IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_ed208a90-a6a7-4a0e-b504-7f6ab3363c62\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D3D.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Nov 24 10:33:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EF3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F33.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 --field-trial-handle=2144,i,17002288862588323597,13941596843949816607,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 1836
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://chrome.google.com/webstore?hl=enQw
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7488%
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347$
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
https://issuetracker.google.com/issues/166475273q
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://anglebug.com/7320e
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.68
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{5c7e77c5-b73f-7af2-8f4a-589876e9a2d5}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
46A000
unkown
page readonly
65E800230000
trusted library allocation
page read and write
6CA1000
heap
page read and write
730800770000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
730800330000
trusted library allocation
page read and write
1560000
heap
page read and write
2C7C00C0C000
trusted library allocation
page read and write
2C7C00844000
trusted library allocation
page read and write
6EB57FA000
stack
page read and write
206CF187000
heap
page read and write
6ECE7FE000
stack
page read and write
2C7C0016C000
trusted library allocation
page read and write
206CF6F9000
heap
page read and write
2C7C00658000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF6F2000
heap
page read and write
2C7C00AB4000
trusted library allocation
page read and write
7759000
heap
page read and write
2C7C001E8000
trusted library allocation
page read and write
206D53C7000
unclassified section
page read and write
775F000
heap
page read and write
7308006F0000
trusted library allocation
page read and write
730800620000
trusted library allocation
page read and write
2C7C00DE4000
trusted library allocation
page read and write
471000
unkown
page readonly
6EB2FFE000
unkown
page readonly
206D602E000
trusted library section
page read and write
206CF6E6000
heap
page read and write
7308002F0000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
206CF181000
heap
page read and write
2C7C00D00000
trusted library allocation
page read and write
7751000
heap
page read and write
2C7C00390000
trusted library allocation
page read and write
1864000
heap
page read and write
206CF187000
heap
page read and write
7A5E000
heap
page read and write
2C7C0034C000
trusted library allocation
page read and write
2C7C00D58000
trusted library allocation
page read and write
206CF181000
heap
page read and write
730800704000
trusted library allocation
page read and write
6EC37FE000
unkown
page readonly
206CF187000
heap
page read and write
2C7C0034C000
trusted library allocation
page read and write
6EC6FFE000
unkown
page readonly
206CF1A1000
heap
page read and write
206CF17F000
heap
page read and write
9FD000
stack
page read and write
730800688000
trusted library allocation
page read and write
65E8002BC000
trusted library allocation
page read and write
206CF187000
heap
page read and write
730800784000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
77FB000
heap
page read and write
6CA1000
heap
page read and write
206CF6E9000
heap
page read and write
65E8002BC000
trusted library allocation
page read and write
2C7C00F78000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF6F9000
heap
page read and write
730800418000
trusted library allocation
page read and write
7754000
heap
page read and write
206CF71A000
heap
page read and write
461000
unkown
page execute read
7390000
direct allocation
page execute and read and write
7A4D000
heap
page read and write
2C7C00198000
trusted library allocation
page read and write
206CF179000
heap
page read and write
2C7C00CF0000
trusted library allocation
page read and write
460000
unkown
page readonly
206CF173000
heap
page read and write
730800330000
trusted library allocation
page read and write
2C7C00AA4000
trusted library allocation
page read and write
2C7C00354000
trusted library allocation
page read and write
7308006B8000
trusted library allocation
page read and write
2C7C007B7000
trusted library allocation
page read and write
2C7C00D24000
trusted library allocation
page read and write
78AC000
heap
page read and write
2C7C001B4000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
65E8002C0000
trusted library allocation
page read and write
2C7C00CE8000
trusted library allocation
page read and write
46E000
unkown
page write copy
2C7C00304000
trusted library allocation
page read and write
E7C000
stack
page read and write
7390000
direct allocation
page execute and read and write
206D3462000
trusted library allocation
page read and write
206CF187000
heap
page read and write
206CF181000
heap
page read and write
206CF6E9000
heap
page read and write
730800788000
trusted library allocation
page read and write
206CF188000
heap
page read and write
2C7C00B0C000
trusted library allocation
page read and write
206CF71A000
heap
page read and write
775E000
heap
page read and write
1241000
unkown
page execute and write copy
2C7C000AC000
trusted library allocation
page read and write
7755000
heap
page read and write
7308007C8000
trusted library allocation
page read and write
2C7C00093000
trusted library allocation
page read and write
148E000
stack
page read and write
6CA1000
heap
page read and write
206CF16A000
heap
page read and write
206CF188000
heap
page read and write
206CF181000
heap
page read and write
65E8002C0000
trusted library allocation
page read and write
2C7C001AC000
trusted library allocation
page read and write
1290000
heap
page read and write
2C7C003ED000
trusted library allocation
page read and write
1547000
heap
page read and write
206CF179000
heap
page read and write
2C7C0021C000
trusted library allocation
page read and write
6CA1000
heap
page read and write
730800408000
trusted library allocation
page read and write
2C7C002E0000
trusted library allocation
page read and write
2C7C00F68000
trusted library allocation
page read and write
2C7C0074C000
trusted library allocation
page read and write
7390000
direct allocation
page execute and read and write
471000
unkown
page readonly
2C7C00934000
trusted library allocation
page read and write
46A000
unkown
page readonly
2C7C00294000
trusted library allocation
page read and write
2C7C00B40000
trusted library allocation
page read and write
65E8002BC000
trusted library allocation
page read and write
2C7C002A4000
trusted library allocation
page read and write
206CF187000
heap
page read and write
2C7C00782000
trusted library allocation
page read and write
2C7C00CBC000
trusted library allocation
page read and write
206CBBDC000
heap
page read and write
A8A000
heap
page read and write
6CA1000
heap
page read and write
206CF182000
heap
page read and write
783B000
heap
page read and write
2C7C00988000
trusted library allocation
page read and write
6EC2FFE000
unkown
page readonly
6ECB7FE000
stack
page read and write
7757000
heap
page read and write
206CF187000
heap
page read and write
2C7C00D1C000
trusted library allocation
page read and write
2C7C00E1C000
trusted library allocation
page read and write
206CF71A000
heap
page read and write
206CF181000
heap
page read and write
65E8002A0000
trusted library allocation
page read and write
206CF182000
heap
page read and write
2C7C000EC000
trusted library allocation
page read and write
206CF187000
heap
page read and write
206CF187000
heap
page read and write
2C7C00E4C000
trusted library allocation
page read and write
2C7C00E98000
trusted library allocation
page read and write
2C7C00F5C000
trusted library allocation
page read and write
6CA1000
heap
page read and write
2C7C00340000
trusted library allocation
page read and write
7752000
heap
page read and write
206D5CE0000
trusted library section
page read and write
6EBCFFE000
unkown
page readonly
206CF181000
heap
page read and write
2C7C00268000
trusted library allocation
page read and write
2C7C00201000
trusted library allocation
page read and write
65E8002BC000
trusted library allocation
page read and write
2C7C00300000
trusted library allocation
page read and write
7308006B0000
trusted library allocation
page read and write
18E6000
heap
page read and write
206CF5F0000
trusted library section
page read and write
7390000
direct allocation
page execute and read and write
6EC9FFE000
unkown
page readonly
206D3A30000
heap
page read and write
2C7C00134000
trusted library allocation
page read and write
2C7C00AE0000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
206CF18B000
heap
page read and write
2C7C000B4000
trusted library allocation
page read and write
206CF665000
heap
page read and write
2C7C00CA4000
trusted library allocation
page read and write
2C7C006AC000
trusted library allocation
page read and write
46E000
unkown
page read and write
65E800238000
trusted library allocation
page read and write
206CF181000
heap
page read and write
206CF181000
heap
page read and write
206CF185000
heap
page read and write
2C7C00CA4000
trusted library allocation
page read and write
6EBFFFE000
unkown
page readonly
730800368000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
2C7C00C54000
trusted library allocation
page read and write
2C7C00742000
trusted library allocation
page read and write
6EB6FFE000
unkown
page readonly
206CF17B000
heap
page read and write
2C7C00124000
trusted library allocation
page read and write
730800624000
trusted library allocation
page read and write
206CF6C4000
heap
page read and write
6CA1000
heap
page read and write
6CA1000
heap
page read and write
781D000
heap
page read and write
2C7C002F0000
trusted library allocation
page read and write
7829000
direct allocation
page read and write
2C7C00190000
trusted library allocation
page read and write
2C7C00C98000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
2C7C00354000
trusted library allocation
page read and write
13FC000
stack
page read and write
6ECBFFE000
unkown
page readonly
206CF16A000
heap
page read and write
6CA1000
heap
page read and write
7923000
heap
page read and write
2C7C00EA4000
trusted library allocation
page read and write
2C7C00E8C000
trusted library allocation
page read and write
2C7C00C7C000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
206CF187000
heap
page read and write
2C7C00794000
trusted library allocation
page read and write
206CF181000
heap
page read and write
206CF187000
heap
page read and write
6EBA7FE000
stack
page read and write
6CA1000
heap
page read and write
206CF6F7000
heap
page read and write
73080035C000
trusted library allocation
page read and write
206CF187000
heap
page read and write
1207000
heap
page read and write
2C7C001F8000
trusted library allocation
page read and write
79A0000
heap
page read and write
65E800250000
trusted library allocation
page read and write
2C7C0077D000
trusted library allocation
page read and write
2C7C004AC000
trusted library allocation
page read and write
206CF181000
heap
page read and write
2C7C0036C000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
A80000
heap
page read and write
6CA1000
heap
page read and write
130400280000
direct allocation
page read and write
775C000
heap
page read and write
46A000
unkown
page readonly
7390000
direct allocation
page execute and read and write
2C7C001A0000
trusted library allocation
page read and write
206CF190000
heap
page read and write
27EF000
unkown
page read and write
103C000
stack
page read and write
206D3A74000
heap
page read and write
65E8002B0000
trusted library allocation
page read and write
2C7C00AC4000
trusted library allocation
page read and write
206CF6C4000
heap
page read and write
206D3A55000
heap
page read and write
784A000
heap
page read and write
2C7C00C28000
trusted library allocation
page read and write
785C000
heap
page read and write
2C7C0080C000
trusted library allocation
page read and write
130400270000
direct allocation
page read and write
206CF17A000
heap
page read and write
78C0000
heap
page read and write
730800698000
trusted library allocation
page read and write
2C7C00380000
trusted library allocation
page read and write
206CF181000
heap
page read and write
461000
unkown
page execute read
2C7C0081C000
trusted library allocation
page read and write
206CBD30000
heap
page read and write
130400290000
direct allocation
page read and write
206CF188000
heap
page read and write
206CF17B000
heap
page read and write
119F000
stack
page read and write
73080080C000
trusted library allocation
page read and write
2C7C003ED000
trusted library allocation
page read and write
6EAEFFE000
unkown
page readonly
130400303000
direct allocation
page read and write
7756000
heap
page read and write
460000
unkown
page readonly
5F0000
heap
page read and write
13F0000
heap
page read and write
2C7C008A4000
trusted library allocation
page read and write
206D59F0000
trusted library section
page read and write
2C7C00C34000
trusted library allocation
page read and write
2C7C00390000
trusted library allocation
page read and write
206CF1A1000
heap
page read and write
206CF181000
heap
page read and write
206CBBEE000
heap
page read and write
7750000
heap
page read and write
7380000
direct allocation
page execute and read and write
206CF6BC000
heap
page read and write
206CF6FF000
heap
page read and write
6EB47FE000
stack
page read and write
730800320000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
206CF173000
heap
page read and write
6EAC7FD000
unkown
page read and write
206CF17B000
heap
page read and write
206D61E0000
trusted library section
page read and write
206CF173000
heap
page read and write
206CF140000
heap
page read and write
18DF000
heap
page read and write
730800238000
trusted library allocation
page read and write
206CF173000
heap
page read and write
2C7C00218000
trusted library allocation
page read and write
2C7C001EC000
trusted library allocation
page read and write
2C7C0020C000
trusted library allocation
page read and write
7751000
heap
page read and write
206CF18B000
heap
page read and write
7390000
direct allocation
page execute and read and write
206CBE20000
heap
page read and write
206CF17B000
heap
page read and write
2C7C007D8000
trusted library allocation
page read and write
206CF6F2000
heap
page read and write
1864000
heap
page read and write
206CF16A000
heap
page read and write
73080039C000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
2C7C001AC000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
6CA1000
heap
page read and write
73080035C000
trusted library allocation
page read and write
1200000
heap
page read and write
7308002B0000
trusted library allocation
page read and write
206CF181000
heap
page read and write
7308006C8000
trusted library allocation
page read and write
6CA1000
heap
page read and write
2C7C00DF0000
trusted library allocation
page read and write
2C7C002C0000
trusted library allocation
page read and write
206CF190000
heap
page read and write
2C7C00E65000
trusted library allocation
page read and write
77E5000
heap
page read and write
6EB97FE000
stack
page read and write
65E8002B0000
trusted library allocation
page read and write
206CF646000
heap
page read and write
1730000
heap
page read and write
7308006E0000
trusted library allocation
page read and write
2C7C00A70000
trusted library allocation
page read and write
1727000
heap
page read and write
6EC3FFE000
unkown
page readonly
206D57F0000
trusted library section
page read and write
2C7C0029A000
trusted library allocation
page read and write
6EC07FB000
stack
page read and write
7961000
heap
page read and write
2C7C004BC000
trusted library allocation
page read and write
6EB27FB000
stack
page read and write
206CE410000
unkown
page read and write
2C7C002A8000
trusted library allocation
page read and write
206CF1AF000
heap
page read and write
206CF189000
heap
page read and write
278E000
unkown
page read and write
78EA000
heap
page read and write
2C7C007A8000
trusted library allocation
page read and write
2C7C00C01000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
2C7C00C28000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
1870000
direct allocation
page read and write
206CF16A000
heap
page read and write
1304002A8000
direct allocation
page read and write
6EAD7FF000
stack
page read and write
7754000
heap
page read and write
206CF6C4000
heap
page read and write
206CF3C0000
heap
page read and write
2C7C00860000
trusted library allocation
page read and write
1864000
heap
page read and write
2C7C00E0C000
trusted library allocation
page read and write
206CF6FF000
heap
page read and write
206CF187000
heap
page read and write
6CA1000
heap
page read and write
206CF166000
heap
page read and write
206CF9E7000
unclassified section
page read and write
18DE000
heap
page read and write
10D0000
heap
page read and write
18CD000
heap
page read and write
206CF17B000
heap
page read and write
7308002CC000
trusted library allocation
page read and write
2C7C00535000
trusted library allocation
page read and write
6ED1FFE000
unkown
page readonly
D70000
heap
page read and write
2C7C00978000
trusted library allocation
page read and write
206CF187000
heap
page read and write
206CF181000
heap
page read and write
2C7C002B4000
trusted library allocation
page read and write
206CF181000
heap
page read and write
6CA1000
heap
page read and write
206CF17B000
heap
page read and write
206CF181000
heap
page read and write
7902000
heap
page read and write
206CBB97000
heap
page read and write
13040024C000
direct allocation
page read and write
206CF179000
heap
page read and write
6CA1000
heap
page read and write
13B0000
heap
page read and write
789D000
heap
page read and write
775A000
heap
page read and write
2C7C004E0000
trusted library allocation
page read and write
2C7C00234000
trusted library allocation
page read and write
730800220000
trusted library allocation
page read and write
461000
unkown
page execute read
1440000
heap
page read and write
206CF17B000
heap
page read and write
206CBE25000
heap
page read and write
C40000
heap
page read and write
6CA1000
heap
page read and write
2C7C0017C000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF194000
heap
page read and write
206CF715000
heap
page read and write
730800678000
trusted library allocation
page read and write
26DA000
stack
page read and write
7837000
heap
page read and write
2C7C00CF4000
trusted library allocation
page read and write
6EB07FE000
stack
page read and write
2790000
heap
page read and write
775B000
heap
page read and write
206CF188000
heap
page read and write
6DA0000
trusted library allocation
page read and write
7758000
heap
page read and write
206CF16A000
heap
page read and write
6CA1000
heap
page read and write
6ED2FFE000
unkown
page readonly
2C7C00360000
trusted library allocation
page read and write
2C7C00EB8000
trusted library allocation
page read and write
7390000
direct allocation
page execute and read and write
206CF186000
heap
page read and write
206D6022000
trusted library section
page read and write
65E800294000
trusted library allocation
page read and write
206CBBEE000
heap
page read and write
6EBF7FE000
stack
page read and write
730800424000
trusted library allocation
page read and write
206CF173000
heap
page read and write
78BC000
heap
page read and write
206CBBDC000
heap
page read and write
206CF179000
heap
page read and write
6EAF7FE000
stack
page read and write
78E9000
heap
page read and write
7757000
heap
page read and write
2C7C001D0000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
6EB3FFE000
unkown
page readonly
206CF72A000
heap
page read and write
206CF16E000
heap
page read and write
2C7C002F0000
trusted library allocation
page read and write
2C7C007C0000
trusted library allocation
page read and write
2C7C00A34000
trusted library allocation
page read and write
2C7C0060C000
trusted library allocation
page read and write
206CF181000
heap
page read and write
2C7C00E01000
trusted library allocation
page read and write
2C7C0029A000
trusted library allocation
page read and write
206CF6E6000
heap
page read and write
206CF17B000
heap
page read and write
206CF72A000
heap
page read and write
206CBB9E000
heap
page read and write
2C7C00AF0000
trusted library allocation
page read and write
206CF17D000
heap
page read and write
206CF181000
heap
page read and write
EA0000
heap
page read and write
2C7C00A01000
trusted library allocation
page read and write
2B00000
heap
page read and write
6ED17FE000
stack
page read and write
730800404000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
7758000
heap
page read and write
2C7C00EC4000
trusted library allocation
page read and write
206D2C00000
trusted library allocation
page read and write
73080020C000
trusted library allocation
page read and write
775E000
heap
page read and write
7907000
heap
page read and write
6ECF7FE000
stack
page read and write
206CD9C0000
heap
page read and write
580000
heap
page read and write
2C7C0095C000
trusted library allocation
page read and write
2C7C001F4000
trusted library allocation
page read and write
2C7C00220000
trusted library allocation
page read and write
2C7C00B6C000
trusted library allocation
page read and write
206CF167000
heap
page read and write
730800744000
trusted library allocation
page read and write
206D6152000
trusted library section
page read and write
1864000
heap
page read and write
206CF187000
heap
page read and write
2C7C00A4C000
trusted library allocation
page read and write
461000
unkown
page execute read
1864000
heap
page read and write
7883000
heap
page read and write
73080027C000
trusted library allocation
page read and write
2C7C0084C000
trusted library allocation
page read and write
206D3A7E000
heap
page read and write
6ECEFFE000
unkown
page readonly
206CF187000
heap
page read and write
2C7C000A0000
trusted library allocation
page read and write
7A7F000
heap
page read and write
206D6060000
trusted library section
page read and write
6CA1000
heap
page read and write
206CF173000
heap
page read and write
206CF187000
heap
page read and write
730800390000
trusted library allocation
page read and write
6EB37FC000
stack
page read and write
206CF19A000
heap
page read and write
6C0D1000
unkown
page execute read
2C7C001E4000
trusted library allocation
page read and write
206CF181000
heap
page read and write
2C7C001D4000
trusted library allocation
page read and write
65E8002BC000
trusted library allocation
page read and write
2C7C00EE0000
trusted library allocation
page read and write
730800320000
trusted library allocation
page read and write
73080025C000
trusted library allocation
page read and write
2C7C001E0000
trusted library allocation
page read and write
2C7C00060000
trusted library allocation
page read and write
2E10000
heap
page read and write
1720000
heap
page read and write
2C7C008C4000
trusted library allocation
page read and write
2C7C00B1C000
trusted library allocation
page read and write
79EF000
heap
page read and write
1864000
heap
page read and write
206D6000000
trusted library section
page read and write
7758000
heap
page read and write
730800248000
trusted library allocation
page read and write
6CA1000
heap
page read and write
730800658000
trusted library allocation
page read and write
1C1F000
stack
page read and write
2C7C00A1C000
trusted library allocation
page read and write
2C7C001C4000
trusted library allocation
page read and write
2C7C00304000
trusted library allocation
page read and write
471000
unkown
page readonly
65E8002BC000
trusted library allocation
page read and write
206CF6E2000
heap
page read and write
2C7C00C68000
trusted library allocation
page read and write
1864000
heap
page read and write
730800610000
trusted library allocation
page read and write
6EC1FFC000
stack
page read and write
206CF183000
heap
page read and write
6ED7FFE000
unkown
page readonly
2C7C009B8000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
6EC57FC000
stack
page read and write
46E000
unkown
page read and write
730800310000
trusted library allocation
page read and write
206CF187000
heap
page read and write
6CA1000
heap
page read and write
1304002EC000
direct allocation
page read and write
206CF17A000
heap
page read and write
206CF187000
heap
page read and write
730800320000
trusted library allocation
page read and write
65E8002A0000
trusted library allocation
page read and write
BFC000
stack
page read and write
206CF16A000
heap
page read and write
2C7C00CB4000
trusted library allocation
page read and write
2C7C003A4000
trusted library allocation
page read and write
6C1F8000
unkown
page readonly
46E000
unkown
page read and write
206CF16A000
heap
page read and write
206CF6F2000
heap
page read and write
6ECFFFE000
unkown
page readonly
130400215000
direct allocation
page read and write
206CF17B000
heap
page read and write
6ED6FFE000
unkown
page readonly
130400230000
direct allocation
page read and write
206CF17B000
heap
page read and write
6CA1000
heap
page read and write
2C7C005DC000
trusted library allocation
page read and write
206CBDF0000
trusted library section
page readonly
206CF16A000
heap
page read and write
2C7C003F2000
trusted library allocation
page read and write
206D6081000
trusted library section
page read and write
6CA1000
heap
page read and write
460000
unkown
page readonly
7A2C000
heap
page read and write
206D5247000
unclassified section
page read and write
6EC77FC000
stack
page read and write
2C7C003F2000
trusted library allocation
page read and write
F20000
heap
page read and write
2C7C00298000
trusted library allocation
page read and write
6EC7FFE000
unkown
page readonly
206CF18B000
heap
page read and write
2C7C00A34000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF1A3000
heap
page read and write
206CF17A000
heap
page read and write
6ED77FC000
stack
page read and write
730800700000
trusted library allocation
page read and write
775D000
heap
page read and write
206CF18B000
heap
page read and write
206CF711000
heap
page read and write
206CF171000
heap
page read and write
7308006FC000
trusted library allocation
page read and write
1864000
heap
page read and write
206CF6E9000
heap
page read and write
7390000
direct allocation
page execute and read and write
206CF18B000
heap
page read and write
730800758000
trusted library allocation
page read and write
206CF173000
heap
page read and write
6CA1000
heap
page read and write
2C7C00B18000
trusted library allocation
page read and write
730800668000
trusted library allocation
page read and write
6EDA7FE000
stack
page read and write
7842000
heap
page read and write
206CBCF0000
heap
page readonly
2C7C00880000
trusted library allocation
page read and write
206D6093000
trusted library section
page read and write
206CF188000
heap
page read and write
2C7C009A4000
trusted library allocation
page read and write
2C7C00E40000
trusted library allocation
page read and write
2C7C0076C000
trusted library allocation
page read and write
206CBBE5000
heap
page read and write
206CF17B000
heap
page read and write
206CF6B2000
heap
page read and write
206D615D000
trusted library section
page read and write
471000
unkown
page readonly
6C1F9000
unkown
page read and write
206CF16A000
heap
page read and write
130400234000
direct allocation
page read and write
730800374000
trusted library allocation
page read and write
2C7C00230000
trusted library allocation
page read and write
471000
unkown
page readonly
730800640000
trusted library allocation
page read and write
10E0000
heap
page read and write
206CF190000
heap
page read and write
787C000
heap
page read and write
2C7C00488000
trusted library allocation
page read and write
206CF664000
heap
page read and write
206CF17B000
heap
page read and write
206CF190000
heap
page read and write
6EB0FFE000
unkown
page readonly
775F000
heap
page read and write
798B000
heap
page read and write
77EB000
heap
page read and write
6EB17FD000
stack
page read and write
7308006AC000
trusted library allocation
page read and write
65E8002D8000
trusted library allocation
page read and write
18DA000
heap
page read and write
7751000
heap
page read and write
206CF181000
heap
page read and write
206CF164000
heap
page read and write
206CF179000
heap
page read and write
65E800278000
trusted library allocation
page read and write
775C000
heap
page read and write
2C7C00294000
trusted library allocation
page read and write
206CF641000
heap
page read and write
206CBD00000
heap
page read and write
1870000
direct allocation
page read and write
2C7C008F4000
trusted library allocation
page read and write
2C7C00EEC000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
206CF187000
heap
page read and write
775C000
heap
page read and write
461000
unkown
page execute read
206CBBBC000
heap
page read and write
1864000
heap
page read and write
2C7C00298000
trusted library allocation
page read and write
27A0000
heap
page read and write
6ECD7FD000
stack
page read and write
2C7C00078000
trusted library allocation
page read and write
6CA1000
heap
page read and write
2C7C001B4000
trusted library allocation
page read and write
730800330000
trusted library allocation
page read and write
2C7C006A1000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF17B000
heap
page read and write
2C7C00310000
trusted library allocation
page read and write
206D6190000
trusted library section
page read and write
7753000
heap
page read and write
6CA1000
heap
page read and write
2C7C0034C000
trusted library allocation
page read and write
6ED4FFE000
unkown
page readonly
143E000
stack
page read and write
65E800264000
trusted library allocation
page read and write
6EC27FC000
stack
page read and write
2C7C00538000
trusted library allocation
page read and write
6EB5FFE000
unkown
page readonly
730800380000
trusted library allocation
page read and write
7390000
direct allocation
page execute and read and write
46E000
unkown
page read and write
730800401000
trusted library allocation
page read and write
730800724000
trusted library allocation
page read and write
471000
unkown
page readonly
206CF16A000
heap
page read and write
2C7C00338000
trusted library allocation
page read and write
6ECA7FB000
stack
page read and write
206CF179000
heap
page read and write
2C7C00228000
trusted library allocation
page read and write
730800288000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
2C7C00601000
trusted library allocation
page read and write
206CF187000
heap
page read and write
6ED47FE000
stack
page read and write
2C7C003FB000
trusted library allocation
page read and write
1864000
heap
page read and write
2C7C00E2C000
trusted library allocation
page read and write
206CBBE1000
heap
page read and write
6CA1000
heap
page read and write
206CF18B000
heap
page read and write
206CF6FF000
heap
page read and write
460000
unkown
page readonly
206CF188000
heap
page read and write
2C7C0061C000
trusted library allocation
page read and write
461000
unkown
page execute read
471000
unkown
page readonly
206CF16A000
heap
page read and write
206CF187000
heap
page read and write
206D53D3000
heap
page read and write
206CF6B4000
heap
page read and write
7308002B8000
trusted library allocation
page read and write
7308006D4000
trusted library allocation
page read and write
787E000
heap
page read and write
2C7C0067C000
trusted library allocation
page read and write
2C7C000DC000
trusted library allocation
page read and write
19D0000
heap
page read and write
206CF187000
heap
page read and write
73080040C000
trusted library allocation
page read and write
7308007D0000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
7390000
direct allocation
page execute and read and write
6EAE7FE000
stack
page read and write
206CF173000
heap
page read and write
1864000
heap
page read and write
206CF186000
heap
page read and write
206CF181000
heap
page read and write
206CF179000
heap
page read and write
7390000
direct allocation
page execute and read and write
206CF1A1000
heap
page read and write
2C7C00E38000
trusted library allocation
page read and write
46A000
unkown
page readonly
206CF181000
heap
page read and write
2C7C00210000
trusted library allocation
page read and write
206CF181000
heap
page read and write
123C000
stack
page read and write
7370000
direct allocation
page execute and read and write
206CF713000
heap
page read and write
7390000
direct allocation
page execute and read and write
2C7C00BAC000
trusted library allocation
page read and write
730800750000
trusted library allocation
page read and write
6CA1000
heap
page read and write
2C7C00CE8000
trusted library allocation
page read and write
730800694000
trusted library allocation
page read and write
7390000
direct allocation
page execute and read and write
206CF181000
heap
page read and write
206CF16C000
heap
page read and write
206CF179000
heap
page read and write
775B000
heap
page read and write
730800310000
trusted library allocation
page read and write
460000
unkown
page readonly
46E000
unkown
page write copy
130400210000
direct allocation
page read and write
206CD9C3000
heap
page read and write
2C7C00294000
trusted library allocation
page read and write
6ED3FFE000
unkown
page readonly
2C7C0032C000
trusted library allocation
page read and write
130400260000
direct allocation
page read and write
2C7C00DC0000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
2C7C00390000
trusted library allocation
page read and write
206CF188000
heap
page read and write
791A000
heap
page read and write
206CF17B000
heap
page read and write
730800754000
trusted library allocation
page read and write
2C7C00C68000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
206CF187000
heap
page read and write
206CF689000
heap
page read and write
2C7C00708000
trusted library allocation
page read and write
2C7C001B4000
trusted library allocation
page read and write
73080033C000
trusted library allocation
page read and write
206CF188000
heap
page read and write
1870000
direct allocation
page read and write
730800734000
trusted library allocation
page read and write
6CA1000
heap
page read and write
2C7C00E1C000
trusted library allocation
page read and write
65E80020C000
trusted library allocation
page read and write
6CA1000
heap
page read and write
1304002E4000
direct allocation
page read and write
2C7C00D70000
trusted library allocation
page read and write
206CF6B4000
heap
page read and write
775F000
heap
page read and write
78C4000
heap
page read and write
206D3A39000
heap
page read and write
6EB1FFE000
unkown
page readonly
206CF1A3000
heap
page read and write
2C7C00E80000
trusted library allocation
page read and write
2C7C00B30000
trusted library allocation
page read and write
73080078C000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF6E2000
heap
page read and write
6EAFFFE000
unkown
page readonly
2C7C002B8000
trusted library allocation
page read and write
730800354000
trusted library allocation
page read and write
65E800274000
trusted library allocation
page read and write
7390000
direct allocation
page execute and read and write
2C7C00ED4000
trusted library allocation
page read and write
77FA000
heap
page read and write
7B0000
unkown
page readonly
206CF170000
heap
page read and write
2C7C00F08000
trusted library allocation
page read and write
206D3444000
trusted library allocation
page read and write
6ECAFFE000
unkown
page readonly
78A5000
heap
page read and write
2B0A000
heap
page read and write
206CF187000
heap
page read and write
3780000
direct allocation
page read and write
2C7C00D44000
trusted library allocation
page read and write
206CF179000
heap
page read and write
6CA1000
heap
page read and write
2C7C0032C000
trusted library allocation
page read and write
206CF181000
heap
page read and write
2C7C00504000
trusted library allocation
page read and write
783E000
heap
page read and write
206CF17B000
heap
page read and write
1870000
direct allocation
page read and write
206CF181000
heap
page read and write
730800630000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
1864000
heap
page read and write
206CF187000
heap
page read and write
206CF18B000
heap
page read and write
130400217000
direct allocation
page read and write
206CF6B6000
heap
page read and write
206CF187000
heap
page read and write
206CF187000
heap
page read and write
206CF1A1000
heap
page read and write
2C7C003ED000
trusted library allocation
page read and write
206CF194000
heap
page read and write
6EB9FFE000
unkown
page readonly
2C7C00550000
trusted library allocation
page read and write
206CF185000
heap
page read and write
65E8002C8000
trusted library allocation
page read and write
46A000
unkown
page readonly
730800664000
trusted library allocation
page read and write
730800718000
trusted library allocation
page read and write
E00000
heap
page read and write
6EBB7FD000
stack
page read and write
2C7C00FAC000
trusted library allocation
page read and write
206CF1A1000
heap
page read and write
2C7C00D30000
trusted library allocation
page read and write
2C7C0022C000
trusted library allocation
page read and write
730800230000
trusted library allocation
page read and write
206CF179000
heap
page read and write
2C7C00C6C000
trusted library allocation
page read and write
2C7C00BF4000
trusted library allocation
page read and write
2C7C0073C000
trusted library allocation
page read and write
2C7C00B58000
trusted library allocation
page read and write
206CF181000
heap
page read and write
7751000
heap
page read and write
2C7C00D6C000
trusted library allocation
page read and write
2C7C00320000
trusted library allocation
page read and write
2C7C0015C000
trusted library allocation
page read and write
2C7C0000C000
trusted library allocation
page read and write
46E000
unkown
page write copy
2C7C002B4000
trusted library allocation
page read and write
2C7C001DC000
trusted library allocation
page read and write
2C7C00A0C000
trusted library allocation
page read and write
206CF181000
heap
page read and write
78A5000
heap
page read and write
2C7C009DC000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
7885000
heap
page read and write
2C7C00401000
trusted library allocation
page read and write
6CA1000
heap
page read and write
6CA1000
heap
page read and write
471000
unkown
page readonly
2C7C00D4C000
trusted library allocation
page read and write
130400284000
direct allocation
page read and write
1304002D0000
direct allocation
page read and write
6CA1000
heap
page read and write
206CF17B000
heap
page read and write
206CF181000
heap
page read and write
460000
unkown
page readonly
206CF17B000
heap
page read and write
2C7C00C8C000
trusted library allocation
page read and write
6EDAFFE000
unkown
page readonly
206CF6B4000
heap
page read and write
1870000
direct allocation
page read and write
65E8002C0000
trusted library allocation
page read and write
781A000
heap
page read and write
2C7C001D8000
trusted library allocation
page read and write
7812000
heap
page read and write
65E800220000
trusted library allocation
page read and write
2C7C00788000
trusted library allocation
page read and write
206CF181000
heap
page read and write
7901000
heap
page read and write
78E3000
heap
page read and write
2C7C008DC000
trusted library allocation
page read and write
2C7C00DE4000
trusted library allocation
page read and write
6ED9FFE000
unkown
page readonly
206CF16A000
heap
page read and write
2C7C00F40000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
730800210000
trusted library allocation
page read and write
2C7C00F4C000
trusted library allocation
page read and write
6EC4FFE000
unkown
page readonly
6ED5FFE000
unkown
page readonly
2C7C0055C000
trusted library allocation
page read and write
6EC67FA000
stack
page read and write
65E8002F0000
trusted library allocation
page read and write
18D3000
heap
page read and write
730800654000
trusted library allocation
page read and write
130400250000
direct allocation
page read and write
206CF173000
heap
page read and write
107C000
stack
page read and write
6CA1000
heap
page read and write
269D000
stack
page read and write
2C7C0006C000
trusted library allocation
page read and write
730800201000
trusted library allocation
page read and write
471000
unkown
page readonly
206CF187000
heap
page read and write
2C7C003F2000
trusted library allocation
page read and write
7751000
heap
page read and write
2C7C0071C000
trusted library allocation
page read and write
206CBD50000
trusted library allocation
page read and write
206CF187000
heap
page read and write
206CF18B000
heap
page read and write
2C7C00214000
trusted library allocation
page read and write
206CF171000
heap
page read and write
206CF187000
heap
page read and write
7819000
heap
page read and write
6EC47FD000
stack
page read and write
6EB4FFE000
unkown
page readonly
7390000
direct allocation
page execute and read and write
206CF72A000
heap
page read and write
206CF640000
heap
page read and write
2C7C00B50000
trusted library allocation
page read and write
2C7C003F2000
trusted library allocation
page read and write
2C7C00D7C000
trusted library allocation
page read and write
206D53E7000
unclassified section
page read and write
65E8002E4000
trusted library allocation
page read and write
2C7C00001000
trusted library allocation
page read and write
7651000
heap
page read and write
2C7C00DB8000
trusted library allocation
page read and write
2C7C003ED000
trusted library allocation
page read and write
206D6136000
trusted library section
page read and write
2C7C00910000
trusted library allocation
page read and write
206CF64B000
heap
page read and write
46E000
unkown
page read and write
6CA1000
heap
page read and write
2C7C00374000
trusted library allocation
page read and write
6EB87FE000
stack
page read and write
7753000
heap
page read and write
206CBB08000
heap
page read and write
206CF16A000
heap
page read and write
6ED87FE000
stack
page read and write
2C7C004A4000
trusted library allocation
page read and write
206D5CD0000
trusted library section
page read and write
787F000
heap
page read and write
2C7C00AC0000
trusted library allocation
page read and write
2C7C00338000
trusted library allocation
page read and write
2C7C00BA0000
trusted library allocation
page read and write
2C7C00CDC000
trusted library allocation
page read and write
6EC17FC000
stack
page read and write
2C7C00E70000
trusted library allocation
page read and write
206CF1A3000
heap
page read and write
2C7C00294000
trusted library allocation
page read and write
206CF187000
heap
page read and write
6CA1000
heap
page read and write
EA7000
heap
page read and write
206CF780000
trusted library section
page read and write
1864000
heap
page read and write
6EC5FFE000
unkown
page readonly
6EC8FFE000
unkown
page readonly
206CF64B000
heap
page read and write
65E800260000
trusted library allocation
page read and write
46A000
unkown
page readonly
18F8000
heap
page read and write
78B4000
heap
page read and write
2C7C0040C000
trusted library allocation
page read and write
2C7C00F48000
trusted library allocation
page read and write
7750000
heap
page read and write
206CF6B6000
heap
page read and write
206CF16A000
heap
page read and write
206CF18B000
heap
page read and write
2C7C00418000
trusted library allocation
page read and write
7308006EC000
trusted library allocation
page read and write
6EC0FFE000
unkown
page readonly
206D5320000
heap
page read and write
2C7C00C1D000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
6EBC7FA000
stack
page read and write
2C7C002FB000
trusted library allocation
page read and write
206CF646000
heap
page read and write
206CF181000
heap
page read and write
7308006E4000
trusted library allocation
page read and write
788D000
heap
page read and write
206CBBC7000
heap
page read and write
6EAB7EF000
stack
page read and write
206CF187000
heap
page read and write
65E800248000
trusted library allocation
page read and write
6EBAFFE000
unkown
page readonly
2C7C004A0000
trusted library allocation
page read and write
6ED27FE000
stack
page read and write
6ECDFFE000
unkown
page readonly
206CF17B000
heap
page read and write
78B3000
heap
page read and write
206CF17B000
heap
page read and write
206CF179000
heap
page read and write
730800320000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF181000
heap
page read and write
2C7C0059C000
trusted library allocation
page read and write
791D000
heap
page read and write
206CF188000
heap
page read and write
730800730000
trusted library allocation
page read and write
206CF187000
heap
page read and write
730800364000
trusted library allocation
page read and write
206CBBF3000
heap
page read and write
730800760000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
206CF179000
heap
page read and write
206CF170000
heap
page read and write
730800601000
trusted library allocation
page read and write
590000
heap
page read and write
206CF173000
heap
page read and write
6CA1000
heap
page read and write
65E8002BC000
trusted library allocation
page read and write
6C1FC000
unkown
page readonly
7753000
heap
page read and write
786A000
heap
page read and write
65E8002B0000
trusted library allocation
page read and write
2C7C005B0000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
7EC000
stack
page read and write
6ECCFFE000
unkown
page readonly
2C7C0001C000
trusted library allocation
page read and write
2C7C00428000
trusted library allocation
page read and write
206CF179000
heap
page read and write
130400201000
direct allocation
page read and write
461000
unkown
page execute read
2C7C00A40000
trusted library allocation
page read and write
2C7C00BDC000
trusted library allocation
page read and write
206CF181000
heap
page read and write
2C7C00CB4000
trusted library allocation
page read and write
7308002E4000
trusted library allocation
page read and write
206CF189000
heap
page read and write
2C7C006C0000
trusted library allocation
page read and write
2C7C002F3000
trusted library allocation
page read and write
6EACFFE000
unkown
page readonly
730800714000
trusted library allocation
page read and write
461000
unkown
page execute read
7390000
direct allocation
page execute and read and write
7A84000
heap
page read and write
7308003EC000
trusted library allocation
page read and write
6ED8FFE000
unkown
page readonly
730800248000
trusted library allocation
page read and write
206CF187000
heap
page read and write
18DF000
heap
page read and write
2C7C00D60000
trusted library allocation
page read and write
206CF150000
heap
page read and write
7308006B4000
trusted library allocation
page read and write
6EB67FB000
stack
page read and write
206CF18B000
heap
page read and write
2C7C001F0000
trusted library allocation
page read and write
1864000
heap
page read and write
65E8002C0000
trusted library allocation
page read and write
3780000
direct allocation
page read and write
78DB000
heap
page read and write
6EC87FD000
stack
page read and write
2C7C00D98000
trusted library allocation
page read and write
6EBE7FE000
stack
page read and write
206CF181000
heap
page read and write
76D2000
direct allocation
page read and write
FB0000
heap
page read and write
206CF187000
heap
page read and write
206CF6E2000
heap
page read and write
65E800270000
trusted library allocation
page read and write
206CF187000
heap
page read and write
206CF187000
heap
page read and write
206CF18B000
heap
page read and write
206CF16C000
heap
page read and write
7815000
heap
page read and write
7390000
direct allocation
page execute and read and write
6EB8FFE000
unkown
page readonly
1870000
direct allocation
page read and write
461000
unkown
page execute read
206CF18B000
heap
page read and write
206CF184000
heap
page read and write
730800430000
trusted library allocation
page read and write
206CF181000
heap
page read and write
206CF18B000
heap
page read and write
206CF187000
heap
page read and write
2C7C00D90000
trusted library allocation
page read and write
7308006D0000
trusted library allocation
page read and write
2C7C00EFC000
trusted library allocation
page read and write
730800644000
trusted library allocation
page read and write
6ECC7FE000
stack
page read and write
2C7C00EB0000
trusted library allocation
page read and write
7308006C4000
trusted library allocation
page read and write
6CA1000
heap
page read and write
2740000
heap
page read and write
2C7C00578000
trusted library allocation
page read and write
206CF6F7000
heap
page read and write
2C7C009D4000
trusted library allocation
page read and write
6EB77FC000
stack
page read and write
2C7C00FB8000
trusted library allocation
page read and write
7757000
heap
page read and write
2C7C00360000
trusted library allocation
page read and write
206CF187000
heap
page read and write
206CF17B000
heap
page read and write
7308002FC000
trusted library allocation
page read and write
1304002AC000
direct allocation
page read and write
2C7C00224000
trusted library allocation
page read and write
206CF181000
heap
page read and write
730800348000
trusted library allocation
page read and write
206CF18B000
heap
page read and write
2C7C001B4000
trusted library allocation
page read and write
46A000
unkown
page readonly
1870000
direct allocation
page read and write
ECC000
stack
page read and write
65E800235000
trusted library allocation
page read and write
206CF179000
heap
page read and write
471000
unkown
page readonly
65E8002F4000
trusted library allocation
page read and write
6CA1000
heap
page read and write
2C7C00540000
trusted library allocation
page read and write
206CF1A5000
heap
page read and write
206CF6F7000
heap
page read and write
7390000
direct allocation
page execute and read and write
6CA1000
heap
page read and write
7751000
heap
page read and write
6CA1000
heap
page read and write
206CF16A000
heap
page read and write
206CF6B6000
heap
page read and write
1304002DC000
direct allocation
page read and write
2C7C00801000
trusted library allocation
page read and write
52C000
stack
page read and write
2C7C0008F000
trusted library allocation
page read and write
2C7C001AC000
trusted library allocation
page read and write
461000
unkown
page execute read
65E8002C0000
trusted library allocation
page read and write
730800684000
trusted library allocation
page read and write
206CF188000
heap
page read and write
2C7C00AFC000
trusted library allocation
page read and write
2C7C00B74000
trusted library allocation
page read and write
2C7C003A4000
trusted library allocation
page read and write
206CF188000
heap
page read and write
2C7C00690000
trusted library allocation
page read and write
2C7C00F18000
trusted library allocation
page read and write
46E000
unkown
page write copy
2C7C00C2C000
trusted library allocation
page read and write
46A000
unkown
page readonly
65E8002F8000
trusted library allocation
page read and write
6EBBFFE000
unkown
page readonly
2C7C0014C000
trusted library allocation
page read and write
791D000
heap
page read and write
2C7C00E58000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
206CF16D000
heap
page read and write
7390000
direct allocation
page execute and read and write
206CF18B000
heap
page read and write
2C7C00F88000
trusted library allocation
page read and write
460000
unkown
page readonly
7931000
heap
page read and write
7360000
direct allocation
page execute and read and write
6ED0FFE000
unkown
page readonly
206CF6F9000
heap
page read and write
206D5CEE000
trusted library section
page read and write
1864000
heap
page read and write
10F0000
heap
page read and write
206CBC10000
heap
page read and write
730800614000
trusted library allocation
page read and write
7751000
heap
page read and write
206CF16A000
heap
page read and write
7A09000
heap
page read and write
2C7C00B7C000
trusted library allocation
page read and write
6CA1000
heap
page read and write
206CF950000
trusted library section
page read and write
206CF188000
heap
page read and write
206CF181000
heap
page read and write
1870000
direct allocation
page read and write
7308007B4000
trusted library allocation
page read and write
65E8002A0000
trusted library allocation
page read and write
206CF713000
heap
page read and write
46A000
unkown
page readonly
206CF689000
heap
page read and write
206CF664000
heap
page read and write
206CBD60000
trusted library allocation
page read and write
206CF181000
heap
page read and write
2C7C00CB4000
trusted library allocation
page read and write
206CF679000
heap
page read and write
1870000
direct allocation
page read and write
7308006E8000
trusted library allocation
page read and write
65E8002A0000
trusted library allocation
page read and write
2C7C00054000
trusted library allocation
page read and write
2C7C00920000
trusted library allocation
page read and write
206CF16A000
heap
page read and write
6EBDFFE000
unkown
page readonly
7ABD000
heap
page read and write
206CBB92000
heap
page read and write
7755000
heap
page read and write
73080069C000
trusted library allocation
page read and write
6CA1000
heap
page read and write
130400294000
direct allocation
page read and write
2C7C0020C000
trusted library allocation
page read and write
6ED67FB000
stack
page read and write
2C7C00CCC000
trusted library allocation
page read and write
13040020C000
direct allocation
page read and write
7308006CC000
trusted library allocation
page read and write
206CF181000
heap
page read and write
2C7C00098000
trusted library allocation
page read and write
460000
unkown
page readonly
D5E000
stack
page read and write
206D61EE000
trusted library section
page read and write
2C7C00DA8000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
2C7C00C48000
trusted library allocation
page read and write
2C7F000
stack
page read and write
2C7C000FC000
trusted library allocation
page read and write
7839000
heap
page read and write
6EC97FC000
stack
page read and write
46E000
unkown
page write copy
7390000
direct allocation
page execute and read and write
730800354000
trusted library allocation
page read and write
7AE3000
heap
page read and write
7120000
direct allocation
page read and write
2C7C00C58000
trusted library allocation
page read and write
1969000
heap
page read and write
206CF6E6000
heap
page read and write
65E800201000
trusted library allocation
page read and write
2C7C00320000
trusted library allocation
page read and write
18F9000
heap
page read and write
6ED07FD000
stack
page read and write
D60000
heap
page read and write
2C7C00290000
trusted library allocation
page read and write
2C7C006F8000
trusted library allocation
page read and write
206D6011000
trusted library section
page read and write
A8E000
heap
page read and write
782B000
direct allocation
page read and write
78EB000
heap
page read and write
7308007CC000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
785B000
heap
page read and write
7B1000
unkown
page execute and write copy
1A1F000
stack
page read and write
2C7C00C2C000
trusted library allocation
page read and write
206CF17B000
heap
page read and write
206D53D0000
heap
page read and write
130400274000
direct allocation
page read and write
2C7C006CC000
trusted library allocation
page read and write
2C3E000
stack
page read and write
206CF18A000
heap
page read and write
2C7C00CA4000
trusted library allocation
page read and write
7759000
heap
page read and write
206CF16A000
heap
page read and write
46A000
unkown
page readonly
18F7000
heap
page read and write
130400220000
direct allocation
page read and write
6C1AF000
unkown
page readonly
6CA1000
heap
page read and write
775A000
heap
page read and write
6C0D0000
unkown
page readonly
6ED37FE000
stack
page read and write
206CF187000
heap
page read and write
6EB7FFE000
unkown
page readonly
65E800288000
trusted library allocation
page read and write
6ED57FD000
stack
page read and write
2C7C00D14000
trusted library allocation
page read and write
2C7C00C2C000
trusted library allocation
page read and write
730800250000
trusted library allocation
page read and write
2C7C00340000
trusted library allocation
page read and write
7755000
heap
page read and write
7753000
heap
page read and write
7758000
heap
page read and write
460000
unkown
page readonly
2C7C00CBC000
trusted library allocation
page read and write
6CA1000
heap
page read and write
6ED97FE000
stack
page read and write
73080075C000
trusted library allocation
page read and write
6EBEFFE000
unkown
page readonly
206CF17B000
heap
page read and write
1540000
heap
page read and write
2C7C0063C000
trusted library allocation
page read and write
6EBD7FE000
stack
page read and write
206CBB00000
heap
page read and write
6C1AD000
unkown
page read and write
73080033C000
trusted library allocation
page read and write
2C7C003F8000
trusted library allocation
page read and write
7308002D4000
trusted library allocation
page read and write
7308002F4000
trusted library allocation
page read and write
13040023C000
direct allocation
page read and write
79CD000
heap
page read and write
2C7C00DD0000
trusted library allocation
page read and write
2C7C00E5E000
trusted library allocation
page read and write
206D6070000
trusted library section
page read and write
206CF17B000
heap
page read and write
7308002ED000
trusted library allocation
page read and write
2C7C005C8000
trusted library allocation
page read and write
16D0000
heap
page read and write
2C7C00904000
trusted library allocation
page read and write
2C7C0058C000
trusted library allocation
page read and write
460000
unkown
page readonly
206CBBF9000
heap
page read and write
6CA1000
heap
page read and write
206CF179000
heap
page read and write
206CF181000
heap
page read and write
2C7C004EC000
trusted library allocation
page read and write
73080060C000
trusted library allocation
page read and write
There are 1268 hidden memdumps, click here to show them.