IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_579a99e6-76dd-425d-a590-a57271dff97f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB231.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 15:25:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB407.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB446.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 --field-trial-handle=2504,i,7512998509247764388,4904351507953880072,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7004 -s 1820
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bf
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icoeb
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
https://docs.google.com/spreadsheets/installwebapp?usp=chrome_defaultouch
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW17320193474fd4
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.68
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.59.37
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{86b909ea-a0f6-632b-c406-6f4d4dfce4c1}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
AAC000
heap
page read and write
malicious
AB3000
heap
page read and write
malicious
AB3000
heap
page read and write
malicious
661800A0C000
trusted library allocation
page read and write
6000002A0000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
8C0000
unkown
page readonly
6A94007B4000
trusted library allocation
page read and write
24A85336000
heap
page read and write
6AD1000
heap
page read and write
DFC000
stack
page read and write
C5FBBFC000
stack
page read and write
6AD1000
heap
page read and write
7727000
heap
page read and write
24A8531E000
heap
page read and write
24A85332000
heap
page read and write
24A85925000
heap
page read and write
24A85322000
heap
page read and write
840000
heap
page read and write
661800A28000
trusted library allocation
page read and write
768C000
heap
page read and write
C589FFC000
stack
page read and write
71E0000
direct allocation
page execute and read and write
24A858A6000
heap
page read and write
661800350000
trusted library allocation
page read and write
6618001E8000
trusted library allocation
page read and write
130E000
stack
page read and write
24A85330000
heap
page read and write
661800830000
trusted library allocation
page read and write
8C1000
unkown
page execute read
770D000
heap
page read and write
71B0000
direct allocation
page execute and read and write
24A85330000
heap
page read and write
661800401000
trusted library allocation
page read and write
8CE000
unkown
page write copy
66180017C000
trusted library allocation
page read and write
774D000
heap
page read and write
24A84510000
unkown
page read and write
24A85322000
heap
page read and write
24A85330000
heap
page read and write
C5F1BFA000
stack
page read and write
A68000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AD1000
heap
page read and write
661800B70000
trusted library allocation
page read and write
661800BD0000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A8C270000
trusted library section
page read and write
661800DF8000
trusted library allocation
page read and write
6A94006EC000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85351000
heap
page read and write
24A85324000
heap
page read and write
68E400270000
direct allocation
page read and write
661800D38000
trusted library allocation
page read and write
1070000
heap
page read and write
AAC000
heap
page read and write
15B0000
heap
page read and write
24A8BFE0000
trusted library section
page read and write
6AD1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
24A8C0CD000
trusted library section
page read and write
6AD1000
heap
page read and write
24A8532A000
heap
page read and write
661800630000
trusted library allocation
page read and write
E40000
heap
page read and write
24A85332000
heap
page read and write
24A8532A000
heap
page read and write
6C1D8000
unkown
page readonly
661800A34000
trusted library allocation
page read and write
661800134000
trusted library allocation
page read and write
66180043C000
trusted library allocation
page read and write
24A85864000
heap
page read and write
6C1DC000
unkown
page readonly
24A85300000
heap
page read and write
24A858A6000
heap
page read and write
8D1000
unkown
page readonly
C5E93FE000
unkown
page readonly
66180081C000
trusted library allocation
page read and write
661800C80000
trusted library allocation
page read and write
6AD1000
heap
page read and write
66180049C000
trusted library allocation
page read and write
66180018C000
trusted library allocation
page read and write
661800334000
trusted library allocation
page read and write
6A9400348000
trusted library allocation
page read and write
24A858BB000
heap
page read and write
766B000
heap
page read and write
6A940035C000
trusted library allocation
page read and write
661800914000
trusted library allocation
page read and write
772B000
heap
page read and write
AAF000
heap
page read and write
661800DC8000
trusted library allocation
page read and write
66180014C000
trusted library allocation
page read and write
6000002C0000
trusted library allocation
page read and write
772E000
heap
page read and write
661800A70000
trusted library allocation
page read and write
D70000
heap
page read and write
6AD1000
heap
page read and write
6A940035C000
trusted library allocation
page read and write
66180022C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
8CE000
unkown
page write copy
24A85335000
heap
page read and write
661800740000
trusted library allocation
page read and write
661800684000
trusted library allocation
page read and write
C5E13FE000
unkown
page readonly
661800118000
trusted library allocation
page read and write
661800BAC000
trusted library allocation
page read and write
24A8588F000
heap
page read and write
600000294000
trusted library allocation
page read and write
24A85322000
heap
page read and write
24A85354000
heap
page read and write
661800C01000
trusted library allocation
page read and write
B74000
heap
page read and write
7699000
heap
page read and write
661800D20000
trusted library allocation
page read and write
6A94006B4000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85322000
heap
page read and write
75B8000
heap
page read and write
6A9400354000
trusted library allocation
page read and write
661800D84000
trusted library allocation
page read and write
6618006D4000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6A9400714000
trusted library allocation
page read and write
66180035C000
trusted library allocation
page read and write
661800801000
trusted library allocation
page read and write
C5E9BFE000
stack
page read and write
8E0000
heap
page read and write
24A8532A000
heap
page read and write
6A9400640000
trusted library allocation
page read and write
6000002C0000
trusted library allocation
page read and write
24A85330000
heap
page read and write
661800F2C000
trusted library allocation
page read and write
C5F23FE000
unkown
page readonly
68E4002A8000
direct allocation
page read and write
24A858B3000
heap
page read and write
68E40020C000
direct allocation
page read and write
6A9400658000
trusted library allocation
page read and write
6618005A0000
trusted library allocation
page read and write
C5FFBFD000
stack
page read and write
C5F43FE000
unkown
page readonly
C5ED3FE000
unkown
page readonly
661800F10000
trusted library allocation
page read and write
6A9400424000
trusted library allocation
page read and write
24A85330000
heap
page read and write
24A85332000
heap
page read and write
75B6000
heap
page read and write
661800A5C000
trusted library allocation
page read and write
6618009AC000
trusted library allocation
page read and write
C5857FE000
unkown
page readonly
24A85332000
heap
page read and write
66180035C000
trusted library allocation
page read and write
8230000
heap
page read and write
24A8C100000
trusted library section
page read and write
661800E84000
trusted library allocation
page read and write
6A9400330000
trusted library allocation
page read and write
8C0000
unkown
page readonly
24A8C47E000
trusted library section
page read and write
C5F5BFC000
stack
page read and write
24A8531E000
heap
page read and write
24A85324000
heap
page read and write
6A94007CC000
trusted library allocation
page read and write
24A85330000
heap
page read and write
13FC000
stack
page read and write
6618006E4000
trusted library allocation
page read and write
24A85330000
heap
page read and write
777F000
heap
page read and write
6A9400688000
trusted library allocation
page read and write
6A6F8000
direct allocation
page read and write
661800370000
trusted library allocation
page read and write
75B3000
heap
page read and write
6000002BC000
trusted library allocation
page read and write
136F000
stack
page read and write
6AD1000
heap
page read and write
24A85324000
heap
page read and write
6A9400201000
trusted library allocation
page read and write
E47000
heap
page read and write
6AD1000
heap
page read and write
6A0000
heap
page read and write
199C000
unkown
page execute and write copy
6A9400724000
trusted library allocation
page read and write
24A85322000
heap
page read and write
6AC0000
direct allocation
page read and write
75BB000
heap
page read and write
661800850000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
24A85324000
heap
page read and write
24A85351000
heap
page read and write
661800A18000
trusted library allocation
page read and write
24A8531E000
heap
page read and write
3FD000
stack
page read and write
F6C000
stack
page read and write
6A9400310000
trusted library allocation
page read and write
6A9400248000
trusted library allocation
page read and write
C58A7FE000
unkown
page readonly
6AD1000
heap
page read and write
6A9400238000
trusted library allocation
page read and write
8CE000
unkown
page read and write
24A85332000
heap
page read and write
24A8531E000
heap
page read and write
6AD1000
heap
page read and write
6A9400760000
trusted library allocation
page read and write
75B4000
heap
page read and write
6A9400704000
trusted library allocation
page read and write
24A85332000
heap
page read and write
661800BA4000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85332000
heap
page read and write
661800228000
trusted library allocation
page read and write
16EE000
stack
page read and write
8CA000
unkown
page readonly
66180057C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
1510000
heap
page read and write
6A9400288000
trusted library allocation
page read and write
661800B70000
trusted library allocation
page read and write
24A85332000
heap
page read and write
24A8588F000
heap
page read and write
24A8532A000
heap
page read and write
6AD1000
heap
page read and write
6618000B4000
trusted library allocation
page read and write
7512000
direct allocation
page read and write
77CD000
heap
page read and write
6A94007C8000
trusted library allocation
page read and write
6000002A0000
trusted library allocation
page read and write
24A85332000
heap
page read and write
75B4000
heap
page read and write
24A85324000
heap
page read and write
6000002BC000
trusted library allocation
page read and write
6A94002E4000
trusted library allocation
page read and write
6A9400390000
trusted library allocation
page read and write
661800C0C000
trusted library allocation
page read and write
AA3000
heap
page read and write
7696000
heap
page read and write
6AC0000
direct allocation
page read and write
6AD1000
heap
page read and write
24A8BFF1000
trusted library section
page read and write
B74000
heap
page read and write
24A85324000
heap
page read and write
76CE000
heap
page read and write
8C1000
unkown
page execute read
6AD1000
heap
page read and write
6A94006E0000
trusted library allocation
page read and write
661800C90000
trusted library allocation
page read and write
75BC000
heap
page read and write
661800010000
trusted library allocation
page read and write
24A85336000
heap
page read and write
6A9400320000
trusted library allocation
page read and write
24A85318000
heap
page read and write
24A858B7000
heap
page read and write
6A94007D0000
trusted library allocation
page read and write
24A85323000
heap
page read and write
6F60000
direct allocation
page read and write
24A85332000
heap
page read and write
C5F9BFB000
stack
page read and write
C5807FE000
unkown
page readonly
79FB000
heap
page read and write
661800300000
trusted library allocation
page read and write
8D1000
unkown
page readonly
24A85322000
heap
page read and write
24A85324000
heap
page read and write
68E400303000
direct allocation
page read and write
661800634000
trusted library allocation
page read and write
6A9400310000
trusted library allocation
page read and write
8C0000
unkown
page readonly
8C1000
unkown
page execute read
24A85330000
heap
page read and write
661800D00000
trusted library allocation
page read and write
800D000
heap
page read and write
6AD1000
heap
page read and write
6618001B4000
trusted library allocation
page read and write
C5E7BFD000
stack
page read and write
77FF000
heap
page read and write
8CE000
unkown
page read and write
24A85922000
heap
page read and write
68E400215000
direct allocation
page read and write
6A9400754000
trusted library allocation
page read and write
FC0000
heap
page read and write
8CE000
unkown
page read and write
6AD1000
heap
page read and write
24A85893000
heap
page read and write
661800A34000
trusted library allocation
page read and write
6A9400610000
trusted library allocation
page read and write
6C1D9000
unkown
page read and write
75B1000
heap
page read and write
C5E53FE000
unkown
page readonly
6618002A4000
trusted library allocation
page read and write
A3E000
heap
page read and write
6618002C4000
trusted library allocation
page read and write
6618001DC000
trusted library allocation
page read and write
6AD1000
heap
page read and write
661800EF8000
trusted library allocation
page read and write
24A85324000
heap
page read and write
764B000
heap
page read and write
6A94006C4000
trusted library allocation
page read and write
661800E9C000
trusted library allocation
page read and write
6A9400718000
trusted library allocation
page read and write
24A85332000
heap
page read and write
24A85949000
heap
page read and write
24A8532A000
heap
page read and write
C5F63FE000
unkown
page readonly
24A8B443000
heap
page read and write
7A0000
heap
page read and write
66180038C000
trusted library allocation
page read and write
63A000
stack
page read and write
24A85324000
heap
page read and write
24A8BFD0000
trusted library section
page read and write
24A858E0000
heap
page read and write
155E000
stack
page read and write
661800ED8000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85332000
heap
page read and write
661800EC0000
trusted library allocation
page read and write
6618002C4000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
6A94006B0000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6618009EC000
trusted library allocation
page read and write
13B0000
heap
page read and write
6AD1000
heap
page read and write
661800DD8000
trusted library allocation
page read and write
6618003EC000
trusted library allocation
page read and write
6618008EC000
trusted library allocation
page read and write
24A8B440000
heap
page read and write
6618006AC000
trusted library allocation
page read and write
AE3000
heap
page read and write
6AD1000
heap
page read and write
661800350000
trusted library allocation
page read and write
76C9000
heap
page read and write
8CE000
unkown
page write copy
C5F2BFB000
stack
page read and write
AA4000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AD1000
heap
page read and write
6618002F3000
trusted library allocation
page read and write
75B4000
heap
page read and write
661800082000
trusted library allocation
page read and write
773C000
heap
page read and write
75B8000
heap
page read and write
C5E33FE000
unkown
page readonly
AA3000
heap
page read and write
78F1000
heap
page read and write
6000002F0000
trusted library allocation
page read and write
661800CC0000
trusted library allocation
page read and write
24A858BB000
heap
page read and write
6AD1000
heap
page read and write
6A9400730000
trusted library allocation
page read and write
66180097C000
trusted library allocation
page read and write
24A8591A000
heap
page read and write
6618003CD000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A8531E000
heap
page read and write
24A85332000
heap
page read and write
AB8000
heap
page read and write
68E4002EC000
direct allocation
page read and write
24A8532A000
heap
page read and write
8CA000
unkown
page readonly
75BB000
heap
page read and write
24A85351000
heap
page read and write
661800128000
trusted library allocation
page read and write
6A9400784000
trusted library allocation
page read and write
24A85324000
heap
page read and write
6A940075C000
trusted library allocation
page read and write
24A858C2000
heap
page read and write
600000264000
trusted library allocation
page read and write
600000270000
trusted library allocation
page read and write
6A9400401000
trusted library allocation
page read and write
68E400220000
direct allocation
page read and write
C5877FE000
unkown
page readonly
24A8531E000
heap
page read and write
24A8531E000
heap
page read and write
68E400280000
direct allocation
page read and write
6A940039C000
trusted library allocation
page read and write
24A85332000
heap
page read and write
C58B7FE000
unkown
page readonly
F00000
unkown
page readonly
661800E90000
trusted library allocation
page read and write
C5F6BFC000
stack
page read and write
77D9000
heap
page read and write
75BB000
heap
page read and write
C5EDBFE000
stack
page read and write
24A85332000
heap
page read and write
24A8586F000
heap
page read and write
C586FFE000
stack
page read and write
24A8531E000
heap
page read and write
24A85879000
heap
page read and write
76E3000
heap
page read and write
68E400290000
direct allocation
page read and write
83E000
stack
page read and write
5E0000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
661800037000
trusted library allocation
page read and write
24A85330000
heap
page read and write
68E400294000
direct allocation
page read and write
24A85324000
heap
page read and write
24A8532A000
heap
page read and write
24A85340000
heap
page read and write
6A94002B0000
trusted library allocation
page read and write
6AD1000
heap
page read and write
600000201000
trusted library allocation
page read and write
24A85332000
heap
page read and write
6AD1000
heap
page read and write
76AB000
heap
page read and write
24A85332000
heap
page read and write
C5F53FE000
unkown
page readonly
C5F03FE000
unkown
page readonly
661800898000
trusted library allocation
page read and write
C5FA3FE000
unkown
page readonly
C5DD3FE000
unkown
page readonly
24A85324000
heap
page read and write
6618005E4000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A85322000
heap
page read and write
71E0000
direct allocation
page execute and read and write
75B1000
heap
page read and write
6618002A4000
trusted library allocation
page read and write
661800B2C000
trusted library allocation
page read and write
24A81EFC000
heap
page read and write
661800220000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6618007BC000
trusted library allocation
page read and write
8CA000
unkown
page readonly
6A9400620000
trusted library allocation
page read and write
8A0D000
heap
page read and write
6A9400330000
trusted library allocation
page read and write
6AD1000
heap
page read and write
795C000
heap
page read and write
66180027C000
trusted library allocation
page read and write
661800328000
trusted library allocation
page read and write
66180038C000
trusted library allocation
page read and write
13F0000
heap
page read and write
661800B90000
trusted library allocation
page read and write
24A85324000
heap
page read and write
6AD1000
heap
page read and write
7EE000
unkown
page read and write
8C1000
unkown
page execute read
24A81DA0000
heap
page read and write
6A9400354000
trusted library allocation
page read and write
661800568000
trusted library allocation
page read and write
8CA000
unkown
page readonly
C5E43FE000
unkown
page readonly
6AD1000
heap
page read and write
6000002A0000
trusted library allocation
page read and write
6A94002ED000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85322000
heap
page read and write
24A85330000
heap
page read and write
24A8B3F0000
heap
page read and write
C5DFBFE000
stack
page read and write
C5F83FE000
unkown
page readonly
24A85330000
heap
page read and write
600000248000
trusted library allocation
page read and write
6A94002D4000
trusted library allocation
page read and write
24A81D90000
heap
page readonly
24A8531B000
heap
page read and write
6A9400320000
trusted library allocation
page read and write
75B6000
heap
page read and write
24A81DF0000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
6618002AA000
trusted library allocation
page read and write
68E4002E4000
direct allocation
page read and write
24A85896000
heap
page read and write
661800874000
trusted library allocation
page read and write
661800724000
trusted library allocation
page read and write
661800900000
trusted library allocation
page read and write
C5F93FE000
unkown
page readonly
24A81E84000
heap
page read and write
6618003B0000
trusted library allocation
page read and write
6AD1000
heap
page read and write
75B9000
heap
page read and write
24A85332000
heap
page read and write
6AD1000
heap
page read and write
24A85324000
heap
page read and write
6A94002F4000
trusted library allocation
page read and write
24A8B457000
unclassified section
page read and write
661800D74000
trusted library allocation
page read and write
71E0000
direct allocation
page execute and read and write
6618002AA000
trusted library allocation
page read and write
24A85322000
heap
page read and write
661800B30000
trusted library allocation
page read and write
6000002BC000
trusted library allocation
page read and write
8C0000
unkown
page readonly
75B1000
heap
page read and write
661800290000
trusted library allocation
page read and write
661800D8D000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
D2C000
stack
page read and write
C5F4BFD000
stack
page read and write
6A9400404000
trusted library allocation
page read and write
68E400234000
direct allocation
page read and write
6A9400694000
trusted library allocation
page read and write
661800AF4000
trusted library allocation
page read and write
75B4000
heap
page read and write
661800760000
trusted library allocation
page read and write
24A852F0000
heap
page read and write
6A940025C000
trusted library allocation
page read and write
6618004EC000
trusted library allocation
page read and write
24A85324000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
C5FEBFE000
stack
page read and write
76C2000
heap
page read and write
24A85332000
heap
page read and write
661800F5C000
trusted library allocation
page read and write
661800230000
trusted library allocation
page read and write
24A8BF71000
trusted library section
page read and write
D90000
heap
page read and write
78AC000
heap
page read and write
6A940069C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
24A85332000
heap
page read and write
6A9400770000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A85330000
heap
page read and write
24A85330000
heap
page read and write
C5867FE000
unkown
page readonly
C5DEBFE000
stack
page read and write
C5E63FE000
unkown
page readonly
C5E5BFB000
stack
page read and write
C5E03FE000
unkown
page readonly
661800944000
trusted library allocation
page read and write
AAC000
heap
page read and write
24A85330000
heap
page read and write
661800CE8000
trusted library allocation
page read and write
F01000
unkown
page execute and write copy
C5EE3FE000
unkown
page readonly
24A858B5000
heap
page read and write
6618001B4000
trusted library allocation
page read and write
24A85896000
heap
page read and write
661800DF0000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A8532A000
heap
page read and write
B74000
heap
page read and write
6A94006D0000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
AE3000
heap
page read and write
24A85330000
heap
page read and write
DDE000
stack
page read and write
6618004BC000
trusted library allocation
page read and write
71C0000
direct allocation
page execute and read and write
6618002D0000
trusted library allocation
page read and write
C5EF3FE000
unkown
page readonly
76BA000
heap
page read and write
76B6000
heap
page read and write
6618003B0000
trusted library allocation
page read and write
1C2F000
stack
page read and write
6AD1000
heap
page read and write
24A85319000
heap
page read and write
24A85330000
heap
page read and write
6618006B2000
trusted library allocation
page read and write
76A5000
heap
page read and write
661800490000
trusted library allocation
page read and write
661800048000
trusted library allocation
page read and write
661800BB4000
trusted library allocation
page read and write
6618005B4000
trusted library allocation
page read and write
F0E000
stack
page read and write
24A81E00000
heap
page read and write
661800DAC000
trusted library allocation
page read and write
14D0000
heap
page read and write
75B9000
heap
page read and write
24A85323000
heap
page read and write
661800DF0000
trusted library allocation
page read and write
6000002BC000
trusted library allocation
page read and write
75B6000
heap
page read and write
24A85330000
heap
page read and write
75BE000
heap
page read and write
6618009D0000
trusted library allocation
page read and write
C5F13FE000
unkown
page readonly
6A9400374000
trusted library allocation
page read and write
A49000
heap
page read and write
8D1000
unkown
page readonly
6AD1000
heap
page read and write
6AD1000
heap
page read and write
66180071A000
trusted library allocation
page read and write
C5DF3FE000
unkown
page readonly
6A940033C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
1B58000
unkown
page execute and write copy
75B5000
heap
page read and write
600000250000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
6A9400668000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
6A940078C000
trusted library allocation
page read and write
24A85330000
heap
page read and write
6AD1000
heap
page read and write
24A89950000
trusted library section
page read and write
113F000
stack
page read and write
24A85324000
heap
page read and write
C5EBBFE000
stack
page read and write
6AD1000
heap
page read and write
661800768000
trusted library allocation
page read and write
781A000
heap
page read and write
6A94002CC000
trusted library allocation
page read and write
6AD1000
heap
page read and write
C5E1BFD000
stack
page read and write
661800664000
trusted library allocation
page read and write
24A85332000
heap
page read and write
8C0000
unkown
page readonly
68E40024C000
direct allocation
page read and write
661800E30000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
EEE000
heap
page read and write
7644000
heap
page read and write
6618001F8000
trusted library allocation
page read and write
8C0000
unkown
page readonly
24A858DC000
heap
page read and write
6AD1000
heap
page read and write
661800C8C000
trusted library allocation
page read and write
24A85913000
heap
page read and write
6F60000
direct allocation
page read and write
24A858C2000
heap
page read and write
6618003A0000
trusted library allocation
page read and write
AAF000
heap
page read and write
6AD1000
heap
page read and write
24A85332000
heap
page read and write
6AD1000
heap
page read and write
6618000EC000
trusted library allocation
page read and write
24A85330000
heap
page read and write
661800348000
trusted library allocation
page read and write
8D1000
unkown
page readonly
66180033C000
trusted library allocation
page read and write
C581FFD000
stack
page read and write
24A8C0C2000
trusted library section
page read and write
6000002BC000
trusted library allocation
page read and write
6000002BC000
trusted library allocation
page read and write
68E4002D0000
direct allocation
page read and write
661800D54000
trusted library allocation
page read and write
6A9400624000
trusted library allocation
page read and write
661800A40000
trusted library allocation
page read and write
8C1000
unkown
page execute read
8C1000
unkown
page execute read
6AD1000
heap
page read and write
6A94006FC000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
661800A01000
trusted library allocation
page read and write
24A85344000
heap
page read and write
24A8591C000
heap
page read and write
24A81FE0000
heap
page read and write
661800658000
trusted library allocation
page read and write
600000260000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
77E8000
heap
page read and write
6618001D8000
trusted library allocation
page read and write
24A858CC000
heap
page read and write
24A85323000
heap
page read and write
24A8533B000
heap
page read and write
24A8531E000
heap
page read and write
A9D000
heap
page read and write
6AD1000
heap
page read and write
C5FCBFE000
stack
page read and write
6AD1000
heap
page read and write
24A8532A000
heap
page read and write
6AC0000
direct allocation
page read and write
24A8532A000
heap
page read and write
24A8AE40000
heap
page read and write
661800348000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
6A9400654000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
24A85324000
heap
page read and write
24A85338000
heap
page read and write
8C0000
unkown
page readonly
6A9400320000
trusted library allocation
page read and write
24A85332000
heap
page read and write
661800201000
trusted library allocation
page read and write
66180080D000
trusted library allocation
page read and write
66180016C000
trusted library allocation
page read and write
661800C50000
trusted library allocation
page read and write
7701000
heap
page read and write
773D000
heap
page read and write
6AD1000
heap
page read and write
24A879B0000
trusted library allocation
page read and write
24A858AC000
heap
page read and write
8D1000
unkown
page readonly
75B1000
heap
page read and write
6A9400630000
trusted library allocation
page read and write
24A81DD0000
heap
page read and write
C5F0BFE000
stack
page read and write
661800C10000
trusted library allocation
page read and write
24A899E7000
unclassified section
page read and write
6A9400364000
trusted library allocation
page read and write
24A8BF92000
trusted library section
page read and write
661800C60000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A81FA0000
trusted library section
page readonly
6AD1000
heap
page read and write
75B7000
heap
page read and write
6A9400408000
trusted library allocation
page read and write
24A85324000
heap
page read and write
7722000
heap
page read and write
24A85332000
heap
page read and write
71E0000
direct allocation
page execute and read and write
24A81CB0000
heap
page read and write
8CE000
unkown
page read and write
75B8000
heap
page read and write
6A9400220000
trusted library allocation
page read and write
661800CF0000
trusted library allocation
page read and write
C5FC3FE000
unkown
page readonly
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
76B6000
heap
page read and write
C588FFE000
stack
page read and write
661800494000
trusted library allocation
page read and write
24A893C4000
trusted library allocation
page read and write
6618002A8000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A8532A000
heap
page read and write
66180021C000
trusted library allocation
page read and write
8EA000
heap
page read and write
6A94002B8000
trusted library allocation
page read and write
830000
heap
page read and write
24A85332000
heap
page read and write
6AD1000
heap
page read and write
5F0000
heap
page read and write
24A85330000
heap
page read and write
24A85324000
heap
page read and write
B74000
heap
page read and write
68E400201000
direct allocation
page read and write
24A858D4000
heap
page read and write
71E0000
direct allocation
page execute and read and write
B74000
heap
page read and write
18AF000
stack
page read and write
6A9400684000
trusted library allocation
page read and write
6A9400664000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
76F2000
heap
page read and write
71E0000
direct allocation
page execute and read and write
24A8C470000
trusted library section
page read and write
6618002B8000
trusted library allocation
page read and write
24A893E2000
trusted library allocation
page read and write
AE3000
heap
page read and write
DFC000
stack
page read and write
24A858B9000
heap
page read and write
24A85332000
heap
page read and write
600000220000
trusted library allocation
page read and write
661800348000
trusted library allocation
page read and write
66180088C000
trusted library allocation
page read and write
71D0000
direct allocation
page execute and read and write
C5817FE000
unkown
page readonly
6AD1000
heap
page read and write
661800C38000
trusted library allocation
page read and write
6A9400380000
trusted library allocation
page read and write
24A81E18000
heap
page read and write
24A81FE5000
heap
page read and write
EE0000
heap
page read and write
661800E6C000
trusted library allocation
page read and write
661800484000
trusted library allocation
page read and write
661800C10000
trusted library allocation
page read and write
6000002E4000
trusted library allocation
page read and write
6A9400614000
trusted library allocation
page read and write
24A85330000
heap
page read and write
68E4002AC000
direct allocation
page read and write
24A85925000
heap
page read and write
6AD1000
heap
page read and write
24A85351000
heap
page read and write
78CE000
heap
page read and write
C5EB3FE000
unkown
page readonly
24A85332000
heap
page read and write
661800218000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85336000
heap
page read and write
661800001000
trusted library allocation
page read and write
661800D18000
trusted library allocation
page read and write
6AD1000
heap
page read and write
C5E4BFE000
stack
page read and write
661800CE8000
trusted library allocation
page read and write
24A85330000
heap
page read and write
24A85332000
heap
page read and write
24A85351000
heap
page read and write
75BA000
heap
page read and write
66180083C000
trusted library allocation
page read and write
661800210000
trusted library allocation
page read and write
76F6000
heap
page read and write
24A8532A000
heap
page read and write
6A94003EC000
trusted library allocation
page read and write
C5F33FE000
unkown
page readonly
EEA000
heap
page read and write
6A94006E4000
trusted library allocation
page read and write
661800E78000
trusted library allocation
page read and write
71E0000
direct allocation
page execute and read and write
C5E23FE000
unkown
page readonly
24A85330000
heap
page read and write
661800CB0000
trusted library allocation
page read and write
C58AFFE000
stack
page read and write
6AC0000
direct allocation
page read and write
661800C2C000
trusted library allocation
page read and write
6A9400700000
trusted library allocation
page read and write
24A8BEF7000
unclassified section
page read and write
24A858B9000
heap
page read and write
24A85324000
heap
page read and write
661800D40000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
661800E1C000
trusted library allocation
page read and write
661800CD8000
trusted library allocation
page read and write
75B2000
heap
page read and write
C5E73FE000
unkown
page readonly
C584FFD000
stack
page read and write
B74000
heap
page read and write
6618003C0000
trusted library allocation
page read and write
24A85330000
heap
page read and write
24A85332000
heap
page read and write
24A85324000
heap
page read and write
661800B88000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6618002F0000
trusted library allocation
page read and write
76DE000
heap
page read and write
6AD1000
heap
page read and write
24A85943000
heap
page read and write
8C1000
unkown
page execute read
71E0000
direct allocation
page execute and read and write
C5F3BFC000
stack
page read and write
6C0B1000
unkown
page execute read
24A85332000
heap
page read and write
24A858FC000
heap
page read and write
8CA000
unkown
page readonly
661800970000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
C5E3BFA000
stack
page read and write
6A9400734000
trusted library allocation
page read and write
C5DCBFD000
unkown
page read and write
24A8532A000
heap
page read and write
24A85324000
heap
page read and write
24A85330000
heap
page read and write
6A9400418000
trusted library allocation
page read and write
24A81E08000
heap
page read and write
C5E6BFB000
stack
page read and write
6618002A4000
trusted library allocation
page read and write
C5FB3FE000
unkown
page readonly
8C0000
unkown
page readonly
18EF000
stack
page read and write
C5FD3FE000
unkown
page readonly
24A85330000
heap
page read and write
6A94002F0000
trusted library allocation
page read and write
6AD1000
heap
page read and write
661800D5C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
8C1000
unkown
page execute read
24A85322000
heap
page read and write
B74000
heap
page read and write
6618002CA000
trusted library allocation
page read and write
6AD1000
heap
page read and write
C58C7FE000
unkown
page readonly
661800DC0000
trusted library allocation
page read and write
C5E0BFE000
stack
page read and write
661800194000
trusted library allocation
page read and write
24A858D7000
heap
page read and write
B74000
heap
page read and write
661800E54000
trusted library allocation
page read and write
24A8BF9E000
trusted library section
page read and write
6618002FB000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
86E000
stack
page read and write
7669000
direct allocation
page read and write
24A85332000
heap
page read and write
75B7000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
661800E3C000
trusted library allocation
page read and write
6618001F0000
trusted library allocation
page read and write
C5E2BFB000
stack
page read and write
6AD1000
heap
page read and write
24A8531E000
heap
page read and write
C5F7BFC000
stack
page read and write
6AD1000
heap
page read and write
24A85332000
heap
page read and write
66180033C000
trusted library allocation
page read and write
75B3000
heap
page read and write
DE0000
heap
page read and write
6618001D0000
trusted library allocation
page read and write
24A81EBD000
heap
page read and write
76A2000
heap
page read and write
C580FFE000
stack
page read and write
7700000
heap
page read and write
24A8AE48000
heap
page read and write
661800074000
trusted library allocation
page read and write
C582FFE000
stack
page read and write
8CA000
unkown
page readonly
6AD1000
heap
page read and write
75B6000
heap
page read and write
600000235000
trusted library allocation
page read and write
661800F20000
trusted library allocation
page read and write
796C000
heap
page read and write
6618001B4000
trusted library allocation
page read and write
6618001A0000
trusted library allocation
page read and write
661800EB4000
trusted library allocation
page read and write
24A85332000
heap
page read and write
24A8532A000
heap
page read and write
661800AB4000
trusted library allocation
page read and write
FE0000
heap
page read and write
6AD1000
heap
page read and write
AE3000
heap
page read and write
6AD1000
heap
page read and write
785A000
heap
page read and write
661800E01000
trusted library allocation
page read and write
8CA000
unkown
page readonly
24A858B3000
heap
page read and write
24A8532A000
heap
page read and write
769E000
heap
page read and write
24A85339000
heap
page read and write
24A8C0A6000
trusted library section
page read and write
66180038C000
trusted library allocation
page read and write
6A94006E8000
trusted library allocation
page read and write
66180061C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
661800B04000
trusted library allocation
page read and write
6AD1000
heap
page read and write
661800950000
trusted library allocation
page read and write
24A8B3C7000
unclassified section
page read and write
6AD1000
heap
page read and write
766C000
heap
page read and write
75B2000
heap
page read and write
774F000
heap
page read and write
24A85324000
heap
page read and write
6C0B0000
unkown
page readonly
71E0000
direct allocation
page execute and read and write
6618002AA000
trusted library allocation
page read and write
661800E0C000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
FD0000
heap
page read and write
DC0000
heap
page read and write
24A85324000
heap
page read and write
661800778000
trusted library allocation
page read and write
661800CE8000
trusted library allocation
page read and write
6AD1000
heap
page read and write
66180015C000
trusted library allocation
page read and write
6618001F4000
trusted library allocation
page read and write
76E0000
heap
page read and write
661800F04000
trusted library allocation
page read and write
661800AC4000
trusted library allocation
page read and write
B74000
heap
page read and write
75B3000
heap
page read and write
6A9400210000
trusted library allocation
page read and write
11FD000
stack
page read and write
24A8531E000
heap
page read and write
6AD1000
heap
page read and write
661800CA0000
trusted library allocation
page read and write
661800E24000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85332000
heap
page read and write
8C0000
unkown
page readonly
6A9400601000
trusted library allocation
page read and write
24A85332000
heap
page read and write
76AD000
heap
page read and write
600000238000
trusted library allocation
page read and write
75B3000
heap
page read and write
880000
heap
page read and write
24A81F00000
trusted library allocation
page read and write
6AD1000
heap
page read and write
661800D0C000
trusted library allocation
page read and write
6618006F4000
trusted library allocation
page read and write
75B5000
heap
page read and write
6618001AC000
trusted library allocation
page read and write
24A85332000
heap
page read and write
66180008C000
trusted library allocation
page read and write
1077000
heap
page read and write
661800629000
trusted library allocation
page read and write
6A940033C000
trusted library allocation
page read and write
661800601000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
C5DDBFE000
stack
page read and write
66180009C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85332000
heap
page read and write
661800C10000
trusted library allocation
page read and write
8C0000
unkown
page readonly
6AD1000
heap
page read and write
661800EC8000
trusted library allocation
page read and write
24A8532B000
heap
page read and write
6000002C0000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
6A9400250000
trusted library allocation
page read and write
600000230000
trusted library allocation
page read and write
24A85324000
heap
page read and write
6618008B4000
trusted library allocation
page read and write
8CA000
unkown
page readonly
24A85330000
heap
page read and write
24A8532A000
heap
page read and write
24A8C27E000
trusted library section
page read and write
661800A80000
trusted library allocation
page read and write
661800788000
trusted library allocation
page read and write
24A858B7000
heap
page read and write
788A000
heap
page read and write
24A81E88000
heap
page read and write
6AD1000
heap
page read and write
24A85330000
heap
page read and write
6AC0000
direct allocation
page read and write
6000002F8000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
776F000
heap
page read and write
783D000
heap
page read and write
8D1000
unkown
page readonly
C5897FE000
unkown
page readonly
AA7000
heap
page read and write
24A858FC000
heap
page read and write
24A85330000
heap
page read and write
68E400250000
direct allocation
page read and write
C5827FE000
unkown
page readonly
6AD1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
75BA000
heap
page read and write
6A940040C000
trusted library allocation
page read and write
24A85324000
heap
page read and write
77AB000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
24A85810000
trusted library section
page read and write
75B6000
heap
page read and write
6618001EC000
trusted library allocation
page read and write
6AD1000
heap
page read and write
24A85330000
heap
page read and write
24A85330000
heap
page read and write
661800484000
trusted library allocation
page read and write
24A85324000
heap
page read and write
75BC000
heap
page read and write
6A9400248000
trusted library allocation
page read and write
6A94002FC000
trusted library allocation
page read and write
661800EE8000
trusted library allocation
page read and write
C5F8BFD000
stack
page read and write
24A85324000
heap
page read and write
6AC0000
direct allocation
page read and write
24A85324000
heap
page read and write
6AD1000
heap
page read and write
6C18D000
unkown
page read and write
661800554000
trusted library allocation
page read and write
9D0000
heap
page read and write
6A940020C000
trusted library allocation
page read and write
24A81F93000
heap
page read and write
24A8C003000
trusted library section
page read and write
600000274000
trusted library allocation
page read and write
C583FFD000
stack
page read and write
B74000
heap
page read and write
66180060C000
trusted library allocation
page read and write
68E40023C000
direct allocation
page read and write
661800310000
trusted library allocation
page read and write
6618002AA000
trusted library allocation
page read and write
661800368000
trusted library allocation
page read and write
7B2A000
heap
page read and write
661800700000
trusted library allocation
page read and write
6618002B8000
trusted library allocation
page read and write
24A85335000
heap
page read and write
24A85937000
heap
page read and write
661800864000
trusted library allocation
page read and write
6AD1000
heap
page read and write
7650000
heap
page read and write
24A85322000
heap
page read and write
6618006BC000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A85332000
heap
page read and write
6000002C0000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
6A94006B8000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
A56000
heap
page read and write
68E4002DC000
direct allocation
page read and write
661800D30000
trusted library allocation
page read and write
C5FABFB000
stack
page read and write
6618008F4000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
B74000
heap
page read and write
6618001D4000
trusted library allocation
page read and write
661800C48000
trusted library allocation
page read and write
6618006B7000
trusted library allocation
page read and write
C5887FE000
unkown
page readonly
24A8533F000
heap
page read and write
24A85330000
heap
page read and write
6AD1000
heap
page read and write
6618003E5000
trusted library allocation
page read and write
6A9400320000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
766D000
heap
page read and write
767C000
heap
page read and write
661800C0C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6A940027C000
trusted library allocation
page read and write
24A8531B000
heap
page read and write
66180031C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
C5EC3FE000
unkown
page readonly
24A85334000
heap
page read and write
24A8532A000
heap
page read and write
6AD1000
heap
page read and write
24A85336000
heap
page read and write
68E400230000
direct allocation
page read and write
6AD1000
heap
page read and write
24A85330000
heap
page read and write
75BB000
heap
page read and write
6AD1000
heap
page read and write
24A85351000
heap
page read and write
6618001B4000
trusted library allocation
page read and write
6618002C4000
trusted library allocation
page read and write
C5EA3FE000
unkown
page readonly
6AD1000
heap
page read and write
661800C74000
trusted library allocation
page read and write
6A9400678000
trusted library allocation
page read and write
7DC000
stack
page read and write
66180040C000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
66180020C000
trusted library allocation
page read and write
600000288000
trusted library allocation
page read and write
24A8594C000
heap
page read and write
6AD1000
heap
page read and write
600000278000
trusted library allocation
page read and write
24A85340000
heap
page read and write
24A85322000
heap
page read and write
24A85917000
heap
page read and write
6AD1000
heap
page read and write
24A85322000
heap
page read and write
7B20000
heap
page read and write
F10000
heap
page read and write
24A8532A000
heap
page read and write
24A85324000
heap
page read and write
7685000
heap
page read and write
68E400274000
direct allocation
page read and write
66180000C000
trusted library allocation
page read and write
6000002F4000
trusted library allocation
page read and write
8CE000
unkown
page read and write
24A85351000
heap
page read and write
24A81EB7000
heap
page read and write
24A8589F000
heap
page read and write
C5ECBFE000
stack
page read and write
24A85330000
heap
page read and write
6AD1000
heap
page read and write
6A9400698000
trusted library allocation
page read and write
6A9400744000
trusted library allocation
page read and write
68E400210000
direct allocation
page read and write
AB0000
heap
page read and write
6618002A8000
trusted library allocation
page read and write
767D000
heap
page read and write
6618008CC000
trusted library allocation
page read and write
C58BFFE000
stack
page read and write
76D3000
heap
page read and write
661800E4D000
trusted library allocation
page read and write
6000002C0000
trusted library allocation
page read and write
78CC000
heap
page read and write
24A858B5000
heap
page read and write
6C18F000
unkown
page readonly
66180061C000
trusted library allocation
page read and write
661800D94000
trusted library allocation
page read and write
24A85330000
heap
page read and write
6618001AC000
trusted library allocation
page read and write
661800214000
trusted library allocation
page read and write
6618006AC000
trusted library allocation
page read and write
661800B10000
trusted library allocation
page read and write
6A940080C000
trusted library allocation
page read and write
6618001E0000
trusted library allocation
page read and write
C90000
heap
page read and write
76FB000
heap
page read and write
C5DBBEF000
stack
page read and write
661800CD8000
trusted library allocation
page read and write
6000002B0000
trusted library allocation
page read and write
15B7000
heap
page read and write
6618001E4000
trusted library allocation
page read and write
24A85324000
heap
page read and write
24A85330000
heap
page read and write
24A85330000
heap
page read and write
24A85330000
heap
page read and write
6618000FC000
trusted library allocation
page read and write
C5FF3FE000
unkown
page readonly
661800310000
trusted library allocation
page read and write
6618002A4000
trusted library allocation
page read and write
8D1000
unkown
page readonly
24A85560000
heap
page read and write
8CE000
unkown
page write copy
71E0000
direct allocation
page execute and read and write
24A85324000
heap
page read and write
6618006E9000
trusted library allocation
page read and write
6A94006CC000
trusted library allocation
page read and write
151E000
stack
page read and write
24A85324000
heap
page read and write
6618003E1000
trusted library allocation
page read and write
661800B1C000
trusted library allocation
page read and write
24A85332000
heap
page read and write
6A9400430000
trusted library allocation
page read and write
770C000
heap
page read and write
6AD1000
heap
page read and write
6000002B0000
trusted library allocation
page read and write
661800EA0000
trusted library allocation
page read and write
6618004E0000
trusted library allocation
page read and write
75B4000
heap
page read and write
AB5000
heap
page read and write
6000002B0000
trusted library allocation
page read and write
24A85860000
heap
page read and write
661800310000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
661800494000
trusted library allocation
page read and write
661800224000
trusted library allocation
page read and write
6AD1000
heap
page read and write
8CE000
unkown
page write copy
6AD1000
heap
page read and write
24A858CC000
heap
page read and write
6AD1000
heap
page read and write
661800E60000
trusted library allocation
page read and write
6A9400330000
trusted library allocation
page read and write
B74000
heap
page read and write
24A81F90000
heap
page read and write
6000002D8000
trusted library allocation
page read and write
24A8589F000
heap
page read and write
6A9400230000
trusted library allocation
page read and write
A67000
heap
page read and write
74B1000
heap
page read and write
24A85324000
heap
page read and write
C5EFBFE000
stack
page read and write
24A85893000
heap
page read and write
24A858E3000
heap
page read and write
24A85330000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6618007DC000
trusted library allocation
page read and write
24A85324000
heap
page read and write
24A8BF60000
trusted library section
page read and write
24A85324000
heap
page read and write
780000
heap
page read and write
661800484000
trusted library allocation
page read and write
C5E83FE000
unkown
page readonly
96C000
stack
page read and write
24A85330000
heap
page read and write
795C000
heap
page read and write
6618006EE000
trusted library allocation
page read and write
766B000
direct allocation
page read and write
66180037C000
trusted library allocation
page read and write
8CA000
unkown
page readonly
6618001AC000
trusted library allocation
page read and write
AA0000
heap
page read and write
24A85324000
heap
page read and write
6A94006D4000
trusted library allocation
page read and write
6A94006C8000
trusted library allocation
page read and write
661800F80000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
13F8000
heap
page read and write
661800E48000
trusted library allocation
page read and write
6F60000
direct allocation
page read and write
7C0C000
heap
page read and write
1A20000
heap
page read and write
24A85324000
heap
page read and write
6AD1000
heap
page read and write
8D1000
unkown
page readonly
24A8532A000
heap
page read and write
68E400284000
direct allocation
page read and write
24A8532B000
heap
page read and write
6618002B4000
trusted library allocation
page read and write
24A85332000
heap
page read and write
8D1000
unkown
page readonly
6618002A4000
trusted library allocation
page read and write
76E0000
heap
page read and write
B74000
heap
page read and write
6000002A0000
trusted library allocation
page read and write
6618004F8000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A85927000
heap
page read and write
24A85330000
heap
page read and write
24A858A4000
heap
page read and write
24A858D7000
heap
page read and write
24A858A4000
heap
page read and write
C5837FE000
unkown
page readonly
C5E8BFA000
stack
page read and write
24A8532A000
heap
page read and write
24A85322000
heap
page read and write
661800F8C000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
24A85330000
heap
page read and write
6A9400758000
trusted library allocation
page read and write
661800CAC000
trusted library allocation
page read and write
C5EABFE000
stack
page read and write
24A8B900000
trusted library section
page read and write
24A8532A000
heap
page read and write
6618001CC000
trusted library allocation
page read and write
8D1000
unkown
page readonly
C5EEBFE000
stack
page read and write
1370000
heap
page read and write
6AD1000
heap
page read and write
24A85330000
heap
page read and write
6AD1000
heap
page read and write
6000002C8000
trusted library allocation
page read and write
6618005D4000
trusted library allocation
page read and write
6A9400368000
trusted library allocation
page read and write
8C1000
unkown
page execute read
6618002F0000
trusted library allocation
page read and write
58C000
stack
page read and write
24A85350000
heap
page read and write
66180020C000
trusted library allocation
page read and write
C5FDBFE000
stack
page read and write
82F000
unkown
page read and write
6AD1000
heap
page read and write
ADC000
stack
page read and write
661800CCC000
trusted library allocation
page read and write
8CF000
stack
page read and write
661800AD4000
trusted library allocation
page read and write
24A85351000
heap
page read and write
68E400217000
direct allocation
page read and write
8C1000
unkown
page execute read
661800D6C000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
6AD1000
heap
page read and write
B74000
heap
page read and write
661800DEC000
trusted library allocation
page read and write
71E0000
direct allocation
page execute and read and write
9C0000
heap
page read and write
661800CD8000
trusted library allocation
page read and write
6618001C4000
trusted library allocation
page read and write
C5F73FE000
unkown
page readonly
75B0000
heap
page read and write
6AD1000
heap
page read and write
661800B7C000
trusted library allocation
page read and write
661800C48000
trusted library allocation
page read and write
24A85330000
heap
page read and write
66180074C000
trusted library allocation
page read and write
C5FE3FE000
unkown
page readonly
6AD1000
heap
page read and write
24A8BF80000
trusted library section
page read and write
6AD1000
heap
page read and write
6A9400750000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6A94006F0000
trusted library allocation
page read and write
71E0000
direct allocation
page execute and read and write
C585FFD000
stack
page read and write
24A85351000
heap
page read and write
24A8BB50000
trusted library section
page read and write
C5847FE000
unkown
page readonly
6AD1000
heap
page read and write
24A858AC000
heap
page read and write
C587FFA000
stack
page read and write
6AD1000
heap
page read and write
75B1000
heap
page read and write
789B000
heap
page read and write
24A8532F000
heap
page read and write
7671000
heap
page read and write
6A94006AC000
trusted library allocation
page read and write
24A8532A000
heap
page read and write
68E400260000
direct allocation
page read and write
6F10000
trusted library allocation
page read and write
24A85332000
heap
page read and write
8CA000
unkown
page readonly
7716000
heap
page read and write
6AD1000
heap
page read and write
24A8533F000
heap
page read and write
6000002BC000
trusted library allocation
page read and write
B74000
heap
page read and write
60000020D000
trusted library allocation
page read and write
66180058C000
trusted library allocation
page read and write
6A9400644000
trusted library allocation
page read and write
24A8531E000
heap
page read and write
6AD1000
heap
page read and write
6AD1000
heap
page read and write
24A897C0000
trusted library section
page read and write
6618000DC000
trusted library allocation
page read and write
6A940060C000
trusted library allocation
page read and write
6AD1000
heap
page read and write
6A9400788000
trusted library allocation
page read and write
661800DDF000
trusted library allocation
page read and write
There are 1361 hidden memdumps, click here to show them.