IOC Report
FMuiLqyqaT.exe

loading gif

Files

File Path
Type
Category
Malicious
FMuiLqyqaT.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_FMuiLqyqaT.exe_6a68c99f3f63f12ca75217f6c8d7e69c3e2bcd4_e4ca092a_611862fc-d487-48f4-83a4-46f0337baeaa\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3FDD.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER432A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43D7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FMuiLqyqaT.exe
"C:\Users\user\Desktop\FMuiLqyqaT.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2240,i,15170287205610031603,8856601979237756071,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6872 -s 1208
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/CharEl3
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6755E
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://www.youtube.coP
unknown
https://docs.google.com/spreadsheets/(
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en3
unknown
https://issuetracker.google.com/161903006
unknown
http://anglebug.com/4551)
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
https://anglebug.com/7899supportsSwapchainMaintenance1
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://drive-daily-5.corp.go
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
ProgramId
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
FileId
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
LowerCaseLongPath
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
LongPathHash
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
Name
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
OriginalFileName
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
Publisher
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
Version
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
BinFileVersion
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
BinaryType
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
ProductName
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
ProductVersion
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
LinkDate
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
BinProductVersion
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
AppxPackageFullName
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
AppxPackageRelativeId
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
Size
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
Language
\REGISTRY\A\{fd284fa7-c946-644c-6184-2aaf1244b9da}\Root\InventoryApplicationFile\fmuilqyqat.exe|20c5fb4476b06ba1
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A30025B4000
trusted library allocation
page read and write
7837000
heap
page read and write
6721000
heap
page read and write
1A30032E8000
trusted library allocation
page read and write
1A3002FD8000
trusted library allocation
page read and write
6721000
heap
page read and write
1A30023D8000
trusted library allocation
page read and write
6721000
heap
page read and write
780C000
heap
page read and write
1EF09592000
trusted library section
page read and write
1A30025BC000
trusted library allocation
page read and write
3040000
direct allocation
page read and write
6E40000
direct allocation
page execute and read and write
1A3002510000
trusted library allocation
page read and write
6721000
heap
page read and write
25CE000
unkown
page read and write
6721000
heap
page read and write
1A30028D0000
trusted library allocation
page read and write
790C000
heap
page read and write
1A30034A0000
trusted library allocation
page read and write
1EF030A2000
heap
page read and write
3040000
direct allocation
page read and write
3040000
direct allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A30029B0000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002504000
trusted library allocation
page read and write
6D1F3FE000
stack
page read and write
1A3003020000
trusted library allocation
page read and write
198400260000
trusted library allocation
page read and write
79EB000
heap
page read and write
6E40000
direct allocation
page execute and read and write
BFC000
stack
page read and write
1A3002EB0000
trusted library allocation
page read and write
BFC000
stack
page read and write
D7A000
unkown
page readonly
6D1D3EF000
stack
page read and write
1A3003218000
trusted library allocation
page read and write
12E4000
heap
page read and write
1A3003020000
trusted library allocation
page read and write
D70000
unkown
page readonly
611000868000
trusted library allocation
page read and write
D71000
unkown
page execute read
1A3002992000
trusted library allocation
page read and write
1A3002418000
trusted library allocation
page read and write
1A30025B4000
trusted library allocation
page read and write
D81000
unkown
page readonly
1A3002618000
trusted library allocation
page read and write
6110006BC000
trusted library allocation
page read and write
1A300222C000
trusted library allocation
page read and write
611000880000
trusted library allocation
page read and write
1A3002CCC000
trusted library allocation
page read and write
6721000
heap
page read and write
6E40000
direct allocation
page execute and read and write
1A300256C000
trusted library allocation
page read and write
1A3002C7C000
trusted library allocation
page read and write
6110007A0000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
1984002F0000
trusted library allocation
page read and write
1A3002E40000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1984002BC000
trusted library allocation
page read and write
1A3002D74000
trusted library allocation
page read and write
12E4000
heap
page read and write
1A30026A0000
trusted library allocation
page read and write
792F000
heap
page read and write
611000220000
trusted library allocation
page read and write
1984002C8000
trusted library allocation
page read and write
1984002A0000
trusted library allocation
page read and write
1A30030A0000
trusted library allocation
page read and write
1EF7285E000
heap
page read and write
1A3003128000
trusted library allocation
page read and write
1A30022EC000
trusted library allocation
page read and write
6721000
heap
page read and write
12E4000
heap
page read and write
1A3002560000
trusted library allocation
page read and write
7856000
heap
page read and write
6721000
heap
page read and write
611000948000
trusted library allocation
page read and write
1A3003380000
trusted library allocation
page read and write
1A3002DF8000
trusted library allocation
page read and write
12E4000
heap
page read and write
1A3002EE8000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1EF09400000
heap
page read and write
1A3003118000
trusted library allocation
page read and write
6E20000
direct allocation
page execute and read and write
1A3002504000
trusted library allocation
page read and write
1A3002E90000
trusted library allocation
page read and write
1050000
heap
page read and write
6721000
heap
page read and write
D71000
unkown
page execute read
6A5C00260000
direct allocation
page read and write
6C7DC000
unkown
page readonly
C7E000
stack
page read and write
6D23BFE000
unkown
page readonly
25D0000
heap
page read and write
1984002A0000
trusted library allocation
page read and write
1A30031D4000
trusted library allocation
page read and write
76DB000
heap
page read and write
611000920000
trusted library allocation
page read and write
1A3003201000
trusted library allocation
page read and write
C5C000
stack
page read and write
D71000
unkown
page execute read
6721000
heap
page read and write
6721000
heap
page read and write
1A30023B4000
trusted library allocation
page read and write
7888000
heap
page read and write
1EF09F81000
trusted library section
page read and write
6721000
heap
page read and write
1984002BC000
trusted library allocation
page read and write
D81000
unkown
page readonly
198400238000
trusted library allocation
page read and write
1EF03080000
heap
page read and write
1EF03686000
heap
page read and write
7E0000
heap
page read and write
1A3003240000
trusted library allocation
page read and write
6FC3000
heap
page read and write
CB0000
heap
page read and write
6D3A3FB000
stack
page read and write
1A3002554000
trusted library allocation
page read and write
D7E000
unkown
page write copy
6721000
heap
page read and write
D7E000
unkown
page read and write
1EF0A167000
unclassified section
page read and write
1A3002C98000
trusted library allocation
page read and write
6721000
heap
page read and write
6D2ABFE000
unkown
page readonly
D70000
unkown
page readonly
1A300349C000
trusted library allocation
page read and write
E20000
heap
page read and write
1A30030E0000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A3002201000
trusted library allocation
page read and write
D81000
unkown
page readonly
6A5C002AC000
direct allocation
page read and write
1A3002EF8000
trusted library allocation
page read and write
1A300254C000
trusted library allocation
page read and write
3040000
direct allocation
page read and write
6721000
heap
page read and write
76D6000
heap
page read and write
1A30028E5000
trusted library allocation
page read and write
1A300310C000
trusted library allocation
page read and write
1A3003198000
trusted library allocation
page read and write
6110007E4000
trusted library allocation
page read and write
1270000
heap
page read and write
1EF098B0000
trusted library section
page read and write
CB0000
heap
page read and write
6D243FA000
stack
page read and write
1EF030A3000
heap
page read and write
6721000
heap
page read and write
611000250000
trusted library allocation
page read and write
14D4000
heap
page read and write
1A3002A50000
trusted library allocation
page read and write
1EF07387000
unclassified section
page read and write
787F000
heap
page read and write
1A30030D4000
trusted library allocation
page read and write
1EF030A2000
heap
page read and write
1A3002244000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A3002B74000
trusted library allocation
page read and write
3040000
direct allocation
page read and write
6D463FE000
unkown
page readonly
13EF000
stack
page read and write
785B000
heap
page read and write
76DC000
heap
page read and write
6BC0000
direct allocation
page read and write
14B4000
heap
page read and write
76DB000
heap
page read and write
6721000
heap
page read and write
6D2DBFE000
unkown
page readonly
6721000
heap
page read and write
1A3002EE8000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3003348000
trusted library allocation
page read and write
2580000
heap
page read and write
778C000
heap
page read and write
1A30024B4000
trusted library allocation
page read and write
D81000
unkown
page readonly
6721000
heap
page read and write
D7A000
unkown
page readonly
1A300260F000
trusted library allocation
page read and write
6721000
heap
page read and write
1A300254C000
trusted library allocation
page read and write
6D343FC000
stack
page read and write
6E40000
direct allocation
page execute and read and write
6D3E3FE000
stack
page read and write
1A3002E0C000
trusted library allocation
page read and write
611000424000
trusted library allocation
page read and write
6D20BFE000
unkown
page readonly
1A30030FC000
trusted library allocation
page read and write
1A3002C38000
trusted library allocation
page read and write
1A30023EC000
trusted library allocation
page read and write
6721000
heap
page read and write
1A30023F0000
trusted library allocation
page read and write
76D2000
heap
page read and write
7814000
heap
page read and write
1A3003134000
trusted library allocation
page read and write
1A3002774000
trusted library allocation
page read and write
198400250000
trusted library allocation
page read and write
1A3002560000
trusted library allocation
page read and write
1A3000601000
trusted library allocation
page read and write
1A300238C000
trusted library allocation
page read and write
1A300310C000
trusted library allocation
page read and write
1A30023F4000
trusted library allocation
page read and write
1A3002FE0000
trusted library allocation
page read and write
6721000
heap
page read and write
6C6B0000
unkown
page readonly
1EF077DD000
heap
page read and write
6A5C002DC000
direct allocation
page read and write
1A30023AC000
trusted library allocation
page read and write
D7A000
unkown
page readonly
6721000
heap
page read and write
1A3003068000
trusted library allocation
page read and write
7779000
heap
page read and write
61100040C000
trusted library allocation
page read and write
D7A000
unkown
page readonly
947000
heap
page read and write
611000848000
trusted library allocation
page read and write
1EF018D0000
trusted library section
page readonly
1EF7283D000
heap
page read and write
14B8000
heap
page read and write
19840020C000
trusted library allocation
page read and write
6A5C00230000
direct allocation
page read and write
6FC1000
heap
page read and write
76D1000
heap
page read and write
D5E000
stack
page read and write
1A3002BCF000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1EF0A0DD000
trusted library section
page read and write
7141000
heap
page read and write
103C000
stack
page read and write
1A3002C38000
trusted library allocation
page read and write
79C6000
heap
page read and write
1EF03637000
heap
page read and write
1EF09D60000
trusted library section
page read and write
6721000
heap
page read and write
1A3002924000
trusted library allocation
page read and write
6721000
heap
page read and write
76D5000
heap
page read and write
6721000
heap
page read and write
1A30024F0000
trusted library allocation
page read and write
6721000
heap
page read and write
1EF09F90000
trusted library section
page read and write
61100079C000
trusted library allocation
page read and write
6D4BBFE000
unkown
page readonly
1EF727A0000
heap
page read and write
14B8000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6D353FB000
stack
page read and write
24DD000
stack
page read and write
1EF09F70000
trusted library section
page read and write
6721000
heap
page read and write
1EF728D0000
trusted library allocation
page read and write
6721000
heap
page read and write
D7A000
unkown
page readonly
1A3003020000
trusted library allocation
page read and write
1A30025B4000
trusted library allocation
page read and write
6D4ABFE000
unkown
page readonly
6721000
heap
page read and write
61100060C000
trusted library allocation
page read and write
1EC000
stack
page read and write
1A300305C000
trusted library allocation
page read and write
6721000
heap
page read and write
7769000
heap
page read and write
6721000
heap
page read and write
3040000
direct allocation
page read and write
1A3002420000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3003038000
trusted library allocation
page read and write
1A30024A4000
trusted library allocation
page read and write
6D40BFD000
stack
page read and write
3040000
direct allocation
page read and write
1A300349C000
trusted library allocation
page read and write
1A30023AC000
trusted library allocation
page read and write
78BA000
heap
page read and write
D71000
unkown
page execute read
D71000
unkown
page execute read
12F0000
heap
page read and write
1A3002C44000
trusted library allocation
page read and write
290F000
unkown
page read and write
6721000
heap
page read and write
6E40000
direct allocation
page execute and read and write
61100020C000
trusted library allocation
page read and write
1984002C0000
trusted library allocation
page read and write
1A30023D0000
trusted library allocation
page read and write
D7E000
unkown
page read and write
1A3002738000
trusted library allocation
page read and write
1A3003001000
trusted library allocation
page read and write
61100039C000
trusted library allocation
page read and write
6721000
heap
page read and write
1A30025D8000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
776D000
heap
page read and write
1A30030C4000
trusted library allocation
page read and write
1A3003184000
trusted library allocation
page read and write
1EF0A1EE000
trusted library section
page read and write
1A30030C4000
trusted library allocation
page read and write
1A3002FA0000
trusted library allocation
page read and write
132E000
stack
page read and write
D70000
unkown
page readonly
10C7000
heap
page read and write
77F9000
heap
page read and write
6110008F4000
trusted library allocation
page read and write
1EF09D6E000
trusted library section
page read and write
61100071C000
trusted library allocation
page read and write
6721000
heap
page read and write
6110006F0000
trusted library allocation
page read and write
6D363FB000
stack
page read and write
6721000
heap
page read and write
1A30023D4000
trusted library allocation
page read and write
1A3002FEC000
trusted library allocation
page read and write
1A3002E48000
trusted library allocation
page read and write
1A300310C000
trusted library allocation
page read and write
198400230000
trusted library allocation
page read and write
1EF09FF0000
trusted library section
page read and write
1A3003364000
trusted library allocation
page read and write
1EF09677000
unclassified section
page read and write
1A3002538000
trusted library allocation
page read and write
14C5000
heap
page read and write
6A5C0024C000
direct allocation
page read and write
14B4000
heap
page read and write
1A3002428000
trusted library allocation
page read and write
6721000
heap
page read and write
1EF72960000
heap
page read and write
1A3002DA0000
trusted library allocation
page read and write
6D203FE000
stack
page read and write
D81000
unkown
page readonly
1A30024C4000
trusted library allocation
page read and write
D7A000
unkown
page readonly
611000844000
trusted library allocation
page read and write
1A30025F8000
trusted library allocation
page read and write
6110002ED000
trusted library allocation
page read and write
6721000
heap
page read and write
77AC000
heap
page read and write
121000
unkown
page execute and write copy
6721000
heap
page read and write
1EF0363F000
heap
page read and write
6E10000
trusted library allocation
page read and write
6110006AC000
trusted library allocation
page read and write
1A30029A8000
trusted library allocation
page read and write
12E4000
heap
page read and write
6721000
heap
page read and write
1EF03682000
heap
page read and write
1EF03632000
heap
page read and write
76DC000
heap
page read and write
76D4000
heap
page read and write
1A3002DE4000
trusted library allocation
page read and write
781C000
heap
page read and write
12E4000
heap
page read and write
14A1000
heap
page read and write
940000
heap
page read and write
6D213FE000
stack
page read and write
6D2E3FA000
stack
page read and write
6A5C00250000
direct allocation
page read and write
6721000
heap
page read and write
BD9000
unkown
page execute and write copy
1A3003154000
trusted library allocation
page read and write
1A300282C000
trusted library allocation
page read and write
1A30032D8000
trusted library allocation
page read and write
77C1000
heap
page read and write
1EF0309E000
heap
page read and write
6721000
heap
page read and write
1A3003140000
trusted library allocation
page read and write
611000960000
trusted library allocation
page read and write
6A5C00220000
direct allocation
page read and write
7809000
heap
page read and write
6721000
heap
page read and write
6E40000
direct allocation
page execute and read and write
7A43000
heap
page read and write
1EF0A0B6000
trusted library section
page read and write
1A30030F0000
trusted library allocation
page read and write
1A3002E01000
trusted library allocation
page read and write
1A3003401000
trusted library allocation
page read and write
611000238000
trusted library allocation
page read and write
6D48BFC000
stack
page read and write
6721000
heap
page read and write
611000898000
trusted library allocation
page read and write
7834000
heap
page read and write
76DC000
heap
page read and write
1A3002E80000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002978000
trusted library allocation
page read and write
1A30023B4000
trusted library allocation
page read and write
1A30025D8000
trusted library allocation
page read and write
1A30032FC000
trusted library allocation
page read and write
76D1000
heap
page read and write
72E4000
direct allocation
page read and write
1A3002318000
trusted library allocation
page read and write
6A5C002A8000
direct allocation
page read and write
1EF036AC000
heap
page read and write
6721000
heap
page read and write
198400270000
trusted library allocation
page read and write
D70000
unkown
page readonly
1A3002410000
trusted library allocation
page read and write
A8E000
heap
page read and write
198400264000
trusted library allocation
page read and write
6110002B8000
trusted library allocation
page read and write
1A30027D0000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
7C0000
heap
page read and write
1EF073C2000
trusted library allocation
page read and write
611000840000
trusted library allocation
page read and write
6D3EBFE000
unkown
page readonly
D70000
unkown
page readonly
D70000
unkown
page readonly
640000
heap
page read and write
1A3001001000
trusted library allocation
page read and write
611000818000
trusted library allocation
page read and write
1A30025C8000
trusted library allocation
page read and write
6721000
heap
page read and write
C28000
heap
page read and write
1A3002B08000
trusted library allocation
page read and write
2940000
heap
page read and write
6E40000
direct allocation
page execute and read and write
1A3000801000
trusted library allocation
page read and write
1984002BC000
trusted library allocation
page read and write
6721000
heap
page read and write
1A300299C000
trusted library allocation
page read and write
79AF000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A3002F8C000
trusted library allocation
page read and write
6721000
heap
page read and write
1EF728A0000
heap
page read and write
1EF0362E000
heap
page read and write
1A3003308000
trusted library allocation
page read and write
298E000
stack
page read and write
6721000
heap
page read and write
6D223FE000
stack
page read and write
D70000
unkown
page readonly
785D000
heap
page read and write
D7E000
unkown
page read and write
1A300254C000
trusted library allocation
page read and write
6D21BFE000
unkown
page readonly
1EF018F0000
heap
page read and write
6721000
heap
page read and write
3040000
direct allocation
page read and write
6F51000
heap
page read and write
611000860000
trusted library allocation
page read and write
7849000
heap
page read and write
1A30029B0000
trusted library allocation
page read and write
75E000
stack
page read and write
1A3002AEC000
trusted library allocation
page read and write
1EF030B0000
heap
page read and write
6D2A3FE000
stack
page read and write
6721000
heap
page read and write
1A3002BAC000
trusted library allocation
page read and write
6D47BFA000
stack
page read and write
1A3003378000
trusted library allocation
page read and write
1A3002A78000
trusted library allocation
page read and write
6721000
heap
page read and write
6D3D3FB000
stack
page read and write
6721000
heap
page read and write
611000828000
trusted library allocation
page read and write
6721000
heap
page read and write
D71000
unkown
page execute read
6110007C4000
trusted library allocation
page read and write
1A3002F80000
trusted library allocation
page read and write
611000778000
trusted library allocation
page read and write
76D3000
heap
page read and write
1EF030B0000
heap
page read and write
1A3002394000
trusted library allocation
page read and write
1EF03654000
heap
page read and write
1A30028D0000
trusted library allocation
page read and write
1A3002EA0000
trusted library allocation
page read and write
6D4DBFE000
unkown
page readonly
1A3002674000
trusted library allocation
page read and write
C3F000
stack
page read and write
6D36BFE000
unkown
page readonly
6D2FBFE000
unkown
page readonly
1A300254C000
trusted library allocation
page read and write
6A5C002D0000
direct allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
A8A000
heap
page read and write
76D8000
heap
page read and write
6D253FC000
stack
page read and write
1A30023E0000
trusted library allocation
page read and write
1A30023E8000
trusted library allocation
page read and write
1A3002214000
trusted library allocation
page read and write
1A3002AC8000
trusted library allocation
page read and write
10C0000
heap
page read and write
7A05000
heap
page read and write
1EF036B0000
trusted library section
page read and write
76D3000
heap
page read and write
6110006E8000
trusted library allocation
page read and write
6D37BFE000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
12E4000
heap
page read and write
1A3002C01000
trusted library allocation
page read and write
1A30029B0000
trusted library allocation
page read and write
1A30030B0000
trusted library allocation
page read and write
1EF72770000
heap
page read and write
1EF0365C000
heap
page read and write
6C6B1000
unkown
page execute read
1EF07300000
trusted library section
page read and write
1EF09D37000
unclassified section
page read and write
1EF077C0000
heap
page read and write
1A3002254000
trusted library allocation
page read and write
6110008B4000
trusted library allocation
page read and write
1984002B0000
trusted library allocation
page read and write
6721000
heap
page read and write
1EF0361D000
heap
page read and write
76D7000
heap
page read and write
12E4000
heap
page read and write
1A300260C000
trusted library allocation
page read and write
72F0000
heap
page read and write
6110008E8000
trusted library allocation
page read and write
76DD000
heap
page read and write
7180000
direct allocation
page read and write
1EF0780B000
heap
page read and write
1A3002F30000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6D32BFE000
unkown
page readonly
6721000
heap
page read and write
6721000
heap
page read and write
1A30024B4000
trusted library allocation
page read and write
1A3002ED0000
trusted library allocation
page read and write
76C000
stack
page read and write
6110007BC000
trusted library allocation
page read and write
61100070C000
trusted library allocation
page read and write
76D7000
heap
page read and write
1A300240C000
trusted library allocation
page read and write
1A30034D4000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002690000
trusted library allocation
page read and write
14B8000
heap
page read and write
6FC1000
heap
page read and write
1EF03689000
heap
page read and write
6D27BFE000
unkown
page readonly
1A3002A58000
trusted library allocation
page read and write
76D2000
heap
page read and write
1EF728C0000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
1EF07826000
heap
page read and write
3040000
direct allocation
page read and write
76D8000
heap
page read and write
12E4000
heap
page read and write
1984002F4000
trusted library allocation
page read and write
1A30024A8000
trusted library allocation
page read and write
1A3002560000
trusted library allocation
page read and write
6721000
heap
page read and write
6110002F4000
trusted library allocation
page read and write
D7E000
unkown
page read and write
1A3003260000
trusted library allocation
page read and write
D7E000
unkown
page write copy
1EF0365C000
heap
page read and write
EF0000
heap
page read and write
1EF07838000
heap
page read and write
6A5C00210000
direct allocation
page read and write
611000728000
trusted library allocation
page read and write
611000878000
trusted library allocation
page read and write
1EF093E7000
unclassified section
page read and write
6721000
heap
page read and write
C20000
heap
page read and write
D7E000
unkown
page write copy
6721000
heap
page read and write
1A3002328000
trusted library allocation
page read and write
1EF095D0000
trusted library section
page read and write
6110006E0000
trusted library allocation
page read and write
6D313FE000
stack
page read and write
1A3002EE8000
trusted library allocation
page read and write
1A3000A01000
trusted library allocation
page read and write
1A30026A0000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3003118000
trusted library allocation
page read and write
14AA000
heap
page read and write
1A3002F00000
trusted library allocation
page read and write
6FC1000
heap
page read and write
1A30023B4000
trusted library allocation
page read and write
1984002A0000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A3003230000
trusted library allocation
page read and write
1A3002BC4000
trusted library allocation
page read and write
D7E000
unkown
page write copy
7A6F000
heap
page read and write
1EF094D2000
trusted library section
page read and write
D81000
unkown
page readonly
1A3002E9C000
trusted library allocation
page read and write
1A3003174000
trusted library allocation
page read and write
6721000
heap
page read and write
611000788000
trusted library allocation
page read and write
1A3002DF8000
trusted library allocation
page read and write
76D5000
heap
page read and write
1A300280C000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002F1C000
trusted library allocation
page read and write
1A300329C000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002EE8000
trusted library allocation
page read and write
1EF018F3000
heap
page read and write
198400201000
trusted library allocation
page read and write
6721000
heap
page read and write
14D5000
heap
page read and write
6721000
heap
page read and write
1A3002BB8000
trusted library allocation
page read and write
1A3002920000
trusted library allocation
page read and write
611000894000
trusted library allocation
page read and write
1A3002E58000
trusted library allocation
page read and write
1A3002B24000
trusted library allocation
page read and write
1A30029F0000
trusted library allocation
page read and write
1A3000C01000
trusted library allocation
page read and write
1A3000401000
trusted library allocation
page read and write
6C78F000
unkown
page readonly
1EF035DA000
heap
page read and write
6E40000
direct allocation
page execute and read and write
611000904000
trusted library allocation
page read and write
611000248000
trusted library allocation
page read and write
6A5C00274000
direct allocation
page read and write
1A3003118000
trusted library allocation
page read and write
6110002B0000
trusted library allocation
page read and write
1984002C0000
trusted library allocation
page read and write
6D2B3FE000
stack
page read and write
611000288000
trusted library allocation
page read and write
1EF035EF000
heap
page read and write
D71000
unkown
page execute read
1A3002540000
trusted library allocation
page read and write
6110007E0000
trusted library allocation
page read and write
6721000
heap
page read and write
1A30028F0000
trusted library allocation
page read and write
112F000
stack
page read and write
1A30024F3000
trusted library allocation
page read and write
1EF03300000
heap
page read and write
1EF0A001000
trusted library section
page read and write
1A3002504000
trusted library allocation
page read and write
6110002D4000
trusted library allocation
page read and write
1A3002490000
trusted library allocation
page read and write
6721000
heap
page read and write
611000964000
trusted library allocation
page read and write
2A10000
heap
page read and write
1A3002EE8000
trusted library allocation
page read and write
14A4000
heap
page read and write
3040000
direct allocation
page read and write
1984002BC000
trusted library allocation
page read and write
6D3ABFE000
unkown
page readonly
6721000
heap
page read and write
76DC000
heap
page read and write
6721000
heap
page read and write
123C000
stack
page read and write
1A300293C000
trusted library allocation
page read and write
1A3002B94000
trusted library allocation
page read and write
6721000
heap
page read and write
14DE000
heap
page read and write
6721000
heap
page read and write
6D393FC000
stack
page read and write
6D3B3FD000
stack
page read and write
77E7000
heap
page read and write
6F6F000
heap
page read and write
1EF077C6000
heap
page read and write
1A3002D24000
trusted library allocation
page read and write
1A3003230000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6110007D4000
trusted library allocation
page read and write
1120000
heap
page read and write
6110006C8000
trusted library allocation
page read and write
1EF09FA2000
trusted library section
page read and write
5FC000
stack
page read and write
D70000
unkown
page readonly
6721000
heap
page read and write
1A3002684000
trusted library allocation
page read and write
1A30023F8000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002E60000
trusted library allocation
page read and write
1A3003118000
trusted library allocation
page read and write
6721000
heap
page read and write
6D323FE000
stack
page read and write
18D0000
heap
page read and write
1EF09403000
heap
page read and write
1EF035B0000
heap
page read and write
1EF0369D000
heap
page read and write
76DB000
heap
page read and write
6D1EBFE000
unkown
page readonly
6D413FE000
unkown
page readonly
3040000
direct allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
12E4000
heap
page read and write
14B4000
heap
page read and write
D7A000
unkown
page readonly
611000830000
trusted library allocation
page read and write
14CB000
heap
page read and write
BE0000
heap
page read and write
D71000
unkown
page execute read
6721000
heap
page read and write
1EF07828000
heap
page read and write
6110008C8000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
76DE000
heap
page read and write
1A300254C000
trusted library allocation
page read and write
6D3FBFE000
unkown
page readonly
1EF72680000
heap
page read and write
1A3003020000
trusted library allocation
page read and write
6D41BFD000
stack
page read and write
1EF030A2000
heap
page read and write
6D3BBFE000
unkown
page readonly
1EF09B20000
trusted library section
page read and write
1A30022DC000
trusted library allocation
page read and write
1A30022FC000
trusted library allocation
page read and write
6721000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6A5C002EC000
direct allocation
page read and write
6D483FE000
unkown
page readonly
14AB000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A3002C2C000
trusted library allocation
page read and write
1A30029E0000
trusted library allocation
page read and write
1EF03637000
heap
page read and write
1A3002CBC000
trusted library allocation
page read and write
1A3002784000
trusted library allocation
page read and write
1A30025B4000
trusted library allocation
page read and write
1A300310C000
trusted library allocation
page read and write
611000874000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6110006AC000
trusted library allocation
page read and write
F20000
heap
page read and write
1A30024F0000
trusted library allocation
page read and write
7897000
heap
page read and write
1A30025B4000
trusted library allocation
page read and write
1A300237C000
trusted library allocation
page read and write
6D30BFE000
unkown
page readonly
1A3003050000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
61100080C000
trusted library allocation
page read and write
6721000
heap
page read and write
A80000
heap
page read and write
7D0000
heap
page read and write
1A30024A4000
trusted library allocation
page read and write
7813000
heap
page read and write
6721000
heap
page read and write
6110008EC000
trusted library allocation
page read and write
1984002D8000
trusted library allocation
page read and write
1EF03682000
heap
page read and write
6D31BFE000
unkown
page readonly
1A3002554000
trusted library allocation
page read and write
1A30023C4000
trusted library allocation
page read and write
611000974000
trusted library allocation
page read and write
1A3003080000
trusted library allocation
page read and write
6A5C00201000
direct allocation
page read and write
1A3002BA0000
trusted library allocation
page read and write
6D39BFE000
unkown
page readonly
1A300252C000
trusted library allocation
page read and write
12E4000
heap
page read and write
611000858000
trusted library allocation
page read and write
1A30024A8000
trusted library allocation
page read and write
6BB0000
direct allocation
page read and write
6E30000
direct allocation
page execute and read and write
6110008A8000
trusted library allocation
page read and write
3040000
direct allocation
page read and write
61100025C000
trusted library allocation
page read and write
6721000
heap
page read and write
6D4D3FE000
stack
page read and write
1A3002AAC000
trusted library allocation
page read and write
1A30026F4000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6721000
heap
page read and write
6C78D000
unkown
page read and write
6721000
heap
page read and write
D00000
heap
page read and write
6721000
heap
page read and write
611000918000
trusted library allocation
page read and write
1A3002801000
trusted library allocation
page read and write
D7A000
unkown
page readonly
1A30024FB000
trusted library allocation
page read and write
77A6000
heap
page read and write
1A3002EE8000
trusted library allocation
page read and write
1A3002424000
trusted library allocation
page read and write
D7E000
unkown
page write copy
6110006F4000
trusted library allocation
page read and write
1EF03098000
heap
page read and write
6721000
heap
page read and write
2A50000
heap
page read and write
14BF000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
198400294000
trusted library allocation
page read and write
1A3002894000
trusted library allocation
page read and write
198400220000
trusted library allocation
page read and write
1A3002F64000
trusted library allocation
page read and write
1A3002C0C000
trusted library allocation
page read and write
6110008B8000
trusted library allocation
page read and write
6721000
heap
page read and write
1A300240C000
trusted library allocation
page read and write
1984002F8000
trusted library allocation
page read and write
1A3002718000
trusted library allocation
page read and write
611000801000
trusted library allocation
page read and write
1EF077D0000
heap
page read and write
6110008D8000
trusted library allocation
page read and write
1A3002EF8000
trusted library allocation
page read and write
1A3002613000
trusted library allocation
page read and write
1EF72760000
heap
page readonly
6D38BFE000
unkown
page readonly
1A30027BC000
trusted library allocation
page read and write
1A3002290000
trusted library allocation
page read and write
76DE000
heap
page read and write
611000430000
trusted library allocation
page read and write
6D35BFE000
unkown
page readonly
6E10000
trusted library allocation
page read and write
1A30023B4000
trusted library allocation
page read and write
7948000
heap
page read and write
6D2CBFE000
unkown
page readonly
74D1000
heap
page read and write
1EF094DE000
trusted library section
page read and write
1A3002601000
trusted library allocation
page read and write
6721000
heap
page read and write
6D25BFE000
unkown
page readonly
7792000
heap
page read and write
1A3003018000
trusted library allocation
page read and write
6D383FC000
stack
page read and write
6721000
heap
page read and write
6A5C00280000
direct allocation
page read and write
6110006D4000
trusted library allocation
page read and write
789F000
heap
page read and write
1A3002540000
trusted library allocation
page read and write
1A30024A4000
trusted library allocation
page read and write
1A3003078000
trusted library allocation
page read and write
6D2C3FE000
stack
page read and write
6721000
heap
page read and write
1A3003270000
trusted library allocation
page read and write
1A3002560000
trusted library allocation
page read and write
1A3002500000
trusted library allocation
page read and write
6A5C00270000
direct allocation
page read and write
12E4000
heap
page read and write
77FA000
heap
page read and write
6D33BFE000
unkown
page readonly
6721000
heap
page read and write
1A3002560000
trusted library allocation
page read and write
76D0000
heap
page read and write
1A30026AC000
trusted library allocation
page read and write
61100039C000
trusted library allocation
page read and write
6721000
heap
page read and write
6110002E4000
trusted library allocation
page read and write
1984002C0000
trusted library allocation
page read and write
E9E000
stack
page read and write
6D26BFE000
unkown
page readonly
1EF030AB000
heap
page read and write
611000210000
trusted library allocation
page read and write
1A30032D0000
trusted library allocation
page read and write
78C000
stack
page read and write
1A3003020000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A30028A4000
trusted library allocation
page read and write
1A3002F50000
trusted library allocation
page read and write
1EF0309E000
heap
page read and write
D71000
unkown
page execute read
1EF03689000
heap
page read and write
1A3002430000
trusted library allocation
page read and write
611000601000
trusted library allocation
page read and write
29CF000
stack
page read and write
61100085C000
trusted library allocation
page read and write
6721000
heap
page read and write
77D9000
heap
page read and write
1A3002CF0000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002794000
trusted library allocation
page read and write
1A3002CE0000
trusted library allocation
page read and write
1A300300C000
trusted library allocation
page read and write
6D43BFE000
stack
page read and write
1A3002401000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6A5C0023C000
direct allocation
page read and write
1984002C0000
trusted library allocation
page read and write
1A3002858000
trusted library allocation
page read and write
7794000
heap
page read and write
D71000
unkown
page execute read
6721000
heap
page read and write
6D42BFD000
stack
page read and write
76D1000
heap
page read and write
6B60000
trusted library allocation
page read and write
1A3002C58000
trusted library allocation
page read and write
6721000
heap
page read and write
6D4B3FE000
stack
page read and write
1EF030A3000
heap
page read and write
1A30023AC000
trusted library allocation
page read and write
12E4000
heap
page read and write
1A3002884000
trusted library allocation
page read and write
1A3002F6C000
trusted library allocation
page read and write
6D3CBFE000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
D81000
unkown
page readonly
520000
heap
page read and write
1A3002F38000
trusted library allocation
page read and write
78EC000
heap
page read and write
6721000
heap
page read and write
12E4000
heap
page read and write
611000418000
trusted library allocation
page read and write
1A3002560000
trusted library allocation
page read and write
611000890000
trusted library allocation
page read and write
6D4C3FE000
stack
page read and write
1EF03740000
trusted library section
page read and write
1A3002FC0000
trusted library allocation
page read and write
1A3002C38000
trusted library allocation
page read and write
6721000
heap
page read and write
1A30023A0000
trusted library allocation
page read and write
796B000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A30024D0000
trusted library allocation
page read and write
C3E000
stack
page read and write
D81000
unkown
page readonly
7786000
heap
page read and write
198400235000
trusted library allocation
page read and write
1A30022B4000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3003118000
trusted library allocation
page read and write
1A300234C000
trusted library allocation
page read and write
1A3003340000
trusted library allocation
page read and write
1A300226A000
trusted library allocation
page read and write
1A300310C000
trusted library allocation
page read and write
6721000
heap
page read and write
9FC000
stack
page read and write
6721000
heap
page read and write
1A3003044000
trusted library allocation
page read and write
830000
heap
page read and write
6D28BFE000
unkown
page readonly
77C0000
heap
page read and write
611000404000
trusted library allocation
page read and write
6721000
heap
page read and write
12E4000
heap
page read and write
1A300272D000
trusted library allocation
page read and write
1A3002F94000
trusted library allocation
page read and write
1A3002C1C000
trusted library allocation
page read and write
1A3002D68000
trusted library allocation
page read and write
6721000
heap
page read and write
6D29BFE000
unkown
page readonly
1EF72820000
heap
page read and write
6721000
heap
page read and write
6D473FE000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
6D263FE000
stack
page read and write
6D433FE000
unkown
page readonly
1A30030A0000
trusted library allocation
page read and write
6721000
heap
page read and write
D81000
unkown
page readonly
198400274000
trusted library allocation
page read and write
6D273FA000
stack
page read and write
1A300220C000
trusted library allocation
page read and write
251A000
stack
page read and write
1A300284C000
trusted library allocation
page read and write
6721000
heap
page read and write
611000230000
trusted library allocation
page read and write
6110006E8000
trusted library allocation
page read and write
6721000
heap
page read and write
61100091C000
trusted library allocation
page read and write
6721000
heap
page read and write
6D22BFE000
unkown
page readonly
6D303FE000
stack
page read and write
6721000
heap
page read and write
D71000
unkown
page execute read
14CB000
heap
page read and write
1A30029C4000
trusted library allocation
page read and write
6721000
heap
page read and write
611000401000
trusted library allocation
page read and write
1A3002F40000
trusted library allocation
page read and write
1440000
heap
page read and write
1EF09646000
trusted library section
page read and write
1A300324C000
trusted library allocation
page read and write
76D0000
heap
page read and write
76D5000
heap
page read and write
6D453FE000
unkown
page readonly
6E10000
trusted library allocation
page read and write
1A3002D98000
trusted library allocation
page read and write
1A3002998000
trusted library allocation
page read and write
1A3002E24000
trusted library allocation
page read and write
6D2F3FE000
stack
page read and write
12E4000
heap
page read and write
7865000
heap
page read and write
1A30024C0000
trusted library allocation
page read and write
6721000
heap
page read and write
1EF09480000
heap
page read and write
1A3002A9C000
trusted library allocation
page read and write
12E4000
heap
page read and write
6721000
heap
page read and write
7F0000
heap
page read and write
6721000
heap
page read and write
1EF02340000
unkown
page read and write
1A30034B8000
trusted library allocation
page read and write
1EF03654000
heap
page read and write
1A30031AC000
trusted library allocation
page read and write
1A3002F00000
trusted library allocation
page read and write
F8F000
stack
page read and write
D7A000
unkown
page readonly
6721000
heap
page read and write
1A30031A4000
trusted library allocation
page read and write
6721000
heap
page read and write
76DD000
heap
page read and write
3040000
direct allocation
page read and write
611000408000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002D90000
trusted library allocation
page read and write
6D49BF4000
stack
page read and write
1A3002D18000
trusted library allocation
page read and write
77D0000
heap
page read and write
1A300229C000
trusted library allocation
page read and write
72FA000
heap
page read and write
6721000
heap
page read and write
1A300247C000
trusted library allocation
page read and write
1EF72859000
heap
page read and write
6D493FE000
unkown
page readonly
6721000
heap
page read and write
1A3002284000
trusted library allocation
page read and write
1A300340C000
trusted library allocation
page read and write
6721000
heap
page read and write
788E000
heap
page read and write
1A30023CC000
trusted library allocation
page read and write
12E4000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A3003280000
trusted library allocation
page read and write
611000201000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002EF8000
trusted library allocation
page read and write
3040000
direct allocation
page read and write
1A3002C38000
trusted library allocation
page read and write
6D3DBFE000
unkown
page readonly
1A30028FC000
trusted library allocation
page read and write
1A3002A0C000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
E28000
heap
page read and write
6A5C00284000
direct allocation
page read and write
1A300312D000
trusted library allocation
page read and write
1A30024A4000
trusted library allocation
page read and write
76D0000
heap
page read and write
1A3002919000
trusted library allocation
page read and write
1EF09FE0000
trusted library section
page read and write
76DA000
heap
page read and write
198400288000
trusted library allocation
page read and write
6D4CBFE000
unkown
page readonly
1A300236C000
trusted library allocation
page read and write
1A3002C38000
trusted library allocation
page read and write
1A300254C000
trusted library allocation
page read and write
D81000
unkown
page readonly
1EF0A1E0000
trusted library section
page read and write
1A3002B38000
trusted library allocation
page read and write
D7E000
unkown
page write copy
1A3002A28000
trusted library allocation
page read and write
1EF035F3000
heap
page read and write
1A3000E01000
trusted library allocation
page read and write
611000790000
trusted library allocation
page read and write
1EF03070000
heap
page read and write
7D0000
heap
page read and write
1A3002DF4000
trusted library allocation
page read and write
6721000
heap
page read and write
198400248000
trusted library allocation
page read and write
6D233FD000
stack
page read and write
6110006AC000
trusted library allocation
page read and write
6D403FD000
stack
page read and write
72E6000
direct allocation
page read and write
6721000
heap
page read and write
1A3002BD8000
trusted library allocation
page read and write
6D3F3FE000
stack
page read and write
1A30026D0000
trusted library allocation
page read and write
78BA000
heap
page read and write
760000
heap
page read and write
D30000
heap
page read and write
76D2000
heap
page read and write
1A30031AC000
trusted library allocation
page read and write
6110008C4000
trusted library allocation
page read and write
11EF000
stack
page read and write
6D4A3FE000
unkown
page readonly
1A30025EC000
trusted library allocation
page read and write
61100095C000
trusted library allocation
page read and write
D7A000
unkown
page readonly
1A3000201000
trusted library allocation
page read and write
4CC000
stack
page read and write
1A3002274000
trusted library allocation
page read and write
1A30028E0000
trusted library allocation
page read and write
6D44BFE000
stack
page read and write
1A300252C000
trusted library allocation
page read and write
1EF03632000
heap
page read and write
1A300284C000
trusted library allocation
page read and write
76D1000
heap
page read and write
6721000
heap
page read and write
1A3002504000
trusted library allocation
page read and write
1A3003080000
trusted library allocation
page read and write
783A000
heap
page read and write
6110006C8000
trusted library allocation
page read and write
D81000
unkown
page readonly
6721000
heap
page read and write
61100087C000
trusted library allocation
page read and write
6721000
heap
page read and write
14C6000
heap
page read and write
6D24BFE000
unkown
page readonly
1EF03099000
heap
page read and write
A5C000
stack
page read and write
6C7D9000
unkown
page read and write
1EF0A0D2000
trusted library section
page read and write
D7A000
unkown
page readonly
1A3002D68000
trusted library allocation
page read and write
1A3002F94000
trusted library allocation
page read and write
1984002B0000
trusted library allocation
page read and write
1A300241C000
trusted library allocation
page read and write
6721000
heap
page read and write
61100078C000
trusted library allocation
page read and write
1EF0362E000
heap
page read and write
1A30027A8000
trusted library allocation
page read and write
6721000
heap
page read and write
61100027C000
trusted library allocation
page read and write
1A3002D28000
trusted library allocation
page read and write
1EF0363F000
heap
page read and write
61100082C000
trusted library allocation
page read and write
1A3003318000
trusted library allocation
page read and write
198400278000
trusted library allocation
page read and write
A00000
heap
page read and write
6110008E4000
trusted library allocation
page read and write
785F000
heap
page read and write
1A3002560000
trusted library allocation
page read and write
1EF0A110000
trusted library section
page read and write
6A5C00290000
direct allocation
page read and write
1A300310C000
trusted library allocation
page read and write
1A3002504000
trusted library allocation
page read and write
6721000
heap
page read and write
1A30024A4000
trusted library allocation
page read and write
D70000
unkown
page readonly
1984002C0000
trusted library allocation
page read and write
611000884000
trusted library allocation
page read and write
7838000
heap
page read and write
6721000
heap
page read and write
6D3C3FC000
stack
page read and write
1A30023E4000
trusted library allocation
page read and write
6A5C00303000
direct allocation
page read and write
1A300235C000
trusted library allocation
page read and write
6D283FC000
stack
page read and write
1A3002FA4000
trusted library allocation
page read and write
1A30030A0000
trusted library allocation
page read and write
611000248000
trusted library allocation
page read and write
121000
unkown
page execute and write copy
6721000
heap
page read and write
D7E000
unkown
page read and write
61100084C000
trusted library allocation
page read and write
1984002A0000
trusted library allocation
page read and write
14AA000
heap
page read and write
12C0000
heap
page read and write
6721000
heap
page read and write
1A3002554000
trusted library allocation
page read and write
1EF09FAE000
trusted library section
page read and write
6E40000
direct allocation
page execute and read and write
1A30025B4000
trusted library allocation
page read and write
6A5C0020C000
direct allocation
page read and write
1EF0959D000
trusted library section
page read and write
6D2BBFE000
unkown
page readonly
D70000
unkown
page readonly
6E10000
direct allocation
page execute and read and write
6A5C002E4000
direct allocation
page read and write
1EF030AA000
heap
page read and write
1A30025B4000
trusted library allocation
page read and write
1A3000001000
trusted library allocation
page read and write
6721000
heap
page read and write
1EF72824000
heap
page read and write
1A30024AA000
trusted library allocation
page read and write
D7A000
unkown
page readonly
1A30025D8000
trusted library allocation
page read and write
6721000
heap
page read and write
611000864000
trusted library allocation
page read and write
1A3002950000
trusted library allocation
page read and write
1EF096A0000
trusted library section
page read and write
120000
unkown
page readonly
1A3002968000
trusted library allocation
page read and write
6D333FA000
stack
page read and write
1A300320C000
trusted library allocation
page read and write
6C7D8000
unkown
page readonly
1EF0A460000
trusted library section
page read and write
1A30034C8000
trusted library allocation
page read and write
788E000
heap
page read and write
6110002FC000
trusted library allocation
page read and write
1A3002DF4000
trusted library allocation
page read and write
2A68000
heap
page read and write
6721000
heap
page read and write
84A000
unkown
page write copy
61100081C000
trusted library allocation
page read and write
1EF727A8000
heap
page read and write
1A30032FC000
trusted library allocation
page read and write
12E4000
heap
page read and write
6D293FC000
stack
page read and write
6D45BFD000
stack
page read and write
1984002BC000
trusted library allocation
page read and write
1A3002AE0000
trusted library allocation
page read and write
1A300242C000
trusted library allocation
page read and write
6721000
heap
page read and write
77E0000
heap
page read and write
1A300270C000
trusted library allocation
page read and write
12E4000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A30031D4000
trusted library allocation
page read and write
6D34BFE000
unkown
page readonly
1EF0A013000
trusted library section
page read and write
1A3002B14000
trusted library allocation
page read and write
6D2D3FD000
stack
page read and write
1EF030AF000
heap
page read and write
76D4000
heap
page read and write
6A5C00215000
direct allocation
page read and write
1A3002EF8000
trusted library allocation
page read and write
6D46BFE000
stack
page read and write
14D0000
heap
page read and write
1A3002D7C000
trusted library allocation
page read and write
6D2EBFE000
unkown
page readonly
1A3002EE8000
trusted library allocation
page read and write
6110007AC000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A3002334000
trusted library allocation
page read and write
1EF058E0000
trusted library allocation
page read and write
6D423FE000
unkown
page readonly
6721000
heap
page read and write
D71000
unkown
page execute read
2A5A000
heap
page read and write
1984002BC000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
1A3002414000
trusted library allocation
page read and write
D70000
unkown
page readonly
1EF09513000
trusted library section
page read and write
6A5C00294000
direct allocation
page read and write
6A5C00234000
direct allocation
page read and write
1A30030B8000
trusted library allocation
page read and write
7A2B000
heap
page read and write
6110008F0000
trusted library allocation
page read and write
1A3002F10000
trusted library allocation
page read and write
7249000
heap
page read and write
1A300308C000
trusted library allocation
page read and write
1EF72965000
heap
page read and write
6721000
heap
page read and write
1984002BC000
trusted library allocation
page read and write
6721000
heap
page read and write
7833000
heap
page read and write
6721000
heap
page read and write
1A3002A01000
trusted library allocation
page read and write
1A300296E000
trusted library allocation
page read and write
12E4000
heap
page read and write
1A300302C000
trusted library allocation
page read and write
611000700000
trusted library allocation
page read and write
7AE000
stack
page read and write
6721000
heap
page read and write
1A300256C000
trusted library allocation
page read and write
D81000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
6110006F4000
trusted library allocation
page read and write
6110002CC000
trusted library allocation
page read and write
6BB0000
direct allocation
page read and write
1A30023DC000
trusted library allocation
page read and write
6721000
heap
page read and write
76D8000
heap
page read and write
1A300336C000
trusted library allocation
page read and write
1A3002520000
trusted library allocation
page read and write
1447000
heap
page read and write
1A30032F0000
trusted library allocation
page read and write
6D1E3FD000
unkown
page read and write
6E40000
direct allocation
page execute and read and write
1984002B0000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6721000
heap
page read and write
6721000
heap
page read and write
1A30030C4000
trusted library allocation
page read and write
D7E000
unkown
page read and write
6721000
heap
page read and write
786B000
heap
page read and write
6721000
heap
page read and write
6D443FE000
unkown
page readonly
1A3002F28000
trusted library allocation
page read and write
1984002E4000
trusted library allocation
page read and write
1A3002504000
trusted library allocation
page read and write
1A30025D8000
trusted library allocation
page read and write
1A3003154000
trusted library allocation
page read and write
1A3002E58000
trusted library allocation
page read and write
6721000
heap
page read and write
1A3002E70000
trusted library allocation
page read and write
1A300332C000
trusted library allocation
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6721000
heap
page read and write
6110007C0000
trusted library allocation
page read and write
76D6000
heap
page read and write
1A3003164000
trusted library allocation
page read and write
1A300254C000
trusted library allocation
page read and write
6721000
heap
page read and write
6A5C00217000
direct allocation
page read and write
6721000
heap
page read and write
1A3002520000
trusted library allocation
page read and write
7813000
heap
page read and write
D70000
unkown
page readonly
6721000
heap
page read and write
6D373FB000
stack
page read and write
6721000
heap
page read and write
1A3002840000
trusted library allocation
page read and write
76D1000
heap
page read and write
1A30023AC000
trusted library allocation
page read and write
7A01000
heap
page read and write
There are 1300 hidden memdumps, click here to show them.