IOC Report
External24.exe

loading gif

Files

File Path
Type
Category
Malicious
External24.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\PixelFlow Creations\PixelFlow.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\PixelFlow Creations\PixelFlow.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\PixelFlow Creations\m
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\292668\Lawyers.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\292668\r
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\7yC9aM3nOPMh37Qvw5GmIXM.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\Accidents
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Anytime
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Appearance
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Army
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Cincinnati
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Helena
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Inflation
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Inspections
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Latinas
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Lung
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Physical
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Sharon
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Therefore
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Warming
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Wiley
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Zoning
data
dropped
malicious
C:\Windows\System32\GroupPolicy\GPT.INI
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Annex
StarOffice Gallery theme \354V\213\361W3\377\307\0060eK, 1183409670 objects, 1st \204\202
dropped
C:\Users\user\AppData\Local\Temp\Asia
data
dropped
C:\Users\user\AppData\Local\Temp\Camp
data
dropped
C:\Users\user\AppData\Local\Temp\Coated
data
dropped
C:\Users\user\AppData\Local\Temp\Concerning
data
dropped
C:\Users\user\AppData\Local\Temp\Cow
data
dropped
C:\Users\user\AppData\Local\Temp\Delivering
data
dropped
C:\Users\user\AppData\Local\Temp\Desperate
data
dropped
C:\Users\user\AppData\Local\Temp\Forgot
ASCII text, with very long lines (972), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Forgot.cmd
ASCII text, with very long lines (972), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Investing
COM executable for MS-DOS
dropped
C:\Users\user\AppData\Local\Temp\Ivory
data
dropped
C:\Users\user\AppData\Local\Temp\Loc
MPEG ADTS, layer I, v2, 224 kbps, 16 kHz, JntStereo
dropped
C:\Users\user\AppData\Local\Temp\Madness
data
dropped
C:\Users\user\AppData\Local\Temp\Monster
data
dropped
C:\Users\user\AppData\Local\Temp\Nipple
data
dropped
C:\Users\user\AppData\Local\Temp\Obesity
COM executable for DOS
dropped
C:\Users\user\AppData\Local\Temp\Pleased
data
dropped
C:\Users\user\AppData\Local\Temp\Query
data
dropped
C:\Users\user\AppData\Local\Temp\Regulated
data
dropped
C:\Users\user\AppData\Local\Temp\Same
data
dropped
C:\Users\user\AppData\Local\Temp\Situation
data
dropped
C:\Users\user\AppData\Local\Temp\Translator
data
dropped
C:\Users\user\AppData\Local\Temp\Trunk
data
dropped
C:\Users\user\AppData\Local\Temp\Viruses
data
dropped
C:\Users\user\AppData\Local\Temp\Ward
data
dropped
C:\Users\user\AppData\Local\Temp\Wine
data
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\0ffAoFEXM0xBWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\AJK0mJqpunS2Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\DPdylnmTjMlDWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\DbHJEiQOxMiMWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\IXuJ06djpYzdWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\LrsRpbnZnzPmLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\Q1KT8XwnyB_aWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\Z7Yuxtpi7pUyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\ZriO6tn8Siv1History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\dL2vJQuu7EoHHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\j_f7766d2puYHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\lsqPckitCOdaHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\m5Mie8xKwOWILogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuHHVgZK6_r3s\sbsB1tmQEFYiLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\trixyuHHVgZK6_r3s\Browsers\Chrome\Default\Cookies.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuHHVgZK6_r3s\Browsers\Firefox\fqs92o4p.default-release\History.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuHHVgZK6_r3s\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuHHVgZK6_r3s\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuHHVgZK6_r3s\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuHHVgZK6_r3s\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\SysWOW64\GroupPolicy\gpt.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\GroupPolicy\Machine\Registry.pol
RAGE Package Format (RPF),
dropped
There are 66 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\External24.exe
"C:\Users\user\Desktop\External24.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Forgot Forgot.cmd & Forgot.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 292668
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "towersallowancemeaninghelp" Wine
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Therefore + Physical + Inflation + Inspections + Sharon + Lung + Appearance + Warming + Army + Latinas + Anytime + Wiley + Zoning + Cincinnati + Accidents + Helena 292668\r
malicious
C:\Users\user\AppData\Local\Temp\292668\Lawyers.pif
292668\Lawyers.pif 292668\r
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "PixelFlow" /tr "wscript //B 'C:\Users\user\AppData\Local\PixelFlow Creations\PixelFlow.js'" /sc onlogon /F /RL HIGHEST
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\PixelFlow Creations\PixelFlow.js"
malicious
C:\Users\user\AppData\Local\PixelFlow Creations\PixelFlow.pif
"C:\Users\user\AppData\Local\PixelFlow Creations\PixelFlow.pif" "C:\Users\user\AppData\Local\PixelFlow Creations\m"
malicious
C:\Users\user\AppData\Local\Temp\292668\Lawyers.pif
C:\Users\user\AppData\Local\Temp\292668\Lawyers.pif
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 15
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.autoitscript.com/autoit3/J
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://db-ip.com/
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33j
unknown
https://t.me/risepro_bot
unknown
https://t.me/risepro_bot33203
unknown
https://ipinfo.io/
34.117.186.192
https://db-ip.com/demo/home.php?s=8.46.123.33tQ0
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://www.autoitscript.com/autoit3/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/t
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
172.67.75.166
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
CcUPthUoPgCKIth.CcUPthUoPgCKIth
unknown
malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
3.36.173.8
unknown
United States
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
Exclusions_Extensions
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableRoutinelyTakingAction
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{B99BD73F-BA9A-4579-8F31-FFF38CE1CEEC}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRawWriteNotification
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F26000
heap
page read and write
malicious
58AF000
heap
page read and write
malicious
F26000
heap
page read and write
malicious
6156000
heap
page read and write
614C000
heap
page read and write
100D000
heap
page read and write
7603000
trusted library allocation
page read and write
2B30000
heap
page read and write
D55000
heap
page read and write
6B5000
unkown
page readonly
3C81000
heap
page read and write
715000
unkown
page readonly
DCE000
heap
page read and write
7601000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
3C81000
heap
page read and write
6187000
heap
page read and write
FF3000
heap
page read and write
4C90000
heap
page read and write
CD8000
heap
page read and write
6154000
heap
page read and write
10C9000
heap
page read and write
1B514EED000
heap
page read and write
2E3E000
stack
page read and write
6154000
heap
page read and write
ACD000
stack
page read and write
4480000
heap
page read and write
4F35000
trusted library allocation
page read and write
2DFF000
stack
page read and write
29E0000
heap
page read and write
2A0E000
stack
page read and write
2EDC000
heap
page read and write
4F32000
trusted library allocation
page read and write
19C1000
heap
page read and write
1B515070000
heap
page read and write
61DD000
heap
page read and write
7640000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
618A000
heap
page read and write
F1A000
heap
page read and write
2AA4000
heap
page read and write
3788000
heap
page read and write
562E000
stack
page read and write
1B514EF9000
heap
page read and write
1384000
heap
page read and write
6141000
heap
page read and write
DD8000
heap
page read and write
6120000
trusted library allocation
page read and write
2EA0000
heap
page read and write
61B3000
heap
page read and write
1072000
heap
page read and write
6176000
heap
page read and write
4DA0000
heap
page read and write
614C000
heap
page read and write
63B0000
heap
page read and write
3E11000
heap
page read and write
7608000
trusted library allocation
page read and write
2B6F000
stack
page read and write
76F2000
trusted library allocation
page read and write
2EFE000
heap
page read and write
270E000
stack
page read and write
1B514ECF000
heap
page read and write
6165000
heap
page read and write
42C5000
heap
page read and write
387D000
heap
page read and write
3E11000
heap
page read and write
3C81000
heap
page read and write
6156000
heap
page read and write
690000
unkown
page readonly
D4A000
heap
page read and write
D1D000
heap
page read and write
EAD000
heap
page read and write
25CC000
stack
page read and write
B50000
remote allocation
page execute and read and write
187E000
trusted library allocation
page read and write
6156000
heap
page read and write
1384000
heap
page read and write
4420000
heap
page read and write
ED0000
heap
page read and write
728000
unkown
page readonly
6132000
heap
page read and write
6141000
heap
page read and write
EE4000
heap
page read and write
A8533FF000
stack
page read and write
3680000
heap
page read and write
39D0000
trusted library allocation
page read and write
88E000
stack
page read and write
36C2000
heap
page read and write
39DE000
heap
page read and write
61DD000
heap
page read and write
3E11000
heap
page read and write
DC2000
heap
page read and write
4352000
heap
page read and write
61FB000
heap
page read and write
6154000
heap
page read and write
21D0000
heap
page read and write
C70000
trusted library allocation
page read and write
3E11000
heap
page read and write
2C06000
heap
page read and write
A8536FF000
stack
page read and write
760B000
trusted library allocation
page read and write
17A1000
trusted library allocation
page read and write
6194000
heap
page read and write
DE3000
heap
page read and write
76FB000
trusted library allocation
page read and write
3C81000
heap
page read and write
3E11000
heap
page read and write
61CE000
heap
page read and write
6141000
heap
page read and write
1062000
heap
page read and write
3C81000
heap
page read and write
4F38000
trusted library allocation
page read and write
1B514EAC000
heap
page read and write
101C000
heap
page read and write
3C81000
heap
page read and write
3F4A000
heap
page read and write
A8532FF000
stack
page read and write
FA8000
heap
page read and write
98F000
stack
page read and write
3705000
heap
page read and write
D63000
heap
page read and write
D98000
heap
page read and write
3E11000
heap
page read and write
EEF000
heap
page read and write
1032000
heap
page read and write
6139000
heap
page read and write
4386000
heap
page read and write
3704000
heap
page read and write
61DD000
heap
page read and write
10C0000
heap
page read and write
1384000
heap
page read and write
6176000
heap
page read and write
6220000
trusted library allocation
page read and write
6161000
heap
page read and write
2840000
heap
page read and write
6167000
heap
page read and write
6132000
heap
page read and write
6138000
heap
page read and write
E03000
heap
page read and write
47B1000
trusted library allocation
page read and write
1384000
heap
page read and write
4F3C000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
723000
unkown
page write copy
FCE000
heap
page read and write
2EFE000
heap
page read and write
DF4000
heap
page read and write
618D000
heap
page read and write
2BCF000
stack
page read and write
42C5000
heap
page read and write
715000
unkown
page readonly
6183000
heap
page read and write
D76000
heap
page read and write
6183000
heap
page read and write
FC6000
heap
page read and write
4F30000
trusted library allocation
page read and write
6141000
heap
page read and write
614C000
heap
page read and write
1089000
heap
page read and write
6136000
heap
page read and write
61B2000
heap
page read and write
9B000
stack
page read and write
EA7000
heap
page read and write
61C9000
heap
page read and write
2E3A000
heap
page read and write
2E4D000
heap
page read and write
39D7000
heap
page read and write
5AE1000
heap
page read and write
600000
unkown
page readonly
4F32000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
3789000
heap
page read and write
29BF000
stack
page read and write
2E2B000
heap
page read and write
4F30000
trusted library allocation
page read and write
2AB2000
heap
page read and write
6141000
heap
page read and write
1B514EFE000
heap
page read and write
39E7000
heap
page read and write
61A2000
heap
page read and write
6156000
heap
page read and write
6BBF000
stack
page read and write
5C9000
heap
page read and write
DF2000
heap
page read and write
CEF000
heap
page read and write
F05000
heap
page read and write
6127000
heap
page read and write
E45000
heap
page read and write
E5C000
heap
page read and write
6156000
heap
page read and write
E45000
heap
page read and write
4D5E000
stack
page read and write
DE5000
heap
page read and write
6141000
heap
page read and write
F0F000
heap
page read and write
67BE000
stack
page read and write
C70000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
7604000
trusted library allocation
page read and write
61A2000
heap
page read and write
3C81000
heap
page read and write
760C000
trusted library allocation
page read and write
1384000
heap
page read and write
ED8000
heap
page read and write
1964000
trusted library allocation
page read and write
3C81000
heap
page read and write
1384000
heap
page read and write
4F34000
trusted library allocation
page read and write
101C000
heap
page read and write
2BCF000
stack
page read and write
614C000
heap
page read and write
2ECF000
heap
page read and write
6120000
trusted library allocation
page read and write
84F000
stack
page read and write
102B000
heap
page read and write
1B514EB8000
heap
page read and write
38C2000
heap
page read and write
F73000
heap
page read and write
4367000
heap
page read and write
61A2000
heap
page read and write
D0F000
heap
page read and write
6136000
heap
page read and write
4BEE000
stack
page read and write
1B514EEA000
heap
page read and write
2E22000
heap
page read and write
6FBE000
stack
page read and write
1384000
heap
page read and write
F45000
heap
page read and write
21BE000
stack
page read and write
FA8000
heap
page read and write
31B8000
heap
page read and write
19B0000
heap
page read and write
D97000
heap
page read and write
629C000
stack
page read and write
2860000
heap
page read and write
420000
unkown
page read and write
6161000
heap
page read and write
6165000
heap
page read and write
760F000
trusted library allocation
page read and write
400000
unkown
page readonly
3E11000
heap
page read and write
57E000
heap
page read and write
7607000
trusted library allocation
page read and write
6156000
heap
page read and write
F8E000
heap
page read and write
77CD000
trusted library allocation
page read and write
618E000
heap
page read and write
61DD000
heap
page read and write
3C81000
heap
page read and write
42C5000
heap
page read and write
42C5000
heap
page read and write
2B8E000
stack
page read and write
D10000
heap
page read and write
61DD000
heap
page read and write
4F32000
trusted library allocation
page read and write
10AE000
heap
page read and write
6141000
heap
page read and write
F9C000
heap
page read and write
3E11000
heap
page read and write
7604000
trusted library allocation
page read and write
EA0000
heap
page read and write
409000
unkown
page readonly
C34000
heap
page read and write
E45000
heap
page read and write
577E000
stack
page read and write
6139000
heap
page read and write
614C000
heap
page read and write
61CE000
heap
page read and write
6196000
heap
page read and write
5AE4000
heap
page read and write
DFD000
stack
page read and write
6188000
heap
page read and write
10B5000
heap
page read and write
17A1000
trusted library allocation
page read and write
500000
unkown
page readonly
6120000
trusted library allocation
page read and write
2E08000
heap
page read and write
F90000
heap
page read and write
5CE1000
heap
page read and write
1B514EB1000
heap
page read and write
61DD000
heap
page read and write
6156000
heap
page read and write
61AC000
heap
page read and write
615B000
heap
page read and write
6138000
heap
page read and write
1B514ECE000
heap
page read and write
D0F000
heap
page read and write
DC2000
heap
page read and write
3E11000
heap
page read and write
612D000
heap
page read and write
1B514EDD000
heap
page read and write
1384000
heap
page read and write
6139000
heap
page read and write
DE3000
heap
page read and write
431F000
stack
page read and write
6141000
heap
page read and write
4F3F000
trusted library allocation
page read and write
1B514DF0000
heap
page read and write
1006000
heap
page read and write
2AE0000
heap
page read and write
1950000
heap
page read and write
E74000
heap
page read and write
61DD000
heap
page read and write
6120000
trusted library allocation
page read and write
F23000
heap
page read and write
770D000
trusted library allocation
page read and write
2AE5000
heap
page read and write
1384000
heap
page read and write
F82000
heap
page read and write
D1F000
heap
page read and write
6176000
heap
page read and write
40C000
unkown
page write copy
3E11000
heap
page read and write
61BF000
heap
page read and write
61DD000
heap
page read and write
6191000
heap
page read and write
F89000
heap
page read and write
6181000
heap
page read and write
EAC000
heap
page read and write
E71000
heap
page read and write
F41000
heap
page read and write
618D000
heap
page read and write
2160000
heap
page read and write
3746000
heap
page read and write
39D0000
trusted library allocation
page read and write
F7C000
heap
page read and write
2EE9000
heap
page read and write
3E11000
heap
page read and write
3E11000
heap
page read and write
690000
unkown
page readonly
4D1F000
stack
page read and write
101F000
heap
page read and write
14CE000
stack
page read and write
670000
heap
page read and write
77B1000
trusted library allocation
page read and write
4F35000
trusted library allocation
page read and write
6136000
heap
page read and write
3C81000
heap
page read and write
61DD000
heap
page read and write
D61000
heap
page read and write
6193000
heap
page read and write
6177000
heap
page read and write
C70000
trusted library allocation
page read and write
DA6000
heap
page read and write
760B000
trusted library allocation
page read and write
D0F000
heap
page read and write
FFD000
heap
page read and write
409000
unkown
page readonly
384E000
heap
page read and write
2BD0000
heap
page read and write
77FE000
trusted library allocation
page read and write
C50000
heap
page read and write
D1F000
heap
page read and write
6154000
heap
page read and write
619B000
heap
page read and write
76D4000
trusted library allocation
page read and write
1990000
heap
page read and write
1988000
trusted library allocation
page read and write
6193000
heap
page read and write
319C000
heap
page read and write
EFC000
heap
page read and write
48A9000
trusted library allocation
page read and write
EE2000
heap
page read and write
760D000
trusted library allocation
page read and write
6184000
heap
page read and write
13C4000
heap
page read and write
6193000
heap
page read and write
618F000
heap
page read and write
C70000
trusted library allocation
page read and write
7702000
trusted library allocation
page read and write
A852FFE000
stack
page read and write
61DD000
heap
page read and write
EA3000
heap
page read and write
6120000
trusted library allocation
page read and write
10C9000
heap
page read and write
7605000
trusted library allocation
page read and write
1027000
heap
page read and write
6165000
heap
page read and write
760B000
trusted library allocation
page read and write
6165000
heap
page read and write
F1F000
heap
page read and write
401000
unkown
page execute read
37CA000
heap
page read and write
EED000
heap
page read and write
39CE000
heap
page read and write
401000
unkown
page execute read
CFF000
heap
page read and write
1890000
trusted library allocation
page read and write
42FC000
heap
page read and write
43E7000
heap
page read and write
55D0000
remote allocation
page read and write
EEB000
heap
page read and write
10CE000
heap
page read and write
728000
unkown
page readonly
19B0000
heap
page read and write
59E0000
heap
page read and write
C70000
trusted library allocation
page read and write
280F000
stack
page read and write
D74000
heap
page read and write
5B98000
heap
page read and write
7601000
trusted library allocation
page read and write
660000
unkown
page readonly
6154000
heap
page read and write
715000
unkown
page readonly
6167000
heap
page read and write
61DD000
heap
page read and write
625C000
stack
page read and write
DF2000
heap
page read and write
76FE000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
3088000
heap
page read and write
1B516C90000
heap
page read and write
61DD000
heap
page read and write
1B514EC6000
heap
page read and write
661000
unkown
page execute read
6161000
heap
page read and write
6141000
heap
page read and write
3C81000
heap
page read and write
1B514EC6000
heap
page read and write
760C000
trusted library allocation
page read and write
4F3B000
trusted library allocation
page read and write
6165000
heap
page read and write
CFA000
heap
page read and write
7608000
trusted library allocation
page read and write
3E11000
heap
page read and write
7601000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
2BAC000
stack
page read and write
3988000
heap
page read and write
614C000
heap
page read and write
61C2000
heap
page read and write
D61000
heap
page read and write
760A000
trusted library allocation
page read and write
1073000
heap
page read and write
3E11000
heap
page read and write
3946000
heap
page read and write
36C2000
heap
page read and write
29F1000
heap
page read and write
5E2000
heap
page read and write
DB8000
heap
page read and write
2EDB000
heap
page read and write
36B000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
6196000
heap
page read and write
6120000
trusted library allocation
page read and write
1384000
heap
page read and write
7601000
trusted library allocation
page read and write
AAF000
stack
page read and write
6C3000
unkown
page write copy
9BC000
stack
page read and write
7708000
trusted library allocation
page read and write
6141000
heap
page read and write
76DE000
trusted library allocation
page read and write
3C81000
heap
page read and write
F0A000
heap
page read and write
D61000
heap
page read and write
723000
unkown
page write copy
3E0000
heap
page read and write
61C9000
heap
page read and write
7705000
trusted library allocation
page read and write
2E1F000
stack
page read and write
F1A000
heap
page read and write
7760000
heap
page read and write
F8D000
heap
page read and write
6169000
heap
page read and write
6133000
heap
page read and write
6183000
heap
page read and write
61CE000
heap
page read and write
7609000
trusted library allocation
page read and write
3E11000
heap
page read and write
2EF7000
heap
page read and write
6169000
heap
page read and write
4F31000
trusted library allocation
page read and write
619D000
heap
page read and write
614C000
heap
page read and write
760A000
trusted library allocation
page read and write
3C81000
heap
page read and write
3C81000
heap
page read and write
FE1000
heap
page read and write
61B2000
heap
page read and write
2E3A000
heap
page read and write
EB6000
heap
page read and write
C34000
heap
page read and write
4F34000
trusted library allocation
page read and write
3681000
heap
page read and write
760B000
trusted library allocation
page read and write
601000
unkown
page execute read
3C81000
heap
page read and write
EB8000
heap
page read and write
3C81000
heap
page read and write
760D000
trusted library allocation
page read and write
76FB000
trusted library allocation
page read and write
6FB9000
stack
page read and write
6141000
heap
page read and write
1931000
heap
page read and write
614C000
heap
page read and write
6176000
heap
page read and write
5AF000
heap
page read and write
E27000
heap
page read and write
F9E000
heap
page read and write
3C81000
heap
page read and write
2E1F000
heap
page read and write
4F36000
trusted library allocation
page read and write
C34000
heap
page read and write
ECF000
heap
page read and write
CD0000
heap
page read and write
EAC000
heap
page read and write
387D000
heap
page read and write
61B3000
heap
page read and write
3C81000
heap
page read and write
4BAF000
stack
page read and write
19E0000
heap
page read and write
661000
unkown
page execute read
D7E000
heap
page read and write
3E11000
heap
page read and write
4362000
heap
page read and write
3C81000
heap
page read and write
CF3000
heap
page read and write
4C2F000
stack
page read and write
76DC000
trusted library allocation
page read and write
2D1E000
stack
page read and write
D61000
heap
page read and write
6120000
trusted library allocation
page read and write
3E11000
heap
page read and write
760B000
trusted library allocation
page read and write
6183000
heap
page read and write
6154000
heap
page read and write
6188000
heap
page read and write
760E000
trusted library allocation
page read and write
F7F000
heap
page read and write
6220000
trusted library allocation
page read and write
4F3F000
trusted library allocation
page read and write
1384000
heap
page read and write
5920000
direct allocation
page execute and read and write
6C8000
unkown
page readonly
61B3000
heap
page read and write
D1C000
heap
page read and write
2DBE000
stack
page read and write
C70000
trusted library allocation
page read and write
226E000
stack
page read and write
19B0000
heap
page read and write
76DE000
trusted library allocation
page read and write
61DD000
heap
page read and write
6177000
heap
page read and write
1041000
heap
page read and write
61DD000
heap
page read and write
437F000
heap
page read and write
6160000
heap
page read and write
6176000
heap
page read and write
616D000
heap
page read and write
4F34000
trusted library allocation
page read and write
1B514EFC000
heap
page read and write
B49000
stack
page read and write
1950000
heap
page read and write
7607000
trusted library allocation
page read and write
6173000
heap
page read and write
2A9C000
stack
page read and write
1384000
heap
page read and write
56E000
stack
page read and write
48B7000
trusted library allocation
page read and write
3D0000
heap
page read and write
F8A000
heap
page read and write
1384000
heap
page read and write
258C000
stack
page read and write
39D0000
trusted library allocation
page read and write
47F6000
trusted library allocation
page read and write
DF3000
heap
page read and write
1930000
heap
page read and write
FA8000
heap
page read and write
6154000
heap
page read and write
57A000
heap
page read and write
6154000
heap
page read and write
6220000
trusted library allocation
page read and write
7609000
trusted library allocation
page read and write
6154000
heap
page read and write
6165000
heap
page read and write
3C81000
heap
page read and write
D97000
heap
page read and write
6165000
heap
page read and write
38C3000
heap
page read and write
3E11000
heap
page read and write
61CE000
heap
page read and write
6132000
heap
page read and write
2E4D000
heap
page read and write
6F0000
unkown
page readonly
2B0F000
stack
page read and write
1B514EFA000
heap
page read and write
619C000
heap
page read and write
76D0000
trusted library allocation
page read and write
E7E000
heap
page read and write
6185000
heap
page read and write
3E11000
heap
page read and write
2EE9000
heap
page read and write
6138000
heap
page read and write
F9C000
heap
page read and write
58E2000
heap
page read and write
2E47000
heap
page read and write
D19000
heap
page read and write
63E000
stack
page read and write
387D000
heap
page read and write
1970000
heap
page read and write
2E30000
heap
page read and write
6185000
heap
page read and write
FF3000
heap
page read and write
1B514EC6000
heap
page read and write
6193000
heap
page read and write
7601000
trusted library allocation
page read and write
2B8E000
stack
page read and write
617B000
heap
page read and write
CB0000
heap
page read and write
43CD000
heap
page read and write
DE3000
heap
page read and write
1384000
heap
page read and write
614C000
heap
page read and write
F99000
heap
page read and write
2830000
heap
page read and write
6121000
heap
page read and write
6165000
heap
page read and write
6156000
heap
page read and write
616A000
heap
page read and write
661000
unkown
page execute read
F01000
heap
page read and write
2E2C000
heap
page read and write
760B000
trusted library allocation
page read and write
EE6000
heap
page read and write
6156000
heap
page read and write
6166000
heap
page read and write
7600000
trusted library allocation
page read and write
D8A000
heap
page read and write
39D0000
trusted library allocation
page read and write
618A000
heap
page read and write
F0E000
heap
page read and write
386F000
heap
page read and write
76DE000
trusted library allocation
page read and write
387D000
heap
page read and write
C34000
heap
page read and write
1B514EB1000
heap
page read and write
F38000
heap
page read and write
76F7000
trusted library allocation
page read and write
380000
heap
page read and write
1B514EF6000
heap
page read and write
18D1000
heap
page read and write
C70000
trusted library allocation
page read and write
1B514EF9000
heap
page read and write
39CE000
heap
page read and write
4F31000
trusted library allocation
page read and write
FF6000
heap
page read and write
387D000
heap
page read and write
786B000
heap
page read and write
6141000
heap
page read and write
1B514EFB000
heap
page read and write
D9E000
heap
page read and write
3080000
heap
page read and write
6156000
heap
page read and write
D61000
heap
page read and write
42C5000
heap
page read and write
723000
unkown
page write copy
618F000
heap
page read and write
C34000
heap
page read and write
42C5000
heap
page read and write
2EFE000
heap
page read and write
E0E000
heap
page read and write
10CE000
heap
page read and write
DE8000
heap
page read and write
E7B000
heap
page read and write
600000
unkown
page readonly
C70000
trusted library allocation
page read and write
2E4D000
heap
page read and write
46FE000
trusted library allocation
page read and write
6186000
heap
page read and write
4411000
heap
page read and write
54CE000
stack
page read and write
E45000
heap
page read and write
4F3A000
trusted library allocation
page read and write
760F000
trusted library allocation
page read and write
46B000
unkown
page read and write
61C9000
heap
page read and write
4F3B000
trusted library allocation
page read and write
3E11000
heap
page read and write
3E11000
heap
page read and write
61DD000
heap
page read and write
61B5000
heap
page read and write
DF2000
heap
page read and write
3C81000
heap
page read and write
2E48000
heap
page read and write
42C5000
heap
page read and write
4345000
heap
page read and write
1B514EDD000
heap
page read and write
119E000
stack
page read and write
D6B000
heap
page read and write
18D0000
heap
page read and write
F7C000
heap
page read and write
F9C000
heap
page read and write
614B000
heap
page read and write
D6B000
heap
page read and write
6185000
heap
page read and write
DC9000
heap
page read and write
61DD000
heap
page read and write
61DD000
heap
page read and write
5B1C000
heap
page read and write
7607000
trusted library allocation
page read and write
FAB000
heap
page read and write
D68000
heap
page read and write
7761000
heap
page read and write
3E11000
heap
page read and write
61DD000
heap
page read and write
7603000
trusted library allocation
page read and write
614B000
heap
page read and write
3868000
heap
page read and write
1B514E90000
heap
page read and write
6137000
heap
page read and write
6141000
heap
page read and write
F9A000
heap
page read and write
10B5000
heap
page read and write
6188000
heap
page read and write
F24000
heap
page read and write
3E11000
heap
page read and write
D5E000
heap
page read and write
760F000
trusted library allocation
page read and write
76F3000
trusted library allocation
page read and write
76FE000
trusted library allocation
page read and write
CB4000
heap
page read and write
EC0000
heap
page read and write
6141000
heap
page read and write
614C000
heap
page read and write
319000
stack
page read and write
61DD000
heap
page read and write
3E11000
heap
page read and write
4CDE000
stack
page read and write
570000
heap
page read and write
6183000
heap
page read and write
F01000
heap
page read and write
660000
unkown
page readonly
3857000
heap
page read and write
386F000
heap
page read and write
4D9F000
stack
page read and write
39D0000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
71F000
unkown
page write copy
71F000
unkown
page write copy
E7D000
heap
page read and write
61CE000
heap
page read and write
6165000
heap
page read and write
77DB000
trusted library allocation
page read and write
10C9000
heap
page read and write
39D0000
trusted library allocation
page read and write
76D6000
trusted library allocation
page read and write
55CD000
stack
page read and write
E86000
heap
page read and write
1B5150BC000
heap
page read and write
2E7F000
stack
page read and write
7608000
trusted library allocation
page read and write
77FD000
trusted library allocation
page read and write
4F34000
trusted library allocation
page read and write
6154000
heap
page read and write
614C000
heap
page read and write
BFE000
stack
page read and write
6133000
heap
page read and write
2A80000
heap
page read and write
3CE000
stack
page read and write
7608000
trusted library allocation
page read and write
4F39000
trusted library allocation
page read and write
EDF000
heap
page read and write
2A40000
heap
page read and write
3C81000
heap
page read and write
76EE000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
1072000
heap
page read and write
4F36000
trusted library allocation
page read and write
2C00000
heap
page read and write
D1F000
heap
page read and write
6193000
heap
page read and write
61DD000
heap
page read and write
2A48000
heap
page read and write
760A000
trusted library allocation
page read and write
3746000
heap
page read and write
1970000
heap
page read and write
6182000
heap
page read and write
4F35000
trusted library allocation
page read and write
18F1000
heap
page read and write
DFF000
heap
page read and write
1384000
heap
page read and write
7606000
trusted library allocation
page read and write
42C5000
heap
page read and write
2990000
heap
page read and write
1910000
heap
page read and write
39D0000
trusted library allocation
page read and write
7605000
trusted library allocation
page read and write
F90000
heap
page read and write
7603000
trusted library allocation
page read and write
1384000
heap
page read and write
6138000
heap
page read and write
FE0000
heap
page read and write
400000
unkown
page readonly
6161000
heap
page read and write
17A1000
trusted library allocation
page read and write
3E11000
heap
page read and write
61C6000
heap
page read and write
6188000
heap
page read and write
18F0000
heap
page read and write
76C9000
trusted library allocation
page read and write
4C60000
heap
page read and write
3C81000
heap
page read and write
380C000
heap
page read and write
1039000
heap
page read and write
6154000
heap
page read and write
E08000
heap
page read and write
F94000
heap
page read and write
1971000
heap
page read and write
61C6000
heap
page read and write
4F34000
trusted library allocation
page read and write
1384000
heap
page read and write
1B514E98000
heap
page read and write
1384000
heap
page read and write
6156000
heap
page read and write
F08000
heap
page read and write
42C5000
heap
page read and write
5E8000
heap
page read and write
40C000
unkown
page read and write
DC2000
heap
page read and write
6120000
heap
page read and write
38C2000
heap
page read and write
D10000
heap
page read and write
614B000
heap
page read and write
10BF000
heap
page read and write
59DA000
heap
page read and write
77EF000
trusted library allocation
page read and write
6133000
heap
page read and write
19A000
stack
page read and write
4F3D000
trusted library allocation
page read and write
1B514EF3000
heap
page read and write
61C7000
heap
page read and write
1B5150B5000
heap
page read and write
434000
unkown
page read and write
6161000
heap
page read and write
DC5000
heap
page read and write
D97000
heap
page read and write
6165000
heap
page read and write
1B514D10000
heap
page read and write
5B57000
heap
page read and write
61C2000
heap
page read and write
58F2000
heap
page read and write
F80000
heap
page read and write
3E11000
heap
page read and write
E31000
heap
page read and write
A8534FF000
stack
page read and write
6183000
heap
page read and write
DB8000
heap
page read and write
1930000
heap
page read and write
9FC000
stack
page read and write
7604000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
3685000
heap
page read and write
6173000
heap
page read and write
39CE000
heap
page read and write
1012000
heap
page read and write
59DB000
stack
page read and write
6156000
heap
page read and write
2D1E000
stack
page read and write
4F35000
trusted library allocation
page read and write
1930000
heap
page read and write
77BE000
trusted library allocation
page read and write
E20000
heap
page read and write
3904000
heap
page read and write
F41000
heap
page read and write
2EFC000
heap
page read and write
76D3000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
F9D000
heap
page read and write
3E11000
heap
page read and write
380D000
heap
page read and write
C34000
heap
page read and write
6194000
heap
page read and write
601000
unkown
page execute read
7604000
trusted library allocation
page read and write
3C81000
heap
page read and write
6120000
trusted library allocation
page read and write
1384000
heap
page read and write
F91000
heap
page read and write
39D0000
trusted library allocation
page read and write
3E11000
heap
page read and write
DE4000
heap
page read and write
EED000
heap
page read and write
6159000
heap
page read and write
1072000
heap
page read and write
760B000
trusted library allocation
page read and write
3C81000
heap
page read and write
3E11000
heap
page read and write
587F000
stack
page read and write
C70000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
1B514EB7000
heap
page read and write
39D0000
trusted library allocation
page read and write
619B000
heap
page read and write
3C80000
heap
page read and write
3881000
heap
page read and write
3C81000
heap
page read and write
1B514EEE000
heap
page read and write
3E11000
heap
page read and write
22C0000
heap
page read and write
61DD000
heap
page read and write
3C81000
heap
page read and write
6156000
heap
page read and write
1062000
heap
page read and write
C30000
heap
page read and write
C70000
trusted library allocation
page read and write
760A000
trusted library allocation
page read and write
ED5000
heap
page read and write
6220000
trusted library allocation
page read and write
61DD000
heap
page read and write
614B000
heap
page read and write
55D0000
remote allocation
page read and write
538D000
stack
page read and write
61A2000
heap
page read and write
760E000
trusted library allocation
page read and write
760B000
trusted library allocation
page read and write
3E11000
heap
page read and write
5AE0000
heap
page read and write
61C7000
heap
page read and write
6156000
heap
page read and write
4F3C000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
7602000
trusted library allocation
page read and write
61DD000
heap
page read and write
4F39000
trusted library allocation
page read and write
3C81000
heap
page read and write
F8D000
heap
page read and write
76EF000
trusted library allocation
page read and write
6156000
heap
page read and write
17A1000
trusted library allocation
page read and write
61C2000
heap
page read and write
A8537FE000
stack
page read and write
3E11000
heap
page read and write
1384000
heap
page read and write
F20000
heap
page read and write
D97000
heap
page read and write
298E000
stack
page read and write
3C81000
heap
page read and write
1384000
heap
page read and write
2D5E000
stack
page read and write
6F0000
unkown
page readonly
572E000
stack
page read and write
6154000
heap
page read and write
76FA000
trusted library allocation
page read and write
1384000
heap
page read and write
3E11000
heap
page read and write
6141000
heap
page read and write
6183000
heap
page read and write
18CE000
stack
page read and write
6154000
heap
page read and write
3904000
heap
page read and write
2ED2000
heap
page read and write
386F000
heap
page read and write
76F3000
trusted library allocation
page read and write
3E11000
heap
page read and write
7607000
trusted library allocation
page read and write
1384000
heap
page read and write
10B5000
heap
page read and write
A852EFA000
stack
page read and write
61CE000
heap
page read and write
1990000
heap
page read and write
520000
heap
page read and write
2ADC000
stack
page read and write
7604000
trusted library allocation
page read and write
4DD0000
heap
page read and write
7601000
trusted library allocation
page read and write
3A5C000
heap
page read and write
3C81000
heap
page read and write
6136000
heap
page read and write
510000
heap
page read and write
3947000
heap
page read and write
71F000
unkown
page write copy
6141000
heap
page read and write
E44000
heap
page read and write
59D0000
heap
page read and write
CFA000
heap
page read and write
4F36000
trusted library allocation
page read and write
4F3E000
trusted library allocation
page read and write
660000
unkown
page readonly
C34000
heap
page read and write
D1F000
heap
page read and write
D61000
heap
page read and write
6138000
heap
page read and write
1B514EC6000
heap
page read and write
4BEE000
stack
page read and write
2E30000
heap
page read and write
F91000
heap
page read and write
6176000
heap
page read and write
6132000
heap
page read and write
47BF000
trusted library allocation
page read and write
4F3E000
trusted library allocation
page read and write
DE3000
heap
page read and write
DA8000
heap
page read and write
2EA8000
heap
page read and write
1384000
heap
page read and write
F19000
heap
page read and write
CF5000
heap
page read and write
4F30000
trusted library allocation
page read and write
A8530FE000
stack
page read and write
3C81000
heap
page read and write
614C000
heap
page read and write
D95000
heap
page read and write
E51000
heap
page read and write
D6B000
heap
page read and write
77AB000
trusted library allocation
page read and write
EF1000
heap
page read and write
6185000
heap
page read and write
61C2000
heap
page read and write
2150000
heap
page read and write
3C81000
heap
page read and write
7602000
trusted library allocation
page read and write
F64000
heap
page read and write
E48000
heap
page read and write
2ACE000
stack
page read and write
61DD000
heap
page read and write
2A6E000
stack
page read and write
61CE000
heap
page read and write
F8A000
heap
page read and write
61B2000
heap
page read and write
C70000
trusted library allocation
page read and write
E00000
heap
page read and write
6156000
heap
page read and write
E7D000
heap
page read and write
ABE000
stack
page read and write
3E11000
heap
page read and write
AEC000
stack
page read and write
5FC000
heap
page read and write
39D0000
trusted library allocation
page read and write
61DD000
heap
page read and write
5B94000
heap
page read and write
3C81000
heap
page read and write
76E7000
trusted library allocation
page read and write
2E3A000
heap
page read and write
6154000
heap
page read and write
6BF000
unkown
page write copy
61DD000
heap
page read and write
EE9000
heap
page read and write
2B10000
heap
page read and write
2CAC000
stack
page read and write
6B5000
unkown
page readonly
61DD000
heap
page read and write
C70000
heap
page read and write
109E000
stack
page read and write
6141000
heap
page read and write
6138000
heap
page read and write
1B514EF5000
heap
page read and write
E19000
heap
page read and write
1B5150B0000
heap
page read and write
F8A000
heap
page read and write
76CF000
trusted library allocation
page read and write
3D0000
heap
page read and write
A8535FE000
stack
page read and write
61DD000
heap
page read and write
4F30000
trusted library allocation
page read and write
6154000
heap
page read and write
728000
unkown
page readonly
EAC000
heap
page read and write
617C000
heap
page read and write
6220000
trusted library allocation
page read and write
B3D000
stack
page read and write
61AC000
heap
page read and write
6194000
heap
page read and write
6141000
heap
page read and write
3C81000
heap
page read and write
6154000
heap
page read and write
3C81000
heap
page read and write
2B40000
heap
page read and write
D21000
heap
page read and write
1B514EDC000
heap
page read and write
DE3000
heap
page read and write
3C81000
heap
page read and write
19B0000
heap
page read and write
61DD000
heap
page read and write
6133000
heap
page read and write
37CA000
heap
page read and write
D21000
heap
page read and write
6120000
trusted library allocation
page read and write
3C81000
heap
page read and write
6BF000
unkown
page read and write
760D000
trusted library allocation
page read and write
6196000
heap
page read and write
F0D000
heap
page read and write
58A0000
direct allocation
page execute and read and write
1384000
heap
page read and write
6F0000
unkown
page readonly
616B000
heap
page read and write
DF6000
heap
page read and write
500000
unkown
page readonly
5330000
heap
page read and write
5B1B000
heap
page read and write
61DD000
heap
page read and write
D4C000
heap
page read and write
307E000
stack
page read and write
6C8000
unkown
page readonly
55D0000
remote allocation
page read and write
CFC000
heap
page read and write
EED000
heap
page read and write
E25000
heap
page read and write
1B514EF5000
heap
page read and write
76EA000
trusted library allocation
page read and write
1B514E10000
heap
page read and write
3E11000
heap
page read and write
F9E000
heap
page read and write
2E00000
heap
page read and write
6176000
heap
page read and write
399D000
heap
page read and write
77A8000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
1B514EF9000
heap
page read and write
EFE000
heap
page read and write
2EF8000
heap
page read and write
2EE9000
heap
page read and write
31B0000
heap
page read and write
384E000
heap
page read and write
6138000
heap
page read and write
4302000
heap
page read and write
675000
heap
page read and write
61FB000
heap
page read and write
619A000
heap
page read and write
4F30000
trusted library allocation
page read and write
548D000
stack
page read and write
297E000
stack
page read and write
19C8000
heap
page read and write
DB9000
heap
page read and write
2B36000
heap
page read and write
6159000
heap
page read and write
61B3000
heap
page read and write
3C81000
heap
page read and write
3880000
heap
page read and write
2E30000
heap
page read and write
There are 1122 hidden memdumps, click here to show them.