IOC Report
nRYpZg6i5E.exe

loading gif

Files

File Path
Type
Category
Malicious
nRYpZg6i5E.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRYpZg6i5E.exe_776dd69e5b18cac04e4ab92562c42e2fe474b38_68bbd28e_6135b24e-ebe4-4045-ad91-67a42a2a375e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BD9.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:37:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20AD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER210B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nRYpZg6i5E.exe
"C:\Users\user\Desktop\nRYpZg6i5E.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 --field-trial-handle=2376,i,13757376621657589230,16986117785964679361,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 1812
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://home.twentytk20ht.top/TQIuuaqjNpwYjtUvFojm1734579850?argument=6Es4F8HJLlz9cVoX1735025759
185.121.15.192
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
http://anglebug.com/77243
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://chrome.google.com/webstoreFw9a61Y8=
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bF
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icoFO
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
https://www.google.com/async/newtab_b?7
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/70365
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://drive.google.com/mestampz
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
ProgramId
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
FileId
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
LowerCaseLongPath
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
LongPathHash
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
Name
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
OriginalFileName
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
Publisher
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
Version
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
BinFileVersion
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
BinaryType
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
ProductName
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
ProductVersion
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
LinkDate
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
BinProductVersion
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
AppxPackageFullName
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
AppxPackageRelativeId
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
Size
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
Language
\REGISTRY\A\{39440d87-6ddb-7cac-cc5c-1a8a11d097d8}\Root\InventoryApplicationFile\nrypzg6i5e.exe|71e5d0c284f8118e
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
961000
unkown
page execute read
469000984000
trusted library allocation
page read and write
2108C683000
heap
page read and write
469000ED8000
trusted library allocation
page read and write
469000E90000
trusted library allocation
page read and write
8D6CBFE000
stack
page read and write
469000E44000
trusted library allocation
page read and write
66D1000
heap
page read and write
7724000
heap
page read and write
21093B12000
trusted library allocation
page read and write
210966D0000
trusted library section
page read and write
46900119C000
trusted library allocation
page read and write
469001018000
trusted library allocation
page read and write
961000
unkown
page execute read
46900031C000
trusted library allocation
page read and write
7887000
heap
page read and write
8D09FFE000
stack
page read and write
1554000
heap
page read and write
2108FFED000
heap
page read and write
8D06FFC000
stack
page read and write
7722000
heap
page read and write
469000CF4000
trusted library allocation
page read and write
2108FA79000
heap
page read and write
66D1000
heap
page read and write
26AC00404000
trusted library allocation
page read and write
469000014000
trusted library allocation
page read and write
66D1000
heap
page read and write
4690007E0000
trusted library allocation
page read and write
2108FA8B000
heap
page read and write
469000CBC000
trusted library allocation
page read and write
469000ED8000
trusted library allocation
page read and write
46900040C000
trusted library allocation
page read and write
96E000
unkown
page read and write
66D1000
heap
page read and write
6BF1F000
unkown
page readonly
8D62BFC000
stack
page read and write
66D1000
heap
page read and write
4690004E0000
trusted library allocation
page read and write
66D1000
heap
page read and write
46900004D000
trusted library allocation
page read and write
469000CF4000
trusted library allocation
page read and write
12E8002A0000
trusted library allocation
page read and write
469000C30000
trusted library allocation
page read and write
6EF1000
heap
page read and write
7723000
heap
page read and write
1397000
heap
page read and write
960000
unkown
page readonly
D70000
heap
page read and write
469000DAC000
trusted library allocation
page read and write
469000A0C000
trusted library allocation
page read and write
469000398000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC00644000
trusted library allocation
page read and write
7A95000
heap
page read and write
8D067FE000
unkown
page readonly
21096670000
trusted library section
page read and write
2E800215000
direct allocation
page read and write
4690001D0000
trusted library allocation
page read and write
4690004A4000
trusted library allocation
page read and write
66D1000
heap
page read and write
4690004D0000
trusted library allocation
page read and write
8D66BFC000
stack
page read and write
168F000
stack
page read and write
469000D40000
trusted library allocation
page read and write
66D1000
heap
page read and write
7722000
heap
page read and write
1420000
heap
page read and write
12E8002C0000
trusted library allocation
page read and write
26AC00688000
trusted library allocation
page read and write
26AC00354000
trusted library allocation
page read and write
8D01FFE000
stack
page read and write
8D6F3FE000
unkown
page readonly
1530000
heap
page read and write
66D1000
heap
page read and write
8B0000
heap
page read and write
2108FFCC000
heap
page read and write
26AC006CC000
trusted library allocation
page read and write
8D793FE000
unkown
page readonly
26AC006D0000
trusted library allocation
page read and write
46900024C000
trusted library allocation
page read and write
469000040000
trusted library allocation
page read and write
469000EE4000
trusted library allocation
page read and write
6DD0000
direct allocation
page execute and read and write
469000228000
trusted library allocation
page read and write
469000E28000
trusted library allocation
page read and write
8D6B3FE000
unkown
page readonly
21092040000
trusted library allocation
page read and write
2108FEF4000
heap
page read and write
469000D94000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
7725000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
26AC00220000
trusted library allocation
page read and write
26AC002F0000
trusted library allocation
page read and write
66D1000
heap
page read and write
4690012E0000
trusted library allocation
page read and write
960000
unkown
page readonly
469000398000
trusted library allocation
page read and write
66D1000
heap
page read and write
7721000
heap
page read and write
1535000
heap
page read and write
8BC000
stack
page read and write
26AC00380000
trusted library allocation
page read and write
469000340000
trusted library allocation
page read and write
96E000
unkown
page write copy
12E8002D8000
trusted library allocation
page read and write
971000
unkown
page readonly
8D69BFE000
stack
page read and write
66D1000
heap
page read and write
110E000
stack
page read and write
26AC0040C000
trusted library allocation
page read and write
6DD0000
direct allocation
page execute and read and write
469000354000
trusted library allocation
page read and write
961000
unkown
page execute read
7A5B000
heap
page read and write
469000BD0000
trusted library allocation
page read and write
96A000
unkown
page readonly
469001084000
trusted library allocation
page read and write
469000308000
trusted library allocation
page read and write
469000EB8000
trusted library allocation
page read and write
469000374000
trusted library allocation
page read and write
B90000
heap
page read and write
8D77BFC000
stack
page read and write
FFC000
stack
page read and write
960000
unkown
page readonly
66D1000
heap
page read and write
66D1000
heap
page read and write
8D703FE000
unkown
page readonly
26AC007D0000
trusted library allocation
page read and write
469000B28000
trusted library allocation
page read and write
469000288000
trusted library allocation
page read and write
469000F40000
trusted library allocation
page read and write
67C000
stack
page read and write
930000
heap
page read and write
D7C000
stack
page read and write
2E800270000
direct allocation
page read and write
66D1000
heap
page read and write
469000F60000
trusted library allocation
page read and write
66D1000
heap
page read and write
12E800238000
trusted library allocation
page read and write
46900021C000
trusted library allocation
page read and write
1510000
heap
page read and write
BE0000
heap
page read and write
785E000
heap
page read and write
961000
unkown
page execute read
96E000
unkown
page write copy
12E8002C8000
trusted library allocation
page read and write
26AC00730000
trusted library allocation
page read and write
26AC00658000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
21092050000
trusted library section
page read and write
13B0000
heap
page read and write
66D1000
heap
page read and write
772A000
heap
page read and write
C00000
heap
page read and write
4690000E4000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
12E8002B0000
trusted library allocation
page read and write
8D7B3FE000
unkown
page readonly
8D76BFD000
stack
page read and write
66D1000
heap
page read and write
2E800274000
direct allocation
page read and write
26AC00788000
trusted library allocation
page read and write
4690001E0000
trusted library allocation
page read and write
4690002CC000
trusted library allocation
page read and write
469001001000
trusted library allocation
page read and write
2108FFDF000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
66D1000
heap
page read and write
7893000
heap
page read and write
66D1000
heap
page read and write
961000
unkown
page execute read
469000751000
trusted library allocation
page read and write
8D6A3FE000
unkown
page readonly
6DD0000
direct allocation
page execute and read and write
66D1000
heap
page read and write
469000230000
trusted library allocation
page read and write
8D623FE000
unkown
page readonly
469000757000
trusted library allocation
page read and write
469001180000
trusted library allocation
page read and write
469000CCC000
trusted library allocation
page read and write
9C0000
heap
page read and write
66D1000
heap
page read and write
469000C54000
trusted library allocation
page read and write
66D1000
heap
page read and write
4690004E0000
trusted library allocation
page read and write
4690001C8000
trusted library allocation
page read and write
2108C548000
heap
page read and write
469000A4C000
trusted library allocation
page read and write
2E800290000
direct allocation
page read and write
4690002AC000
trusted library allocation
page read and write
66D1000
heap
page read and write
1470000
direct allocation
page read and write
66D1000
heap
page read and write
7A7E000
heap
page read and write
8D5FBFE000
stack
page read and write
469000368000
trusted library allocation
page read and write
7182000
heap
page read and write
26AC00348000
trusted library allocation
page read and write
79FA000
heap
page read and write
781B000
heap
page read and write
21096796000
trusted library section
page read and write
78DE000
heap
page read and write
830000
heap
page read and write
469000EF4000
trusted library allocation
page read and write
961000
unkown
page execute read
66D1000
heap
page read and write
2E800217000
direct allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
2108FA82000
heap
page read and write
66D1000
heap
page read and write
469000784000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
8DE000
stack
page read and write
4690007C0000
trusted library allocation
page read and write
7722000
heap
page read and write
469000354000
trusted library allocation
page read and write
7724000
heap
page read and write
7935000
heap
page read and write
8D04FFD000
stack
page read and write
12E8002B0000
trusted library allocation
page read and write
26AC00401000
trusted library allocation
page read and write
2108FA90000
heap
page read and write
4690006C4000
trusted library allocation
page read and write
66D1000
heap
page read and write
469001201000
trusted library allocation
page read and write
66D1000
heap
page read and write
21095D7E000
trusted library section
page read and write
26AC006B0000
trusted library allocation
page read and write
26AC00684000
trusted library allocation
page read and write
469000C1C000
trusted library allocation
page read and write
469000368000
trusted library allocation
page read and write
7725000
heap
page read and write
6D0000
heap
page read and write
8D663FE000
unkown
page readonly
7723000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
469000FCC000
trusted library allocation
page read and write
4690006E8000
trusted library allocation
page read and write
469000C20000
trusted library allocation
page read and write
469000601000
trusted library allocation
page read and write
66D1000
heap
page read and write
772D000
heap
page read and write
71E000
stack
page read and write
8D7ABFD000
stack
page read and write
26AC00288000
trusted library allocation
page read and write
12E800270000
trusted library allocation
page read and write
7722000
heap
page read and write
12E8002BC000
trusted library allocation
page read and write
DFC000
stack
page read and write
76E000
stack
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
469000E38000
trusted library allocation
page read and write
26AC00784000
trusted library allocation
page read and write
96E000
unkown
page write copy
6DD0000
direct allocation
page execute and read and write
469000F1C000
trusted library allocation
page read and write
96E000
unkown
page read and write
2108FA82000
heap
page read and write
26AC00648000
trusted library allocation
page read and write
8D7BBFB000
stack
page read and write
790000
heap
page read and write
469000354000
trusted library allocation
page read and write
66D1000
heap
page read and write
12E8002C0000
trusted library allocation
page read and write
26AC00678000
trusted library allocation
page read and write
7181000
heap
page read and write
961000
unkown
page execute read
4690001E4000
trusted library allocation
page read and write
66D1000
heap
page read and write
6BF69000
unkown
page read and write
6DD0000
direct allocation
page execute and read and write
D9E000
stack
page read and write
6DB0000
direct allocation
page execute and read and write
26AC00430000
trusted library allocation
page read and write
469000234000
trusted library allocation
page read and write
469000BA0000
trusted library allocation
page read and write
8D713FE000
unkown
page readonly
26AC00330000
trusted library allocation
page read and write
469000D04000
trusted library allocation
page read and write
122F000
stack
page read and write
21094000000
trusted library section
page read and write
469000178000
trusted library allocation
page read and write
1531000
heap
page read and write
2108FA50000
heap
page read and write
469000C90000
trusted library allocation
page read and write
4690002D3000
trusted library allocation
page read and write
4690001A8000
trusted library allocation
page read and write
4690009B4000
trusted library allocation
page read and write
469000244000
trusted library allocation
page read and write
469000B64000
trusted library allocation
page read and write
96E000
unkown
page read and write
6DD0000
direct allocation
page execute and read and write
6DD0000
direct allocation
page execute and read and write
469000EA4000
trusted library allocation
page read and write
469000E38000
trusted library allocation
page read and write
469000CF4000
trusted library allocation
page read and write
469000EE4000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
469001118000
trusted library allocation
page read and write
96A000
unkown
page readonly
26AC00364000
trusted library allocation
page read and write
2108FF4E000
heap
page read and write
66D1000
heap
page read and write
26AC00620000
trusted library allocation
page read and write
4690001D0000
trusted library allocation
page read and write
8D78BFC000
stack
page read and write
66D1000
heap
page read and write
26AC00640000
trusted library allocation
page read and write
6DD0000
direct allocation
page execute and read and write
C4F000
stack
page read and write
8D5C3FE000
unkown
page readonly
8D07FFE000
stack
page read and write
940000
heap
page read and write
469000118000
trusted library allocation
page read and write
6BC000
stack
page read and write
4690010A0000
trusted library allocation
page read and write
4690008E8000
trusted library allocation
page read and write
469000C70000
trusted library allocation
page read and write
2108C470000
heap
page readonly
96A000
unkown
page readonly
21095E32000
trusted library section
page read and write
4690009F0000
trusted library allocation
page read and write
4690012A0000
trusted library allocation
page read and write
2108FA90000
heap
page read and write
66D1000
heap
page read and write
469000E74000
trusted library allocation
page read and write
21095710000
heap
page read and write
960000
unkown
page readonly
469000ED8000
trusted library allocation
page read and write
469000D14000
trusted library allocation
page read and write
66D1000
heap
page read and write
2108FFD3000
heap
page read and write
469000944000
trusted library allocation
page read and write
7723000
heap
page read and write
4690006DC000
trusted library allocation
page read and write
469000ECE000
trusted library allocation
page read and write
469000A5C000
trusted library allocation
page read and write
469000F50000
trusted library allocation
page read and write
8D7D3FE000
unkown
page readonly
26AC006FC000
trusted library allocation
page read and write
8D60BFD000
stack
page read and write
7276000
direct allocation
page read and write
66D1000
heap
page read and write
469000828000
trusted library allocation
page read and write
4690006D4000
trusted library allocation
page read and write
66D1000
heap
page read and write
EB0000
heap
page read and write
961000
unkown
page execute read
8D057FE000
unkown
page readonly
469000303000
trusted library allocation
page read and write
26AC00724000
trusted library allocation
page read and write
26AC00624000
trusted library allocation
page read and write
4690001BC000
trusted library allocation
page read and write
8D6C3FE000
unkown
page readonly
8E0000
heap
page read and write
971000
unkown
page readonly
12E8002C0000
trusted library allocation
page read and write
66D1000
heap
page read and write
CD5000
unkown
page execute and write copy
66D1000
heap
page read and write
469000454000
trusted library allocation
page read and write
66D1000
heap
page read and write
126F000
stack
page read and write
4690000EC000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
2E8002D0000
direct allocation
page read and write
66D1000
heap
page read and write
78A9000
heap
page read and write
469000BC8000
trusted library allocation
page read and write
26AC002E4000
trusted library allocation
page read and write
2108C4D0000
trusted library allocation
page read and write
26AC00230000
trusted library allocation
page read and write
94A000
unkown
page write copy
718D000
heap
page read and write
469000E84000
trusted library allocation
page read and write
D7F000
stack
page read and write
F30000
heap
page read and write
2108FFA6000
heap
page read and write
960000
unkown
page readonly
66D1000
heap
page read and write
66D1000
heap
page read and write
26AC00320000
trusted library allocation
page read and write
960000
unkown
page readonly
26AC0035C000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
4690002F8000
trusted library allocation
page read and write
15EF000
stack
page read and write
469000C84000
trusted library allocation
page read and write
66D1000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
66D1000
heap
page read and write
26AC00201000
trusted library allocation
page read and write
66D1000
heap
page read and write
880000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
DFC000
stack
page read and write
8D5EBFE000
stack
page read and write
469000A5C000
trusted library allocation
page read and write
21095A67000
unclassified section
page read and write
8D5F3FE000
unkown
page readonly
2108FFE1000
heap
page read and write
469000CB8000
trusted library allocation
page read and write
469000D04000
trusted library allocation
page read and write
7944000
heap
page read and write
26AC00754000
trusted library allocation
page read and write
469000C01000
trusted library allocation
page read and write
66D1000
heap
page read and write
4690005B8000
trusted library allocation
page read and write
469000CF4000
trusted library allocation
page read and write
7521000
heap
page read and write
469000328000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000E38000
trusted library allocation
page read and write
469000160000
trusted library allocation
page read and write
960000
unkown
page readonly
960000
unkown
page readonly
46900035C000
trusted library allocation
page read and write
469000ED8000
trusted library allocation
page read and write
469000348000
trusted library allocation
page read and write
469000354000
trusted library allocation
page read and write
2108C540000
heap
page read and write
77CA000
heap
page read and write
469000F6C000
trusted library allocation
page read and write
7840000
heap
page read and write
66D1000
heap
page read and write
1527000
heap
page read and write
8D5CBFF000
stack
page read and write
8D65BFB000
stack
page read and write
4690004CA000
trusted library allocation
page read and write
469000348000
trusted library allocation
page read and write
77DF000
heap
page read and write
2108FF27000
heap
page read and write
26AC00250000
trusted library allocation
page read and write
4690002AC000
trusted library allocation
page read and write
2E800210000
direct allocation
page read and write
21096682000
trusted library section
page read and write
EB7000
heap
page read and write
46900060C000
trusted library allocation
page read and write
8D75BFC000
stack
page read and write
8D7A3FE000
unkown
page readonly
469000938000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC0075C000
trusted library allocation
page read and write
66D1000
heap
page read and write
1470000
direct allocation
page read and write
66D1000
heap
page read and write
1470000
direct allocation
page read and write
4690005CC000
trusted library allocation
page read and write
4690007BC000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000224000
trusted library allocation
page read and write
469000D50000
trusted library allocation
page read and write
2108C680000
heap
page read and write
7AB0000
heap
page read and write
6BF6C000
unkown
page readonly
469000D04000
trusted library allocation
page read and write
96A000
unkown
page readonly
2109645E000
trusted library section
page read and write
12E8002F0000
trusted library allocation
page read and write
469000454000
trusted library allocation
page read and write
26AC006E8000
trusted library allocation
page read and write
26AC0035C000
trusted library allocation
page read and write
46900070D000
trusted library allocation
page read and write
26AC00700000
trusted library allocation
page read and write
960000
unkown
page readonly
220000
unkown
page readonly
210967B2000
trusted library section
page read and write
10E0000
heap
page read and write
6F72000
heap
page read and write
2108FA75000
heap
page read and write
7720000
heap
page read and write
66D1000
heap
page read and write
46900129C000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC002B0000
trusted library allocation
page read and write
7727000
heap
page read and write
469000888000
trusted library allocation
page read and write
2108FEF8000
heap
page read and write
960000
unkown
page readonly
66D1000
heap
page read and write
66D1000
heap
page read and write
469000A5C000
trusted library allocation
page read and write
469000DA0000
trusted library allocation
page read and write
2108FFD5000
heap
page read and write
2108FFDB000
heap
page read and write
7727000
heap
page read and write
10F0000
heap
page read and write
469000C20000
trusted library allocation
page read and write
46900053C000
trusted library allocation
page read and write
1470000
direct allocation
page read and write
8D03FFE000
stack
page read and write
26AC006C4000
trusted library allocation
page read and write
971000
unkown
page readonly
66D1000
heap
page read and write
12E8002C0000
trusted library allocation
page read and write
4690001D0000
trusted library allocation
page read and write
46900067C000
trusted library allocation
page read and write
840000
heap
page read and write
66D1000
heap
page read and write
26AC00760000
trusted library allocation
page read and write
8D017FE000
unkown
page readonly
12E8002E4000
trusted library allocation
page read and write
96A000
unkown
page readonly
2E8002E4000
direct allocation
page read and write
21095DB3000
trusted library section
page read and write
6DD0000
direct allocation
page execute and read and write
788C000
heap
page read and write
469000354000
trusted library allocation
page read and write
786D000
heap
page read and write
2108FFB9000
heap
page read and write
66D1000
heap
page read and write
960000
unkown
page readonly
8D723FE000
unkown
page readonly
469000A5C000
trusted library allocation
page read and write
3120000
heap
page read and write
8D653FE000
unkown
page readonly
772D000
heap
page read and write
66D1000
heap
page read and write
469000F7C000
trusted library allocation
page read and write
EA0000
heap
page read and write
66D1000
heap
page read and write
46900035C000
trusted library allocation
page read and write
21096B50000
trusted library section
page read and write
469000ED2000
trusted library allocation
page read and write
66D1000
heap
page read and write
847000
heap
page read and write
960000
unkown
page readonly
8D7F3FE000
unkown
page readonly
9B0000
heap
page read and write
4690002B2000
trusted library allocation
page read and write
210968B0000
trusted library section
page read and write
78AB000
heap
page read and write
469000AC8000
trusted library allocation
page read and write
26AC00238000
trusted library allocation
page read and write
77D3000
heap
page read and write
2108FF52000
heap
page read and write
8D693FE000
unkown
page readonly
6B10000
trusted library allocation
page read and write
7833000
heap
page read and write
469000090000
trusted library allocation
page read and write
971000
unkown
page readonly
96E000
unkown
page read and write
2108C390000
heap
page read and write
6F12000
heap
page read and write
469000A74000
trusted library allocation
page read and write
26AC003EC000
trusted library allocation
page read and write
46900040C000
trusted library allocation
page read and write
4690010F0000
trusted library allocation
page read and write
78B6000
heap
page read and write
2E8002EC000
direct allocation
page read and write
7727000
heap
page read and write
1535000
heap
page read and write
2108C4E0000
trusted library allocation
page read and write
26AC00770000
trusted library allocation
page read and write
1390000
heap
page read and write
2108C5FB000
heap
page read and write
66D1000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
26AC007B4000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
46900115C000
trusted library allocation
page read and write
469000EAC000
trusted library allocation
page read and write
21095E3D000
trusted library section
page read and write
96E000
unkown
page write copy
7723000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
D80000
heap
page read and write
26AC00354000
trusted library allocation
page read and write
469000BA0000
trusted library allocation
page read and write
7721000
heap
page read and write
469000454000
trusted library allocation
page read and write
14D4000
heap
page read and write
26AC00614000
trusted library allocation
page read and write
8D783FE000
unkown
page readonly
21095C50000
heap
page read and write
12CF000
stack
page read and write
469000801000
trusted library allocation
page read and write
11D0000
heap
page read and write
66D1000
heap
page read and write
9F0000
heap
page read and write
8D007FE000
unkown
page readonly
66D1000
heap
page read and write
469000EE4000
trusted library allocation
page read and write
961000
unkown
page execute read
66D1000
heap
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
469001118000
trusted library allocation
page read and write
7812000
heap
page read and write
BDE000
stack
page read and write
7725000
heap
page read and write
96A000
unkown
page readonly
182F000
stack
page read and write
46900103C000
trusted library allocation
page read and write
469000368000
trusted library allocation
page read and write
26AC007CC000
trusted library allocation
page read and write
960000
unkown
page readonly
26AC00320000
trusted library allocation
page read and write
469000368000
trusted library allocation
page read and write
46900031C000
trusted library allocation
page read and write
210966E1000
trusted library section
page read and write
96E000
unkown
page write copy
8D5DBFE000
stack
page read and write
95E000
stack
page read and write
8D7FBFE000
stack
page read and write
8D5ABEF000
stack
page read and write
1535000
heap
page read and write
2108C4B0000
heap
page read and write
2108FF18000
heap
page read and write
971000
unkown
page readonly
8D633FE000
unkown
page readonly
46900031C000
trusted library allocation
page read and write
66D1000
heap
page read and write
46900120C000
trusted library allocation
page read and write
6DD0000
direct allocation
page execute and read and write
2E8002DC000
direct allocation
page read and write
8D6E3FE000
unkown
page readonly
66D1000
heap
page read and write
4690008F8000
trusted library allocation
page read and write
2108FFCD000
heap
page read and write
66D1000
heap
page read and write
469000F50000
trusted library allocation
page read and write
971000
unkown
page readonly
11FC000
stack
page read and write
469000B50000
trusted library allocation
page read and write
13A0000
heap
page read and write
66D1000
heap
page read and write
1470000
direct allocation
page read and write
106E000
stack
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
26AC002F4000
trusted library allocation
page read and write
469000638000
trusted library allocation
page read and write
7729000
heap
page read and write
15D0000
direct allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
46900103C000
trusted library allocation
page read and write
2108C5E1000
heap
page read and write
66D1000
heap
page read and write
12E800248000
trusted library allocation
page read and write
2108FF58000
heap
page read and write
469000D78000
trusted library allocation
page read and write
26AC002CC000
trusted library allocation
page read and write
1470000
direct allocation
page read and write
469000368000
trusted library allocation
page read and write
469000CF4000
trusted library allocation
page read and write
469000FCC000
trusted library allocation
page read and write
1535000
heap
page read and write
469000A3C000
trusted library allocation
page read and write
2108FFE1000
heap
page read and write
971000
unkown
page readonly
7110000
direct allocation
page read and write
469000CD8000
trusted library allocation
page read and write
8D79BFB000
stack
page read and write
96E000
unkown
page read and write
2108C600000
heap
page read and write
66D1000
heap
page read and write
7805000
heap
page read and write
4690000BA000
trusted library allocation
page read and write
66D1000
heap
page read and write
2108FA7D000
heap
page read and write
78DD000
heap
page read and write
2108FFDF000
heap
page read and write
77C7000
heap
page read and write
4690001E8000
trusted library allocation
page read and write
890000
heap
page read and write
12E800260000
trusted library allocation
page read and write
469000ED8000
trusted library allocation
page read and write
469000B04000
trusted library allocation
page read and write
46900031C000
trusted library allocation
page read and write
2108C790000
heap
page read and write
8DC000
stack
page read and write
4690008D0000
trusted library allocation
page read and write
8D7E3FE000
unkown
page readonly
961000
unkown
page execute read
26AC006E0000
trusted library allocation
page read and write
26AC00368000
trusted library allocation
page read and write
469001194000
trusted library allocation
page read and write
12E800288000
trusted library allocation
page read and write
12E800278000
trusted library allocation
page read and write
2108FF1A000
heap
page read and write
79B0000
heap
page read and write
469000ED8000
trusted library allocation
page read and write
2E800250000
direct allocation
page read and write
46900020C000
trusted library allocation
page read and write
26AC002D4000
trusted library allocation
page read and write
66D1000
heap
page read and write
12E8002BC000
trusted library allocation
page read and write
2108FEF0000
heap
page read and write
3DC000
stack
page read and write
2108FF14000
heap
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
7843000
heap
page read and write
4690008C3000
trusted library allocation
page read and write
12E800264000
trusted library allocation
page read and write
F40000
heap
page read and write
4690009C8000
trusted library allocation
page read and write
469000C4C000
trusted library allocation
page read and write
96A000
unkown
page readonly
78F4000
heap
page read and write
2108FF16000
heap
page read and write
12E800235000
trusted library allocation
page read and write
188F000
stack
page read and write
469000D04000
trusted library allocation
page read and write
66D1000
heap
page read and write
46900087C000
trusted library allocation
page read and write
87E000
stack
page read and write
66D1000
heap
page read and write
8D64BFB000
stack
page read and write
21093EF0000
trusted library section
page read and write
1470000
direct allocation
page read and write
2108C795000
heap
page read and write
8D02FFE000
stack
page read and write
2E8002AC000
direct allocation
page read and write
8D71BFE000
stack
page read and write
210966C0000
trusted library section
page read and write
78B7000
heap
page read and write
8D037FE000
unkown
page readonly
4690002B6000
trusted library allocation
page read and write
66D1000
heap
page read and write
2108FA8A000
heap
page read and write
78DB000
heap
page read and write
21096450000
trusted library section
page read and write
26AC0069C000
trusted library allocation
page read and write
469000A68000
trusted library allocation
page read and write
66D1000
heap
page read and write
2E800280000
direct allocation
page read and write
303F000
stack
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
4690012C4000
trusted library allocation
page read and write
7722000
heap
page read and write
153A000
heap
page read and write
66D1000
heap
page read and write
26AC0078C000
trusted library allocation
page read and write
6DD0000
direct allocation
page execute and read and write
8D7DBFD000
stack
page read and write
1470000
direct allocation
page read and write
469000454000
trusted library allocation
page read and write
26AC002B8000
trusted library allocation
page read and write
8D753FE000
unkown
page readonly
26AC0033C000
trusted library allocation
page read and write
66D1000
heap
page read and write
12E8002F8000
trusted library allocation
page read and write
971000
unkown
page readonly
4690012D4000
trusted library allocation
page read and write
66D1000
heap
page read and write
21096240000
trusted library section
page read and write
15D0000
direct allocation
page read and write
8D7C3FE000
unkown
page readonly
77FD000
heap
page read and write
26AC006B4000
trusted library allocation
page read and write
469000354000
trusted library allocation
page read and write
46900104C000
trusted library allocation
page read and write
4690009E7000
trusted library allocation
page read and write
8D6FBFE000
stack
page read and write
21096650000
trusted library section
page read and write
26AC00744000
trusted library allocation
page read and write
7FC000
stack
page read and write
2E800260000
direct allocation
page read and write
21095E70000
trusted library section
page read and write
26AC0033C000
trusted library allocation
page read and write
26AC00368000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000C7C000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000238000
trusted library allocation
page read and write
6DC0000
direct allocation
page execute and read and write
D78000
heap
page read and write
469000A84000
trusted library allocation
page read and write
4690002AC000
trusted library allocation
page read and write
8D74BFC000
stack
page read and write
8D72BFB000
stack
page read and write
469000201000
trusted library allocation
page read and write
46900009C000
trusted library allocation
page read and write
21095A37000
unclassified section
page read and write
46900103C000
trusted library allocation
page read and write
4690002F8000
trusted library allocation
page read and write
154C000
heap
page read and write
469001070000
trusted library allocation
page read and write
469000144000
trusted library allocation
page read and write
26AC00714000
trusted library allocation
page read and write
469000398000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC006D4000
trusted library allocation
page read and write
8D63BFE000
stack
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
961000
unkown
page execute read
469000368000
trusted library allocation
page read and write
26AC00694000
trusted library allocation
page read and write
4690001D0000
trusted library allocation
page read and write
77C6000
heap
page read and write
66D1000
heap
page read and write
469000C1C000
trusted library allocation
page read and write
961000
unkown
page execute read
46900075C000
trusted library allocation
page read and write
DD0000
heap
page read and write
469000ECC000
trusted library allocation
page read and write
66D1000
heap
page read and write
78AB000
heap
page read and write
2E800294000
direct allocation
page read and write
83C000
stack
page read and write
2E800234000
direct allocation
page read and write
971000
unkown
page readonly
152E000
heap
page read and write
469000198000
trusted library allocation
page read and write
469000BAC000
trusted library allocation
page read and write
96A000
unkown
page readonly
4690012A4000
trusted library allocation
page read and write
8D6EBFE000
stack
page read and write
96A000
unkown
page readonly
12E8002A0000
trusted library allocation
page read and write
469000E38000
trusted library allocation
page read and write
26AC00720000
trusted library allocation
page read and write
469000CAC000
trusted library allocation
page read and write
469000E50000
trusted library allocation
page read and write
469000794000
trusted library allocation
page read and write
8D73BFD000
stack
page read and write
2108FF12000
heap
page read and write
4690004E0000
trusted library allocation
page read and write
469000D04000
trusted library allocation
page read and write
469000388000
trusted library allocation
page read and write
971000
unkown
page readonly
961000
unkown
page execute read
8D61BFA000
stack
page read and write
26AC002FC000
trusted library allocation
page read and write
96A000
unkown
page readonly
4690000C0000
trusted library allocation
page read and write
960000
unkown
page readonly
469000F00000
trusted library allocation
page read and write
66D1000
heap
page read and write
2108FFD3000
heap
page read and write
26AC00310000
trusted library allocation
page read and write
9BC000
stack
page read and write
7887000
heap
page read and write
DA0000
heap
page read and write
10F8000
heap
page read and write
7721000
heap
page read and write
46900031C000
trusted library allocation
page read and write
26AC006C8000
trusted library allocation
page read and write
26AC006B8000
trusted library allocation
page read and write
469000454000
trusted library allocation
page read and write
66D1000
heap
page read and write
46900114C000
trusted library allocation
page read and write
12E8002BC000
trusted library allocation
page read and write
4690002AC000
trusted library allocation
page read and write
12E8002A0000
trusted library allocation
page read and write
469000928000
trusted library allocation
page read and write
469000220000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
4690012B0000
trusted library allocation
page read and write
1470000
direct allocation
page read and write
46900089C000
trusted library allocation
page read and write
21095C53000
heap
page read and write
2E800284000
direct allocation
page read and write
7728000
heap
page read and write
8D027FE000
unkown
page readonly
7274000
direct allocation
page read and write
469000F6C000
trusted library allocation
page read and write
469000E01000
trusted library allocation
page read and write
F7F000
stack
page read and write
772C000
heap
page read and write
B8A000
stack
page read and write
26AC00390000
trusted library allocation
page read and write
66D1000
heap
page read and write
1070000
heap
page read and write
4690010F8000
trusted library allocation
page read and write
221000
unkown
page execute and write copy
66D1000
heap
page read and write
469000154000
trusted library allocation
page read and write
2108FF0E000
heap
page read and write
2E800201000
direct allocation
page read and write
F20000
heap
page read and write
66D1000
heap
page read and write
971000
unkown
page readonly
96A000
unkown
page readonly
469000CE4000
trusted library allocation
page read and write
4690004E8000
trusted library allocation
page read and write
66D1000
heap
page read and write
12E8002BC000
trusted library allocation
page read and write
2108FA83000
heap
page read and write
4690007F0000
trusted library allocation
page read and write
2108FF06000
heap
page read and write
469000F2C000
trusted library allocation
page read and write
469000CF4000
trusted library allocation
page read and write
77FE000
heap
page read and write
66D1000
heap
page read and write
783D000
heap
page read and write
469000B60000
trusted library allocation
page read and write
66D1000
heap
page read and write
2E800303000
direct allocation
page read and write
66D1000
heap
page read and write
96E000
unkown
page write copy
12E800220000
trusted library allocation
page read and write
7895000
heap
page read and write
26AC00750000
trusted library allocation
page read and write
221000
unkown
page execute and write copy
469000E68000
trusted library allocation
page read and write
469000E38000
trusted library allocation
page read and write
469000548000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC00630000
trusted library allocation
page read and write
4690001F8000
trusted library allocation
page read and write
26AC00424000
trusted library allocation
page read and write
46900000C000
trusted library allocation
page read and write
66D1000
heap
page read and write
961000
unkown
page execute read
F37000
heap
page read and write
772B000
heap
page read and write
66D1000
heap
page read and write
469000354000
trusted library allocation
page read and write
469000888000
trusted library allocation
page read and write
4690005DC000
trusted library allocation
page read and write
78F9000
heap
page read and write
469000D58000
trusted library allocation
page read and write
7865000
heap
page read and write
66D1000
heap
page read and write
8D047FE000
unkown
page readonly
7864000
heap
page read and write
96E000
unkown
page write copy
2108C510000
trusted library section
page readonly
66D1000
heap
page read and write
2108C606000
heap
page read and write
469000D30000
trusted library allocation
page read and write
26AC00408000
trusted library allocation
page read and write
469001070000
trusted library allocation
page read and write
130E000
stack
page read and write
4690004E0000
trusted library allocation
page read and write
7A9F000
heap
page read and write
46900020C000
trusted library allocation
page read and write
469000AAC000
trusted library allocation
page read and write
2108FFDB000
heap
page read and write
9BE000
stack
page read and write
96A000
unkown
page readonly
8D5BBFD000
unkown
page read and write
469000708000
trusted library allocation
page read and write
66D1000
heap
page read and write
77CC000
heap
page read and write
469000454000
trusted library allocation
page read and write
4690004E0000
trusted library allocation
page read and write
469001100000
trusted library allocation
page read and write
210967F0000
trusted library section
page read and write
66D1000
heap
page read and write
469000F10000
trusted library allocation
page read and write
8D68BFE000
stack
page read and write
469000888000
trusted library allocation
page read and write
8D0A7FE000
unkown
page readonly
E00000
heap
page read and write
469000DB8000
trusted library allocation
page read and write
469000C7C000
trusted library allocation
page read and write
469000D04000
trusted library allocation
page read and write
9B8000
heap
page read and write
7919000
heap
page read and write
2108FA83000
heap
page read and write
8D70BFE000
stack
page read and write
469000718000
trusted library allocation
page read and write
26AC00668000
trusted library allocation
page read and write
66D1000
heap
page read and write
C90000
heap
page read and write
26AC00310000
trusted library allocation
page read and write
12E8002BC000
trusted library allocation
page read and write
8D6DBFA000
stack
page read and write
782C000
heap
page read and write
6BE41000
unkown
page execute read
66D1000
heap
page read and write
8D00FFD000
stack
page read and write
66D1000
heap
page read and write
469000D6C000
trusted library allocation
page read and write
46900073C000
trusted library allocation
page read and write
46900104C000
trusted library allocation
page read and write
66D1000
heap
page read and write
2108FA60000
heap
page read and write
469000A01000
trusted library allocation
page read and write
6DD0000
direct allocation
page execute and read and write
66D1000
heap
page read and write
469000779000
trusted library allocation
page read and write
469000454000
trusted library allocation
page read and write
4690007B9000
trusted library allocation
page read and write
797D000
heap
page read and write
469000EC4000
trusted library allocation
page read and write
469000994000
trusted library allocation
page read and write
8D05FFA000
stack
page read and write
8D5E3FE000
unkown
page readonly
26AC00248000
trusted library allocation
page read and write
4690004B4000
trusted library allocation
page read and write
21095BB0000
heap
page read and write
8D6D3FE000
unkown
page readonly
469000F38000
trusted library allocation
page read and write
469000EE4000
trusted library allocation
page read and write
2108FFA8000
heap
page read and write
66D1000
heap
page read and write
8D08FFE000
stack
page read and write
66D1000
heap
page read and write
469000250000
trusted library allocation
page read and write
6BF1D000
unkown
page read and write
66D1000
heap
page read and write
46900069C000
trusted library allocation
page read and write
7725000
heap
page read and write
469000C9C000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000F50000
trusted library allocation
page read and write
1543000
heap
page read and write
66D1000
heap
page read and write
4690003AC000
trusted library allocation
page read and write
7180000
heap
page read and write
66D1000
heap
page read and write
4690002AC000
trusted library allocation
page read and write
46900100C000
trusted library allocation
page read and write
469000FAC000
trusted library allocation
page read and write
153D000
heap
page read and write
66D1000
heap
page read and write
21094097000
unclassified section
page read and write
66D1000
heap
page read and write
8D643FE000
unkown
page readonly
8D6ABFE000
stack
page read and write
66D1000
heap
page read and write
469000218000
trusted library allocation
page read and write
718A000
heap
page read and write
66D1000
heap
page read and write
2108FFDF000
heap
page read and write
66D1000
heap
page read and write
772E000
heap
page read and write
4690002D8000
trusted library allocation
page read and write
66D1000
heap
page read and write
2E800230000
direct allocation
page read and write
971000
unkown
page readonly
7863000
heap
page read and write
96E000
unkown
page read and write
66D1000
heap
page read and write
46900061C000
trusted library allocation
page read and write
8FE000
stack
page read and write
469000248000
trusted library allocation
page read and write
8D603FE000
unkown
page readonly
469000A24000
trusted library allocation
page read and write
8D077FE000
unkown
page readonly
46900031C000
trusted library allocation
page read and write
1470000
direct allocation
page read and write
96E000
unkown
page read and write
1470000
direct allocation
page read and write
26AC0025C000
trusted library allocation
page read and write
469000401000
trusted library allocation
page read and write
66D1000
heap
page read and write
8D743FE000
unkown
page readonly
66D1000
heap
page read and write
2108C650000
heap
page read and write
960000
unkown
page readonly
8D773FE000
unkown
page readonly
469000D88000
trusted library allocation
page read and write
7800000
heap
page read and write
469001058000
trusted library allocation
page read and write
469000FA0000
trusted library allocation
page read and write
26AC00704000
trusted library allocation
page read and write
4690012B8000
trusted library allocation
page read and write
77E6000
heap
page read and write
66D1000
heap
page read and write
469000B14000
trusted library allocation
page read and write
7726000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
469000001000
trusted library allocation
page read and write
772C000
heap
page read and write
B4D000
stack
page read and write
8D087FE000
unkown
page readonly
66D1000
heap
page read and write
66D1000
heap
page read and write
469000D98000
trusted library allocation
page read and write
46900035C000
trusted library allocation
page read and write
26AC00610000
trusted library allocation
page read and write
7829000
heap
page read and write
26AC00330000
trusted library allocation
page read and write
971000
unkown
page readonly
8D673FE000
unkown
page readonly
469000874000
trusted library allocation
page read and write
12E80020C000
trusted library allocation
page read and write
66D1000
heap
page read and write
21096877000
unclassified section
page read and write
7721000
heap
page read and write
66D1000
heap
page read and write
469000108000
trusted library allocation
page read and write
96A000
unkown
page readonly
66D1000
heap
page read and write
1520000
heap
page read and write
7727000
heap
page read and write
6B10000
trusted library allocation
page read and write
26AC00698000
trusted library allocation
page read and write
78B6000
heap
page read and write
96E000
unkown
page read and write
469000128000
trusted library allocation
page read and write
26AC00601000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000BD8000
trusted library allocation
page read and write
4690002D0000
trusted library allocation
page read and write
469000F8C000
trusted library allocation
page read and write
26AC002ED000
trusted library allocation
page read and write
26AC006AC000
trusted library allocation
page read and write
469000188000
trusted library allocation
page read and write
26AC0060C000
trusted library allocation
page read and write
2108FF98000
heap
page read and write
910000
heap
page read and write
469000518000
trusted library allocation
page read and write
971000
unkown
page readonly
971000
unkown
page readonly
469000398000
trusted library allocation
page read and write
4690001B4000
trusted library allocation
page read and write
153E000
heap
page read and write
469000214000
trusted library allocation
page read and write
12E8002BC000
trusted library allocation
page read and write
21095F27000
unclassified section
page read and write
DE0000
heap
page read and write
66D1000
heap
page read and write
21095C60000
trusted library section
page read and write
14E9000
heap
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
1190000
heap
page read and write
469000554000
trusted library allocation
page read and write
96A000
unkown
page readonly
7847000
heap
page read and write
96E000
unkown
page write copy
961000
unkown
page execute read
F1E000
stack
page read and write
2108C635000
heap
page read and write
7724000
heap
page read and write
4690001EC000
trusted library allocation
page read and write
26AC006EC000
trusted library allocation
page read and write
66D1000
heap
page read and write
2108FF50000
heap
page read and write
66D1000
heap
page read and write
469001090000
trusted library allocation
page read and write
971000
unkown
page readonly
66D1000
heap
page read and write
8D733FE000
unkown
page readonly
2108C480000
heap
page read and write
BE0000
heap
page read and write
6B50000
direct allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
6B10000
trusted library allocation
page read and write
469000E18000
trusted library allocation
page read and write
469000BB4000
trusted library allocation
page read and write
210966F3000
trusted library section
page read and write
8D097FE000
unkown
page readonly
21096040000
trusted library section
page read and write
66D1000
heap
page read and write
469000ED8000
trusted library allocation
page read and write
31F0000
heap
page read and write
7081000
heap
page read and write
66D1000
heap
page read and write
26AC00320000
trusted library allocation
page read and write
12E8002F4000
trusted library allocation
page read and write
7725000
heap
page read and write
720000
heap
page read and write
66D1000
heap
page read and write
1527000
heap
page read and write
66D1000
heap
page read and write
7A2B000
heap
page read and write
96A000
unkown
page readonly
26AC0027C000
trusted library allocation
page read and write
960000
unkown
page readonly
469000DE0000
trusted library allocation
page read and write
12E8002BC000
trusted library allocation
page read and write
96A000
unkown
page readonly
2109572B000
heap
page read and write
2108FF02000
heap
page read and write
4690001C8000
trusted library allocation
page read and write
7722000
heap
page read and write
66D1000
heap
page read and write
6BF68000
unkown
page readonly
1470000
direct allocation
page read and write
6B10000
trusted library allocation
page read and write
46900084C000
trusted library allocation
page read and write
2108FFAF000
heap
page read and write
66D1000
heap
page read and write
92E000
stack
page read and write
B3C000
stack
page read and write
469001168000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC006F0000
trusted library allocation
page read and write
469000AEC000
trusted library allocation
page read and write
26AC007C8000
trusted library allocation
page read and write
2E80020C000
direct allocation
page read and write
7725000
heap
page read and write
9E0000
heap
page read and write
66D1000
heap
page read and write
4690000B6000
trusted library allocation
page read and write
1531000
heap
page read and write
12E8002B0000
trusted library allocation
page read and write
46900023C000
trusted library allocation
page read and write
469000910000
trusted library allocation
page read and write
12E800294000
trusted library allocation
page read and write
469000F00000
trusted library allocation
page read and write
4690004E3000
trusted library allocation
page read and write
210968BE000
trusted library section
page read and write
4690002B0000
trusted library allocation
page read and write
469000A5C000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC006E4000
trusted library allocation
page read and write
66D1000
heap
page read and write
46900072C000
trusted library allocation
page read and write
469000334000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000C0C000
trusted library allocation
page read and write
8D683FE000
unkown
page readonly
4690007B4000
trusted library allocation
page read and write
66D1000
heap
page read and write
4690002B0000
trusted library allocation
page read and write
2E800220000
direct allocation
page read and write
66D1000
heap
page read and write
8D7EBFD000
stack
page read and write
66D1000
heap
page read and write
4690008B0000
trusted library allocation
page read and write
961000
unkown
page execute read
66D1000
heap
page read and write
469000368000
trusted library allocation
page read and write
1528000
heap
page read and write
26AC00330000
trusted library allocation
page read and write
47C000
stack
page read and write
66D1000
heap
page read and write
12E800201000
trusted library allocation
page read and write
469000368000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC00664000
trusted library allocation
page read and write
31FB000
heap
page read and write
2108ECC0000
unkown
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
469000240000
trusted library allocation
page read and write
469000D48000
trusted library allocation
page read and write
469000E84000
trusted library allocation
page read and write
2108C5E5000
heap
page read and write
210967BD000
trusted library section
page read and write
77E3000
heap
page read and write
4690004C8000
trusted library allocation
page read and write
12E800250000
trusted library allocation
page read and write
1470000
direct allocation
page read and write
4690010BC000
trusted library allocation
page read and write
66D1000
heap
page read and write
469000D24000
trusted library allocation
page read and write
66D1000
heap
page read and write
8D7CBFE000
stack
page read and write
469000713000
trusted library allocation
page read and write
2109668E000
trusted library section
page read and write
26AC0020C000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
2E8002A8000
direct allocation
page read and write
66D1000
heap
page read and write
469000EE4000
trusted library allocation
page read and write
66D1000
heap
page read and write
6F72000
heap
page read and write
469001124000
trusted library allocation
page read and write
2108FA74000
heap
page read and write
66D1000
heap
page read and write
46900037C000
trusted library allocation
page read and write
469000E5C000
trusted library allocation
page read and write
8D613FE000
unkown
page readonly
66D1000
heap
page read and write
78CE000
heap
page read and write
26AC00418000
trusted library allocation
page read and write
46900080C000
trusted library allocation
page read and write
66D1000
heap
page read and write
6BE40000
unkown
page readonly
66D1000
heap
page read and write
66D1000
heap
page read and write
78D9000
heap
page read and write
469000A30000
trusted library allocation
page read and write
4690002BC000
trusted library allocation
page read and write
66D1000
heap
page read and write
46900064C000
trusted library allocation
page read and write
66D1000
heap
page read and write
1535000
heap
page read and write
2108C558000
heap
page read and write
26AC00248000
trusted library allocation
page read and write
2E80024C000
direct allocation
page read and write
4690000A8000
trusted library allocation
page read and write
21095D72000
trusted library section
page read and write
469000210000
trusted library allocation
page read and write
66D1000
heap
page read and write
13EF000
stack
page read and write
469001018000
trusted library allocation
page read and write
4690002AC000
trusted library allocation
page read and write
66D1000
heap
page read and write
26AC00374000
trusted library allocation
page read and write
4690004C4000
trusted library allocation
page read and write
12E8002C0000
trusted library allocation
page read and write
1531000
heap
page read and write
469000AF8000
trusted library allocation
page read and write
D1E000
unkown
page read and write
26AC00734000
trusted library allocation
page read and write
469000FC4000
trusted library allocation
page read and write
D5F000
unkown
page read and write
12E800230000
trusted library allocation
page read and write
46900022C000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
2108FA8F000
heap
page read and write
469000DC4000
trusted library allocation
page read and write
1531000
heap
page read and write
6DD0000
direct allocation
page execute and read and write
21095ED6000
trusted library section
page read and write
26AC0039C000
trusted library allocation
page read and write
26AC0080C000
trusted library allocation
page read and write
12E800274000
trusted library allocation
page read and write
469000E0C000
trusted library allocation
page read and write
795E000
heap
page read and write
46900095C000
trusted library allocation
page read and write
66D1000
heap
page read and write
21096661000
trusted library section
page read and write
26AC00758000
trusted library allocation
page read and write
4690001C8000
trusted library allocation
page read and write
7873000
heap
page read and write
66D1000
heap
page read and write
2E80023C000
direct allocation
page read and write
469000CF4000
trusted library allocation
page read and write
2108FFE1000
heap
page read and write
66D1000
heap
page read and write
4690005A8000
trusted library allocation
page read and write
26AC00210000
trusted library allocation
page read and write
78ED000
heap
page read and write
46900005C000
trusted library allocation
page read and write
2108FF56000
heap
page read and write
77BB000
heap
page read and write
12E8002A0000
trusted library allocation
page read and write
66D1000
heap
page read and write
21096B60000
trusted library section
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
1470000
direct allocation
page read and write
DFC000
stack
page read and write
8D6BBFD000
stack
page read and write
469000A5C000
trusted library allocation
page read and write
6DD0000
direct allocation
page execute and read and write
66D1000
heap
page read and write
2108FFC9000
heap
page read and write
4690005F4000
trusted library allocation
page read and write
8D67BFA000
stack
page read and write
772F000
heap
page read and write
26AC00320000
trusted library allocation
page read and write
8D763FE000
unkown
page readonly
There are 1347 hidden memdumps, click here to show them.