IOC Report
mPQW1NB2Px.exe

loading gif

Files

File Path
Type
Category
Malicious
mPQW1NB2Px.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_mPQW1NB2Px.exe_fe6ab0bc1a9e1537554667f42a75d5f58a55b3_d63839fe_77fd3ec4-57b5-45ba-ae07-e00e6663ed3e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB38.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:33:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD089.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD145.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\mPQW1NB2Px.exe
"C:\Users\user\Desktop\mPQW1NB2Px.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 --field-trial-handle=2332,i,10596624105070430740,12121365275626674710,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7296 -s 1396
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/34524
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
http://anglebug.com/7724;
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
http://anglebug.com/6876=
unknown
https://anglebug.com/7714
unknown
http://anglebug.com/7761e-data
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
http://anglebug.com/4836h
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
http://anglebug.com/4324m64/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://unisolated.invalid/x
unknown
http://anglebug.com/4551%
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://drive-daily-5.corp.go
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.132
s-part-0035.t-0009.t-msedge.net
13.107.246.63
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.132
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
ProgramId
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
FileId
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
LowerCaseLongPath
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
LongPathHash
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
Name
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
OriginalFileName
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
Publisher
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
Version
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
BinFileVersion
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
BinaryType
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
ProductName
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
ProductVersion
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
LinkDate
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
BinProductVersion
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
AppxPackageFullName
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
AppxPackageRelativeId
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
Size
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
Language
\REGISTRY\A\{258ed01f-9c08-eb18-07ee-d63ec0808306}\Root\InventoryApplicationFile\mpqw1nb2px.exe|f15604d875536e35
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
606C02B14000
trusted library allocation
page read and write
606C025C0000
trusted library allocation
page read and write
606C024A8000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02FCC000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C028DC000
trusted library allocation
page read and write
24EAD5ED000
heap
page read and write
24EA9F88000
heap
page read and write
7E3C000
heap
page read and write
606C02A48000
trusted library allocation
page read and write
606C02CC0000
trusted library allocation
page read and write
769000270000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02F14000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
606C023AC000
trusted library allocation
page read and write
606C029E0000
trusted library allocation
page read and write
606C02EE8000
trusted library allocation
page read and write
606C02959000
trusted library allocation
page read and write
24EB3620000
heap
page read and write
1030000
heap
page read and write
541000
unkown
page readonly
606C024A4000
trusted library allocation
page read and write
6C4800210000
trusted library allocation
page read and write
606C02E70000
trusted library allocation
page read and write
6871000
heap
page read and write
6F60000
trusted library allocation
page read and write
24EAC830000
unkown
page read and write
1037000
heap
page read and write
6871000
heap
page read and write
7E3B000
heap
page read and write
606C02510000
trusted library allocation
page read and write
53E000
unkown
page read and write
52117FD000
stack
page read and write
7690002BC000
trusted library allocation
page read and write
52207FE000
stack
page read and write
606C03114000
trusted library allocation
page read and write
606C031A8000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
520CFFE000
unkown
page readonly
6C4800868000
trusted library allocation
page read and write
6871000
heap
page read and write
132E000
stack
page read and write
12DB000
heap
page read and write
6C48006AC000
trusted library allocation
page read and write
18B4002E4000
direct allocation
page read and write
530000
unkown
page readonly
52017FB000
stack
page read and write
24EAD5F9000
heap
page read and write
24EB440E000
trusted library section
page read and write
521B7FE000
stack
page read and write
530000
unkown
page readonly
7996000
heap
page read and write
527D9FE000
unkown
page readonly
24EAD5F9000
heap
page read and write
606C029A8000
trusted library allocation
page read and write
606C024C4000
trusted library allocation
page read and write
52287FE000
stack
page read and write
6871000
heap
page read and write
7690002E4000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02420000
trusted library allocation
page read and write
6C48008B8000
trusted library allocation
page read and write
6871000
heap
page read and write
6F90000
direct allocation
page execute and read and write
6871000
heap
page read and write
530000
unkown
page readonly
17C0000
heap
page read and write
78A1000
heap
page read and write
6C4800728000
trusted library allocation
page read and write
53E000
unkown
page write copy
24EB3F02000
trusted library section
page read and write
5CC000
stack
page read and write
606C02E20000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C030CC000
trusted library allocation
page read and write
606C02938000
trusted library allocation
page read and write
606C02334000
trusted library allocation
page read and write
52037FB000
stack
page read and write
78A4000
heap
page read and write
53E000
unkown
page read and write
606C0280C000
trusted library allocation
page read and write
16EE000
stack
page read and write
606C02994000
trusted library allocation
page read and write
13FF000
stack
page read and write
606C02E70000
trusted library allocation
page read and write
531000
unkown
page execute read
11E0000
heap
page read and write
5212FFE000
unkown
page readonly
6871000
heap
page read and write
6C48007C4000
trusted library allocation
page read and write
24EAA021000
heap
page read and write
6871000
heap
page read and write
606C02638000
trusted library allocation
page read and write
18B4002AC000
direct allocation
page read and write
606C024D0000
trusted library allocation
page read and write
6871000
heap
page read and write
119E000
stack
page read and write
606C0298F000
trusted library allocation
page read and write
18DF000
stack
page read and write
606C031D0000
trusted library allocation
page read and write
6C48008C4000
trusted library allocation
page read and write
606C022E0000
trusted library allocation
page read and write
24EAD61B000
heap
page read and write
500000
heap
page read and write
1080000
heap
page read and write
78AF000
heap
page read and write
7EE000
stack
page read and write
606C02E70000
trusted library allocation
page read and write
606C023DC000
trusted library allocation
page read and write
606C031B4000
trusted library allocation
page read and write
24EB3EE1000
trusted library section
page read and write
230A000
stack
page read and write
606C02868000
trusted library allocation
page read and write
606C024A4000
trusted library allocation
page read and write
527F1FD000
stack
page read and write
527E9FE000
unkown
page readonly
7A0B000
heap
page read and write
606C022AE000
trusted library allocation
page read and write
6871000
heap
page read and write
541000
unkown
page readonly
24EAD5F1000
heap
page read and write
606C022D0000
trusted library allocation
page read and write
18B4002EC000
direct allocation
page read and write
78AE000
heap
page read and write
7A4A000
heap
page read and write
24EADB87000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C02318000
trusted library allocation
page read and write
24EADBB7000
heap
page read and write
18B400201000
direct allocation
page read and write
606C02504000
trusted library allocation
page read and write
52791EF000
stack
page read and write
24EADB5D000
heap
page read and write
606C03001000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
C20000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6C480085C000
trusted library allocation
page read and write
606C02FA4000
trusted library allocation
page read and write
24EB3F50000
trusted library section
page read and write
606C0262F000
trusted library allocation
page read and write
606C0240C000
trusted library allocation
page read and write
78A4000
heap
page read and write
6C48006BC000
trusted library allocation
page read and write
606C024AA000
trusted library allocation
page read and write
6C480039C000
trusted library allocation
page read and write
6C480084C000
trusted library allocation
page read and write
78AF000
heap
page read and write
6C480087C000
trusted library allocation
page read and write
6871000
heap
page read and write
7A7E000
heap
page read and write
6871000
heap
page read and write
74C000
stack
page read and write
3370000
direct allocation
page read and write
606C00801000
trusted library allocation
page read and write
6C480082C000
trusted library allocation
page read and write
6C48002ED000
trusted library allocation
page read and write
12C7000
heap
page read and write
606C02F0C000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02D88000
trusted library allocation
page read and write
6C48007A0000
trusted library allocation
page read and write
24EAD5FE000
heap
page read and write
606C02428000
trusted library allocation
page read and write
6871000
heap
page read and write
3370000
direct allocation
page read and write
541000
unkown
page readonly
24EAD5FF000
heap
page read and write
798E000
heap
page read and write
5227FFE000
unkown
page readonly
12BB000
heap
page read and write
6871000
heap
page read and write
3370000
direct allocation
page read and write
6C4800404000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02A1C000
trusted library allocation
page read and write
7B7C000
heap
page read and write
1030000
heap
page read and write
24EADBE3000
heap
page read and write
6871000
heap
page read and write
1268000
heap
page read and write
769000274000
trusted library allocation
page read and write
18B4002A8000
direct allocation
page read and write
6C48008F0000
trusted library allocation
page read and write
521A7FB000
stack
page read and write
24EAA1C0000
trusted library allocation
page read and write
541000
unkown
page readonly
6871000
heap
page read and write
606C031A8000
trusted library allocation
page read and write
520AFFE000
unkown
page readonly
6F90000
direct allocation
page execute and read and write
606C030D0000
trusted library allocation
page read and write
606C02BBB000
trusted library allocation
page read and write
7945000
heap
page read and write
79A1000
heap
page read and write
7937000
heap
page read and write
7690002BC000
trusted library allocation
page read and write
606C02F60000
trusted library allocation
page read and write
606C023B4000
trusted library allocation
page read and write
6C48008B4000
trusted library allocation
page read and write
606C02AF8000
trusted library allocation
page read and write
6C48002E4000
trusted library allocation
page read and write
11E0000
heap
page read and write
7690002BC000
trusted library allocation
page read and write
6871000
heap
page read and write
606C028E4000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
78E000
stack
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C0235C000
trusted library allocation
page read and write
52107FB000
stack
page read and write
6871000
heap
page read and write
520A7FD000
stack
page read and write
606C02774000
trusted library allocation
page read and write
606C023AC000
trusted library allocation
page read and write
18B400217000
direct allocation
page read and write
606C031D8000
trusted library allocation
page read and write
5203FFE000
unkown
page readonly
6871000
heap
page read and write
606C023F4000
trusted library allocation
page read and write
53A000
unkown
page readonly
606C02A01000
trusted library allocation
page read and write
606C0260C000
trusted library allocation
page read and write
606C02424000
trusted library allocation
page read and write
52277FE000
stack
page read and write
606C02550000
trusted library allocation
page read and write
18B400250000
direct allocation
page read and write
606C03140000
trusted library allocation
page read and write
12E0000
heap
page read and write
6871000
heap
page read and write
530000
unkown
page readonly
606C02678000
trusted library allocation
page read and write
530000
unkown
page readonly
6871000
heap
page read and write
6C4800964000
trusted library allocation
page read and write
24EAD61B000
heap
page read and write
6871000
heap
page read and write
606C029BC000
trusted library allocation
page read and write
6C48007BC000
trusted library allocation
page read and write
531000
unkown
page execute read
6871000
heap
page read and write
6871000
heap
page read and write
52057FC000
stack
page read and write
53A000
unkown
page readonly
606C02288000
trusted library allocation
page read and write
52027FE000
stack
page read and write
606C02E78000
trusted library allocation
page read and write
24EAFD10000
trusted library allocation
page read and write
606C02E58000
trusted library allocation
page read and write
606C02F70000
trusted library allocation
page read and write
6871000
heap
page read and write
12EF000
stack
page read and write
6871000
heap
page read and write
52007FB000
stack
page read and write
6F90000
direct allocation
page execute and read and write
6871000
heap
page read and write
606C024A8000
trusted library allocation
page read and write
7958000
heap
page read and write
6C480025C000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02DE0000
trusted library allocation
page read and write
24EAD5FF000
heap
page read and write
530000
unkown
page readonly
606C03054000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
527F9FE000
unkown
page readonly
606C02F1C000
trusted library allocation
page read and write
6C48006E8000
trusted library allocation
page read and write
606C02F48000
trusted library allocation
page read and write
53E000
unkown
page write copy
6871000
heap
page read and write
6871000
heap
page read and write
1520000
heap
page read and write
24EAA160000
heap
page readonly
6F80000
direct allocation
page execute and read and write
6871000
heap
page read and write
24EADB6D000
heap
page read and write
606C02D60000
trusted library allocation
page read and write
606C0271C000
trusted library allocation
page read and write
5210FFE000
unkown
page readonly
606C0226C000
trusted library allocation
page read and write
606C02D50000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
531000
unkown
page execute read
F1F000
stack
page read and write
795B000
heap
page read and write
6C48008A8000
trusted library allocation
page read and write
6871000
heap
page read and write
78A4000
heap
page read and write
606C023F8000
trusted library allocation
page read and write
79DD000
heap
page read and write
606C02260000
trusted library allocation
page read and write
53A000
unkown
page readonly
7B07000
heap
page read and write
24EB3557000
unclassified section
page read and write
7953000
heap
page read and write
78AA000
heap
page read and write
7B8C000
heap
page read and write
531000
unkown
page execute read
7A20000
heap
page read and write
73A1000
heap
page read and write
606C02648000
trusted library allocation
page read and write
606C02904000
trusted library allocation
page read and write
606C02EB8000
trusted library allocation
page read and write
5215FFE000
unkown
page readonly
6871000
heap
page read and write
606C02C24000
trusted library allocation
page read and write
12B8000
heap
page read and write
606C023D8000
trusted library allocation
page read and write
24EADBC8000
heap
page read and write
6F90000
direct allocation
page execute and read and write
18B4002DC000
direct allocation
page read and write
606C02728000
trusted library allocation
page read and write
24EAD60A000
heap
page read and write
24EAD60A000
heap
page read and write
53A000
unkown
page readonly
606C024F3000
trusted library allocation
page read and write
78AC000
heap
page read and write
6F90000
direct allocation
page execute and read and write
606C02328000
trusted library allocation
page read and write
6C480095C000
trusted library allocation
page read and write
6C480027C000
trusted library allocation
page read and write
6871000
heap
page read and write
6C48006E0000
trusted library allocation
page read and write
6871000
heap
page read and write
26CB000
heap
page read and write
FFC000
stack
page read and write
606C023A0000
trusted library allocation
page read and write
6C48006F4000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C0238C000
trusted library allocation
page read and write
530000
unkown
page readonly
6871000
heap
page read and write
606C03184000
trusted library allocation
page read and write
C07000
heap
page read and write
6871000
heap
page read and write
606C02784000
trusted library allocation
page read and write
24EAD5FF000
heap
page read and write
6871000
heap
page read and write
6C4800864000
trusted library allocation
page read and write
6871000
heap
page read and write
7976000
heap
page read and write
606C0253C000
trusted library allocation
page read and write
531000
unkown
page execute read
24EAD5ED000
heap
page read and write
606C022F0000
trusted library allocation
page read and write
521E7FD000
stack
page read and write
769000201000
trusted library allocation
page read and write
5216FFE000
unkown
page readonly
606C02A24000
trusted library allocation
page read and write
53A000
unkown
page readonly
6871000
heap
page read and write
520BFFE000
unkown
page readonly
24EAD5E7000
heap
page read and write
79EC000
heap
page read and write
6C480039C000
trusted library allocation
page read and write
606C02EF0000
trusted library allocation
page read and write
BFC000
stack
page read and write
52217FD000
stack
page read and write
606C0314C000
trusted library allocation
page read and write
531000
unkown
page execute read
6871000
heap
page read and write
5219FFE000
unkown
page readonly
24EADB51000
heap
page read and write
6C4800408000
trusted library allocation
page read and write
541000
unkown
page readonly
3370000
direct allocation
page read and write
6D00000
direct allocation
page read and write
606C02CCC000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
24EAD602000
heap
page read and write
6871000
heap
page read and write
606C028E8000
trusted library allocation
page read and write
24EAA1A0000
heap
page read and write
7690002BC000
trusted library allocation
page read and write
C10000
heap
page read and write
6871000
heap
page read and write
606C03099000
trusted library allocation
page read and write
606C02550000
trusted library allocation
page read and write
606C02601000
trusted library allocation
page read and write
24EADB00000
heap
page read and write
24EB40EE000
trusted library section
page read and write
6871000
heap
page read and write
B20000
heap
page read and write
3370000
direct allocation
page read and write
606C02500000
trusted library allocation
page read and write
B80000
heap
page read and write
5201FFE000
unkown
page readonly
6C48008E8000
trusted library allocation
page read and write
6C4800848000
trusted library allocation
page read and write
606C02434000
trusted library allocation
page read and write
7CE000
stack
page read and write
12BF000
heap
page read and write
606C02DE4000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
79D7000
heap
page read and write
78A7000
heap
page read and write
606C023AC000
trusted library allocation
page read and write
606C024A8000
trusted library allocation
page read and write
6C4800601000
trusted library allocation
page read and write
24EAA305000
heap
page read and write
24EB1D90000
heap
page read and write
2A20000
heap
page read and write
5206FFE000
unkown
page readonly
6CE0000
heap
page read and write
606C02C70000
trusted library allocation
page read and write
CCA000
unkown
page write copy
6871000
heap
page read and write
18B400274000
direct allocation
page read and write
78AE000
heap
page read and write
606C02DE4000
trusted library allocation
page read and write
6871000
heap
page read and write
14DF000
stack
page read and write
6871000
heap
page read and write
6C4800874000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
53A000
unkown
page readonly
6F90000
direct allocation
page execute and read and write
606C02898000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
6871000
heap
page read and write
7690002A0000
trusted library allocation
page read and write
530000
unkown
page readonly
12C7000
heap
page read and write
24EB3F0E000
trusted library section
page read and write
606C02C01000
trusted library allocation
page read and write
531000
unkown
page execute read
12CF000
heap
page read and write
6871000
heap
page read and write
6F90000
direct allocation
page execute and read and write
18B400270000
direct allocation
page read and write
606C02D90000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C0288C000
trusted library allocation
page read and write
6871000
heap
page read and write
5204FFE000
unkown
page readonly
1150000
heap
page read and write
53A000
unkown
page readonly
606C02FB0000
trusted library allocation
page read and write
6871000
heap
page read and write
53E000
unkown
page read and write
79F3000
heap
page read and write
606C0255C000
trusted library allocation
page read and write
527A1FE000
unkown
page read and write
6871000
heap
page read and write
6F90000
direct allocation
page execute and read and write
527C1FE000
stack
page read and write
6871000
heap
page read and write
24EADB8A000
heap
page read and write
606C00001000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
24EB3623000
heap
page read and write
606C025B0000
trusted library allocation
page read and write
420000
heap
page read and write
7690002B0000
trusted library allocation
page read and write
606C02D50000
trusted library allocation
page read and write
79B1000
heap
page read and write
52077FE000
stack
page read and write
74C000
stack
page read and write
606C0300C000
trusted library allocation
page read and write
712C000
heap
page read and write
53A000
unkown
page readonly
606C0253C000
trusted library allocation
page read and write
6C48006C8000
trusted library allocation
page read and write
FDF000
stack
page read and write
13F7000
heap
page read and write
6871000
heap
page read and write
FFC000
stack
page read and write
6871000
heap
page read and write
5A1000
unkown
page execute and write copy
6C48008EC000
trusted library allocation
page read and write
6871000
heap
page read and write
7AAB000
heap
page read and write
606C02980000
trusted library allocation
page read and write
606C031EC000
trusted library allocation
page read and write
18B400210000
direct allocation
page read and write
1780000
heap
page read and write
6C480079C000
trusted library allocation
page read and write
6C888000
unkown
page readonly
606C02BEC000
trusted library allocation
page read and write
52177FC000
stack
page read and write
7BAB000
heap
page read and write
6F90000
direct allocation
page execute and read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C02530000
trusted library allocation
page read and write
7690002A0000
trusted library allocation
page read and write
6871000
heap
page read and write
78AE000
heap
page read and write
527D1FE000
stack
page read and write
6F90000
direct allocation
page execute and read and write
7A4A000
heap
page read and write
24EAD5FF000
heap
page read and write
6871000
heap
page read and write
12BB000
heap
page read and write
78A7000
heap
page read and write
18B400303000
direct allocation
page read and write
6C760000
unkown
page readonly
6871000
heap
page read and write
24EB3F40000
trusted library section
page read and write
24EAD5FA000
heap
page read and write
527C9FE000
unkown
page readonly
1054000
unkown
page execute and write copy
52267FC000
stack
page read and write
541000
unkown
page readonly
6871000
heap
page read and write
6C4800880000
trusted library allocation
page read and write
52127FC000
stack
page read and write
606C02B04000
trusted library allocation
page read and write
D30000
heap
page read and write
24EADB5A000
heap
page read and write
B10000
heap
page read and write
7F0000
heap
page read and write
606C0315C000
trusted library allocation
page read and write
24EAD5F2000
heap
page read and write
606C031C0000
trusted library allocation
page read and write
7436000
direct allocation
page read and write
128C000
heap
page read and write
6871000
heap
page read and write
606C02544000
trusted library allocation
page read and write
606C026BF000
trusted library allocation
page read and write
606C02490000
trusted library allocation
page read and write
24EB375E000
trusted library section
page read and write
606C02EA4000
trusted library allocation
page read and write
6871000
heap
page read and write
24EAA080000
heap
page read and write
7970000
heap
page read and write
79B7000
heap
page read and write
6871000
heap
page read and write
6C4800904000
trusted library allocation
page read and write
24EAD61B000
heap
page read and write
606C02674000
trusted library allocation
page read and write
18B400290000
direct allocation
page read and write
53E000
unkown
page write copy
769000238000
trusted library allocation
page read and write
5214FFE000
unkown
page readonly
11FC000
stack
page read and write
6C4800220000
trusted library allocation
page read and write
71AC000
heap
page read and write
53A000
unkown
page readonly
6871000
heap
page read and write
527A9FE000
unkown
page readonly
606C02A74000
trusted library allocation
page read and write
606C0251C000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
530000
unkown
page readonly
7A45000
heap
page read and write
606C02DA4000
trusted library allocation
page read and write
531000
unkown
page execute read
6871000
heap
page read and write
6871000
heap
page read and write
606C02418000
trusted library allocation
page read and write
6C48002B8000
trusted library allocation
page read and write
606C02414000
trusted library allocation
page read and write
24EADB10000
heap
page read and write
24EADB8E000
heap
page read and write
6C4800788000
trusted library allocation
page read and write
53E000
unkown
page write copy
12B9000
heap
page read and write
14BF000
stack
page read and write
78A3000
heap
page read and write
3370000
direct allocation
page read and write
ACC000
stack
page read and write
A20000
heap
page read and write
6871000
heap
page read and write
5222FFD000
stack
page read and write
23BE000
unkown
page read and write
22CD000
stack
page read and write
541000
unkown
page readonly
24EADBC6000
heap
page read and write
5213FFE000
unkown
page readonly
76900020D000
trusted library allocation
page read and write
53A000
unkown
page readonly
D6C000
stack
page read and write
26DC000
heap
page read and write
7A73000
heap
page read and write
606C02E70000
trusted library allocation
page read and write
606C02580000
trusted library allocation
page read and write
52047FB000
stack
page read and write
606C02410000
trusted library allocation
page read and write
24EAA200000
trusted library section
page readonly
24EAD5F2000
heap
page read and write
5225FFE000
unkown
page readonly
24EAA300000
heap
page read and write
7690002B0000
trusted library allocation
page read and write
6C4800894000
trusted library allocation
page read and write
78A7000
heap
page read and write
606C023B4000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
18B400260000
direct allocation
page read and write
7A15000
heap
page read and write
606C02954000
trusted library allocation
page read and write
606C02E88000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02AE4000
trusted library allocation
page read and write
7690002B0000
trusted library allocation
page read and write
606C02278000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6C48007C0000
trusted library allocation
page read and write
B30000
heap
page read and write
606C02648000
trusted library allocation
page read and write
1387000
heap
page read and write
6C4800424000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
52157FC000
stack
page read and write
606C00201000
trusted library allocation
page read and write
6C480040C000
trusted library allocation
page read and write
6871000
heap
page read and write
6C4800828000
trusted library allocation
page read and write
BFC000
stack
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
5211FFE000
unkown
page readonly
606C02504000
trusted library allocation
page read and write
606C02674000
trusted library allocation
page read and write
606C02694000
trusted library allocation
page read and write
606C02A90000
trusted library allocation
page read and write
606C02564000
trusted library allocation
page read and write
52137FD000
stack
page read and write
78A2000
heap
page read and write
CEF000
stack
page read and write
52097FE000
stack
page read and write
606C0302C000
trusted library allocation
page read and write
606C027C0000
trusted library allocation
page read and write
12BF000
heap
page read and write
78A0000
heap
page read and write
7690002C0000
trusted library allocation
page read and write
606C02E70000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
24EAA170000
heap
page read and write
136E000
stack
page read and write
606C02CA0000
trusted library allocation
page read and write
6871000
heap
page read and write
6C48002FC000
trusted library allocation
page read and write
606C023C4000
trusted library allocation
page read and write
78A1000
heap
page read and write
6C4800948000
trusted library allocation
page read and write
7BE3000
heap
page read and write
DBE000
stack
page read and write
606C02570000
trusted library allocation
page read and write
606C0311C000
trusted library allocation
page read and write
C2A000
heap
page read and write
9FC000
stack
page read and write
606C023D4000
trusted library allocation
page read and write
70C2000
heap
page read and write
6F60000
direct allocation
page execute and read and write
606C02F34000
trusted library allocation
page read and write
24EB403D000
trusted library section
page read and write
606C0220C000
trusted library allocation
page read and write
606C0227E000
trusted library allocation
page read and write
24EAA044000
heap
page read and write
6871000
heap
page read and write
5220FFE000
unkown
page readonly
606C024B8000
trusted library allocation
page read and write
78AB000
heap
page read and write
12D0000
heap
page read and write
6C48007E0000
trusted library allocation
page read and write
606C02A0F000
trusted library allocation
page read and write
606C03120000
trusted library allocation
page read and write
606C02FD4000
trusted library allocation
page read and write
5200FFE000
unkown
page readonly
6C48006E8000
trusted library allocation
page read and write
D0C000
stack
page read and write
606C03104000
trusted library allocation
page read and write
6F70000
direct allocation
page execute and read and write
6871000
heap
page read and write
6871000
heap
page read and write
7690002A0000
trusted library allocation
page read and write
6C761000
unkown
page execute read
606C02798000
trusted library allocation
page read and write
606C028F4000
trusted library allocation
page read and write
606C022B0000
trusted library allocation
page read and write
6C4800201000
trusted library allocation
page read and write
6C4800778000
trusted library allocation
page read and write
606C02910000
trusted library allocation
page read and write
52237FE000
unkown
page readonly
24EB36E0000
trusted library section
page read and write
24EB4400000
trusted library section
page read and write
7A59000
heap
page read and write
6871000
heap
page read and write
7690002D8000
trusted library allocation
page read and write
606C02648000
trusted library allocation
page read and write
53A000
unkown
page readonly
606C024A4000
trusted library allocation
page read and write
6871000
heap
page read and write
18B4002D0000
direct allocation
page read and write
7A05000
heap
page read and write
606C02394000
trusted library allocation
page read and write
769000294000
trusted library allocation
page read and write
6C480080C000
trusted library allocation
page read and write
12D5000
heap
page read and write
FFD000
stack
page read and write
7126000
heap
page read and write
606C030B8000
trusted library allocation
page read and write
79F0000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
18B400234000
direct allocation
page read and write
606C024A4000
trusted library allocation
page read and write
11DE000
stack
page read and write
6F90000
direct allocation
page execute and read and write
6F90000
direct allocation
page execute and read and write
18B400284000
direct allocation
page read and write
6C4800401000
trusted library allocation
page read and write
606C02648000
trusted library allocation
page read and write
606C03060000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
13F0000
heap
page read and write
6F60000
trusted library allocation
page read and write
531000
unkown
page execute read
606C02DE4000
trusted library allocation
page read and write
6871000
heap
page read and write
24EAD5D0000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
11FC000
stack
page read and write
3370000
direct allocation
page read and write
606C02EC8000
trusted library allocation
page read and write
52227FE000
unkown
page readonly
6871000
heap
page read and write
5208FFE000
unkown
page readonly
7A3C000
heap
page read and write
6C4800884000
trusted library allocation
page read and write
6871000
heap
page read and write
6C4800288000
trusted library allocation
page read and write
6D10000
direct allocation
page read and write
541000
unkown
page readonly
6C4800844000
trusted library allocation
page read and write
520DFFE000
unkown
page readonly
24EB1BE0000
trusted library section
page read and write
6D00000
direct allocation
page read and write
530000
unkown
page readonly
606C02CB0000
trusted library allocation
page read and write
52187FC000
stack
page read and write
24EB3752000
trusted library section
page read and write
606C02E90000
trusted library allocation
page read and write
24EAD5F9000
heap
page read and write
12BB000
heap
page read and write
6C48002B0000
trusted library allocation
page read and write
606C023F0000
trusted library allocation
page read and write
606C02680000
trusted library allocation
page read and write
6C4800238000
trusted library allocation
page read and write
520C7FE000
stack
page read and write
128C000
heap
page read and write
520B7FA000
stack
page read and write
24EADB7F000
heap
page read and write
530000
unkown
page readonly
24EADB8C000
heap
page read and write
27D0000
heap
page read and write
606C02C1C000
trusted library allocation
page read and write
24EADC30000
trusted library section
page read and write
606C02ECB000
trusted library allocation
page read and write
24EADBC9000
heap
page read and write
606C02ACC000
trusted library allocation
page read and write
6871000
heap
page read and write
71A5000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
3370000
direct allocation
page read and write
769000260000
trusted library allocation
page read and write
B7E000
stack
page read and write
606C02F54000
trusted library allocation
page read and write
606C02E0C000
trusted library allocation
page read and write
6C4800418000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C02648000
trusted library allocation
page read and write
6871000
heap
page read and write
6C4800818000
trusted library allocation
page read and write
26C0000
heap
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
18B400215000
direct allocation
page read and write
24EB1D60000
heap
page read and write
5209FFE000
unkown
page readonly
6871000
heap
page read and write
606C02658000
trusted library allocation
page read and write
606C02580000
trusted library allocation
page read and write
6C48002D4000
trusted library allocation
page read and write
606C0281C000
trusted library allocation
page read and write
606C0298A000
trusted library allocation
page read and write
1F0F000
stack
page read and write
5226FFE000
unkown
page readonly
606C02E01000
trusted library allocation
page read and write
78A5000
heap
page read and write
606C024C4000
trusted library allocation
page read and write
24EB4610000
trusted library section
page read and write
79EC000
heap
page read and write
7A8C000
heap
page read and write
24EB3CC0000
trusted library section
page read and write
18B40024C000
direct allocation
page read and write
5223FFA000
stack
page read and write
53E000
unkown
page read and write
606C02DF4000
trusted library allocation
page read and write
606C0240C000
trusted library allocation
page read and write
1040000
heap
page read and write
78A6000
heap
page read and write
6C4800790000
trusted library allocation
page read and write
796D000
heap
page read and write
606C0237C000
trusted library allocation
page read and write
606C02E70000
trusted library allocation
page read and write
6C4800430000
trusted library allocation
page read and write
7690002C0000
trusted library allocation
page read and write
530000
unkown
page readonly
606C0246C000
trusted library allocation
page read and write
D70000
heap
page read and write
606C030E8000
trusted library allocation
page read and write
6871000
heap
page read and write
6C48006AC000
trusted library allocation
page read and write
6871000
heap
page read and write
119E000
stack
page read and write
24EB3793000
trusted library section
page read and write
541000
unkown
page readonly
606C03095000
trusted library allocation
page read and write
6871000
heap
page read and write
6C48008C8000
trusted library allocation
page read and write
606C02F7C000
trusted library allocation
page read and write
2680000
heap
page read and write
606C02D68000
trusted library allocation
page read and write
7B3A000
heap
page read and write
18B400294000
direct allocation
page read and write
606C02594000
trusted library allocation
page read and write
606C02A58000
trusted library allocation
page read and write
531000
unkown
page execute read
606C02A18000
trusted library allocation
page read and write
6871000
heap
page read and write
8F0000
heap
page read and write
24EA9F80000
heap
page read and write
606C022B8000
trusted library allocation
page read and write
606C02DD8000
trusted library allocation
page read and write
78A0000
heap
page read and write
6871000
heap
page read and write
24EAA230000
heap
page read and write
606C0253C000
trusted library allocation
page read and write
6C48006AC000
trusted library allocation
page read and write
606C0314C000
trusted library allocation
page read and write
6871000
heap
page read and write
79D2000
heap
page read and write
6C48006D4000
trusted library allocation
page read and write
606C030F4000
trusted library allocation
page read and write
606C02528000
trusted library allocation
page read and write
6871000
heap
page read and write
7E3C000
heap
page read and write
53E000
unkown
page write copy
606C0241C000
trusted library allocation
page read and write
606C030DC000
trusted library allocation
page read and write
6871000
heap
page read and write
52257FE000
unkown
page readonly
5224FFE000
stack
page read and write
24EAD5F5000
heap
page read and write
606C02F00000
trusted library allocation
page read and write
1380000
heap
page read and write
23FF000
unkown
page read and write
79B1000
heap
page read and write
6C83F000
unkown
page readonly
541000
unkown
page readonly
18B40020C000
direct allocation
page read and write
1037000
heap
page read and write
7690002BC000
trusted library allocation
page read and write
6871000
heap
page read and write
76A1000
heap
page read and write
52247FE000
unkown
page readonly
606C023E4000
trusted library allocation
page read and write
7A4E000
heap
page read and write
24EADAB0000
trusted library section
page read and write
70A1000
heap
page read and write
6871000
heap
page read and write
5228FFE000
unkown
page readonly
606C02648000
trusted library allocation
page read and write
6C48008E4000
trusted library allocation
page read and write
6C48006F0000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
78AF000
heap
page read and write
521D7FE000
stack
page read and write
606C02FE8000
trusted library allocation
page read and write
521CFFE000
unkown
page readonly
520E7FE000
stack
page read and write
263E000
stack
page read and write
520FFFE000
unkown
page readonly
606C02FA8000
trusted library allocation
page read and write
606C02BDC000
trusted library allocation
page read and write
267E000
stack
page read and write
6C48007AC000
trusted library allocation
page read and write
606C02E64000
trusted library allocation
page read and write
7690002C0000
trusted library allocation
page read and write
6871000
heap
page read and write
18B400280000
direct allocation
page read and write
606C02DE0000
trusted library allocation
page read and write
606C02F60000
trusted library allocation
page read and write
6871000
heap
page read and write
6C4800878000
trusted library allocation
page read and write
24EADB78000
heap
page read and write
6871000
heap
page read and write
520D7FE000
stack
page read and write
5217FFE000
unkown
page readonly
606C03100000
trusted library allocation
page read and write
6871000
heap
page read and write
531000
unkown
page execute read
78AD000
heap
page read and write
606C03140000
trusted library allocation
page read and write
24EAA025000
heap
page read and write
7690002C0000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02E48000
trusted library allocation
page read and write
6C4800840000
trusted library allocation
page read and write
24EAD5E8000
heap
page read and write
527B1FE000
stack
page read and write
769000278000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02F90000
trusted library allocation
page read and write
78A1000
heap
page read and write
6C480060C000
trusted library allocation
page read and write
6871000
heap
page read and write
53A000
unkown
page readonly
6C4800700000
trusted library allocation
page read and write
12B3000
heap
page read and write
530000
unkown
page readonly
6871000
heap
page read and write
606C02401000
trusted library allocation
page read and write
6871000
heap
page read and write
7690002F8000
trusted library allocation
page read and write
606C024B4000
trusted library allocation
page read and write
7690002BC000
trusted library allocation
page read and write
531000
unkown
page execute read
606C025A0000
trusted library allocation
page read and write
606C02504000
trusted library allocation
page read and write
6C480091C000
trusted library allocation
page read and write
769000235000
trusted library allocation
page read and write
78A1000
heap
page read and write
6871000
heap
page read and write
606C00601000
trusted library allocation
page read and write
606C030C4000
trusted library allocation
page read and write
6871000
heap
page read and write
7434000
direct allocation
page read and write
521BFFE000
unkown
page readonly
6871000
heap
page read and write
521AFFE000
unkown
page readonly
6871000
heap
page read and write
6871000
heap
page read and write
6C4800230000
trusted library allocation
page read and write
53E000
unkown
page read and write
606C027A8000
trusted library allocation
page read and write
606C02C64000
trusted library allocation
page read and write
24EB4016000
trusted library section
page read and write
3370000
direct allocation
page read and write
5A0000
unkown
page readonly
6C480078C000
trusted library allocation
page read and write
530000
unkown
page readonly
6C4800960000
trusted library allocation
page read and write
24EADB99000
heap
page read and write
606C02DD8000
trusted library allocation
page read and write
6871000
heap
page read and write
6F60000
trusted library allocation
page read and write
521FFFE000
unkown
page readonly
6871000
heap
page read and write
606C03074000
trusted library allocation
page read and write
606C02840000
trusted library allocation
page read and write
5207FFE000
unkown
page readonly
53E000
unkown
page read and write
6C4800850000
trusted library allocation
page read and write
606C0266A000
trusted library allocation
page read and write
3370000
direct allocation
page read and write
6F90000
direct allocation
page execute and read and write
5221FFD000
stack
page read and write
606C02544000
trusted library allocation
page read and write
9F8000
heap
page read and write
6871000
heap
page read and write
606C02A30000
trusted library allocation
page read and write
541000
unkown
page readonly
530000
unkown
page readonly
6871000
heap
page read and write
606C02550000
trusted library allocation
page read and write
24EAD830000
heap
page read and write
606C02A9C000
trusted library allocation
page read and write
78A2000
heap
page read and write
6871000
heap
page read and write
7AC7000
heap
page read and write
6C48008F4000
trusted library allocation
page read and write
24EAD5F1000
heap
page read and write
606C02FD8000
trusted library allocation
page read and write
606C02F8C000
trusted library allocation
page read and write
78A2000
heap
page read and write
53E000
unkown
page write copy
6C4800860000
trusted library allocation
page read and write
24EB3ED0000
trusted library section
page read and write
72D0000
direct allocation
page read and write
D00000
heap
page read and write
521EFFE000
unkown
page readonly
606C02FE4000
trusted library allocation
page read and write
6871000
heap
page read and write
769000250000
trusted library allocation
page read and write
606C02830000
trusted library allocation
page read and write
1262000
heap
page read and write
78AD000
heap
page read and write
6C480070C000
trusted library allocation
page read and write
6C4800890000
trusted library allocation
page read and write
71A9000
heap
page read and write
24EB1792000
trusted library allocation
page read and write
606C02220000
trusted library allocation
page read and write
7690002F0000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C02FBC000
trusted library allocation
page read and write
606C02430000
trusted library allocation
page read and write
606C026B8000
trusted library allocation
page read and write
5205FFE000
unkown
page readonly
6871000
heap
page read and write
769000264000
trusted library allocation
page read and write
606C031E0000
trusted library allocation
page read and write
6C889000
unkown
page read and write
18B40023C000
direct allocation
page read and write
6871000
heap
page read and write
11A0000
heap
page read and write
541000
unkown
page readonly
7690002BC000
trusted library allocation
page read and write
527E1FE000
stack
page read and write
606C02AB8000
trusted library allocation
page read and write
DD0000
heap
page read and write
606C028E8000
trusted library allocation
page read and write
52147FA000
stack
page read and write
6F90000
direct allocation
page execute and read and write
606C02B54000
trusted library allocation
page read and write
606C02E54000
trusted library allocation
page read and write
531000
unkown
page execute read
12B8000
heap
page read and write
3370000
direct allocation
page read and write
606C00401000
trusted library allocation
page read and write
6871000
heap
page read and write
24EAA233000
heap
page read and write
606C0271C000
trusted library allocation
page read and write
606C02964000
trusted library allocation
page read and write
78A2000
heap
page read and write
24EAA1D0000
trusted library allocation
page read and write
606C02FE8000
trusted library allocation
page read and write
1050000
heap
page read and write
6F90000
direct allocation
page execute and read and write
6871000
heap
page read and write
6871000
heap
page read and write
24EAD61B000
heap
page read and write
6871000
heap
page read and write
606C023B4000
trusted library allocation
page read and write
6C480081C000
trusted library allocation
page read and write
606C02544000
trusted library allocation
page read and write
606C02ED8000
trusted library allocation
page read and write
7A74000
heap
page read and write
6871000
heap
page read and write
24EB4070000
trusted library section
page read and write
52197FD000
stack
page read and write
6871000
heap
page read and write
10C0000
heap
page read and write
6871000
heap
page read and write
606C02928000
trusted library allocation
page read and write
78A9000
heap
page read and write
6871000
heap
page read and write
53E000
unkown
page write copy
C2E000
heap
page read and write
24EB4307000
unclassified section
page read and write
606C024F0000
trusted library allocation
page read and write
6871000
heap
page read and write
24EAD5F1000
heap
page read and write
24EB3F73000
trusted library section
page read and write
6871000
heap
page read and write
24EB1D8A000
heap
page read and write
6F90000
direct allocation
page execute and read and write
606C0242C000
trusted library allocation
page read and write
6C88C000
unkown
page readonly
24EB3527000
unclassified section
page read and write
6871000
heap
page read and write
5202FFE000
unkown
page readonly
6C4800898000
trusted library allocation
page read and write
521DFFE000
unkown
page readonly
6C48002CC000
trusted library allocation
page read and write
9F0000
heap
page read and write
6C4800920000
trusted library allocation
page read and write
606C00E01000
trusted library allocation
page read and write
10E0000
heap
page read and write
606C0301C000
trusted library allocation
page read and write
521C7FE000
stack
page read and write
11E7000
heap
page read and write
6871000
heap
page read and write
6C480020C000
trusted library allocation
page read and write
24EB35E0000
heap
page read and write
606C02244000
trusted library allocation
page read and write
78A2000
heap
page read and write
79E1000
heap
page read and write
606C023EC000
trusted library allocation
page read and write
C00000
heap
page read and write
24EAD5F6000
heap
page read and write
6C48007D4000
trusted library allocation
page read and write
18B400220000
direct allocation
page read and write
606C030A0000
trusted library allocation
page read and write
606C02CDC000
trusted library allocation
page read and write
541000
unkown
page readonly
1500000
heap
page read and write
53A000
unkown
page readonly
606C02E98000
trusted library allocation
page read and write
6C48002F4000
trusted library allocation
page read and write
2370000
heap
page read and write
24EADBA5000
heap
page read and write
606C026C8000
trusted library allocation
page read and write
6871000
heap
page read and write
520EFFE000
unkown
page readonly
7A1F000
heap
page read and write
6C4800250000
trusted library allocation
page read and write
531000
unkown
page execute read
53E000
unkown
page read and write
6CEA000
heap
page read and write
172F000
stack
page read and write
24EB1C77000
unclassified section
page read and write
606C03084000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
12D5000
heap
page read and write
6871000
heap
page read and write
7A5C000
heap
page read and write
606C02D04000
trusted library allocation
page read and write
18B400230000
direct allocation
page read and write
6C4800248000
trusted library allocation
page read and write
606C028D8000
trusted library allocation
page read and write
606C02BBF000
trusted library allocation
page read and write
6F90000
direct allocation
page execute and read and write
769000230000
trusted library allocation
page read and write
606C02530000
trusted library allocation
page read and write
3370000
direct allocation
page read and write
769000288000
trusted library allocation
page read and write
24EAA03F000
heap
page read and write
606C01001000
trusted library allocation
page read and write
78A6000
heap
page read and write
6871000
heap
page read and write
606C00A01000
trusted library allocation
page read and write
521F7FE000
stack
page read and write
24EB3EF0000
trusted library section
page read and write
606C023E8000
trusted library allocation
page read and write
24EAD5C0000
heap
page read and write
541000
unkown
page readonly
6C4800830000
trusted library allocation
page read and write
101E000
stack
page read and write
7BDD000
heap
page read and write
606C027D4000
trusted library allocation
page read and write
606C02878000
trusted library allocation
page read and write
606C02D14000
trusted library allocation
page read and write
6871000
heap
page read and write
606C030AC000
trusted library allocation
page read and write
606C025A0000
trusted library allocation
page read and write
606C02670000
trusted library allocation
page read and write
24EADBE1000
heap
page read and write
24EADBC4000
heap
page read and write
78A3000
heap
page read and write
53E000
unkown
page read and write
606C02201000
trusted library allocation
page read and write
24EB40E0000
trusted library section
page read and write
1CC000
stack
page read and write
606C0271C000
trusted library allocation
page read and write
520F7FE000
stack
page read and write
606C023B4000
trusted library allocation
page read and write
6C4800248000
trusted library allocation
page read and write
6C480071C000
trusted library allocation
page read and write
7A37000
heap
page read and write
606C02B84000
trusted library allocation
page read and write
7690002F4000
trusted library allocation
page read and write
DFE000
stack
page read and write
606C03130000
trusted library allocation
page read and write
606C028E8000
trusted library allocation
page read and write
606C02BC4000
trusted library allocation
page read and write
DC0000
heap
page read and write
6871000
heap
page read and write
606C02B9C000
trusted library allocation
page read and write
53A000
unkown
page readonly
6871000
heap
page read and write
7690002C0000
trusted library allocation
page read and write
606C023E0000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02C40000
trusted library allocation
page read and write
52087FE000
stack
page read and write
53A000
unkown
page readonly
769000248000
trusted library allocation
page read and write
606C0236C000
trusted library allocation
page read and write
5218FFE000
unkown
page readonly
6871000
heap
page read and write
24EAD5F7000
heap
page read and write
16D0000
heap
page read and write
606C0234C000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02B90000
trusted library allocation
page read and write
6C4800918000
trusted library allocation
page read and write
6871000
heap
page read and write
71A6000
heap
page read and write
769000220000
trusted library allocation
page read and write
6871000
heap
page read and write
6C48008D8000
trusted library allocation
page read and write
6871000
heap
page read and write
606C031DC000
trusted library allocation
page read and write
53A000
unkown
page readonly
6871000
heap
page read and write
6C48007E4000
trusted library allocation
page read and write
541000
unkown
page readonly
24EB4032000
trusted library section
page read and write
531000
unkown
page execute read
B6E000
stack
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
7A14000
heap
page read and write
6C83D000
unkown
page read and write
6C4800974000
trusted library allocation
page read and write
12DF000
heap
page read and write
778A000
heap
page read and write
78A9000
heap
page read and write
7B49000
heap
page read and write
78AE000
heap
page read and write
24EB3F61000
trusted library section
page read and write
606C02C0C000
trusted library allocation
page read and write
53E000
unkown
page write copy
6871000
heap
page read and write
530000
unkown
page readonly
6871000
heap
page read and write
7690002A0000
trusted library allocation
page read and write
52067FB000
stack
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
12BF000
heap
page read and write
7690002C8000
trusted library allocation
page read and write
541000
unkown
page readonly
24EADBE1000
heap
page read and write
6C4800801000
trusted library allocation
page read and write
3370000
direct allocation
page read and write
606C00C01000
trusted library allocation
page read and write
6871000
heap
page read and write
606C02CE8000
trusted library allocation
page read and write
14FE000
stack
page read and write
78A8000
heap
page read and write
606C024F7000
trusted library allocation
page read and write
EEF000
stack
page read and write
6871000
heap
page read and write
606C023C8000
trusted library allocation
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
606C02D7C000
trusted library allocation
page read and write
6871000
heap
page read and write
531000
unkown
page execute read
606C02B64000
trusted library allocation
page read and write
167F000
stack
page read and write
198F000
stack
page read and write
52167FD000
stack
page read and write
6871000
heap
page read and write
6871000
heap
page read and write
BEC000
stack
page read and write
7A0000
heap
page read and write
606C0253C000
trusted library allocation
page read and write
7A38000
heap
page read and write
A30000
heap
page read and write
6871000
heap
page read and write
606C02801000
trusted library allocation
page read and write
606C03034000
trusted library allocation
page read and write
6C48006C8000
trusted library allocation
page read and write
606C0221C000
trusted library allocation
page read and write
24EADB92000
heap
page read and write
6871000
heap
page read and write
3370000
direct allocation
page read and write
24EADB90000
heap
page read and write
606C0271C000
trusted library allocation
page read and write
6871000
heap
page read and write
7997000
heap
page read and write
There are 1278 hidden memdumps, click here to show them.