusted library allocation
page read and write
196D5610000
heap
page read and write
196D5610000
heap
page read and write
18140034C000
trusted library allocation
page read and write
611000
unkown
page readonly
18140036C000
trusted library allocation
page read and write
771F000
heap
page read and write
601000
unkown
page execute read
6C61000
heap
page read and write
7370000
direct allocation
page execute and read and write
106E000
stack
page read and write
196D563A000
heap
page read and write
1A1F000
stack
page read and write
196D5605000
heap
page read and write
6C61000
heap
page read and write
196D560D000
heap
page read and write
196D5618000
heap
page read and write
196D5B0F000
heap
page read and write
18140001C000
trusted library allocation
page read and write
4D7C002F4000
trusted library allocation
page read and write
6C61000
heap
page read and write
8E1ADFA000
stack
page read and write
196D5B5E000
heap
page read and write
4D7C00330000
trusted library allocation
page read and write
196D5610000
heap
page read and write
4D7C00654000
trusted library allocation
page read and write
1814005A0000
trusted library allocation
page read and write
8E1FDFE000
stack
page read and write
BFC000
stack
page read and write
7777000
heap
page read and write
3EAC002A0000
trusted library allocation
page read and write
3EAC0020C000
trusted library allocation
page read and write
1814002F0000
trusted library allocation
page read and write
7370000
direct allocation
page execute and read and write
E60000
heap
page read and write
18140020C000
trusted library allocation
page read and write
196D561E000
heap
page read and write
4D7C00684000
trusted library allocation
page read and write
196D5616000
heap
page read and write
8E3C5FE000
unkown
page readonly
4D7C00288000
trusted library allocation
page read and write
196D5605000
heap
page read and write
196D5608000
heap
page read and write
18140084C000
trusted library allocation
page read and write
4D7C00408000
trusted library allocation
page read and write
196D5616000
heap
page read and write
4D7C002B0000
trusted library allocation
page read and write
196D561E000
heap
page read and write
181400A50000
trusted library allocation
page read and write
1814006E8000
trusted library allocation
page read and write
3EAC00230000
trusted library allocation
page read and write
18140016C000
trusted library allocation
page read and write
196D5610000
heap
page read and write
1814000F0000
trusted library allocation
page read and write
7A0000
heap
page read and write
196D5610000
heap
page read and write
6C61000
heap
page read and write
196D561A000
heap
page read and write
600000
unkown
page readonly
196D561B000
heap
page read and write
7370000
direct allocation
page execute and read and write
8E25DFE000
stack
page read and write
196D5616000
heap
page read and write
4D7C00754000
trusted library allocation
page read and write
6C61000
heap
page read and write
1814004A4000
trusted library allocation
page read and write
181400B28000
trusted library allocation
page read and write
196D5616000
heap
page read and write
77DC000
heap
page read and write
181400DB0000
trusted library allocation
page read and write
60E000
unkown
page write copy
18140017C000
trusted library allocation
page read and write
760000
heap
page read and write
1B74000
heap
page read and write
181400709000
trusted library allocation
page read and write
8E2ADFA000
stack
page read and write
4D7C00760000
trusted library allocation
page read and write
3EAC00250000
trusted library allocation
page read and write
181400924000
trusted library allocation
page read and write
181400080000
trusted library allocation
page read and write
8E305FE000
unkown
page readonly
8E285FE000
unkown
page readonly
8E385FE000
unkown
page readonly
196D561E000
heap
page read and write
60E000
unkown
page read and write
8E20DFD000
stack
page read and write
8E18DFB000
stack
page read and write
196D5620000
heap
page read and write
8E185FE000
unkown
page readonly
196D5610000
heap
page read and write
8E3D5FE000
unkown
page readonly
196D5616000
heap
page read and write
1814008CC000
trusted library allocation
page read and write
7370000
direct allocation
page execute and read and write
196D5608000
heap
page read and write
196D5B50000
heap
page read and write
181400801000
trusted library allocation
page read and write
101A000
heap
page read and write
6C61000
heap
page read and write
7649000
heap
page read and write
196D561B000
heap
page read and write
196D561E000
heap
page read and write
77C5000
heap
page read and write
6C0D1000
unkown
page execute read
1814004A4000
trusted library allocation
page read and write
295F000
stack
page read and write
196D5610000
heap
page read and write
7643000
heap
page read and write
181400EEC000
trusted library allocation
page read and write
181400324000
trusted library allocation
page read and write
196D5616000
heap
page read and write
4D7C00364000
trusted library allocation
page read and write
196D5613000
heap
page read and write
6C61000
heap
page read and write
196D5605000
heap
page read and write
4D7C007C8000
trusted library allocation
page read and write
1814004A4000
trusted library allocation
page read and write
1814000D0000
trusted library allocation
page read and write
1814009C4000
trusted library allocation
page read and write
181400CE0000
trusted library allocation
page read and write
196D5610000
heap
page read and write
181400EF8000
trusted library allocation
page read and write
17CD000
unkown
page execute and write copy
196D5605000
heap
page read and write
181400B9C000
trusted library allocation
page read and write
4D7C00601000
trusted library allocation
page read and write
7645000
heap
page read and write
181400B08000
trusted library allocation
page read and write
196D5610000
heap
page read and write
7644000
heap
page read and write
7786000
heap
page read and write
8E1A5FE000
unkown
page readonly
8E155FE000
unkown
page readonly
196D5608000
heap
page read and write
196D561E000
heap
page read and write
7646000
heap
page read and write
181400AE8000
trusted library allocation
page read and write
196D5608000
heap
page read and write
7759000
heap
page read and write
181400E28000
trusted library allocation
page read and write
196D1EB0000
heap
page read and write
8E1CDFD000
stack
page read and write
70F0000
direct allocation
page read and write
1814006C5000
trusted library allocation
page read and write
1814002B4000
trusted library allocation
page read and write
196D5608000
heap
page read and write
196D5610000
heap
page read and write
6C61000
heap
page read and write
196D5608000
heap
page read and write
196D2038000
heap
page read and write
196DC5CD000
trusted library section
page read and write
4D7C00624000
trusted library allocation
page read and write
196D560D000
heap
page read and write
181400564000
trusted library allocation
page read and write
1B74000
heap
page read and write
196D55FC000
heap
page read and write
7993000
heap
page read and write
181400B24000
trusted library allocation
page read and write
18140040C000
trusted library allocation
page read and write
196D561E000
heap
page read and write
3EAC00288000
trusted library allocation
page read and write
1814001AC000
trusted library allocation
page read and write
2BF000250000
direct allocation
page read and write
6C61000
heap
page read and write
1814009F0000
trusted library allocation
page read and write
181400CF8000
trusted library allocation
page read and write
1814001F0000
trusted library allocation
page read and write
196D5618000
heap
page read and write
4D7C0080C000
trusted library allocation
page read and write
196DC4F1000
trusted library section
page read and write
196D561E000
heap
page read and write
196D5616000
heap
page read and write
7370000
direct allocation
page execute and read and write
2BF0002A8000
direct allocation
page read and write
196D5616000
heap
page read and write
2BF0002DC000
direct allocation
page read and write
6C61000
heap
page read and write
7645000
heap
page read and write
8E23DFE000
stack
page read and write
181400424000
trusted library allocation
page read and write
181400710000
trusted library allocation
page read and write
7642000
heap
page read and write
4D7C00320000
trusted library allocation
page read and write
7743000
heap
page read and write
181400574000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5616000
heap
page read and write
196D5610000
heap
page read and write
181400CF0000
trusted library allocation
page read and write
181400CF0000
trusted library allocation
page read and write
196D561E000
heap
page read and write
18140045C000
trusted library allocation
page read and write
196D563A000
heap
page read and write
776A000
heap
page read and write
77CE000
heap
page read and write
196D561E000
heap
page read and write
783E000
heap
page read and write
69A000
stack
page read and write
18140037C000
trusted library allocation
page read and write
196D5607000
heap
page read and write
2960000
heap
page read and write
4D7C0020C000
trusted library allocation
page read and write
78AD000
heap
page read and write
181400D08000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D2030000
heap
page read and write
1814002C4000
trusted library allocation
page read and write
196D5616000
heap
page read and write
181400C55000
trusted library allocation
page read and write
181400318000
trusted library allocation
page read and write
2BF000303000
direct allocation
page read and write
70C000
stack
page read and write
181400C7C000
trusted library allocation
page read and write
196D5612000
heap
page read and write
2BF00023C000
direct allocation
page read and write
196D5616000
heap
page read and write
196D5616000
heap
page read and write
196D5610000
heap
page read and write
181400F20000
trusted library allocation
page read and write
196DB683000
heap
page read and write
6C61000
heap
page read and write
196D5612000
heap
page read and write
196D5616000
heap
page read and write
196D561E000
heap
page read and write
181400358000
trusted library allocation
page read and write
196D5610000
heap
page read and write
181400CE0000
trusted library allocation
page read and write
8E28DFD000
stack
page read and write
7738000
heap
page read and write
8E3E5FE000
unkown
page readonly
196DC307000
unclassified section
page read and write
1814006D1000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5616000
heap
page read and write
196DBE50000
trusted library section
page read and write
7370000
direct allocation
page execute and read and write
7644000
heap
page read and write
7F0000
heap
page read and write
196D561E000
heap
page read and write
4D7C00704000
trusted library allocation
page read and write
7772000
heap
page read and write
7370000
direct allocation
page execute and read and write
196D5618000
heap
page read and write
181400B18000
trusted library allocation
page read and write
196D5605000
heap
page read and write
8E38DFE000
stack
page read and write
4D7C00220000
trusted library allocation
page read and write
7EE000
stack
page read and write
196DC5C2000
trusted library section
page read and write
1814003B4000
trusted library allocation
page read and write
196D5608000
heap
page read and write
4D7C00320000
trusted library allocation
page read and write
764D000
heap
page read and write
786A000
heap
page read and write
196D2290000
heap
page read and write
1B74000
heap
page read and write
196D5600000
heap
page read and write
196DC0A0000
trusted library section
page read and write
196D5620000
heap
page read and write
196D5610000
heap
page read and write
7350000
direct allocation
page execute and read and write
1814002A8000
trusted library allocation
page read and write
181400C84000
trusted library allocation
page read and write
196D5618000
heap
page read and write
8E215FE000
unkown
page readonly
6C61000
heap
page read and write
77A4000
heap
page read and write
8E1BDFB000
stack
page read and write
3EAC002BC000
trusted library allocation
page read and write
196D5613000
heap
page read and write
6C61000
heap
page read and write
6C61000
heap
page read and write
181400D40000
trusted library allocation
page read and write
196D561E000
heap
page read and write
181400CF8000
trusted library allocation
page read and write
196D5600000
heap
page read and write
8E295FE000
unkown
page readonly
196D5608000
heap
page read and write
772D000
heap
page read and write
8E365FE000
unkown
page readonly
181400898000
trusted library allocation
page read and write
196D5610000
heap
page read and write
181400DF8000
trusted library allocation
page read and write
196D5610000
heap
page read and write
3EAC002F4000
trusted library allocation
page read and write
196D561E000
heap
page read and write
181400C4C000
trusted library allocation
page read and write
196DB710000
heap
page read and write
196D561E000
heap
page read and write
196D5618000
heap
page read and write
196D8FF9000
heap
page read and write
1814001D0000
trusted library allocation
page read and write
776C000
heap
page read and write
4D7C006B4000
trusted library allocation
page read and write
181400F30000
trusted library allocation
page read and write
4D7C006FC000
trusted library allocation
page read and write
1814002A4000
trusted library allocation
page read and write
181400E68000
trusted library allocation
page read and write
196D5610000
heap
page read and write
4D7C00750000
trusted library allocation
page read and write
196D561A000
heap
page read and write
181400A84000
trusted library allocation
page read and write
196D5610000
heap
page read and write
181400EC0000
trusted library allocation
page read and write
1814005B4000
trusted library allocation
page read and write
4D7C00788000
trusted library allocation
page read and write
4D7C00250000
trusted library allocation
page read and write
2BF00024C000
direct allocation
page read and write
8E2A5FE000
unkown
page readonly
196D20E4000
heap
page read and write
181400778000
trusted library allocation
page read and write
196D5605000
heap
page read and write
196D5608000
heap
page read and write
196D5610000
heap
page read and write
4D7C00380000
trusted library allocation
page read and write
181400044000
trusted library allocation
page read and write
196D5607000
heap
page read and write
196D5B88000
heap
page read and write
7370000
direct allocation
page execute and read and write
196D49C0000
unkown
page read and write
196D561E000
heap
page read and write
196D55FA000
heap
page read and write
181400360000
trusted library allocation
page read and write
4D7C002ED000
trusted library allocation
page read and write
1814002F3000
trusted library allocation
page read and write
1814002A8000
trusted library allocation
page read and write
181400D24000
trusted library allocation
page read and write
76F5000
heap
page read and write
181400C70000
trusted library allocation
page read and write
6C50000
direct allocation
page read and write
196D561E000
heap
page read and write
8E175FE000
unkown
page readonly
18140008C000
trusted library allocation
page read and write
196D5608000
heap
page read and write
196DB680000
heap
page read and write
77A5000
heap
page read and write
196D5610000
heap
page read and write
8E16DFD000
stack
page read and write
181400228000
trusted library allocation
page read and write
196D5618000
heap
page read and write
196D5618000
heap
page read and write
196D5618000
heap
page read and write
1010000
heap
page read and write
181400300000
trusted library allocation
page read and write
1814001C8000
trusted library allocation
page read and write
4D7C0060C000
trusted library allocation
page read and write
60A000
unkown
page readonly
7370000
direct allocation
page execute and read and write
764C000
heap
page read and write
8E13DFE000
stack
page read and write
4D7C006D4000
trusted library allocation
page read and write
6C61000
heap
page read and write
1814000A8000
trusted library allocation
page read and write
1B74000
heap
page read and write
196D5605000
heap
page read and write
196D5616000
heap
page read and write
4D7C00744000
trusted library allocation
page read and write
3EAC00278000
trusted library allocation
page read and write
196D5610000
heap
page read and write
181400584000
trusted library allocation
page read and write
196D5616000
heap
page read and write
181400D80000
trusted library allocation
page read and write
4D7C006C4000
trusted library allocation
page read and write
196D5B19000
heap
page read and write
6C50000
direct allocation
page read and write
4D7C006E8000
trusted library allocation
page read and write
181400401000
trusted library allocation
page read and write
196D55FD000
heap
page read and write
196D9004000
heap
page read and write
764E000
heap
page read and write
7360000
direct allocation
page execute and read and write
196D5610000
heap
page read and write
6C61000
heap
page read and write
181400601000
trusted library allocation
page read and write
1814001E0000
trusted library allocation
page read and write
4D7C00730000
trusted library allocation
page read and write
196D5608000
heap
page read and write
196D5616000
heap
page read and write
1814002A4000
trusted library allocation
page read and write
196D5616000
heap
page read and write
3EAC002D8000
trusted library allocation
page read and write
7D0000
heap
page read and write
8E415FE000
unkown
page readonly
196D5B91000
heap
page read and write
196D5610000
heap
page read and write
181400D98000
trusted library allocation
page read and write
1814006A8000
trusted library allocation
page read and write
8E2B5FE000
unkown
page readonly
8E2E5FE000
unkown
page readonly
77BA000
heap
page read and write
196D5616000
heap
page read and write
3EAC00201000
trusted library allocation
page read and write
196D5605000
heap
page read and write
181400998000
trusted library allocation
page read and write
196D5610000
heap
page read and write
4D7C00401000
trusted library allocation
page read and write
196D5616000
heap
page read and write
7917000
heap
page read and write
4D7C002B8000
trusted library allocation
page read and write
1B74000
heap
page read and write
2BF000274000
direct allocation
page read and write
4D7C007D0000
trusted library allocation
page read and write
4D7C00374000
trusted library allocation
page read and write
8E32DFD000
stack
page read and write
1814009A0000
trusted library allocation
page read and write
4D7C00430000
trusted library allocation
page read and write
18140037C000
trusted library allocation
page read and write
196D5618000
heap
page read and write
7643000
heap
page read and write
600000
unkown
page readonly
196D5605000
heap
page read and write
4D7C00330000
trusted library allocation
page read and write
4D7C00404000
trusted library allocation
page read and write
181400340000
trusted library allocation
page read and write
181400A44000
trusted library allocation
page read and write
196D5611000
heap
page read and write
FFE000
stack
page read and write
7370000
direct allocation
page execute and read and write
8E11DFE000
unkown
page read and write
3EAC002BC000
trusted library allocation
page read and write
1814007D0000
trusted library allocation
page read and write
3EAC002A0000
trusted library allocation
page read and write
18140000C000
trusted library allocation
page read and write
1814002A4000
trusted library allocation
page read and write
13F0000
heap
page read and write
196D5610000
heap
page read and write
1814001AC000
trusted library allocation
page read and write
1814001B4000
trusted library allocation
page read and write
2BF000217000
direct allocation
page read and write
4D7C00348000
trusted library allocation
page read and write
291E000
stack
page read and write
4D7C006F0000
trusted library allocation
page read and write
196D5605000
heap
page read and write
764C000
heap
page read and write
196D5616000
heap
page read and write
1B74000
heap
page read and write
196D5608000
heap
page read and write
196D5616000
heap
page read and write
18140005A000
trusted library allocation
page read and write
181400E30000
trusted library allocation
page read and write
196DB677000
unclassified section
page read and write
196DC460000
trusted library section
page read and write
4D7C002FC000
trusted library allocation
page read and write
4D7C002F0000
trusted library allocation
page read and write
8E265FE000
unkown
page readonly
181400DD8000
trusted library allocation
page read and write
7640000
heap
page read and write
6C61000
heap
page read and write
4D7C002CC000
trusted library allocation
page read and write
4D7C0033C000
trusted library allocation
page read and write
196D5618000
heap
page read and write
77F9000
direct allocation
page read and write
181400CF0000
trusted library allocation
page read and write
6C61000
heap
page read and write
196D5610000
heap
page read and write
196D5610000
heap
page read and write
196D560D000
heap
page read and write
196D20BD000
heap
page read and write
196D5610000
heap
page read and write
18140065C000
trusted library allocation
page read and write
6C61000
heap
page read and write
181400E9A000
trusted library allocation
page read and write
3EAC00248000
trusted library allocation
page read and write
4D7C002D4000
trusted library allocation
page read and write
1814000E0000
trusted library allocation
page read and write
8E3DDFE000
stack
page read and write
181400A44000
trusted library allocation
page read and write
4D7C00310000
trusted library allocation
page read and write
601000
unkown
page execute read
181400ACC000
trusted library allocation
page read and write
7649000
heap
page read and write
196D5618000
heap
page read and write
77D9000
heap
page read and write
181400A18000
trusted library allocation
page read and write
181400854000
trusted library allocation
page read and write
4D7C006AC000
trusted library allocation
page read and write
196D55D0000
heap
page read and write
4D7C00758000
trusted library allocation
page read and write
181400E9C000
trusted library allocation
page read and write
4D7C00201000
trusted library allocation
page read and write
6C61000
heap
page read and write
196D5616000
heap
page read and write
8E205FE000
unkown
page readonly
196D5610000
heap
page read and write
196D5616000
heap
page read and write
3EAC00220000
trusted library allocation
page read and write
6C61000
heap
page read and write
181400210000
trusted library allocation
page read and write
4D7C0040C000
trusted library allocation
page read and write
196DC640000
trusted library section
page read and write
8E14DFE000
stack
page read and write
18140060C000
trusted library allocation
page read and write
181400118000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5610000
heap
page read and write
60A000
unkown
page readonly
196D5616000
heap
page read and write
3EAC00238000
trusted library allocation
page read and write
181400D38000
trusted library allocation
page read and write
1814001AC000
trusted library allocation
page read and write
8E195FE000
unkown
page readonly
4D7C00368000
trusted library allocation
page read and write
196D5616000
heap
page read and write
196D5601000
heap
page read and write
196D5610000
heap
page read and write
78DF000
heap
page read and write
181400C94000
trusted library allocation
page read and write
18140014C000
trusted library allocation
page read and write
196D5DB0000
trusted library allocation
page read and write
8E2DDFC000
stack
page read and write
7370000
direct allocation
page execute and read and write
196D5616000
heap
page read and write
181400F30000
trusted library allocation
page read and write
611000
unkown
page readonly
196D5612000
heap
page read and write
196D3F70000
heap
page read and write
7370000
direct allocation
page execute and read and write
196D5616000
heap
page read and write
There are 1286 hidden memdumps, click here to show them.