IOC Report
OUZXNOqKXg.exe

loading gif

Files

File Path
Type
Category
Malicious
OUZXNOqKXg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HWrdWlyArR5ylxzokfJFSLT.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\omSBwUIH4pet5KxkFSj3Ooa.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_efa6ea435623776204e2ff3e8ee4f891ec76e69_2d68038f_52783177-a43b-47d0-addd-1377208c22e4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_efa6ea435623776204e2ff3e8ee4f891ec76e69_2d68038f_5c095051-8930-4543-a428-f5de80664f92\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_OUZXNOqKXg.exe_5390e549b8f70678a22be0d1b2bb235f301267_520e7665_01f7457b-adcf-4fbc-ae7c-da9e5bdd937b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER101D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER104D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB5B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC91.tmp.dmp
Mini DuMP crash report, 15 streams, Thu May 2 11:07:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE255.tmp.dmp
Mini DuMP crash report, 15 streams, Thu May 2 11:07:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED91.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDC1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFDAD.tmp.dmp
Mini DuMP crash report, 15 streams, Thu May 2 11:07:26 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\738S5kD7Lt_5Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\DmxiK99S1aMvLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\ItL735j0X1vDWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\JXoPPEuLvBuYHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\KFrsFkuEtVx7Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\Lx_wEgxUUerRWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\OzhYo5EPzTFbHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\PaWWAHmKp8fWWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\PfUMhVZm9gXZWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\dRaxYJfWlRkoHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\ejUKl4SHyZAYHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\fCfRKg2Q_74JLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\lsqAHYMI4ze8Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\mOHLDwmCIeIVCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanSnhvzcZr_E4B\xFSkFcdxh7ihWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\10GGX8YOPvgsLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\96e_HOYMTAmIWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\DYntKPfaj3fyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\ED7tWrpGNjOYLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\I9jYHh0VLt8gCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\IcAhGBHRo3YOWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\QsGerBPH44FGHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\RpnqHn0hU1iAWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\_zU6EX5Cd6weHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\fgBHz3xnoPPkWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\kD7rFNDHAS4QWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\l1q_1j16WyA9Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\qy02EWz6v3q_Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\sOvQuAGbgPTNHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw5lE9SfNusXC\tnpH27OGiBtPHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\trixySnhvzcZr_E4B\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixySnhvzcZr_E4B\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixySnhvzcZr_E4B\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyw5lE9SfNusXC\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyw5lE9SfNusXC\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyw5lE9SfNusXC\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 10:08:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 10:08:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 10:08:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 10:08:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 10:08:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 126
ASCII text, with very long lines (769)
downloaded
There are 60 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OUZXNOqKXg.exe
"C:\Users\user\Desktop\OUZXNOqKXg.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2120
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6044 -s 2028
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 2092
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1940,i,7949673732740788315,15977875228803599202,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://db-ip.com:443/demo/home.php?s=191.96.150.225A
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io/widget/demo/191.96.150.225;
unknown
https://duckduckgo.com/ac/?q=
unknown
https://t.x
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGJzozbEGIjCxTehgS7Xj9JABG9mCXW98VQ5yfDr7OKui0mBNEQv43K_hnjR_IbcTaqS2cHi5QPgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.100
https://t.me/risepro_botD
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://db-ip.com/
unknown
https://t.p
unknown
https://db-ip.com:443/demo/home.php?s=191.96.150.225P
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://ipinfo.io/widget/demo/191.96.150.2251
unknown
https://t.me/RiseProSUPPORTY
unknown
http://193.233.132.56/cost/go.exe
unknown
http://193.233.132.56/cost/go.exet
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/v
unknown
https://t.me/risepro_botisepro_bot
unknown
https://ipinfo.io/widget/demo/191.96.150.225
34.117.186.192
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.40.100
http://193.233.132.56/cost/go.exelS
unknown
https://db-ip.com:443/demo/home.php?s=191.96.150.225
unknown
https://t.me/RiseProSUPPORTA
unknown
https://t.me/risepro_botrisepro
unknown
https://t.me/risepro_bot0.225
unknown
http://193.233.132.56/cost/lenin.exeeS
unknown
https://ipinfo.io/widget/demo/191.96.150.225z
unknown
https://t.me/RiseProSUPPORT1
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://t.me/risepro_bot:S
unknown
https://ipinfo.io/S
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.251.40.100
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/K
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225w
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225
unknown
https://www.ecosia.org/newtab/
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225
104.26.5.15
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io/widget/demo/191.96.150.225v
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://193.233.132.56/cost/lenin.exeka.ex%
unknown
http://193.233.132.56/cost/sok.exe
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.251.40.100
https://t.me/risepro_bot
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGJzozbEGIjBA57m2OnHq4MuqM1LINkAHVsFdZO-nSsIbTZhoH_tZk0bZIq1X5_t8JY-lJBTRSsoyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.100
https://ipinfo.io:443/widget/demo/191.96.150.225h
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.40.100
https://ipinfo.io/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://193.233.132.56/cost/lenin.exe
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
http://193.233.132.56/cost/sok.exebS
unknown
http://193.233.132.56/cost/lenin.exer
unknown
https://t.me/risepro_botN5
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225c
unknown
https://t.me/risepro_botlater3S
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225a
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
www.google.com
142.251.40.100
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
192.168.2.5
unknown
unknown
malicious
34.117.186.192
ipinfo.io
United States
142.251.40.100
www.google.com
United States
239.255.255.250
unknown
Reserved
104.26.5.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
ProgramId
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
FileId
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
LowerCaseLongPath
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
LongPathHash
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
Name
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
OriginalFileName
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
Publisher
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
Version
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
BinFileVersion
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
BinaryType
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
ProductName
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
ProductVersion
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
LinkDate
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
BinProductVersion
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
AppxPackageFullName
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
AppxPackageRelativeId
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
Size
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
Language
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\ouzxnoqkxg.exe|6003e13b9c17bc
Usn
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{c2ce6f29-8004-335f-8710-7e0c4510ae2d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7A05000
heap
page read and write
malicious
7927000
heap
page read and write
malicious
74E0000
heap
page read and write
malicious
763D000
heap
page read and write
malicious
75D8000
heap
page read and write
malicious
791C000
heap
page read and write
malicious
7A05000
heap
page read and write
malicious
7928000
heap
page read and write
malicious
E41000
heap
page read and write
774C000
heap
page read and write
4970000
direct allocation
page execute and read and write
4A30000
direct allocation
page execute and read and write
7961000
heap
page read and write
5D4000
heap
page read and write
574000
heap
page read and write
954000
heap
page read and write
791B000
heap
page read and write
44E1000
heap
page read and write
1265000
unkown
page execute and write copy
15AF000
unkown
page execute and read and write
7884000
heap
page read and write
7655000
heap
page read and write
4881000
heap
page read and write
49A1000
heap
page read and write
7A19000
heap
page read and write
7642000
heap
page read and write
5D4000
heap
page read and write
A14000
heap
page read and write
44E1000
heap
page read and write
1260000
unkown
page execute and write copy
4E30000
direct allocation
page execute and read and write
5240000
direct allocation
page execute and read and write
7A1D000
heap
page read and write
4C3E000
stack
page read and write
74FF000
heap
page read and write
A14000
heap
page read and write
7A17000
heap
page read and write
6ED000
heap
page read and write
753E000
heap
page read and write
7960000
trusted library allocation
page read and write
810000
heap
page read and write
761F000
heap
page read and write
2D5E000
stack
page read and write
79BE000
stack
page read and write
763F000
heap
page read and write
764A000
heap
page read and write
79FB000
heap
page read and write
429E000
stack
page read and write
487F000
stack
page read and write
5E6000
direct allocation
page read and write
574000
heap
page read and write
AFF000
heap
page read and write
E2D000
unkown
page read and write
49A1000
heap
page read and write
510000
heap
page read and write
574000
heap
page read and write
BED000
heap
page read and write
7A30000
heap
page read and write
954000
heap
page read and write
10D4000
unkown
page execute and write copy
D4E000
stack
page read and write
75FF000
heap
page read and write
763F000
heap
page read and write
75ED000
heap
page read and write
44E1000
heap
page read and write
FE6000
direct allocation
page read and write
4970000
direct allocation
page execute and read and write
75FD000
heap
page read and write
79C5000
heap
page read and write
1177000
unkown
page read and write
7661000
heap
page read and write
15BC000
unkown
page execute and write copy
3C5E000
stack
page read and write
75E0000
trusted library allocation
page read and write
762A000
heap
page read and write
7642000
heap
page read and write
44E1000
heap
page read and write
7A18000
heap
page read and write
EC1000
unkown
page execute and write copy
7747000
heap
page read and write
7961000
heap
page read and write
44E1000
heap
page read and write
52B0000
direct allocation
page execute and read and write
7B6B000
heap
page read and write
78D8000
heap
page read and write
7370000
remote allocation
page read and write
7871000
heap
page read and write
FE9000
direct allocation
page read and write
7DE4000
heap
page read and write
7A79000
heap
page read and write
13CF000
unkown
page execute and read and write
7D5B000
heap
page read and write
7320000
remote allocation
page read and write
1BE000
stack
page read and write
7961000
heap
page read and write
752B000
heap
page read and write
75CE000
stack
page read and write
7632000
heap
page read and write
7F65000
heap
page read and write
79EE000
heap
page read and write
7D54000
heap
page read and write
2D57000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
7658000
heap
page read and write
5210000
direct allocation
page execute and read and write
7D55000
heap
page read and write
C00000
heap
page read and write
7576000
heap
page read and write
7605000
heap
page read and write
3D5E000
stack
page read and write
7871000
heap
page read and write
7634000
heap
page read and write
B5E000
stack
page read and write
385F000
stack
page read and write
7632000
heap
page read and write
79FC000
heap
page read and write
43BE000
stack
page read and write
764F000
heap
page read and write
49A1000
heap
page read and write
335F000
stack
page read and write
7A24000
heap
page read and write
15B5000
unkown
page execute and write copy
7DE7000
heap
page read and write
44E1000
heap
page read and write
7E32000
heap
page read and write
761F000
heap
page read and write
34DE000
stack
page read and write
4881000
heap
page read and write
7A27000
heap
page read and write
3D5F000
stack
page read and write
7A6C000
heap
page read and write
5200000
direct allocation
page execute and read and write
4D41000
heap
page read and write
79F2000
heap
page read and write
7929000
heap
page read and write
489E000
stack
page read and write
44E1000
heap
page read and write
753E000
heap
page read and write
1268000
unkown
page execute and write copy
4D70000
direct allocation
page execute and read and write
44E1000
heap
page read and write
7A18000
heap
page read and write
44E1000
heap
page read and write
7632000
heap
page read and write
658000
heap
page read and write
7DF4000
heap
page read and write
430000
heap
page read and write
4960000
direct allocation
page execute and read and write
439F000
stack
page read and write
30BF000
stack
page read and write
7507000
heap
page read and write
768B000
heap
page read and write
FF1000
unkown
page execute and read and write
49BE000
stack
page read and write
7DEC000
heap
page read and write
291B000
heap
page read and write
792A000
heap
page read and write
9E0000
heap
page read and write
7D51000
heap
page read and write
DFE000
heap
page read and write
7A05000
heap
page read and write
954000
heap
page read and write
B15000
heap
page read and write
11D2000
unkown
page execute and read and write
4F30000
direct allocation
page execute and read and write
954000
heap
page read and write
49B0000
direct allocation
page execute and read and write
79EC000
heap
page read and write
49F0000
direct allocation
page execute and read and write
AF8000
heap
page read and write
7E91000
heap
page read and write
44E1000
heap
page read and write
7D50000
heap
page read and write
7D5A000
heap
page read and write
7AB0000
heap
page read and write
79DE000
heap
page read and write
CA0000
unkown
page read and write
7D51000
heap
page read and write
4E50000
direct allocation
page execute and read and write
44E1000
heap
page read and write
954000
heap
page read and write
E07000
heap
page read and write
7632000
heap
page read and write
7632000
heap
page read and write
7982000
heap
page read and write
761F000
heap
page read and write
49A1000
heap
page read and write
44E1000
heap
page read and write
7A24000
heap
page read and write
752C000
heap
page read and write
4E30000
direct allocation
page execute and read and write
78CC000
heap
page read and write
321E000
stack
page read and write
7A1E000
heap
page read and write
755F000
heap
page read and write
7D51000
heap
page read and write
7634000
heap
page read and write
339E000
stack
page read and write
574000
heap
page read and write
752F000
heap
page read and write
765E000
heap
page read and write
4A30000
direct allocation
page execute and read and write
7DE3000
heap
page read and write
44E1000
heap
page read and write
49B0000
direct allocation
page execute and read and write
7A38000
heap
page read and write
9E4000
heap
page read and write
77CD000
stack
page read and write
B04000
heap
page read and write
15B5000
unkown
page execute and write copy
7871000
heap
page read and write
FF0000
unkown
page read and write
383F000
stack
page read and write
3BDF000
stack
page read and write
79CF000
heap
page read and write
5D4000
heap
page read and write
7D5C000
heap
page read and write
7A30000
heap
page read and write
7651000
heap
page read and write
4F50000
direct allocation
page execute and read and write
75FD000
heap
page read and write
51E0000
direct allocation
page execute and read and write
4D40000
heap
page read and write
EA0000
direct allocation
page read and write
75FD000
heap
page read and write
2B9E000
stack
page read and write
1053000
unkown
page execute and read and write
7D5B000
heap
page read and write
4D41000
heap
page read and write
4D50000
heap
page read and write
7D5B000
heap
page read and write
5080000
remote allocation
page read and write
7603000
heap
page read and write
7699000
heap
page read and write
15B5000
unkown
page execute and write copy
762A000
heap
page read and write
7DD5000
heap
page read and write
7AB4000
heap
page read and write
758D000
stack
page read and write
7666000
heap
page read and write
4970000
direct allocation
page execute and read and write
791B000
heap
page read and write
15BB000
unkown
page execute and read and write
7944000
heap
page read and write
7D71000
heap
page read and write
2B7B000
heap
page read and write
504D000
stack
page read and write
4D41000
heap
page read and write
7982000
heap
page read and write
5070000
remote allocation
page read and write
7960000
trusted library allocation
page read and write
371F000
stack
page read and write
75D1000
heap
page read and write
EA0000
direct allocation
page read and write
75ED000
heap
page read and write
5D4000
heap
page read and write
44E1000
heap
page read and write
4DE0000
trusted library allocation
page read and write
7B6A000
heap
page read and write
7A27000
heap
page read and write
4D00000
direct allocation
page read and write
A14000
heap
page read and write
337E000
stack
page read and write
774E000
heap
page read and write
FD0000
direct allocation
page read and write
148C000
unkown
page execute and write copy
49E0000
direct allocation
page execute and read and write
9E4000
heap
page read and write
7925000
heap
page read and write
765000
heap
page read and write
5080000
remote allocation
page read and write
7DE4000
heap
page read and write
761F000
heap
page read and write
49A1000
heap
page read and write
2FF7000
heap
page read and write
7634000
heap
page read and write
7632000
heap
page read and write
7511000
heap
page read and write
4A60000
direct allocation
page execute and read and write
3EDE000
stack
page read and write
764A000
heap
page read and write
79C4000
heap
page read and write
5200000
direct allocation
page execute and read and write
7669000
heap
page read and write
7AC5000
heap
page read and write
9E4000
heap
page read and write
44E1000
heap
page read and write
954000
heap
page read and write
D8A000
heap
page read and write
385F000
stack
page read and write
B70000
heap
page read and write
7AC5000
heap
page read and write
7A2C000
heap
page read and write
7960000
trusted library allocation
page read and write
9E4000
heap
page read and write
7699000
heap
page read and write
FD0000
direct allocation
page read and write
954000
heap
page read and write
BCF000
heap
page read and write
7642000
heap
page read and write
738E000
stack
page read and write
5200000
direct allocation
page execute and read and write
954000
heap
page read and write
4A70000
direct allocation
page execute and read and write
C7E000
stack
page read and write
7D5F000
heap
page read and write
7A05000
heap
page read and write
4FAD000
stack
page read and write
5D4000
heap
page read and write
E1E000
stack
page read and write
79FC000
heap
page read and write
5F0000
heap
page read and write
751F000
heap
page read and write
75EC000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
44E1000
heap
page read and write
52E0000
direct allocation
page execute and read and write
E0B000
heap
page read and write
12F3000
unkown
page execute and write copy
44E1000
heap
page read and write
EA0000
direct allocation
page read and write
147F000
unkown
page execute and read and write
7550000
heap
page read and write
9E4000
heap
page read and write
399F000
stack
page read and write
4A10000
direct allocation
page execute and read and write
1480000
unkown
page execute and write copy
79FB000
heap
page read and write
762A000
heap
page read and write
3D9E000
stack
page read and write
764A000
heap
page read and write
10C4000
unkown
page execute and read and write
4F20000
direct allocation
page execute and read and write
954000
heap
page read and write
C80000
heap
page read and write
764D000
heap
page read and write
DE0000
heap
page read and write
7676000
heap
page read and write
2F7F000
stack
page read and write
79D2000
heap
page read and write
4D09000
direct allocation
page read and write
7870000
trusted library allocation
page read and write
954000
heap
page read and write
4D50000
direct allocation
page execute and read and write
78B2000
heap
page read and write
7F55000
heap
page read and write
7601000
heap
page read and write
5250000
direct allocation
page execute and read and write
765A000
heap
page read and write
954000
heap
page read and write
461E000
stack
page read and write
4D06000
direct allocation
page read and write
667000
heap
page read and write
44E1000
heap
page read and write
A14000
heap
page read and write
764A000
heap
page read and write
7655000
heap
page read and write
7925000
heap
page read and write
7F57000
heap
page read and write
3E9E000
stack
page read and write
79CC000
heap
page read and write
7832000
heap
page read and write
7A2C000
heap
page read and write
A14000
heap
page read and write
4881000
heap
page read and write
4881000
heap
page read and write
764A000
heap
page read and write
A5E000
stack
page read and write
A10000
heap
page read and write
EA0000
direct allocation
page read and write
52F0000
direct allocation
page execute and read and write
44E1000
heap
page read and write
5230000
direct allocation
page execute and read and write
44E0000
heap
page read and write
7A24000
heap
page read and write
44E1000
heap
page read and write
49B0000
direct allocation
page execute and read and write
78B2000
heap
page read and write
44E1000
heap
page read and write
7634000
heap
page read and write
4E30000
direct allocation
page execute and read and write
40BF000
stack
page read and write
76D1000
heap
page read and write
415E000
stack
page read and write
749D000
stack
page read and write
764A000
heap
page read and write
437F000
stack
page read and write
7A33000
heap
page read and write
34BE000
stack
page read and write
1180000
unkown
page read and write
B80000
direct allocation
page read and write
7D51000
heap
page read and write
7770000
heap
page read and write
7DF0000
heap
page read and write
79D2000
heap
page read and write
76DB000
heap
page read and write
1485000
unkown
page execute and write copy
401E000
stack
page read and write
7A17000
heap
page read and write
7518000
heap
page read and write
4AB8000
heap
page read and write
4AF1000
direct allocation
page read and write
1302000
unkown
page execute and read and write
BAE000
stack
page read and write
DD9000
heap
page read and write
421F000
stack
page read and write
7A05000
heap
page read and write
574000
heap
page read and write
755000
heap
page read and write
9E4000
heap
page read and write
79B5000
heap
page read and write
5C0000
direct allocation
page read and write
642000
heap
page read and write
5070000
remote allocation
page read and write
43DE000
stack
page read and write
7685000
heap
page read and write
347E000
stack
page read and write
49E0000
direct allocation
page execute and read and write
373E000
stack
page read and write
777B000
heap
page read and write
7AA1000
heap
page read and write
4881000
heap
page read and write
574000
heap
page read and write
780F000
stack
page read and write
765E000
heap
page read and write
7D51000
heap
page read and write
A14000
heap
page read and write
7A19000
heap
page read and write
7320000
remote allocation
page read and write
5220000
direct allocation
page execute and read and write
7DF0000
heap
page read and write
A14000
heap
page read and write
9E4000
heap
page read and write
75EB000
heap
page read and write
7BB0000
remote allocation
page read and write
EC1000
unkown
page execute and write copy
49A1000
heap
page read and write
7A70000
heap
page read and write
560000
heap
page read and write
5D4000
heap
page read and write
762A000
heap
page read and write
7652000
heap
page read and write
7BB0000
remote allocation
page read and write
79FC000
heap
page read and write
A14000
heap
page read and write
129F000
unkown
page execute and read and write
7A05000
heap
page read and write
2F9C000
stack
page read and write
75FF000
heap
page read and write
7DD5000
heap
page read and write
44E1000
heap
page read and write
7DF1000
heap
page read and write
4C2E000
stack
page read and write
9E4000
heap
page read and write
7A05000
heap
page read and write
E1B000
heap
page read and write
7A24000
heap
page read and write
7634000
heap
page read and write
74B000
heap
page read and write
126B000
unkown
page execute and read and write
954000
heap
page read and write
7A0C000
heap
page read and write
7873000
heap
page read and write
3E7E000
stack
page read and write
766E000
heap
page read and write
7D5E000
heap
page read and write
44E1000
heap
page read and write
4A50000
direct allocation
page execute and read and write
43DE000
stack
page read and write
711E000
stack
page read and write
777A000
heap
page read and write
52C0000
direct allocation
page execute and read and write
A14000
heap
page read and write
7A1C000
heap
page read and write
7D51000
heap
page read and write
761F000
heap
page read and write
9E4000
heap
page read and write
FF0000
unkown
page read and write
3C1E000
stack
page read and write
7A33000
heap
page read and write
73DE000
stack
page read and write
6C4F000
heap
page read and write
79AE000
stack
page read and write
7D50000
trusted library allocation
page read and write
7F6C000
heap
page read and write
12F3000
unkown
page execute and read and write
7535000
heap
page read and write
44E1000
heap
page read and write
761F000
heap
page read and write
3F7F000
stack
page read and write
4E20000
direct allocation
page read and write
3A7F000
stack
page read and write
4E70000
direct allocation
page execute and read and write
1265000
unkown
page execute and write copy
44E1000
heap
page read and write
754B000
heap
page read and write
74D000
heap
page read and write
78B6000
heap
page read and write
764A000
heap
page read and write
7C27000
heap
page read and write
321F000
stack
page read and write
9E4000
heap
page read and write
7A4B000
heap
page read and write
7B8F000
stack
page read and write
4E30000
direct allocation
page execute and read and write
793A000
heap
page read and write
4970000
direct allocation
page execute and read and write
7668000
heap
page read and write
9E4000
heap
page read and write
79FB000
heap
page read and write
791B000
heap
page read and write
75D1000
heap
page read and write
7C28000
heap
page read and write
E33000
unkown
page execute and read and write
74CE000
stack
page read and write
7ACA000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4E30000
direct allocation
page execute and read and write
762A000
heap
page read and write
2C7F000
stack
page read and write
7634000
heap
page read and write
7777000
heap
page read and write
44E1000
heap
page read and write
B07000
heap
page read and write
765A000
heap
page read and write
7634000
heap
page read and write
761F000
heap
page read and write
EA0000
direct allocation
page read and write
79DC000
heap
page read and write
7640000
heap
page read and write
64C000
heap
page read and write
4E50000
direct allocation
page execute and read and write
AE9000
heap
page read and write
761F000
heap
page read and write
764B000
heap
page read and write
36BF000
stack
page read and write
4E30000
direct allocation
page execute and read and write
7B71000
heap
page read and write
7A1C000
heap
page read and write
BDD000
heap
page read and write
7A30000
heap
page read and write
7632000
heap
page read and write
78BE000
heap
page read and write
7652000
heap
page read and write
6F7D000
stack
page read and write
44E1000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4A60000
direct allocation
page execute and read and write
3D1F000
stack
page read and write
7A75000
heap
page read and write
70DD000
stack
page read and write
4F60000
direct allocation
page execute and read and write
761F000
heap
page read and write
7961000
heap
page read and write
760A000
heap
page read and write
756F000
heap
page read and write
E9F000
stack
page read and write
7A05000
heap
page read and write
7960000
trusted library allocation
page read and write
1268000
unkown
page execute and write copy
764A000
heap
page read and write
7A19000
heap
page read and write
5C0000
direct allocation
page read and write
7D50000
trusted library allocation
page read and write
A14000
heap
page read and write
4D41000
heap
page read and write
10B000
stack
page read and write
4D50000
direct allocation
page execute and read and write
7A35000
heap
page read and write
786E000
stack
page read and write
7668000
heap
page read and write
764A000
heap
page read and write
79E1000
heap
page read and write
B29000
heap
page read and write
7960000
trusted library allocation
page read and write
7875000
heap
page read and write
76D1000
heap
page read and write
764A000
heap
page read and write
1DE000
stack
page read and write
7AC0000
heap
page read and write
7871000
heap
page read and write
7370000
remote allocation
page read and write
954000
heap
page read and write
EC1000
unkown
page execute and read and write
752E000
heap
page read and write
325E000
stack
page read and write
335E000
stack
page read and write
28BE000
stack
page read and write
688000
heap
page read and write
7561000
heap
page read and write
44E1000
heap
page read and write
79FB000
heap
page read and write
7632000
heap
page read and write
485F000
stack
page read and write
40FE000
stack
page read and write
7532000
heap
page read and write
7A18000
heap
page read and write
7D50000
trusted library allocation
page read and write
383E000
stack
page read and write
95B000
stack
page read and write
5FA000
heap
page read and write
7A2C000
heap
page read and write
7602000
heap
page read and write
7513000
heap
page read and write
BC4000
heap
page read and write
375E000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
4E60000
direct allocation
page execute and read and write
15B0000
unkown
page execute and write copy
7999000
heap
page read and write
7544000
heap
page read and write
C97000
heap
page read and write
7E14000
heap
page read and write
7D51000
heap
page read and write
49B0000
heap
page read and write
791B000
heap
page read and write
7D51000
heap
page read and write
7551000
heap
page read and write
44E1000
heap
page read and write
762A000
heap
page read and write
1053000
unkown
page execute and read and write
9E4000
heap
page read and write
753A000
heap
page read and write
7E60000
heap
page read and write
7C12000
heap
page read and write
648000
heap
page read and write
791B000
heap
page read and write
7632000
heap
page read and write
C3C000
stack
page read and write
79D2000
heap
page read and write
574000
heap
page read and write
78A2000
heap
page read and write
59D000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
7871000
heap
page read and write
44E1000
heap
page read and write
763F000
heap
page read and write
954000
heap
page read and write
752C000
heap
page read and write
49A1000
heap
page read and write
763F000
heap
page read and write
4AB000
stack
page read and write
791C000
heap
page read and write
4D50000
direct allocation
page execute and read and write
7566000
heap
page read and write
7837000
heap
page read and write
78BE000
heap
page read and write
7960000
trusted library allocation
page read and write
13CF000
unkown
page execute and read and write
140C000
unkown
page execute and read and write
7632000
heap
page read and write
796F000
stack
page read and write
2FDE000
stack
page read and write
7602000
heap
page read and write
7896000
heap
page read and write
15B8000
unkown
page execute and write copy
74FF000
heap
page read and write
764F000
heap
page read and write
764A000
heap
page read and write
A14000
heap
page read and write
129F000
unkown
page execute and read and write
49D0000
direct allocation
page execute and read and write
7654000
heap
page read and write
7601000
heap
page read and write
49B0000
direct allocation
page execute and read and write
5080000
remote allocation
page read and write
9E4000
heap
page read and write
75FF000
heap
page read and write
574000
heap
page read and write
429E000
stack
page read and write
1047000
unkown
page write copy
B2B000
heap
page read and write
1480000
unkown
page execute and write copy
9F0000
heap
page read and write
954000
heap
page read and write
3CFF000
stack
page read and write
BEA000
heap
page read and write
389E000
stack
page read and write
7670000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
463E000
stack
page read and write
49B0000
direct allocation
page execute and read and write
3BFE000
stack
page read and write
7654000
heap
page read and write
7871000
heap
page read and write
45DF000
stack
page read and write
9E4000
heap
page read and write
7A33000
heap
page read and write
7606000
heap
page read and write
7875000
heap
page read and write
7C2A000
heap
page read and write
79F2000
heap
page read and write
4E30000
direct allocation
page execute and read and write
7A26000
heap
page read and write
761F000
heap
page read and write
44E1000
heap
page read and write
7DD4000
heap
page read and write
7667000
heap
page read and write
5D4000
heap
page read and write
7925000
heap
page read and write
7D1000
heap
page read and write
8F0000
heap
page read and write
954000
heap
page read and write
75FD000
heap
page read and write
387E000
stack
page read and write
499F000
stack
page read and write
79C0000
heap
page read and write
7658000
heap
page read and write
7E46000
heap
page read and write
4D41000
heap
page read and write
44E1000
heap
page read and write
5E9000
direct allocation
page read and write
49A1000
heap
page read and write
574000
heap
page read and write
7602000
heap
page read and write
954000
heap
page read and write
49C0000
direct allocation
page execute and read and write
44E1000
heap
page read and write
787D000
heap
page read and write
2F9F000
stack
page read and write
74E1000
heap
page read and write
D9F000
stack
page read and write
7E70000
heap
page read and write
7634000
heap
page read and write
502D000
stack
page read and write
4C30000
heap
page read and write
791B000
heap
page read and write
7DEE000
heap
page read and write
761F000
heap
page read and write
44E1000
heap
page read and write
7873000
heap
page read and write
7943000
heap
page read and write
764D000
heap
page read and write
49B0000
direct allocation
page execute and read and write
764A000
heap
page read and write
4970000
direct allocation
page execute and read and write
323E000
stack
page read and write
7531000
heap
page read and write
4D50000
direct allocation
page execute and read and write
3A9F000
stack
page read and write
2910000
heap
page read and write
5270000
direct allocation
page execute and read and write
393F000
stack
page read and write
79D2000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
7646000
heap
page read and write
7641000
heap
page read and write
4970000
direct allocation
page execute and read and write
736000
heap
page read and write
752B000
heap
page read and write
752F000
heap
page read and write
75E6000
heap
page read and write
731000
heap
page read and write
574000
heap
page read and write
3B1E000
stack
page read and write
FD0000
direct allocation
page read and write
5D4000
heap
page read and write
75FF000
heap
page read and write
7632000
heap
page read and write
7A17000
heap
page read and write
7DE4000
heap
page read and write
7D6C000
heap
page read and write
4D41000
heap
page read and write
5200000
direct allocation
page execute and read and write
75FD000
heap
page read and write
EC0000
unkown
page readonly
4FB0000
heap
page read and write
763F000
heap
page read and write
766A000
heap
page read and write
4D90000
direct allocation
page execute and read and write
7670000
heap
page read and write
1177000
unkown
page read and write
7A24000
heap
page read and write
2D50000
heap
page read and write
3FBE000
stack
page read and write
7D50000
trusted library allocation
page read and write
3D7E000
stack
page read and write
39DE000
stack
page read and write
762A000
heap
page read and write
753A000
heap
page read and write
4A20000
direct allocation
page execute and read and write
7693000
heap
page read and write
4A00000
direct allocation
page execute and read and write
7870000
trusted library allocation
page read and write
5D4000
heap
page read and write
7A17000
heap
page read and write
75E0000
trusted library allocation
page read and write
7D51000
heap
page read and write
B01000
heap
page read and write
79D2000
heap
page read and write
437E000
stack
page read and write
299F000
stack
page read and write
735F000
stack
page read and write
79FB000
heap
page read and write
7892000
heap
page read and write
7A2D000
heap
page read and write
44E1000
heap
page read and write
D70000
heap
page read and write
3ABF000
stack
page read and write
35BE000
stack
page read and write
761F000
heap
page read and write
DE8000
heap
page read and write
385E000
stack
page read and write
7A49000
heap
page read and write
16BE000
stack
page read and write
2D1E000
stack
page read and write
309F000
stack
page read and write
7632000
heap
page read and write
4E91000
direct allocation
page read and write
5D4000
heap
page read and write
75DA000
heap
page read and write
79EE000
heap
page read and write
4C8D000
stack
page read and write
79CC000
heap
page read and write
7520000
heap
page read and write
FD0000
direct allocation
page read and write
11D2000
unkown
page execute and read and write
B98000
heap
page read and write
7556000
heap
page read and write
777F000
heap
page read and write
D80000
heap
page read and write
44E1000
heap
page read and write
7660000
heap
page read and write
4BEE000
stack
page read and write
79FC000
heap
page read and write
764A000
heap
page read and write
44F0000
heap
page read and write
AAD000
heap
page read and write
4970000
direct allocation
page execute and read and write
7642000
heap
page read and write
CA1000
unkown
page execute and write copy
1488000
unkown
page execute and write copy
12DC000
unkown
page execute and read and write
75D000
heap
page read and write
CA1000
unkown
page execute and read and write
49A1000
heap
page read and write
4D30000
direct allocation
page execute and read and write
761F000
heap
page read and write
7A6F000
heap
page read and write
4D41000
heap
page read and write
3D9E000
stack
page read and write
7A17000
heap
page read and write
4ABF000
stack
page read and write
7A33000
heap
page read and write
751F000
heap
page read and write
7870000
trusted library allocation
page read and write
7925000
heap
page read and write
4D50000
direct allocation
page execute and read and write
752E000
heap
page read and write
3BFF000
stack
page read and write
125F000
unkown
page execute and read and write
954000
heap
page read and write
7944000
heap
page read and write
764A000
heap
page read and write
954000
heap
page read and write
7D50000
trusted library allocation
page read and write
DF6000
heap
page read and write
7873000
heap
page read and write
44E1000
heap
page read and write
9E4000
heap
page read and write
A14000
heap
page read and write
787B000
heap
page read and write
399F000
stack
page read and write
762A000
heap
page read and write
339E000
stack
page read and write
12F3000
unkown
page execute and write copy
78B2000
heap
page read and write
79FB000
heap
page read and write
7889000
heap
page read and write
49A1000
heap
page read and write
7602000
heap
page read and write
433F000
stack
page read and write
954000
heap
page read and write
7D56000
heap
page read and write
79F2000
heap
page read and write
7870000
trusted library allocation
page read and write
75EB000
heap
page read and write
7D5E000
heap
page read and write
574000
heap
page read and write
7632000
heap
page read and write
EC0000
unkown
page read and write
1424000
unkown
page execute and write copy
7E68000
heap
page read and write
752B000
heap
page read and write
762A000
heap
page read and write
411F000
stack
page read and write
753000
heap
page read and write
7B60000
heap
page read and write
44E0000
heap
page read and write
79FC000
heap
page read and write
4881000
heap
page read and write
4D41000
heap
page read and write
49B0000
direct allocation
page execute and read and write
1423000
unkown
page execute and write copy
EA0000
direct allocation
page read and write
44E1000
heap
page read and write
954000
heap
page read and write
954000
heap
page read and write
7887000
heap
page read and write
75E0000
heap
page read and write
311E000
stack
page read and write
7A33000
heap
page read and write
7632000
heap
page read and write
44E1000
heap
page read and write
A14000
heap
page read and write
7A25000
heap
page read and write
49A1000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
954000
heap
page read and write
7602000
heap
page read and write
725E000
stack
page read and write
413E000
stack
page read and write
574000
heap
page read and write
7D51000
heap
page read and write
752D000
heap
page read and write
7A05000
heap
page read and write
44E1000
heap
page read and write
49B0000
direct allocation
page execute and read and write
EA0000
direct allocation
page read and write
447F000
stack
page read and write
7A3E000
heap
page read and write
5D4000
heap
page read and write
7A17000
heap
page read and write
4D41000
heap
page read and write
5D4000
heap
page read and write
6DF000
stack
page read and write
A14000
heap
page read and write
5341000
direct allocation
page read and write
15B5000
unkown
page execute and write copy
79B5000
heap
page read and write
C11000
heap
page read and write
764A000
heap
page read and write
79A8000
heap
page read and write
52D0000
direct allocation
page execute and read and write
C90000
heap
page read and write
7632000
heap
page read and write
DCA000
heap
page read and write
FF1000
unkown
page execute and write copy
7871000
heap
page read and write
3C3E000
stack
page read and write
7602000
heap
page read and write
574000
heap
page read and write
4E30000
direct allocation
page execute and read and write
7602000
heap
page read and write
7E47000
heap
page read and write
B80000
direct allocation
page read and write
44E1000
heap
page read and write
5D4000
heap
page read and write
7602000
heap
page read and write
2F5F000
stack
page read and write
7A17000
heap
page read and write
5C0000
direct allocation
page read and write
B36000
heap
page read and write
7632000
heap
page read and write
7B61000
heap
page read and write
7D54000
heap
page read and write
78E2000
heap
page read and write
3C5E000
stack
page read and write
574000
heap
page read and write
7642000
heap
page read and write
7A05000
heap
page read and write
7F64000
heap
page read and write
760000
heap
page read and write
B98000
heap
page read and write
44E1000
heap
page read and write
7549000
heap
page read and write
EA0000
direct allocation
page read and write
7541000
heap
page read and write
574000
heap
page read and write
5D4000
heap
page read and write
15B0000
unkown
page execute and write copy
C85000
heap
page read and write
9E4000
heap
page read and write
44FE000
stack
page read and write
6CAC000
heap
page read and write
371E000
stack
page read and write
7B61000
heap
page read and write
3ABE000
stack
page read and write
5090000
heap
page read and write
7D50000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
44E1000
heap
page read and write
79B5000
heap
page read and write
752A000
heap
page read and write
793B000
heap
page read and write
79A8000
heap
page read and write
764C000
heap
page read and write
7A1C000
heap
page read and write
765C000
heap
page read and write
7652000
heap
page read and write
79DE000
heap
page read and write
3ADE000
stack
page read and write
748D000
stack
page read and write
4881000
heap
page read and write
574000
heap
page read and write
423F000
stack
page read and write
EA0000
direct allocation
page read and write
BBE000
stack
page read and write
35DF000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
30DE000
stack
page read and write
4D50000
direct allocation
page execute and read and write
4890000
heap
page read and write
7640000
heap
page read and write
78CC000
heap
page read and write
71C000
heap
page read and write
35FE000
stack
page read and write
325E000
stack
page read and write
7871000
heap
page read and write
7634000
heap
page read and write
EA0000
direct allocation
page read and write
7A2C000
heap
page read and write
2A1F000
stack
page read and write
39DE000
stack
page read and write
7D5C000
heap
page read and write
1183000
unkown
page execute and read and write
954000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4880000
heap
page read and write
44E1000
heap
page read and write
761F000
heap
page read and write
9E4000
heap
page read and write
665000
heap
page read and write
2FDE000
stack
page read and write
AE5000
heap
page read and write
7675000
heap
page read and write
2E5F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
79B5000
heap
page read and write
500D000
stack
page read and write
7D51000
heap
page read and write
A14000
heap
page read and write
79E1000
heap
page read and write
7531000
heap
page read and write
78BE000
stack
page read and write
5C0000
direct allocation
page read and write
574000
heap
page read and write
7884000
heap
page read and write
49A1000
heap
page read and write
764B000
heap
page read and write
44E1000
heap
page read and write
765A000
heap
page read and write
7654000
heap
page read and write
787B000
heap
page read and write
7961000
heap
page read and write
7695000
heap
page read and write
44E1000
heap
page read and write
4960000
direct allocation
page read and write
75CD000
stack
page read and write
4A50000
direct allocation
page execute and read and write
9E4000
heap
page read and write
76A1000
heap
page read and write
7535000
heap
page read and write
1177000
unkown
page write copy
4970000
direct allocation
page execute and read and write
2D1F000
stack
page read and write
333E000
stack
page read and write
7A81000
heap
page read and write
3E9F000
stack
page read and write
4FD0000
heap
page read and write
427E000
stack
page read and write
9E4000
heap
page read and write
753E000
heap
page read and write
7EE000
stack
page read and write
2BDF000
stack
page read and write
7602000
heap
page read and write
788D000
heap
page read and write
5D4000
heap
page read and write
52A0000
direct allocation
page execute and read and write
7D97000
heap
page read and write
7DE4000
heap
page read and write
4D41000
heap
page read and write
277E000
stack
page read and write
12F4000
unkown
page execute and write copy
41FF000
stack
page read and write
7CE000
heap
page read and write
7632000
heap
page read and write
EA0000
direct allocation
page read and write
7652000
heap
page read and write
99E000
stack
page read and write
5D4000
heap
page read and write
7634000
heap
page read and write
7A17000
heap
page read and write
79CC000
heap
page read and write
31FF000
stack
page read and write
399E000
stack
page read and write
117D000
unkown
page read and write
5A9000
stack
page read and write
7961000
heap
page read and write
7E5F000
stack
page read and write
75E5000
heap
page read and write
7D51000
heap
page read and write
359F000
stack
page read and write
FF0000
unkown
page readonly
7655000
heap
page read and write
7634000
heap
page read and write
36FE000
stack
page read and write
5BE000
stack
page read and write
12DC000
unkown
page execute and read and write
AAA000
heap
page read and write
45BF000
stack
page read and write
44E1000
heap
page read and write
75FF000
heap
page read and write
76A1000
heap
page read and write
1172000
unkown
page execute and read and write
7673000
heap
page read and write
761F000
heap
page read and write
653000
heap
page read and write
7614000
heap
page read and write
7EB8000
heap
page read and write
753A000
heap
page read and write
7943000
heap
page read and write
763F000
heap
page read and write
7893000
heap
page read and write
7D62000
heap
page read and write
7DFB000
heap
page read and write
7D51000
heap
page read and write
44E1000
heap
page read and write
791A000
heap
page read and write
7602000
heap
page read and write
574000
heap
page read and write
7686000
heap
page read and write
B2D000
heap
page read and write
7A19000
heap
page read and write
7D84000
heap
page read and write
75E6000
heap
page read and write
473F000
stack
page read and write
49A1000
heap
page read and write
7651000
heap
page read and write
762A000
heap
page read and write
792A000
heap
page read and write
4E30000
direct allocation
page execute and read and write
A14000
heap
page read and write
71BF000
stack
page read and write
30FF000
stack
page read and write
7F5B000
heap
page read and write
764A000
heap
page read and write
75E0000
trusted library allocation
page read and write
66C000
heap
page read and write
4D5E000
stack
page read and write
4881000
heap
page read and write
7B6D000
heap
page read and write
761F000
heap
page read and write
46FF000
stack
page read and write
425E000
stack
page read and write
2FF0000
heap
page read and write
DF8000
heap
page read and write
44E1000
heap
page read and write
5D4000
heap
page read and write
397E000
stack
page read and write
754E000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
761F000
heap
page read and write
954000
heap
page read and write
7A49000
heap
page read and write
395F000
stack
page read and write
4CC0000
trusted library allocation
page read and write
425F000
stack
page read and write
7A2A000
heap
page read and write
9E4000
heap
page read and write
4ED000
stack
page read and write
B9E000
heap
page read and write
FF1000
unkown
page execute and read and write
2E7F000
stack
page read and write
7520000
heap
page read and write
9E4000
heap
page read and write
2C1E000
stack
page read and write
7DF3000
heap
page read and write
2C1F000
stack
page read and write
7A35000
heap
page read and write
44E1000
heap
page read and write
75FF000
heap
page read and write
770E000
stack
page read and write
9E4000
heap
page read and write
2F9E000
stack
page read and write
475E000
stack
page read and write
44E1000
heap
page read and write
4F00000
direct allocation
page execute and read and write
7787000
heap
page read and write
1042000
unkown
page execute and read and write
58B000
stack
page read and write
30FE000
stack
page read and write
4970000
direct allocation
page execute and read and write
5D4000
heap
page read and write
762A000
heap
page read and write
79F2000
heap
page read and write
A14000
heap
page read and write
7960000
trusted library allocation
page read and write
1488000
unkown
page execute and write copy
7875000
heap
page read and write
79ED000
heap
page read and write
4D50000
direct allocation
page execute and read and write
7961000
heap
page read and write
9E4000
heap
page read and write
4AF6000
heap
page read and write
5C0000
direct allocation
page read and write
7A5A000
heap
page read and write
44E1000
heap
page read and write
7A05000
heap
page read and write
7F5B000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
4960000
direct allocation
page read and write
44E1000
heap
page read and write
768D000
heap
page read and write
A14000
heap
page read and write
762A000
heap
page read and write
1047000
unkown
page write copy
44DF000
stack
page read and write
7D5F000
heap
page read and write
762A000
heap
page read and write
954000
heap
page read and write
79FB000
heap
page read and write
7666000
heap
page read and write
7A75000
heap
page read and write
361E000
stack
page read and write
76D2000
heap
page read and write
75EB000
heap
page read and write
44E1000
heap
page read and write
764B000
heap
page read and write
7A81000
heap
page read and write
44E1000
heap
page read and write
7D50000
trusted library allocation
page read and write
12E4000
unkown
page execute and read and write
712000
heap
page read and write
4A80000
direct allocation
page execute and read and write
7DF5000
heap
page read and write
15B8000
unkown
page execute and write copy
79CE000
heap
page read and write
4FA1000
direct allocation
page read and write
44E1000
heap
page read and write
7820000
heap
page read and write
BFE000
stack
page read and write
389E000
stack
page read and write
2D30000
direct allocation
page execute and read and write
A14000
heap
page read and write
9E4000
heap
page read and write
7621000
heap
page read and write
7892000
heap
page read and write
768D000
heap
page read and write
333F000
stack
page read and write
75EB000
heap
page read and write
E22000
unkown
page execute and read and write
A14000
heap
page read and write
7667000
heap
page read and write
7D71000
heap
page read and write
FD0000
direct allocation
page read and write
F8E000
stack
page read and write
2D5E000
stack
page read and write
762A000
heap
page read and write
753E000
heap
page read and write
765A000
heap
page read and write
AFD000
heap
page read and write
1E0000
heap
page read and write
75EB000
heap
page read and write
4881000
heap
page read and write
4E30000
direct allocation
page execute and read and write
792A000
heap
page read and write
75EB000
heap
page read and write
9E4000
heap
page read and write
767A000
heap
page read and write
4990000
direct allocation
page execute and read and write
7602000
heap
page read and write
B9B000
heap
page read and write
A14000
heap
page read and write
7871000
heap
page read and write
4970000
direct allocation
page read and write
7A27000
heap
page read and write
7870000
heap
page read and write
A14000
heap
page read and write
7A2C000
heap
page read and write
7602000
heap
page read and write
7992000
heap
page read and write
75FD000
heap
page read and write
2B6E000
stack
page read and write
A14000
heap
page read and write
7960000
trusted library allocation
page read and write
766A000
heap
page read and write
FF1000
unkown
page execute and write copy
6E0000
heap
page read and write
762A000
heap
page read and write
67C000
heap
page read and write
7870000
trusted library allocation
page read and write
6FDD000
stack
page read and write
7871000
heap
page read and write
A14000
heap
page read and write
3AFE000
stack
page read and write
764A000
heap
page read and write
44E1000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
76D0000
trusted library allocation
page read and write
51C0000
direct allocation
page read and write
7602000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
44E1000
heap
page read and write
7A19000
heap
page read and write
349F000
stack
page read and write
954000
heap
page read and write
7884000
heap
page read and write
425F000
stack
page read and write
74DE000
stack
page read and write
B17000
heap
page read and write
104D000
unkown
page read and write
5200000
direct allocation
page execute and read and write
2D40000
direct allocation
page execute and read and write
75EB000
heap
page read and write
7750000
heap
page read and write
4881000
heap
page read and write
30DF000
stack
page read and write
C08000
heap
page read and write
FCE000
stack
page read and write
435F000
stack
page read and write
574000
heap
page read and write
7D5E000
stack
page read and write
7A49000
heap
page read and write
AEE000
heap
page read and write
44E1000
heap
page read and write
E30000
unkown
page read and write
7520000
heap
page read and write
49BE000
stack
page read and write
75FD000
heap
page read and write
7887000
heap
page read and write
4E20000
direct allocation
page execute and read and write
63A000
heap
page read and write
770000
heap
page read and write
7A18000
heap
page read and write
4BFF000
stack
page read and write
3ADF000
stack
page read and write
7961000
heap
page read and write
1047000
unkown
page read and write
7632000
heap
page read and write
EA0000
direct allocation
page read and write
CB000
stack
page read and write
477E000
stack
page read and write
9E4000
heap
page read and write
75FD000
heap
page read and write
761F000
heap
page read and write
51D0000
direct allocation
page execute and read and write
8FC000
stack
page read and write
28FE000
stack
page read and write
7D51000
heap
page read and write
7DE9000
heap
page read and write
4D40000
direct allocation
page execute and read and write
752B000
heap
page read and write
7533000
heap
page read and write
7871000
heap
page read and write
44E1000
heap
page read and write
71FE000
stack
page read and write
7D51000
heap
page read and write
7A19000
heap
page read and write
35BF000
stack
page read and write
31FF000
stack
page read and write
5200000
direct allocation
page execute and read and write
7A05000
heap
page read and write
4D41000
heap
page read and write
49B0000
direct allocation
page execute and read and write
E35000
heap
page read and write
758A000
heap
page read and write
7A17000
heap
page read and write
7960000
trusted library allocation
page read and write
449F000
stack
page read and write
791B000
heap
page read and write
707D000
stack
page read and write
4AF3000
heap
page read and write
49A1000
heap
page read and write
7642000
heap
page read and write
7887000
heap
page read and write
1485000
unkown
page execute and write copy
7A17000
heap
page read and write
762A000
heap
page read and write
49A1000
heap
page read and write
401E000
stack
page read and write
761F000
heap
page read and write
574000
heap
page read and write
7871000
heap
page read and write
44E1000
heap
page read and write
7A2C000
heap
page read and write
7775000
heap
page read and write
7A3A000
heap
page read and write
B90000
heap
page read and write
7632000
heap
page read and write
4D41000
heap
page read and write
2917000
heap
page read and write
49A1000
heap
page read and write
7A2A000
heap
page read and write
44E1000
heap
page read and write
DCF000
heap
page read and write
7634000
heap
page read and write
7870000
trusted library allocation
page read and write
7A2B000
heap
page read and write
769A000
heap
page read and write
5D4000
heap
page read and write
5200000
direct allocation
page execute and read and write
A14000
heap
page read and write
148B000
unkown
page execute and read and write
5D4000
heap
page read and write
780E000
stack
page read and write
44DF000
stack
page read and write
5200000
direct allocation
page execute and read and write
570000
heap
page read and write
5D4000
heap
page read and write
7640000
heap
page read and write
758A000
heap
page read and write
75E0000
trusted library allocation
page read and write
79E0000
heap
page read and write
78E2000
heap
page read and write
49A1000
heap
page read and write
44E1000
heap
page read and write
4E80000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
49F0000
direct allocation
page execute and read and write
C18000
heap
page read and write
C3C000
stack
page read and write
5D4000
heap
page read and write
5290000
direct allocation
page execute and read and write
3FDF000
stack
page read and write
7639000
heap
page read and write
7D50000
trusted library allocation
page read and write
940000
heap
page read and write
411F000
stack
page read and write
7D50000
trusted library allocation
page read and write
471F000
stack
page read and write
79FB000
heap
page read and write
764D000
heap
page read and write
7F58000
heap
page read and write
76D7000
heap
page read and write
4881000
heap
page read and write
5D4000
heap
page read and write
2B70000
heap
page read and write
A14000
heap
page read and write
7A19000
heap
page read and write
1050000
unkown
page read and write
4E20000
direct allocation
page execute and read and write
4A80000
direct allocation
page execute and read and write
9D0000
heap
page read and write
7A0C000
heap
page read and write
762A000
heap
page read and write
7D51000
heap
page read and write
1047000
unkown
page read and write
4E30000
direct allocation
page execute and read and write
7960000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
758C000
heap
page read and write
9E4000
heap
page read and write
7873000
heap
page read and write
7D60000
heap
page read and write
4A90000
heap
page read and write
9E4000
heap
page read and write
7A25000
heap
page read and write
7A71000
heap
page read and write
1172000
unkown
page execute and read and write
7641000
heap
page read and write
7961000
heap
page read and write
2B77000
heap
page read and write
7834000
heap
page read and write
7511000
heap
page read and write
4C30000
heap
page read and write
B25000
heap
page read and write
790D000
stack
page read and write
7961000
heap
page read and write
2B2F000
stack
page read and write
954000
heap
page read and write
1424000
unkown
page execute and write copy
5D4000
heap
page read and write
349E000
stack
page read and write
C22000
heap
page read and write
15AF000
unkown
page execute and read and write
B80000
direct allocation
page read and write
7B6D000
heap
page read and write
A14000
heap
page read and write
7634000
heap
page read and write
E27000
unkown
page write copy
5D4000
heap
page read and write
1042000
unkown
page execute and read and write
78CC000
heap
page read and write
7A18000
heap
page read and write
7883000
heap
page read and write
7605000
heap
page read and write
7634000
heap
page read and write
10D3000
unkown
page execute and read and write
5D4000
heap
page read and write
4990000
direct allocation
page execute and read and write
9E4000
heap
page read and write
764B000
heap
page read and write
34DE000
stack
page read and write
A14000
heap
page read and write
FE0000
direct allocation
page read and write
3FDE000
stack
page read and write
7516000
heap
page read and write
7A28000
heap
page read and write
347F000
stack
page read and write
49B0000
direct allocation
page execute and read and write
7A24000
heap
page read and write
753E000
heap
page read and write
74DF000
stack
page read and write
752A000
heap
page read and write
7A59000
heap
page read and write
2A9F000
stack
page read and write
7A05000
heap
page read and write
7667000
heap
page read and write
4D41000
heap
page read and write
3FDF000
stack
page read and write
764B000
heap
page read and write
76CD000
stack
page read and write
4D50000
direct allocation
page execute and read and write
7615000
heap
page read and write
44E1000
heap
page read and write
766A000
heap
page read and write
1183000
unkown
page execute and read and write
7602000
heap
page read and write
75FD000
heap
page read and write
40FF000
stack
page read and write
70C000
heap
page read and write
764B000
heap
page read and write
44E1000
heap
page read and write
DFA000
heap
page read and write
7961000
heap
page read and write
79C4000
heap
page read and write
4AF9000
heap
page read and write
5070000
remote allocation
page read and write
7A0C000
heap
page read and write
4AFE000
stack
page read and write
7A18000
heap
page read and write
719000
heap
page read and write
7A19000
heap
page read and write
5200000
direct allocation
page execute and read and write
7538000
heap
page read and write
787B000
heap
page read and write
66F000
heap
page read and write
7873000
heap
page read and write
3D3F000
stack
page read and write
45FF000
stack
page read and write
7A17000
heap
page read and write
774E000
heap
page read and write
4FCE000
stack
page read and write
7873000
heap
page read and write
764A000
heap
page read and write
574000
heap
page read and write
7D50000
trusted library allocation
page read and write
7A27000
heap
page read and write
EC0000
unkown
page readonly
9E4000
heap
page read and write
5300000
direct allocation
page execute and read and write
7DE4000
heap
page read and write
764F000
heap
page read and write
574000
heap
page read and write
1050000
unkown
page read and write
343F000
stack
page read and write
7A2A000
heap
page read and write
764B000
heap
page read and write
49B0000
direct allocation
page execute and read and write
1488000
unkown
page execute and write copy
7A56000
heap
page read and write
4D10000
direct allocation
page read and write
FCE000
stack
page read and write
7634000
heap
page read and write
44BF000
stack
page read and write
7986000
heap
page read and write
7B6A000
heap
page read and write
7A17000
heap
page read and write
DDE000
stack
page read and write
762A000
heap
page read and write
4A70000
direct allocation
page execute and read and write
72FF000
stack
page read and write
A14000
heap
page read and write
2FBE000
stack
page read and write
7871000
heap
page read and write
AA0000
heap
page read and write
A14000
heap
page read and write
7A7F000
heap
page read and write
7634000
heap
page read and write
4D41000
heap
page read and write
6F9D000
stack
page read and write
7A08000
heap
page read and write
783B000
heap
page read and write
75D0000
heap
page read and write
75DD000
heap
page read and write
70AF000
heap
page read and write
44E1000
heap
page read and write
2B1F000
stack
page read and write
15B8000
unkown
page execute and write copy
44E1000
heap
page read and write
764B000
heap
page read and write
2F9F000
stack
page read and write
7651000
heap
page read and write
79D2000
heap
page read and write
10BC000
unkown
page execute and read and write
9E4000
heap
page read and write
4D60000
direct allocation
page execute and read and write
3F9F000
stack
page read and write
40DF000
stack
page read and write
BFE000
stack
page read and write
954000
heap
page read and write
44DE000
stack
page read and write
2FE9000
direct allocation
page read and write
9E4000
heap
page read and write
755000
heap
page read and write
45FE000
stack
page read and write
7A35000
heap
page read and write
7ACB000
heap
page read and write
75FD000
heap
page read and write
49A1000
heap
page read and write
761F000
heap
page read and write
4E60000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
BE5000
heap
page read and write
7871000
heap
page read and write
75E0000
trusted library allocation
page read and write
2E5F000
stack
page read and write
79CC000
heap
page read and write
49D0000
direct allocation
page execute and read and write
148C000
unkown
page execute and write copy
7632000
heap
page read and write
7634000
heap
page read and write
4881000
heap
page read and write
5C0000
direct allocation
page read and write
7A17000
heap
page read and write
752B000
heap
page read and write
7A27000
heap
page read and write
752D000
heap
page read and write
765C000
heap
page read and write
44E1000
heap
page read and write
FF0000
unkown
page readonly
E5C000
stack
page read and write
7A18000
heap
page read and write
7532000
heap
page read and write
7870000
trusted library allocation
page read and write
E00000
heap
page read and write
761F000
heap
page read and write
44E1000
heap
page read and write
5D4000
heap
page read and write
4970000
direct allocation
page execute and read and write
44E1000
heap
page read and write
64E000
heap
page read and write
791B000
heap
page read and write
A14000
heap
page read and write
748F000
stack
page read and write
44E1000
heap
page read and write
784A000
heap
page read and write
ECE000
stack
page read and write
335F000
stack
page read and write
49B0000
direct allocation
page execute and read and write
12F4000
unkown
page execute and write copy
7518000
heap
page read and write
4D41000
heap
page read and write
7D5C000
heap
page read and write
7632000
heap
page read and write
2C9F000
stack
page read and write
74F0000
heap
page read and write
7A17000
heap
page read and write
7632000
heap
page read and write
75D3000
heap
page read and write
AD7000
heap
page read and write
7B60000
heap
page read and write
1180000
unkown
page read and write
788D000
heap
page read and write
7D1F000
stack
page read and write
7870000
trusted library allocation
page read and write
7D68000
heap
page read and write
7A27000
heap
page read and write
A14000
heap
page read and write
44E1000
heap
page read and write
3E7F000
stack
page read and write
415E000
stack
page read and write
79FC000
heap
page read and write
7BB0000
remote allocation
page read and write
7A05000
heap
page read and write
7A33000
heap
page read and write
7A19000
heap
page read and write
7992000
heap
page read and write
B80000
direct allocation
page read and write
752A000
heap
page read and write
4881000
heap
page read and write
7668000
heap
page read and write
4E90000
direct allocation
page execute and read and write
762A000
heap
page read and write
794E000
stack
page read and write
349F000
stack
page read and write
3EDE000
stack
page read and write
439E000
stack
page read and write
4D3F000
stack
page read and write
DE5000
heap
page read and write
E9E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
752B000
heap
page read and write
7634000
heap
page read and write
7C1E000
stack
page read and write
7A1B000
heap
page read and write
7EB8000
heap
page read and write
752E000
heap
page read and write
126C000
unkown
page execute and write copy
764A000
heap
page read and write
752C000
heap
page read and write
762A000
heap
page read and write
79EE000
heap
page read and write
7D60000
heap
page read and write
A14000
heap
page read and write
762A000
heap
page read and write
7871000
heap
page read and write
761F000
heap
page read and write
BE1000
heap
page read and write
752A000
heap
page read and write
473E000
stack
page read and write
7ACD000
heap
page read and write
1423000
unkown
page execute and read and write
5D4000
heap
page read and write
7A4F000
stack
page read and write
764A000
heap
page read and write
7961000
heap
page read and write
7925000
heap
page read and write
7683000
heap
page read and write
7832000
heap
page read and write
4D41000
heap
page read and write
765A000
heap
page read and write
49A1000
heap
page read and write
950000
heap
page read and write
7544000
heap
page read and write
79DF000
heap
page read and write
7C17000
heap
page read and write
7651000
heap
page read and write
7F54000
heap
page read and write
7D50000
trusted library allocation
page read and write
7677000
heap
page read and write
3E9F000
stack
page read and write
4881000
heap
page read and write
4AE1000
direct allocation
page read and write
1CA000
stack
page read and write
371F000
stack
page read and write
10D3000
unkown
page execute and write copy
7632000
heap
page read and write
79CF000
heap
page read and write
2ADE000
stack
page read and write
2FE6000
direct allocation
page read and write
7AC1000
heap
page read and write
EC0000
unkown
page read and write
7871000
heap
page read and write
44E1000
heap
page read and write
C90000
direct allocation
page execute and read and write
7A2F000
heap
page read and write
7632000
heap
page read and write
44E1000
heap
page read and write
148B000
unkown
page execute and read and write
7892000
heap
page read and write
79D2000
heap
page read and write
C2F000
heap
page read and write
7D88000
heap
page read and write
7601000
heap
page read and write
4C90000
heap
page read and write
7871000
heap
page read and write
487E000
stack
page read and write
7608000
heap
page read and write
7A4A000
heap
page read and write
7A42000
heap
page read and write
5190000
heap
page read and write
BE8000
heap
page read and write
5200000
direct allocation
page execute and read and write
EA0000
direct allocation
page read and write
766E000
stack
page read and write
7A27000
heap
page read and write
4881000
heap
page read and write
31DF000
stack
page read and write
4A40000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
44E1000
heap
page read and write
345F000
stack
page read and write
4980000
direct allocation
page execute and read and write
75D9000
heap
page read and write
574000
heap
page read and write
3E3F000
stack
page read and write
7AA1000
heap
page read and write
766A000
heap
page read and write
9E4000
heap
page read and write
44E1000
heap
page read and write
5310000
direct allocation
page execute and read and write
7B60000
heap
page read and write
7AAE000
stack
page read and write
4E30000
direct allocation
page execute and read and write
2D1F000
stack
page read and write
7601000
heap
page read and write
4D41000
heap
page read and write
7606000
heap
page read and write
170000
heap
page read and write
107F000
unkown
page execute and read and write
1414000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
49A1000
heap
page read and write
7E71000
heap
page read and write
7661000
heap
page read and write
76A6000
heap
page read and write
49A1000
heap
page read and write
7601000
heap
page read and write
1423000
unkown
page execute and read and write
2FE0000
direct allocation
page read and write
753F000
heap
page read and write
7871000
heap
page read and write
49B0000
direct allocation
page execute and read and write
76DF000
heap
page read and write
752A000
heap
page read and write
79F2000
heap
page read and write
7A2C000
heap
page read and write
7960000
trusted library allocation
page read and write
7925000
heap
page read and write
2E9E000
stack
page read and write
7AA1000
heap
page read and write
CFC000
stack
page read and write
709F000
heap
page read and write
1302000
unkown
page execute and read and write
7D50000
trusted library allocation
page read and write
37FF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4A20000
direct allocation
page execute and read and write
7638000
heap
page read and write
76CF000
stack
page read and write
DDE000
heap
page read and write
30DF000
stack
page read and write
787C000
heap
page read and write
51F0000
direct allocation
page execute and read and write
6F3C000
stack
page read and write
5180000
trusted library allocation
page read and write
771F000
stack
page read and write
3B1D000
stack
page read and write
3FFE000
stack
page read and write
7944000
heap
page read and write
7D5F000
heap
page read and write
3EBE000
stack
page read and write
7D66000
heap
page read and write
627000
heap
page read and write
78D8000
heap
page read and write
7D5C000
heap
page read and write
79B5000
heap
page read and write
117D000
unkown
page read and write
A14000
heap
page read and write
763F000
heap
page read and write
9E4000
heap
page read and write
4F9000
stack
page read and write
739D000
stack
page read and write
574000
heap
page read and write
7A1C000
heap
page read and write
7665000
heap
page read and write
75ED000
heap
page read and write
4F40000
direct allocation
page execute and read and write
762A000
heap
page read and write
762A000
heap
page read and write
77E000
heap
page read and write
7D51000
heap
page read and write
7A19000
heap
page read and write
79F0000
heap
page read and write
762A000
heap
page read and write
7A24000
heap
page read and write
75EB000
heap
page read and write
4F10000
direct allocation
page execute and read and write
BFE000
heap
page read and write
762A000
heap
page read and write
49A1000
heap
page read and write
311E000
stack
page read and write
79B5000
heap
page read and write
574000
heap
page read and write
520D000
stack
page read and write
7A30000
heap
page read and write
3D5F000
stack
page read and write
76A1000
heap
page read and write
1488000
unkown
page execute and write copy
1485000
unkown
page execute and write copy
49A0000
heap
page read and write
7960000
trusted library allocation
page read and write
1423000
unkown
page execute and write copy
7675000
heap
page read and write
4E40000
direct allocation
page execute and read and write
76D1000
heap
page read and write
44E1000
heap
page read and write
7D51000
heap
page read and write
4881000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
12F3000
unkown
page execute and read and write
7653000
heap
page read and write
70BE000
stack
page read and write
C82000
heap
page read and write
5260000
direct allocation
page execute and read and write
5D4000
heap
page read and write
7D51000
heap
page read and write
761F000
heap
page read and write
12E4000
unkown
page execute and read and write
78CC000
heap
page read and write
7A18000
heap
page read and write
78B6000
heap
page read and write
753A000
heap
page read and write
7DE7000
heap
page read and write
761F000
heap
page read and write
C06000
heap
page read and write
506D000
stack
page read and write
E28000
heap
page read and write
39BE000
stack
page read and write
773A000
heap
page read and write
73B000
heap
page read and write
4D50000
direct allocation
page execute and read and write
7925000
heap
page read and write
954000
heap
page read and write
15BC000
unkown
page execute and write copy
6EA000
heap
page read and write
774A000
heap
page read and write
A14000
heap
page read and write
5FE000
heap
page read and write
6EE000
heap
page read and write
72B000
heap
page read and write
B9B000
heap
page read and write
760A000
heap
page read and write
7D51000
heap
page read and write
7551000
heap
page read and write
7A27000
heap
page read and write
7A18000
heap
page read and write
7A19000
heap
page read and write
677000
heap
page read and write
7370000
remote allocation
page read and write
761F000
heap
page read and write
7D51000
heap
page read and write
331F000
stack
page read and write
7A35000
heap
page read and write
767A000
heap
page read and write
764A000
heap
page read and write
321F000
stack
page read and write
439F000
stack
page read and write
954000
heap
page read and write
7D4000
heap
page read and write
74FF000
heap
page read and write
4D41000
heap
page read and write
15B8000
unkown
page execute and write copy
574000
heap
page read and write
7960000
trusted library allocation
page read and write
5D4000
heap
page read and write
7555000
heap
page read and write
7601000
heap
page read and write
49A1000
heap
page read and write
44E1000
heap
page read and write
4A10000
direct allocation
page execute and read and write
5D0000
heap
page read and write
4881000
heap
page read and write
75E6000
heap
page read and write
574000
heap
page read and write
78A3000
heap
page read and write
4D41000
heap
page read and write
75E1000
heap
page read and write
75DF000
stack
page read and write
574000
heap
page read and write
7AC0000
trusted library allocation
page read and write
7634000
heap
page read and write
761F000
heap
page read and write
4970000
direct allocation
page execute and read and write
79D2000
heap
page read and write
4D41000
heap
page read and write
752B000
heap
page read and write
7606000
heap
page read and write
7F56000
heap
page read and write
4920000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
C7E000
stack
page read and write
7656000
heap
page read and write
7A27000
heap
page read and write
791B000
heap
page read and write
44E1000
heap
page read and write
C8D000
heap
page read and write
764A000
heap
page read and write
397F000
stack
page read and write
764A000
heap
page read and write
49A0000
direct allocation
page execute and read and write
15BB000
unkown
page execute and read and write
357F000
stack
page read and write
3C1E000
stack
page read and write
777E000
stack
page read and write
7870000
trusted library allocation
page read and write
7A24000
heap
page read and write
760A000
heap
page read and write
768F000
heap
page read and write
764A000
heap
page read and write
761E000
stack
page read and write
78BE000
heap
page read and write
7A6B000
heap
page read and write
7A7E000
heap
page read and write
3D3E000
stack
page read and write
3FBF000
stack
page read and write
7960000
heap
page read and write
44E1000
heap
page read and write
7A27000
heap
page read and write
7871000
heap
page read and write
9C0000
heap
page read and write
4AF6000
heap
page read and write
4920000
trusted library allocation
page read and write
74FE000
heap
page read and write
7E73000
heap
page read and write
79BF000
heap
page read and write
7632000
heap
page read and write
2F5F000
stack
page read and write
A14000
heap
page read and write
BE3000
heap
page read and write
D8E000
heap
page read and write
7887000
heap
page read and write
4E30000
direct allocation
page execute and read and write
7D50000
trusted library allocation
page read and write
1414000
unkown
page execute and read and write
79F1000
heap
page read and write
2E9E000
stack
page read and write
954000
heap
page read and write
9E4000
heap
page read and write
7D60000
heap
page read and write
411E000
stack
page read and write
7602000
heap
page read and write
36FF000
stack
page read and write
44E1000
heap
page read and write
7A1E000
heap
page read and write
4A40000
direct allocation
page execute and read and write
79D2000
heap
page read and write
35DF000
stack
page read and write
44BE000
stack
page read and write
44E1000
heap
page read and write
7602000
heap
page read and write
788D000
heap
page read and write
761F000
heap
page read and write
574000
heap
page read and write
721000
heap
page read and write
5D4000
heap
page read and write
7925000
heap
page read and write
4AB5000
heap
page read and write
752C000
heap
page read and write
75EB000
heap
page read and write
2900000
direct allocation
page execute and read and write
4AEE000
stack
page read and write
2FDE000
stack
page read and write
7C2D000
heap
page read and write
4D41000
heap
page read and write
7695000
heap
page read and write
7A05000
heap
page read and write
787C000
heap
page read and write
497F000
stack
page read and write
79F2000
heap
page read and write
4881000
heap
page read and write
5C0000
direct allocation
page read and write
5280000
direct allocation
page execute and read and write
79B5000
heap
page read and write
79EE000
heap
page read and write
721F000
stack
page read and write
3ADF000
stack
page read and write
7C1F000
heap
page read and write
35DE000
stack
page read and write
764B000
heap
page read and write
7537000
heap
page read and write
7A1B000
heap
page read and write
767F000
heap
page read and write
7A17000
heap
page read and write
753A000
heap
page read and write
5D4000
heap
page read and write
381F000
stack
page read and write
574000
heap
page read and write
A14000
heap
page read and write
423E000
stack
page read and write
375E000
stack
page read and write
4970000
direct allocation
page execute and read and write
7961000
heap
page read and write
7F6D000
heap
page read and write
4969000
direct allocation
page read and write
9E4000
heap
page read and write
A14000
heap
page read and write
4881000
heap
page read and write
44E1000
heap
page read and write
49A0000
direct allocation
page execute and read and write
EC1000
unkown
page execute and read and write
5200000
direct allocation
page execute and read and write
44E1000
heap
page read and write
761F000
heap
page read and write
44F1000
heap
page read and write
7651000
heap
page read and write
752B000
heap
page read and write
697000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
7870000
trusted library allocation
page read and write
7A17000
heap
page read and write
7531000
heap
page read and write
7960000
trusted library allocation
page read and write
287F000
stack
page read and write
79E0000
heap
page read and write
4E40000
direct allocation
page execute and read and write
7961000
heap
page read and write
A9F000
stack
page read and write
1485000
unkown
page execute and write copy
4DA0000
direct allocation
page execute and read and write
5080000
heap
page read and write
104D000
unkown
page read and write
7AA1000
heap
page read and write
63E000
heap
page read and write
7675000
heap
page read and write
7B6C000
heap
page read and write
2D7F000
stack
page read and write
7A35000
heap
page read and write
766A000
heap
page read and write
9E4000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
C9B000
heap
page read and write
753E000
heap
page read and write
7D50000
trusted library allocation
page read and write
5D4000
heap
page read and write
FB2000
unkown
page execute and read and write
3C1F000
stack
page read and write
4C2E000
stack
page read and write
75FC000
heap
page read and write
764B000
heap
page read and write
44E1000
heap
page read and write
E27000
unkown
page read and write
4881000
heap
page read and write
7DE7000
heap
page read and write
7A05000
heap
page read and write
FD0000
direct allocation
page read and write
7D51000
heap
page read and write
7532000
heap
page read and write
44E1000
heap
page read and write
954000
heap
page read and write
7DF3000
heap
page read and write
9E4000
heap
page read and write
766A000
heap
page read and write
4881000
heap
page read and write
5D4000
heap
page read and write
7D0000
heap
page read and write
752F000
heap
page read and write
7982000
heap
page read and write
140C000
unkown
page execute and read and write
5F0000
heap
page read and write
7A0B000
heap
page read and write
4881000
heap
page read and write
9E4000
heap
page read and write
7320000
remote allocation
page read and write
4881000
heap
page read and write
7895000
heap
page read and write
762A000
heap
page read and write
A14000
heap
page read and write
5E0000
direct allocation
page read and write
7654000
heap
page read and write
762A000
heap
page read and write
7943000
heap
page read and write
44E1000
heap
page read and write
7DEE000
heap
page read and write
7377000
heap
page read and write
7961000
heap
page read and write
44E1000
heap
page read and write
4D50000
direct allocation
page execute and read and write
4966000
direct allocation
page read and write
7DE4000
heap
page read and write
4A90000
direct allocation
page execute and read and write
B9A000
heap
page read and write
B80000
direct allocation
page read and write
BD3000
heap
page read and write
A14000
heap
page read and write
954000
heap
page read and write
7632000
heap
page read and write
75FD000
heap
page read and write
32FF000
stack
page read and write
7927000
heap
page read and write
7632000
heap
page read and write
3E5F000
stack
page read and write
757F000
heap
page read and write
75EB000
heap
page read and write
7A8E000
stack
page read and write
1177000
unkown
page write copy
7A19000
heap
page read and write
75FF000
heap
page read and write
36DF000
stack
page read and write
764B000
heap
page read and write
954000
heap
page read and write
79FB000
heap
page read and write
9E4000
heap
page read and write
2E5F000
stack
page read and write
CA0000
unkown
page readonly
4E10000
direct allocation
page execute and read and write
7A33000
heap
page read and write
361E000
stack
page read and write
4D41000
heap
page read and write
147F000
unkown
page execute and read and write
7D50000
trusted library allocation
page read and write
7651000
heap
page read and write
B1D000
heap
page read and write
2CDB000
stack
page read and write
7642000
heap
page read and write
44E1000
heap
page read and write
483F000
stack
page read and write
75E0000
trusted library allocation
page read and write
738E000
stack
page read and write
7D5C000
heap
page read and write
7DF2000
heap
page read and write
762A000
heap
page read and write
760A000
heap
page read and write
7695000
heap
page read and write
4D41000
heap
page read and write
574000
heap
page read and write
7960000
trusted library allocation
page read and write
7AA5000
heap
page read and write
753E000
heap
page read and write
7A17000
heap
page read and write
787F000
stack
page read and write
44E1000
heap
page read and write
4980000
direct allocation
page execute and read and write
574000
heap
page read and write
792A000
heap
page read and write
7DE7000
heap
page read and write
5D4000
heap
page read and write
44E1000
heap
page read and write
79FC000
heap
page read and write
72F000
heap
page read and write
EA0000
direct allocation
page read and write
There are 2193 hidden memdumps, click here to show them.