IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AEHIDAKECFIEBGDHJEBK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AFBFHDBKJEGHJJJKFIIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKECBAKFBGDGCBGDBAECAKJJEC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBGHDGHCGHCAAKFIIECFHCFBFC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HDGIEBGHDAEBGDGCFIID
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\IIEBGIDA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKKFIIEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 73
ASCII text, with very long lines (804)
downloaded
Chrome Cache Entry: 74
ASCII text
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 77
gzip compressed data, original size modulo 2^32 173904
downloaded
Chrome Cache Entry: 78
data
downloaded
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 --field-trial-handle=2428,i,9357800286788744826,14473933952351811652,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.phpRF
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://google-ohttp-relay-join.fastly-edge.com/(
unknown
https://duckduckgo.com/ac/?q=
unknown
https://google-ohttp-relay-join.fastly-edge.com/.
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://google-ohttp-relay-join.fastly-edge.com/5
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://google-ohttp-relay-join.fastly-edge.com/;
unknown
https://issuetracker.google.com/284462263
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dllO
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
http://185.215.113.206/6c4adf523b719729.phpenSSH
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://google-ohttp-relay-join.fastly-edge.com/d
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dllC
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://i.pki.goog/r1.crt0
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dll0m
unknown
https://issuetracker.google.com/161903006
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
http://i.pki.goog/wr2.crt0
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.186.174
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico4/7
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/%
unknown
http://unisolated.invalid/a
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://185.215.113.206/6c4adf523b719729.phpcal
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.186.174
play.google.com
216.58.206.46
www.google.com
142.250.185.132
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.186.174
plus.l.google.com
United States
142.250.185.132
www.google.com
United States
216.58.206.46
play.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
10AE000
heap
page read and write
malicious
2A1000
unkown
page execute and read and write
malicious
4D00000
direct allocation
page read and write
malicious
2F340554C000
trusted library allocation
page read and write
2F3405328000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
705800217000
direct allocation
page read and write
3C3E000
stack
page read and write
4E3400274000
trusted library allocation
page read and write
2F3404CD0000
trusted library allocation
page read and write
40FF000
stack
page read and write
2C70A9F1000
heap
page read and write
EB4000
heap
page read and write
2F3406E8C000
trusted library allocation
page read and write
1D34F000
heap
page read and write
2F3404704000
trusted library allocation
page read and write
705800244000
direct allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405290000
trusted library allocation
page read and write
2F3404CA8000
trusted library allocation
page read and write
2F3404704000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70AA0A000
heap
page read and write
2C70D130000
trusted library allocation
page read and write
2F34046B7000
trusted library allocation
page read and write
2884006C8000
trusted library allocation
page read and write
4881000
heap
page read and write
2884006AC000
trusted library allocation
page read and write
2F3406054000
trusted library allocation
page read and write
2F3402C01000
trusted library allocation
page read and write
2F34053C6000
trusted library allocation
page read and write
1080000
direct allocation
page read and write
2C70AA0A000
heap
page read and write
28840080C000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
2884006E8000
trusted library allocation
page read and write
1D34E000
heap
page read and write
2C70AA0E000
heap
page read and write
C720DFE000
stack
page read and write
6C887000
unkown
page read and write
2F34058A8000
trusted library allocation
page read and write
2884007C8000
trusted library allocation
page read and write
C722DFE000
stack
page read and write
2F3407001000
trusted library allocation
page read and write
2F340480C000
trusted library allocation
page read and write
2F3406B20000
trusted library allocation
page read and write
2F340473C000
trusted library allocation
page read and write
2F3405E01000
trusted library allocation
page read and write
4E3400248000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
4E34002C8000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F340536C000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3404C88000
trusted library allocation
page read and write
2F340614D000
trusted library allocation
page read and write
6F902000
unkown
page readonly
234E0000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
4881000
heap
page read and write
4E3400230000
trusted library allocation
page read and write
1188000
heap
page read and write
4E34002A4000
trusted library allocation
page read and write
2F3402401000
trusted library allocation
page read and write
2C710B67000
unclassified section
page read and write
2C707640000
trusted library section
page readonly
EB4000
heap
page read and write
2F3405ABC000
trusted library allocation
page read and write
2C70AA01000
heap
page read and write
2C70A9FF000
heap
page read and write
3BFF000
stack
page read and write
2F3404704000
trusted library allocation
page read and write
2C70AF59000
heap
page read and write
2346A000
heap
page read and write
2F3405328000
trusted library allocation
page read and write
2F3404A84000
trusted library allocation
page read and write
2F3405884000
trusted library allocation
page read and write
2F3405C94000
trusted library allocation
page read and write
2F34045E8000
trusted library allocation
page read and write
4881000
heap
page read and write
116F000
heap
page read and write
3FFE000
stack
page read and write
2F3402601000
trusted library allocation
page read and write
4E34002A4000
trusted library allocation
page read and write
2F3405DD4000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2C70AA01000
heap
page read and write
2F34050B8000
trusted library allocation
page read and write
C7275FE000
unkown
page readonly
C73A5FE000
unkown
page readonly
2F3405E1C000
trusted library allocation
page read and write
2357C000
heap
page read and write
2F3405DEC000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
705800274000
direct allocation
page read and write
2F3404E01000
trusted library allocation
page read and write
28840085C000
trusted library allocation
page read and write
4881000
heap
page read and write
2C70AA07000
heap
page read and write
28840069C000
trusted library allocation
page read and write
3FBF000
stack
page read and write
2C70A9FF000
heap
page read and write
2C70AA05000
heap
page read and write
2C70AA07000
heap
page read and write
2F3405F03000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
1D2AC000
stack
page read and write
2C70A9FF000
heap
page read and write
2F34045EC000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2F3405F94000
trusted library allocation
page read and write
4E34002A0000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
4E3400294000
trusted library allocation
page read and write
1D340000
heap
page read and write
2F3406088000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2C70A9F4000
heap
page read and write
44BF000
stack
page read and write
2F34060DC000
trusted library allocation
page read and write
2F3405DF0000
trusted library allocation
page read and write
2C7073D0000
trusted library allocation
page read and write
2F3405F30000
trusted library allocation
page read and write
2C70A9F1000
heap
page read and write
2884002FC000
trusted library allocation
page read and write
705800284000
direct allocation
page read and write
2C70AA0A000
heap
page read and write
1D354000
heap
page read and write
EB4000
heap
page read and write
2F34050D4000
trusted library allocation
page read and write
1D334000
heap
page read and write
2F3404EDC000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3405DB0000
trusted library allocation
page read and write
1179000
heap
page read and write
44A000
unkown
page execute and read and write
2C70AFB0000
heap
page read and write
2C70AF53000
heap
page read and write
387E000
stack
page read and write
2F3404698000
trusted library allocation
page read and write
2C70AA05000
heap
page read and write
2F3403001000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2C70A9F9000
heap
page read and write
1164000
heap
page read and write
2F3404B24000
trusted library allocation
page read and write
2F3405DD8000
trusted library allocation
page read and write
1D06D000
stack
page read and write
2F3404618000
trusted library allocation
page read and write
EB4000
heap
page read and write
4881000
heap
page read and write
2F3406143000
trusted library allocation
page read and write
2F3406014000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
6C7E1000
unkown
page execute read
2F3406EF7000
trusted library allocation
page read and write
C7215FE000
unkown
page readonly
2F3406604000
trusted library allocation
page read and write
1D320000
heap
page read and write
288400734000
trusted library allocation
page read and write
1D340000
heap
page read and write
2C70A9F9000
heap
page read and write
C734DFE000
stack
page read and write
C7105FE000
unkown
page readonly
705800230000
direct allocation
page read and write
2C70A9F9000
heap
page read and write
2C70AA0A000
heap
page read and write
2F3406E4A000
trusted library allocation
page read and write
2884006EC000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
C71CDFE000
stack
page read and write
2F3404AE0000
trusted library allocation
page read and write
2F340502C000
trusted library allocation
page read and write
2F3405C8C000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2F3404D1C000
trusted library allocation
page read and write
2F34048AC000
trusted library allocation
page read and write
2F340480C000
trusted library allocation
page read and write
2884006FC000
trusted library allocation
page read and write
2F340473C000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
EB4000
heap
page read and write
2C70AA04000
heap
page read and write
2F34072E4000
trusted library allocation
page read and write
C7295FE000
unkown
page readonly
2F3406070000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
2C70A9F3000
heap
page read and write
2F3404ECC000
trusted library allocation
page read and write
EB4000
heap
page read and write
2F34045D0000
trusted library allocation
page read and write
4E34002C0000
trusted library allocation
page read and write
2F3405034000
trusted library allocation
page read and write
C7385FE000
unkown
page readonly
2C70AA2E000
heap
page read and write
288400320000
trusted library allocation
page read and write
C71D5FE000
unkown
page readonly
2F3406FD0000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2884006BC000
trusted library allocation
page read and write
2C70AA01000
heap
page read and write
2F3404ACC000
trusted library allocation
page read and write
2F3404630000
trusted library allocation
page read and write
1D326000
heap
page read and write
2F3405C5C000
trusted library allocation
page read and write
288400758000
trusted library allocation
page read and write
2884006E0000
trusted library allocation
page read and write
2F3405BA8000
trusted library allocation
page read and write
C737DFE000
stack
page read and write
2C70A9FF000
heap
page read and write
1D337000
heap
page read and write
2C70AA0A000
heap
page read and write
2C70A9F3000
heap
page read and write
2F3404B24000
trusted library allocation
page read and write
2F34060D8000
trusted library allocation
page read and write
2C70A9ED000
heap
page read and write
2C70A9F9000
heap
page read and write
2C70AA07000
heap
page read and write
2F3405FD4000
trusted library allocation
page read and write
2F3404698000
trusted library allocation
page read and write
2F3406028000
trusted library allocation
page read and write
2884006B4000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
2C70AA07000
heap
page read and write
2F340473C000
trusted library allocation
page read and write
2F3404694000
trusted library allocation
page read and write
427E000
stack
page read and write
2F3404DEF000
trusted library allocation
page read and write
4E34002A0000
trusted library allocation
page read and write
82A000
unkown
page execute and write copy
2F340603C000
trusted library allocation
page read and write
2884006D0000
trusted library allocation
page read and write
1CEDF000
stack
page read and write
35BF000
stack
page read and write
118F000
heap
page read and write
2C70AA20000
heap
page read and write
C71E5FE000
unkown
page readonly
2F34056BE000
trusted library allocation
page read and write
9C5000
unkown
page execute and read and write
2F3405C28000
trusted library allocation
page read and write
2F34051B9000
trusted library allocation
page read and write
2F3405C74000
trusted library allocation
page read and write
2F3405AC8000
trusted library allocation
page read and write
1D33A000
heap
page read and write
2C70A9F3000
heap
page read and write
4881000
heap
page read and write
2C70EBF2000
trusted library allocation
page read and write
2F3404E3C000
trusted library allocation
page read and write
2F340479C000
trusted library allocation
page read and write
2F3405F28000
trusted library allocation
page read and write
2F340527C000
trusted library allocation
page read and write
2884006CC000
trusted library allocation
page read and write
2F3405CF4000
trusted library allocation
page read and write
2C70AF5B000
heap
page read and write
2F3406E66000
trusted library allocation
page read and write
2C70A9FA000
heap
page read and write
2C70A9FF000
heap
page read and write
2C70A9FF000
heap
page read and write
44FE000
stack
page read and write
2F34058CC000
trusted library allocation
page read and write
2F3404744000
trusted library allocation
page read and write
7058002E4000
direct allocation
page read and write
2C70A9FF000
heap
page read and write
288400320000
trusted library allocation
page read and write
4881000
heap
page read and write
2C70A9F1000
heap
page read and write
C712DFD000
stack
page read and write
2C70AA05000
heap
page read and write
2F3404B20000
trusted library allocation
page read and write
2F3405D84000
trusted library allocation
page read and write
2F3405728000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
288400664000
trusted library allocation
page read and write
2F3405F78000
trusted library allocation
page read and write
2F340443C000
trusted library allocation
page read and write
2C70AA3F000
heap
page read and write
EB4000
heap
page read and write
C7335FE000
unkown
page readonly
2F3405288000
trusted library allocation
page read and write
2C70A9F1000
heap
page read and write
2C70AF75000
heap
page read and write
2C711A7D000
trusted library section
page read and write
2C70A9FF000
heap
page read and write
2F3405F64000
trusted library allocation
page read and write
2F3405034000
trusted library allocation
page read and write
2F34053C0000
trusted library allocation
page read and write
2F34050EA000
trusted library allocation
page read and write
1080000
direct allocation
page read and write
C71ADFE000
stack
page read and write
2F34045B4000
trusted library allocation
page read and write
2F3405D90000
trusted library allocation
page read and write
2F3404F78000
trusted library allocation
page read and write
2F3405118000
trusted library allocation
page read and write
4881000
heap
page read and write
28840075C000
trusted library allocation
page read and write
2F34051B4000
trusted library allocation
page read and write
2F3406040000
trusted library allocation
page read and write
2F3405C01000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
1D430000
trusted library allocation
page read and write
2F34045D8000
trusted library allocation
page read and write
1D345000
heap
page read and write
2F340644F000
trusted library allocation
page read and write
4881000
heap
page read and write
2F3405F88000
trusted library allocation
page read and write
2C70AA01000
heap
page read and write
C71B5FE000
unkown
page readonly
2F34048F0000
trusted library allocation
page read and write
4881000
heap
page read and write
2F340606C000
trusted library allocation
page read and write
288400368000
trusted library allocation
page read and write
C7145FE000
unkown
page readonly
2F3405B7C000
trusted library allocation
page read and write
233A0000
heap
page read and write
2F3405904000
trusted library allocation
page read and write
2F34060C0000
trusted library allocation
page read and write
2F3405334000
trusted library allocation
page read and write
2F34056D0000
trusted library allocation
page read and write
288400248000
trusted library allocation
page read and write
2C70AF57000
heap
page read and write
2F3404E80000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F3404704000
trusted library allocation
page read and write
2F3405584000
trusted library allocation
page read and write
4E34002C0000
trusted library allocation
page read and write
2F340460C000
trusted library allocation
page read and write
EB4000
heap
page read and write
288400640000
trusted library allocation
page read and write
3AFE000
stack
page read and write
2C70AFC0000
trusted library section
page read and write
2F3404704000
trusted library allocation
page read and write
C711DFE000
stack
page read and write
2F3405EF8000
trusted library allocation
page read and write
1D357000
heap
page read and write
2F3404F38000
trusted library allocation
page read and write
3E7F000
stack
page read and write
2C70AA20000
heap
page read and write
31FF000
stack
page read and write
383F000
stack
page read and write
2F3404C94000
trusted library allocation
page read and write
2F34057B0000
trusted library allocation
page read and write
2C70746D000
heap
page read and write
705800250000
direct allocation
page read and write
4980000
trusted library allocation
page read and write
1D31D000
heap
page read and write
2BFC000
stack
page read and write
2C70AA05000
heap
page read and write
2F34061D8000
trusted library allocation
page read and write
288400418000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
C7205FE000
unkown
page readonly
2C70A9ED000
heap
page read and write
2C70AA0A000
heap
page read and write
2F34056D7000
trusted library allocation
page read and write
2F3405D98000
trusted library allocation
page read and write
2F340501C000
trusted library allocation
page read and write
4E34002F0000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2AB0000
heap
page read and write
1D31B000
heap
page read and write
2F340537C000
trusted library allocation
page read and write
2F34060D4000
trusted library allocation
page read and write
4881000
heap
page read and write
1080000
direct allocation
page read and write
2F34061AC000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70AA0A000
heap
page read and write
2F34060A0000
trusted library allocation
page read and write
2F3404B70000
trusted library allocation
page read and write
2F340587D000
trusted library allocation
page read and write
2F3404528000
trusted library allocation
page read and write
2F3405738000
trusted library allocation
page read and write
2C70A9EA000
heap
page read and write
2F3406010000
trusted library allocation
page read and write
C72E5FE000
unkown
page readonly
2F3406184000
trusted library allocation
page read and write
7058002A8000
direct allocation
page read and write
2F3405320000
trusted library allocation
page read and write
2F3405B78000
trusted library allocation
page read and write
2F3404964000
trusted library allocation
page read and write
2C70A9FD000
heap
page read and write
2F3404A01000
trusted library allocation
page read and write
1D1AE000
stack
page read and write
2884002E4000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
39BE000
stack
page read and write
2C711942000
trusted library section
page read and write
3D7E000
stack
page read and write
2F3404634000
trusted library allocation
page read and write
34BE000
stack
page read and write
23401000
heap
page read and write
2358C000
heap
page read and write
2C70A9FF000
heap
page read and write
2F3406A63000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3404C38000
trusted library allocation
page read and write
2F3404CE8000
trusted library allocation
page read and write
2F3404F0C000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3405D5C000
trusted library allocation
page read and write
4890000
heap
page read and write
2C70A9F9000
heap
page read and write
233C0000
heap
page read and write
DB0000
heap
page read and write
1D341000
heap
page read and write
2F3406B48000
trusted library allocation
page read and write
2F3404BAA000
trusted library allocation
page read and write
C7365FE000
unkown
page readonly
2F3400406000
trusted library allocation
page read and write
EB4000
heap
page read and write
2F3405904000
trusted library allocation
page read and write
2F3404484000
trusted library allocation
page read and write
2F34050D4000
trusted library allocation
page read and write
2F3405BCC000
trusted library allocation
page read and write
C71A5FE000
unkown
page readonly
2C70A9F2000
heap
page read and write
C723DFE000
stack
page read and write
2C70A9F9000
heap
page read and write
2C70A9FA000
heap
page read and write
6F8ED000
unkown
page readonly
2F3404624000
trusted library allocation
page read and write
2F34051A4000
trusted library allocation
page read and write
2F3404ABC000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70AA03000
heap
page read and write
2F340539C000
trusted library allocation
page read and write
2F3405424000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2C70AA07000
heap
page read and write
2C70AA01000
heap
page read and write
EB4000
heap
page read and write
2F3405B10000
trusted library allocation
page read and write
C7355FE000
unkown
page readonly
2F3404DF8000
trusted library allocation
page read and write
2C7074B3000
heap
page read and write
2F3405D74000
trusted library allocation
page read and write
2F3405118000
trusted library allocation
page read and write
2F3406144000
trusted library allocation
page read and write
1080000
direct allocation
page read and write
2F340580C000
trusted library allocation
page read and write
2F34046FF000
trusted library allocation
page read and write
C714DFA000
stack
page read and write
288400754000
trusted library allocation
page read and write
2F3405C60000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
4881000
heap
page read and write
2C70AA03000
heap
page read and write
2F34044DC000
trusted library allocation
page read and write
2F3405D64000
trusted library allocation
page read and write
2F3405DB4000
trusted library allocation
page read and write
2F340505C000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3405388000
trusted library allocation
page read and write
2F3404598000
trusted library allocation
page read and write
2884006D4000
trusted library allocation
page read and write
2F3405D8C000
trusted library allocation
page read and write
1D33A000
heap
page read and write
1D333000
heap
page read and write
50E000
unkown
page execute and read and write
2F3405934000
trusted library allocation
page read and write
2C70AA20000
heap
page read and write
2F3400288000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3404750000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2C70AA0A000
heap
page read and write
2F34050EC000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2C70AA07000
heap
page read and write
2F3404F9C000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
1D16D000
stack
page read and write
28840035C000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405030000
trusted library allocation
page read and write
2F340500C000
trusted library allocation
page read and write
1D326000
heap
page read and write
2C70A9F9000
heap
page read and write
2F3405344000
trusted library allocation
page read and write
288400310000
trusted library allocation
page read and write
2F34048A8000
trusted library allocation
page read and write
2F34056FC000
trusted library allocation
page read and write
10A0000
heap
page read and write
288400354000
trusted library allocation
page read and write
1D33F000
heap
page read and write
2F3406098000
trusted library allocation
page read and write
2F34053E4000
trusted library allocation
page read and write
43BE000
stack
page read and write
2F34044AC000
trusted library allocation
page read and write
2F3404B65000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2F3405001000
trusted library allocation
page read and write
2F3405201000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3406048000
trusted library allocation
page read and write
2F3404750000
trusted library allocation
page read and write
2F340467C000
trusted library allocation
page read and write
2F3404B8E000
trusted library allocation
page read and write
2F340499C000
trusted library allocation
page read and write
2F34046A8000
trusted library allocation
page read and write
6C841000
unkown
page readonly
1D33F000
heap
page read and write
2F3406030000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2C70A9F9000
heap
page read and write
2F3404414000
trusted library allocation
page read and write
2F34052A8000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2F34060B0000
trusted library allocation
page read and write
2F3406BEC000
trusted library allocation
page read and write
1D359000
heap
page read and write
2D3E000
stack
page read and write
2C709240000
heap
page read and write
2F34045AC000
trusted library allocation
page read and write
4881000
heap
page read and write
2F3404E24000
trusted library allocation
page read and write
2F3400001000
trusted library allocation
page read and write
2F3405CE8000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F34060AC000
trusted library allocation
page read and write
2F3406141000
trusted library allocation
page read and write
1108000
heap
page read and write
2F3405B4C000
trusted library allocation
page read and write
2F3405BF0000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2C70AA0A000
heap
page read and write
288400718000
trusted library allocation
page read and write
2F3404DC4000
trusted library allocation
page read and write
288400374000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3405B24000
trusted library allocation
page read and write
23415000
heap
page read and write
2F3406A97000
trusted library allocation
page read and write
2F3405DF4000
trusted library allocation
page read and write
4881000
heap
page read and write
2F3400E01000
trusted library allocation
page read and write
2F3404534000
trusted library allocation
page read and write
2F3404C38000
trusted library allocation
page read and write
2F34060C4000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70A9F3000
heap
page read and write
2C70AA04000
heap
page read and write
2F3406A90000
trusted library allocation
page read and write
C713DFB000
stack
page read and write
2F3404620000
trusted library allocation
page read and write
2F3404B10000
trusted library allocation
page read and write
23462000
heap
page read and write
2F34057CC000
trusted library allocation
page read and write
2F340456C000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3406B54000
trusted library allocation
page read and write
2C70A9ED000
heap
page read and write
2F3405FAC000
trusted library allocation
page read and write
2F3404854000
trusted library allocation
page read and write
2F3405FC0000
trusted library allocation
page read and write
2F340602C000
trusted library allocation
page read and write
1CD9F000
stack
page read and write
2F34054A0000
trusted library allocation
page read and write
2F3406179000
trusted library allocation
page read and write
2F3406E01000
trusted library allocation
page read and write
4E34002A0000
trusted library allocation
page read and write
1D333000
heap
page read and write
2E7E000
stack
page read and write
2C70A9F9000
heap
page read and write
2C70AA0A000
heap
page read and write
2C70AA01000
heap
page read and write
2C70A9F3000
heap
page read and write
2C70A9FF000
heap
page read and write
2F3404EAC000
trusted library allocation
page read and write
EB4000
heap
page read and write
2C70AA07000
heap
page read and write
2C70A9F3000
heap
page read and write
4881000
heap
page read and write
2F3406FA8000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2F3405310000
trusted library allocation
page read and write
2F340473C000
trusted library allocation
page read and write
2C71061F000
heap
page read and write
2C70A9FF000
heap
page read and write
2F340020A000
trusted library allocation
page read and write
2C707360000
heap
page read and write
2F3405F01000
trusted library allocation
page read and write
1D01F000
stack
page read and write
1D34E000
heap
page read and write
2F34056C4000
trusted library allocation
page read and write
C7155FE000
unkown
page readonly
829000
unkown
page execute and write copy
2C710E23000
trusted library section
page read and write
2C70A9F9000
heap
page read and write
2C70AA03000
heap
page read and write
2C70AA0A000
heap
page read and write
2F3405CEC000
trusted library allocation
page read and write
2358A000
heap
page read and write
4881000
heap
page read and write
2C70AA01000
heap
page read and write
2F34045C4000
trusted library allocation
page read and write
2F34052CC000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2F3405134000
trusted library allocation
page read and write
4881000
heap
page read and write
288400320000
trusted library allocation
page read and write
4881000
heap
page read and write
4E3400264000
trusted library allocation
page read and write
288400684000
trusted library allocation
page read and write
1D33A000
heap
page read and write
4881000
heap
page read and write
2F3405298000
trusted library allocation
page read and write
333F000
stack
page read and write
2F3405D0C000
trusted library allocation
page read and write
4881000
heap
page read and write
2C70AA0A000
heap
page read and write
2F3406EDB000
trusted library allocation
page read and write
2F3405F44000
trusted library allocation
page read and write
23403000
heap
page read and write
2C711921000
trusted library section
page read and write
2F3405264000
trusted library allocation
page read and write
4881000
heap
page read and write
2C70AA0A000
heap
page read and write
2F3404730000
trusted library allocation
page read and write
1D343000
heap
page read and write
C724DFD000
stack
page read and write
2A3F000
stack
page read and write
2F340473C000
trusted library allocation
page read and write
2F3405DBC000
trusted library allocation
page read and write
4E3400278000
trusted library allocation
page read and write
2AA0000
direct allocation
page execute and read and write
2F3405874000
trusted library allocation
page read and write
2F3404D90000
trusted library allocation
page read and write
487F000
stack
page read and write
288400364000
trusted library allocation
page read and write
1D34E000
heap
page read and write
2CFF000
stack
page read and write
2A0000
unkown
page read and write
7058002DC000
direct allocation
page read and write
2F340580C000
trusted library allocation
page read and write
829000
unkown
page execute and read and write
2884006B8000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F3405E48000
trusted library allocation
page read and write
2F340473C000
trusted library allocation
page read and write
2C70A9EC000
heap
page read and write
10F3000
heap
page read and write
2F34058EC000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3405174000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2C70A9F3000
heap
page read and write
2F3405BD4000
trusted library allocation
page read and write
2F3406188000
trusted library allocation
page read and write
2C70B010000
trusted library section
page read and write
288400201000
trusted library allocation
page read and write
2F3405160000
trusted library allocation
page read and write
2F3405DC8000
trusted library allocation
page read and write
2F3405DCC000
trusted library allocation
page read and write
2F3404F84000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3404DE8000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70A9F3000
heap
page read and write
2C70AA0A000
heap
page read and write
2F3404B24000
trusted library allocation
page read and write
EB4000
heap
page read and write
2F34044A0000
trusted library allocation
page read and write
2F3404BDC000
trusted library allocation
page read and write
2F34050EC000
trusted library allocation
page read and write
35FE000
stack
page read and write
4E50000
direct allocation
page execute and read and write
1D33D000
heap
page read and write
2F34072DC000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2F3405328000
trusted library allocation
page read and write
2F3405C24000
trusted library allocation
page read and write
288400620000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3405FF0000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405934000
trusted library allocation
page read and write
2C70A9ED000
heap
page read and write
2F3404744000
trusted library allocation
page read and write
2F3406EA8000
trusted library allocation
page read and write
2C70A9F2000
heap
page read and write
2F3404854000
trusted library allocation
page read and write
2F3404C0C000
trusted library allocation
page read and write
2F3404B24000
trusted library allocation
page read and write
C7185FE000
unkown
page readonly
2C70AA0A000
heap
page read and write
2F3405334000
trusted library allocation
page read and write
2F34056A8000
trusted library allocation
page read and write
2F3405498000
trusted library allocation
page read and write
2F3406F77000
trusted library allocation
page read and write
2884003EC000
trusted library allocation
page read and write
6C889000
unkown
page readonly
28840078C000
trusted library allocation
page read and write
2F3407074000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F3405C44000
trusted library allocation
page read and write
2F34072E0000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3400201000
trusted library allocation
page read and write
2F3406EDF000
trusted library allocation
page read and write
2F34047B0000
trusted library allocation
page read and write
288400644000
trusted library allocation
page read and write
C71FDFA000
stack
page read and write
2C70A9FF000
heap
page read and write
2F3404B98000
trusted library allocation
page read and write
2C71162E000
trusted library section
page read and write
2C70AA05000
heap
page read and write
2F3406A01000
trusted library allocation
page read and write
2F340607C000
trusted library allocation
page read and write
2884002D4000
trusted library allocation
page read and write
C717DFB000
stack
page read and write
2F7F000
stack
page read and write
2F3405D40000
trusted library allocation
page read and write
2F340569C000
trusted library allocation
page read and write
288400688000
trusted library allocation
page read and write
C7375FE000
unkown
page readonly
2C70AA0A000
heap
page read and write
2F3404B8C000
trusted library allocation
page read and write
1D33F000
heap
page read and write
2C70AA0A000
heap
page read and write
2C70A9FF000
heap
page read and write
EB4000
heap
page read and write
2F3405D04000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
4E3400288000
trusted library allocation
page read and write
1CF1E000
stack
page read and write
2F34046A8000
trusted library allocation
page read and write
1D33F000
heap
page read and write
2F34060A8000
trusted library allocation
page read and write
4881000
heap
page read and write
C71F5FE000
unkown
page readonly
1080000
direct allocation
page read and write
C736DFE000
stack
page read and write
2C70A9F9000
heap
page read and write
2C70A9FF000
heap
page read and write
2F3405464000
trusted library allocation
page read and write
2C711C20000
trusted library section
page read and write
2F3405CF0000
trusted library allocation
page read and write
4881000
heap
page read and write
2F34052D8000
trusted library allocation
page read and write
2F3405904000
trusted library allocation
page read and write
2F340530C000
trusted library allocation
page read and write
D52000
stack
page read and write
2F340539C000
trusted library allocation
page read and write
2F3406F18000
trusted library allocation
page read and write
2F34046A4000
trusted library allocation
page read and write
2C70A9E8000
heap
page read and write
2F3405B0C000
trusted library allocation
page read and write
2C70A9ED000
heap
page read and write
2F3405F74000
trusted library allocation
page read and write
2F3405118000
trusted library allocation
page read and write
2F3400401000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2C70A9F3000
heap
page read and write
2F34050EC000
trusted library allocation
page read and write
2F340523C000
trusted library allocation
page read and write
7058002AC000
direct allocation
page read and write
2F3405D10000
trusted library allocation
page read and write
C7255FE000
unkown
page readonly
2F3404750000
trusted library allocation
page read and write
C7315FE000
unkown
page readonly
2F3404780000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
1D34E000
heap
page read and write
2F3405958000
trusted library allocation
page read and write
48A0000
heap
page read and write
4880000
heap
page read and write
2C70A9F9000
heap
page read and write
2F34052E4000
trusted library allocation
page read and write
C73D5FE000
unkown
page readonly
2C70AA03000
heap
page read and write
2C70AA0A000
heap
page read and write
2C70AA01000
heap
page read and write
705800303000
direct allocation
page read and write
705800215000
direct allocation
page read and write
2C70A9F9000
heap
page read and write
2F3405098000
trusted library allocation
page read and write
4881000
heap
page read and write
C7125FE000
unkown
page readonly
2F3404C58000
trusted library allocation
page read and write
2F340613C000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
C71DDFE000
stack
page read and write
2F3404750000
trusted library allocation
page read and write
2F3405BD0000
trusted library allocation
page read and write
2F3405397000
trusted library allocation
page read and write
2F3404FD4000
trusted library allocation
page read and write
2F3405EF8000
trusted library allocation
page read and write
373E000
stack
page read and write
2F3406A6D000
trusted library allocation
page read and write
2C70F020000
trusted library section
page read and write
2F34050FC000
trusted library allocation
page read and write
1174000
heap
page read and write
C735DFE000
stack
page read and write
2F3405448000
trusted library allocation
page read and write
2C70A9F2000
heap
page read and write
2F3406FB4000
trusted library allocation
page read and write
2F3405CB4000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
2F3404694000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3405D24000
trusted library allocation
page read and write
2F3405914000
trusted library allocation
page read and write
2F3405C48000
trusted library allocation
page read and write
2F3405344000
trusted library allocation
page read and write
2F3405801000
trusted library allocation
page read and write
2FBE000
stack
page read and write
4881000
heap
page read and write
2C70AA04000
heap
page read and write
2C70AA03000
heap
page read and write
2F3404988000
trusted library allocation
page read and write
2F3406E0C000
trusted library allocation
page read and write
1D337000
heap
page read and write
447000
unkown
page execute and read and write
2F34046F0000
trusted library allocation
page read and write
2F34072F4000
trusted library allocation
page read and write
2F3405554000
trusted library allocation
page read and write
2F3404B00000
trusted library allocation
page read and write
2F3404708000
trusted library allocation
page read and write
2C70AA01000
heap
page read and write
2F3406001000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
EB4000
heap
page read and write
2C70A9FF000
heap
page read and write
28840020C000
trusted library allocation
page read and write
2F3404BB4000
trusted library allocation
page read and write
2F3405C98000
trusted library allocation
page read and write
2F3406B86000
trusted library allocation
page read and write
2F3405F40000
trusted library allocation
page read and write
2F3405528000
trusted library allocation
page read and write
397F000
stack
page read and write
2F34045F8000
trusted library allocation
page read and write
2F3404710000
trusted library allocation
page read and write
288400354000
trusted library allocation
page read and write
EB4000
heap
page read and write
2C70AA0A000
heap
page read and write
2F34045F4000
trusted library allocation
page read and write
288400784000
trusted library allocation
page read and write
4881000
heap
page read and write
2C70AA01000
heap
page read and write
2C70A9FF000
heap
page read and write
2F3404974000
trusted library allocation
page read and write
2F3405CC8000
trusted library allocation
page read and write
2F34054B4000
trusted library allocation
page read and write
4881000
heap
page read and write
4881000
heap
page read and write
2C70A9FF000
heap
page read and write
2F340479C000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
1080000
direct allocation
page read and write
2F3404744000
trusted library allocation
page read and write
2F3404750000
trusted library allocation
page read and write
2C70A9EC000
heap
page read and write
4E3400238000
trusted library allocation
page read and write
2340F000
heap
page read and write
2F3404518000
trusted library allocation
page read and write
2F34061A4000
trusted library allocation
page read and write
2F3406138000
trusted library allocation
page read and write
C732DFE000
stack
page read and write
2F3405EF8000
trusted library allocation
page read and write
2F3405C0C000
trusted library allocation
page read and write
4E3400201000
trusted library allocation
page read and write
C72B5FE000
unkown
page readonly
EB4000
heap
page read and write
2F3405DD0000
trusted library allocation
page read and write
70580024C000
direct allocation
page read and write
2F3406E80000
trusted library allocation
page read and write
2F3404750000
trusted library allocation
page read and write
C70EDFF000
stack
page read and write
2A0000
unkown
page readonly
1D340000
heap
page read and write
1080000
direct allocation
page read and write
705800220000
direct allocation
page read and write
2C70AA13000
heap
page read and write
4CC0000
heap
page read and write
2F34056DC000
trusted library allocation
page read and write
2F3405CD8000
trusted library allocation
page read and write
C718DFC000
stack
page read and write
4881000
heap
page read and write
2C707469000
heap
page read and write
705800294000
direct allocation
page read and write
2C70AA0F000
heap
page read and write
6C76F000
unkown
page readonly
2C7110B0000
trusted library section
page read and write
2F3404E5C000
trusted library allocation
page read and write
705800290000
direct allocation
page read and write
2F3404474000
trusted library allocation
page read and write
337E000
stack
page read and write
2F340473C000
trusted library allocation
page read and write
2F3405080000
trusted library allocation
page read and write
2F3405198000
trusted library allocation
page read and write
4881000
heap
page read and write
C73BDFD000
stack
page read and write
1D339000
heap
page read and write
2F3405DE4000
trusted library allocation
page read and write
2F3404454000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2F3404D70000
trusted library allocation
page read and write
2F3404694000
trusted library allocation
page read and write
2F3404710000
trusted library allocation
page read and write
C7285FE000
unkown
page readonly
C73C5FE000
unkown
page readonly
2C7112B0000
trusted library section
page read and write
2F34061C4000
trusted library allocation
page read and write
2F34058E4000
trusted library allocation
page read and write
2F3404A74000
trusted library allocation
page read and write
2C7073E8000
heap
page read and write
2F3405F54000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3404770000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70AF37000
heap
page read and write
6C7AF000
unkown
page write copy
347F000
stack
page read and write
2C70A9ED000
heap
page read and write
288400760000
trusted library allocation
page read and write
10A8000
heap
page read and write
2C710625000
heap
page read and write
2C70AA04000
heap
page read and write
2C70A9F9000
heap
page read and write
EB4000
heap
page read and write
1D359000
heap
page read and write
2C7073B0000
heap
page read and write
28840039C000
trusted library allocation
page read and write
2F340035C000
trusted library allocation
page read and write
2F3404B24000
trusted library allocation
page read and write
2F3405F90000
trusted library allocation
page read and write
2F3404D10000
trusted library allocation
page read and write
2F34050EC000
trusted library allocation
page read and write
C7195FE000
unkown
page readonly
2C70AF2E000
heap
page read and write
463E000
stack
page read and write
2F340536C000
trusted library allocation
page read and write
2F3405344000
trusted library allocation
page read and write
C73ADFC000
stack
page read and write
3B4000
unkown
page execute and read and write
2F34049E0000
trusted library allocation
page read and write
2F34060E8000
trusted library allocation
page read and write
2F3405270000
trusted library allocation
page read and write
2F3404764000
trusted library allocation
page read and write
2F3406A0C000
trusted library allocation
page read and write
118E000
heap
page read and write
2F3405334000
trusted library allocation
page read and write
58A000
unkown
page execute and read and write
30BF000
stack
page read and write
2F34049F8000
trusted library allocation
page read and write
2F3407201000
trusted library allocation
page read and write
2F3405830000
trusted library allocation
page read and write
2C70AA20000
heap
page read and write
1080000
direct allocation
page read and write
2F34050E4000
trusted library allocation
page read and write
4881000
heap
page read and write
4881000
heap
page read and write
4E8000
unkown
page execute and read and write
288400788000
trusted library allocation
page read and write
2F3405B20000
trusted library allocation
page read and write
2F34056B9000
trusted library allocation
page read and write
288400401000
trusted library allocation
page read and write
4E34002A4000
trusted library allocation
page read and write
2F3404B24000
trusted library allocation
page read and write
2F34058C0000
trusted library allocation
page read and write
2C711AB0000
trusted library section
page read and write
2F3405BE4000
trusted library allocation
page read and write
45FF000
stack
page read and write
61EB4000
direct allocation
page read and write
C7265FE000
unkown
page readonly
105E000
stack
page read and write
C73CDFD000
stack
page read and write
2C70AA01000
heap
page read and write
2F34058F4000
trusted library allocation
page read and write
2F3405B38000
trusted library allocation
page read and write
1D34E000
heap
page read and write
2F34045F0000
trusted library allocation
page read and write
2F3405CA4000
trusted library allocation
page read and write
C726DFC000
stack
page read and write
2F3405FF4000
trusted library allocation
page read and write
2884006F0000
trusted library allocation
page read and write
2C710645000
heap
page read and write
1D338000
heap
page read and write
2C70A9FF000
heap
page read and write
2F3404694000
trusted library allocation
page read and write
1080000
direct allocation
page read and write
2C70AA04000
heap
page read and write
2F340505C000
trusted library allocation
page read and write
2F34044EC000
trusted library allocation
page read and write
2F34053E0000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F3404C4C000
trusted library allocation
page read and write
2C710608000
heap
page read and write
C72A5FE000
unkown
page readonly
1D326000
heap
page read and write
2F340517C000
trusted library allocation
page read and write
1080000
direct allocation
page read and write
2F3405D54000
trusted library allocation
page read and write
2F3405BB0000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405390000
trusted library allocation
page read and write
2884002B0000
trusted library allocation
page read and write
2F340560C000
trusted library allocation
page read and write
1D333000
heap
page read and write
2C707380000
heap
page read and write
1D339000
heap
page read and write
2884007B4000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405958000
trusted library allocation
page read and write
4881000
heap
page read and write
2F3405F8C000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
2C70AF03000
heap
page read and write
2F3406014000
trusted library allocation
page read and write
2F34056B8000
trusted library allocation
page read and write
2F3405868000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70A9F9000
heap
page read and write
2F3404704000
trusted library allocation
page read and write
2F3404F28000
trusted library allocation
page read and write
C72EDFE000
stack
page read and write
2C70A9F3000
heap
page read and write
2C70A9F3000
heap
page read and write
4881000
heap
page read and write
2F3406AED000
trusted library allocation
page read and write
2884007CC000
trusted library allocation
page read and write
2F34045D4000
trusted library allocation
page read and write
2F3405064000
trusted library allocation
page read and write
2F3405C90000
trusted library allocation
page read and write
1080000
direct allocation
page read and write
2C70AA20000
heap
page read and write
2F3404A0C000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
288400601000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2F3404D9C000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2C70AA0A000
heap
page read and write
2F3405830000
trusted library allocation
page read and write
2F3406BB1000
trusted library allocation
page read and write
2F340559C000
trusted library allocation
page read and write
2C70AF1D000
heap
page read and write
4E50000
direct allocation
page execute and read and write
2C70A9F3000
heap
page read and write
2F3405328000
trusted library allocation
page read and write
2F3405250000
trusted library allocation
page read and write
2F3405B1C000
trusted library allocation
page read and write
2F3406AF4000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3404610000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
1180000
heap
page read and write
2F3404A28000
trusted library allocation
page read and write
2F34046E0000
trusted library allocation
page read and write
C738DFE000
stack
page read and write
2F3404704000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F3405328000
trusted library allocation
page read and write
100E000
stack
page read and write
2C70A9F9000
heap
page read and write
28840040C000
trusted library allocation
page read and write
2F3405DE8000
trusted library allocation
page read and write
2F340569C000
trusted library allocation
page read and write
2C70AF55000
heap
page read and write
23584000
heap
page read and write
2C70AA0A000
heap
page read and write
288400610000
trusted library allocation
page read and write
2F3402E01000
trusted library allocation
page read and write
2F3405328000
trusted library allocation
page read and write
2F3405AF8000
trusted library allocation
page read and write
1D310000
heap
page read and write
2F3404CFC000
trusted library allocation
page read and write
2F3405904000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2F3402801000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2C70AA07000
heap
page read and write
288400678000
trusted library allocation
page read and write
2F3405034000
trusted library allocation
page read and write
1D34E000
heap
page read and write
2C70AA0A000
heap
page read and write
705800280000
direct allocation
page read and write
1D345000
heap
page read and write
2F3405ACC000
trusted library allocation
page read and write
288400714000
trusted library allocation
page read and write
2F34057B8000
trusted library allocation
page read and write
2F3405B08000
trusted library allocation
page read and write
4881000
heap
page read and write
2F340440C000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
EB4000
heap
page read and write
423F000
stack
page read and write
2F3406A6F000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
288400624000
trusted library allocation
page read and write
2F340604C000
trusted library allocation
page read and write
2F3406FDC000
trusted library allocation
page read and write
2F3404F78000
trusted library allocation
page read and write
288400348000
trusted library allocation
page read and write
705800260000
direct allocation
page read and write
2F3405328000
trusted library allocation
page read and write
C72F5FE000
unkown
page readonly
2C707370000
heap
page readonly
2C70A9F1000
heap
page read and write
1080000
direct allocation
page read and write
2F3406B8D000
trusted library allocation
page read and write
1D337000
heap
page read and write
2F3405FD0000
trusted library allocation
page read and write
2F34050EC000
trusted library allocation
page read and write
2F340460C000
trusted library allocation
page read and write
2F34050D4000
trusted library allocation
page read and write
EB4000
heap
page read and write
4881000
heap
page read and write
1D33A000
heap
page read and write
2F3405C9C000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
288400408000
trusted library allocation
page read and write
2C70A9ED000
heap
page read and write
2C70AA04000
heap
page read and write
2C70A9F3000
heap
page read and write
2F34058B0000
trusted library allocation
page read and write
2C70A9F1000
heap
page read and write
2C709220000
heap
page read and write
2C70A9F9000
heap
page read and write
2C70AA07000
heap
page read and write
4881000
heap
page read and write
2F3405C20000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2C70A9F9000
heap
page read and write
2F3405030000
trusted library allocation
page read and write
2F34045E4000
trusted library allocation
page read and write
2F340700C000
trusted library allocation
page read and write
2F34045B4000
trusted library allocation
page read and write
2F3404FB4000
trusted library allocation
page read and write
4881000
heap
page read and write
2C70AA0A000
heap
page read and write
1D355000
heap
page read and write
7058002EC000
direct allocation
page read and write
2C70AA0A000
heap
page read and write
C70DDFE000
unkown
page read and write
2C70AA05000
heap
page read and write
2F3405AF4000
trusted library allocation
page read and write
437F000
stack
page read and write
2F3404C60000
trusted library allocation
page read and write
2F34046BC000
trusted library allocation
page read and write
6C5D1000
unkown
page execute read
EB4000
heap
page read and write
2F3405BE0000
trusted library allocation
page read and write
6C5D0000
unkown
page readonly
EB4000
heap
page read and write
2C70A9F3000
heap
page read and write
1D329000
heap
page read and write
2F3405D48000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
2F34044C4000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2F3405574000
trusted library allocation
page read and write
1D326000
heap
page read and write
2F3405B3C000
trusted library allocation
page read and write
2F3405FA8000
trusted library allocation
page read and write
2F3404EFC000
trusted library allocation
page read and write
2F3404A44000
trusted library allocation
page read and write
2C70AF47000
heap
page read and write
2C70AA05000
heap
page read and write
288400744000
trusted library allocation
page read and write
2F3404D30000
trusted library allocation
page read and write
2F3404D5C000
trusted library allocation
page read and write
2F3405FB0000
trusted library allocation
page read and write
EB4000
heap
page read and write
4E34002A0000
trusted library allocation
page read and write
2F3405158000
trusted library allocation
page read and write
2F3404FBC000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2C70AA01000
heap
page read and write
2F3405D58000
trusted library allocation
page read and write
2F3400A01000
trusted library allocation
page read and write
4E34002E4000
trusted library allocation
page read and write
C71EDFE000
stack
page read and write
2F3404694000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2C70AA07000
heap
page read and write
2C70A9E7000
heap
page read and write
1D326000
heap
page read and write
2BBF000
stack
page read and write
2F3405C34000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2C70AF3E000
heap
page read and write
2C70A9F3000
heap
page read and write
473F000
stack
page read and write
4881000
heap
page read and write
2C70AA0F000
heap
page read and write
2F3405E20000
trusted library allocation
page read and write
386000
unkown
page execute and read and write
2F3406BC4000
trusted library allocation
page read and write
2F34045AC000
trusted library allocation
page read and write
4881000
heap
page read and write
4E34002D8000
trusted library allocation
page read and write
288400430000
trusted library allocation
page read and write
2F34057C4000
trusted library allocation
page read and write
2C70A9F1000
heap
page read and write
2F3404908000
trusted library allocation
page read and write
288400380000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F34057A4000
trusted library allocation
page read and write
4D3C000
stack
page read and write
2F34053C0000
trusted library allocation
page read and write
2C7073E0000
heap
page read and write
2F3404F78000
trusted library allocation
page read and write
2C70AA3F000
heap
page read and write
2C70AA01000
heap
page read and write
4881000
heap
page read and write
1CC9E000
stack
page read and write
2F3402201000
trusted library allocation
page read and write
2C70A9ED000
heap
page read and write
2F340446A000
trusted library allocation
page read and write
2F3405A01000
trusted library allocation
page read and write
2F34061C0000
trusted library allocation
page read and write
288400801000
trusted library allocation
page read and write
EB0000
heap
page read and write
2F3406B9F000
trusted library allocation
page read and write
2F3404894000
trusted library allocation
page read and write
2F340446E000
trusted library allocation
page read and write
2F34051E8000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
41B000
unkown
page execute and read and write
2F34048A0000
trusted library allocation
page read and write
2C70A9ED000
heap
page read and write
2F3405334000
trusted library allocation
page read and write
2C70AA05000
heap
page read and write
288400250000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3405528000
trusted library allocation
page read and write
2F34056C4000
trusted library allocation
page read and write
2F340618C000
trusted library allocation
page read and write
2C710BD0000
heap
page read and write
2A80000
direct allocation
page read and write
2C710E66000
trusted library section
page read and write
288400248000
trusted library allocation
page read and write
705800210000
direct allocation
page read and write
2C70A9F3000
heap
page read and write
2C70AA03000
heap
page read and write
2F3405EFC000
trusted library allocation
page read and write
C719DFB000
stack
page read and write
2A80000
direct allocation
page read and write
2F34050D4000
trusted library allocation
page read and write
4881000
heap
page read and write
2F340457C000
trusted library allocation
page read and write
2F340520C000
trusted library allocation
page read and write
2884006E4000
trusted library allocation
page read and write
C731DFD000
stack
page read and write
2C70AA03000
heap
page read and write
2C70AA04000
heap
page read and write
2F3406138000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F34047C0000
trusted library allocation
page read and write
2F34058D4000
trusted library allocation
page read and write
1D336000
heap
page read and write
717000
unkown
page execute and read and write
288400390000
trusted library allocation
page read and write
2C710CF7000
unclassified section
page read and write
2F3404AE7000
trusted library allocation
page read and write
70580020C000
direct allocation
page read and write
2F340479C000
trusted library allocation
page read and write
2F3406F1F000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
1D33D000
heap
page read and write
4881000
heap
page read and write
4E3400260000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2F34057A4000
trusted library allocation
page read and write
7058002D0000
direct allocation
page read and write
1CDDE000
stack
page read and write
2F34058F4000
trusted library allocation
page read and write
4E3400235000
trusted library allocation
page read and write
2F3404690000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
1D438000
heap
page read and write
2F3405D30000
trusted library allocation
page read and write
1D340000
heap
page read and write
2F3405B98000
trusted library allocation
page read and write
3D3F000
stack
page read and write
6C7B5000
unkown
page readonly
2F3405230000
trusted library allocation
page read and write
2F3406018000
trusted library allocation
page read and write
4E34002B0000
trusted library allocation
page read and write
9C6000
unkown
page execute and write copy
2F3405A0C000
trusted library allocation
page read and write
2F34054C0000
trusted library allocation
page read and write
2F34045B4000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
2C70AA04000
heap
page read and write
2F3405E2C000
trusted library allocation
page read and write
2F3404C38000
trusted library allocation
page read and write
2A90000
direct allocation
page execute and read and write
2F3405E30000
trusted library allocation
page read and write
2F3404E0C000
trusted library allocation
page read and write
2F3404704000
trusted library allocation
page read and write
2C70AF4F000
heap
page read and write
2F3405768000
trusted library allocation
page read and write
4892000
heap
page read and write
C727DFA000
stack
page read and write
2C70AA0E000
heap
page read and write
1CC5F000
stack
page read and write
C7165FE000
unkown
page readonly
2C70AA07000
heap
page read and write
288400330000
trusted library allocation
page read and write
2F3404704000
trusted library allocation
page read and write
2F3405150000
trusted library allocation
page read and write
2F3400C01000
trusted library allocation
page read and write
2C707670000
heap
page read and write
2F3405BA4000
trusted library allocation
page read and write
4E34002C0000
trusted library allocation
page read and write
2F3405448000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
C72CDFD000
stack
page read and write
2F3404AEC000
trusted library allocation
page read and write
2F3405D94000
trusted library allocation
page read and write
2F3406E42000
trusted library allocation
page read and write
1D336000
heap
page read and write
4881000
heap
page read and write
2F340684F000
trusted library allocation
page read and write
2F3405424000
trusted library allocation
page read and write
EB4000
heap
page read and write
C716DFC000
stack
page read and write
2C70AA0C000
heap
page read and write
2F3405B64000
trusted library allocation
page read and write
1D33A000
heap
page read and write
2F34051B4000
trusted library allocation
page read and write
C7325FE000
unkown
page readonly
3E9000
unkown
page execute and read and write
477E000
stack
page read and write
2F34061C0000
trusted library allocation
page read and write
4E3400220000
trusted library allocation
page read and write
2F3405D1C000
trusted library allocation
page read and write
2F3405538000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
4881000
heap
page read and write
2F3405401000
trusted library allocation
page read and write
6F871000
unkown
page execute read
2C70A9FF000
heap
page read and write
2F3405140000
trusted library allocation
page read and write
2F340609C000
trusted library allocation
page read and write
2F3404884000
trusted library allocation
page read and write
28840027C000
trusted library allocation
page read and write
4E34002A0000
trusted library allocation
page read and write
7ED000
unkown
page execute and read and write
2C70AEC0000
heap
page read and write
EB4000
heap
page read and write
C70CDEF000
stack
page read and write
2F340475C000
trusted library allocation
page read and write
2F3405FE4000
trusted library allocation
page read and write
2ABE000
heap
page read and write
4881000
heap
page read and write
2F34053E5000
trusted library allocation
page read and write
4E34002C0000
trusted library allocation
page read and write
C7235FE000
unkown
page readonly
2C70A9F1000
heap
page read and write
2F3405390000
trusted library allocation
page read and write
2C70AA05000
heap
page read and write
30FE000
stack
page read and write
2C70AA20000
heap
page read and write
1D340000
heap
page read and write
2F34057BC000
trusted library allocation
page read and write
2F340539C000
trusted library allocation
page read and write
EB4000
heap
page read and write
2C710C30000
heap
page read and write
EB4000
heap
page read and write
2E3F000
stack
page read and write
C72ADFC000
stack
page read and write
2F3404614000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405448000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2C70A9F1000
heap
page read and write
2F3406148000
trusted library allocation
page read and write
2C7105F0000
heap
page read and write
61EB7000
direct allocation
page readonly
2C70AA20000
heap
page read and write
C721DFE000
stack
page read and write
2C70A9F9000
heap
page read and write
4E340020C000
trusted library allocation
page read and write
2F3404E2C000
trusted library allocation
page read and write
2C70AA0F000
heap
page read and write
2F34044FC000
trusted library allocation
page read and write
4881000
heap
page read and write
2F3405B88000
trusted library allocation
page read and write
F0E000
stack
page read and write
2C70A9FF000
heap
page read and write
2F3405F58000
trusted library allocation
page read and write
2F3406044000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F34056E4000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F3406BD9000
trusted library allocation
page read and write
2F3404730000
trusted library allocation
page read and write
2F3404401000
trusted library allocation
page read and write
2F3406A36000
trusted library allocation
page read and write
2F340602C000
trusted library allocation
page read and write
2F3405748000
trusted library allocation
page read and write
2C711620000
trusted library section
page read and write
4881000
heap
page read and write
2F3405AE4000
trusted library allocation
page read and write
2F340473C000
trusted library allocation
page read and write
2F3405424000
trusted library allocation
page read and write
2F3406198000
trusted library allocation
page read and write
2C7074AC000
heap
page read and write
1122000
heap
page read and write
288400668000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
E90000
heap
page read and write
4881000
heap
page read and write
C70E5FE000
unkown
page readonly
2F3405F2C000
trusted library allocation
page read and write
EB4000
heap
page read and write
2C70F0B7000
unclassified section
page read and write
2C70A9FF000
heap
page read and write
2F34046C0000
trusted library allocation
page read and write
288400698000
trusted library allocation
page read and write
2F34050E4000
trusted library allocation
page read and write
2F3406F7C000
trusted library allocation
page read and write
2F3400FBC000
trusted library allocation
page read and write
2F3405C40000
trusted library allocation
page read and write
2C709243000
heap
page read and write
2C70AA04000
heap
page read and write
2F34052EC000
trusted library allocation
page read and write
705800201000
direct allocation
page read and write
2F3405B9C000
trusted library allocation
page read and write
2C711C2E000
trusted library section
page read and write
2F34045E0000
trusted library allocation
page read and write
1D338000
heap
page read and write
C70FDFE000
stack
page read and write
C729DFB000
stack
page read and write
2C70AA07000
heap
page read and write
2F3405CDC000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F3405438000
trusted library allocation
page read and write
1186000
heap
page read and write
2C70A9F3000
heap
page read and write
2F3406A34000
trusted library allocation
page read and write
2F3404854000
trusted library allocation
page read and write
2F3405AE0000
trusted library allocation
page read and write
2C70A9FE000
heap
page read and write
288400614000
trusted library allocation
page read and write
40E000
unkown
page execute and read and write
2C70AA07000
heap
page read and write
1D33A000
heap
page read and write
C72C5FE000
unkown
page readonly
2C70AA07000
heap
page read and write
2F3404694000
trusted library allocation
page read and write
2F3406204000
trusted library allocation
page read and write
2F340454C000
trusted library allocation
page read and write
2F34046F4000
trusted library allocation
page read and write
2884006B0000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
6F8FE000
unkown
page read and write
C710DFE000
stack
page read and write
2F3405C88000
trusted library allocation
page read and write
C7345FE000
unkown
page readonly
2C70AA0A000
heap
page read and write
2C710C57000
unclassified section
page read and write
2F340519C000
trusted library allocation
page read and write
1D343000
heap
page read and write
6C7E0000
unkown
page readonly
2C70AA07000
heap
page read and write
EB4000
heap
page read and write
2F34056D4000
trusted library allocation
page read and write
D58000
stack
page read and write
2F3404FC4000
trusted library allocation
page read and write
2C711910000
trusted library section
page read and write
2F3404BC4000
trusted library allocation
page read and write
2F3404B9D000
trusted library allocation
page read and write
2F340469A000
trusted library allocation
page read and write
2F3405BC0000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2C70AA03000
heap
page read and write
2F34046B4000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2AB7000
heap
page read and write
2C70AA03000
heap
page read and write
C73DDFC000
stack
page read and write
2F3405CE4000
trusted library allocation
page read and write
288400770000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
EB4000
heap
page read and write
2F34052CA000
trusted library allocation
page read and write
48DB000
heap
page read and write
2F3404EBC000
trusted library allocation
page read and write
2F3406E8E000
trusted library allocation
page read and write
2F3404C1C000
trusted library allocation
page read and write
4E3F000
stack
page read and write
2C70AA0A000
heap
page read and write
2F3406AB8000
trusted library allocation
page read and write
288400658000
trusted library allocation
page read and write
2C7075B0000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405728000
trusted library allocation
page read and write
2F3406060000
trusted library allocation
page read and write
2F3406060000
trusted library allocation
page read and write
2F3404704000
trusted library allocation
page read and write
2F34052B4000
trusted library allocation
page read and write
C72BDFC000
stack
page read and write
4881000
heap
page read and write
2C70F0E0000
trusted library allocation
page read and write
2C70AF21000
heap
page read and write
4881000
heap
page read and write
2F3406EF5000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F340503C000
trusted library allocation
page read and write
2F340584C000
trusted library allocation
page read and write
2C70AA01000
heap
page read and write
EB4000
heap
page read and write
2C70AA01000
heap
page read and write
6F870000
unkown
page readonly
2F3405C6C000
trusted library allocation
page read and write
2F3404744000
trusted library allocation
page read and write
C7305FE000
unkown
page readonly
2F3405E40000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3405B60000
trusted library allocation
page read and write
2C70AF24000
heap
page read and write
23408000
heap
page read and write
4E34002A0000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
1D34E000
heap
page read and write
2F3400601000
trusted library allocation
page read and write
C72FDFE000
stack
page read and write
2C70AA07000
heap
page read and write
2C70A9FB000
heap
page read and write
2F34051C0000
trusted library allocation
page read and write
2C707675000
heap
page read and write
2F3405AE8000
trusted library allocation
page read and write
2F3406F40000
trusted library allocation
page read and write
2F3406B2C000
trusted library allocation
page read and write
2F3405D08000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
1D326000
heap
page read and write
2C70A9ED000
heap
page read and write
2F34050EC000
trusted library allocation
page read and write
2F3404A98000
trusted library allocation
page read and write
2F3406138000
trusted library allocation
page read and write
288400730000
trusted library allocation
page read and write
28840035C000
trusted library allocation
page read and write
2C70A9F1000
heap
page read and write
2C70A9F9000
heap
page read and write
2F3405108000
trusted library allocation
page read and write
2F3404750000
trusted library allocation
page read and write
28840033C000
trusted library allocation
page read and write
2C70AA10000
heap
page read and write
2C70A9F2000
heap
page read and write
2F34049B0000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
2A1000
unkown
page execute and write copy
3ABF000
stack
page read and write
2C70AA05000
heap
page read and write
2C70A9F3000
heap
page read and write
43B000
unkown
page execute and read and write
1D358000
heap
page read and write
EB4000
heap
page read and write
2F34045A0000
trusted library allocation
page read and write
2F34054B4000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F34046B4000
trusted library allocation
page read and write
1D356000
heap
page read and write
2F3405088000
trusted library allocation
page read and write
2F340461C000
trusted library allocation
page read and write
4881000
heap
page read and write
2F3404694000
trusted library allocation
page read and write
2C70AA07000
heap
page read and write
C5C000
stack
page read and write
2C71194E000
trusted library section
page read and write
2C70A9FF000
heap
page read and write
2C70AA0A000
heap
page read and write
2F34060A4000
trusted library allocation
page read and write
2F3405BA0000
trusted library allocation
page read and write
2C7073F7000
heap
page read and write
2F3404694000
trusted library allocation
page read and write
EB4000
heap
page read and write
1080000
direct allocation
page read and write
4881000
heap
page read and write
2F3405C78000
trusted library allocation
page read and write
4881000
heap
page read and write
2C70AA07000
heap
page read and write
2ABB000
heap
page read and write
EB4000
heap
page read and write
28840060C000
trusted library allocation
page read and write
2F3400801000
trusted library allocation
page read and write
2F3405CA0000
trusted library allocation
page read and write
2F3405BF4000
trusted library allocation
page read and write
2F3404854000
trusted library allocation
page read and write
2F3404744000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
2F3405B50000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
233E1000
heap
page read and write
2F340479C000
trusted library allocation
page read and write
2F3405ABC000
trusted library allocation
page read and write
3EBE000
stack
page read and write
1CB5E000
stack
page read and write
C71C5FE000
unkown
page readonly
2C70AA04000
heap
page read and write
2F3406150000
trusted library allocation
page read and write
819000
unkown
page execute and read and write
2C70A9F3000
heap
page read and write
2F3405F0C000
trusted library allocation
page read and write
EB4000
heap
page read and write
2C70A9F1000
heap
page read and write
288400320000
trusted library allocation
page read and write
2A7E000
stack
page read and write
2F3404628000
trusted library allocation
page read and write
4E34002F8000
trusted library allocation
page read and write
1D336000
heap
page read and write
2C70A9F9000
heap
page read and write
2CC000
unkown
page execute and read and write
2F34045B4000
trusted library allocation
page read and write
2F3405601000
trusted library allocation
page read and write
2F340614F000
trusted library allocation
page read and write
2C70AA20000
heap
page read and write
28840085C000
trusted library allocation
page read and write
2F34051F0000
trusted library allocation
page read and write
2F3404CB4000
trusted library allocation
page read and write
2F3402A01000
trusted library allocation
page read and write
4881000
heap
page read and write
2F3405D44000
trusted library allocation
page read and write
288400288000
trusted library allocation
page read and write
C730DFD000
stack
page read and write
23584000
heap
page read and write
2F34054D0000
trusted library allocation
page read and write
C7175FE000
unkown
page readonly
2F3404698000
trusted library allocation
page read and write
2F3405B5C000
trusted library allocation
page read and write
1D326000
heap
page read and write
2F3404694000
trusted library allocation
page read and write
2F34047B0000
trusted library allocation
page read and write
2F3405FA4000
trusted library allocation
page read and write
C73EDFE000
stack
page read and write
508000
unkown
page execute and read and write
288400654000
trusted library allocation
page read and write
4881000
heap
page read and write
61E01000
direct allocation
page execute read
2F34053C0000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
2F3405C70000
trusted library allocation
page read and write
2F3406E64000
trusted library allocation
page read and write
2F34056C4000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
4881000
heap
page read and write
2F34048FC000
trusted library allocation
page read and write
2C711A72000
trusted library section
page read and write
288400630000
trusted library allocation
page read and write
C733DFD000
stack
page read and write
2F3404590000
trusted library allocation
page read and write
2C70AA20000
heap
page read and write
EB4000
heap
page read and write
2C711990000
trusted library section
page read and write
288400330000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F3405030000
trusted library allocation
page read and write
2F3405B34000
trusted library allocation
page read and write
C71BDFE000
stack
page read and write
2F340473C000
trusted library allocation
page read and write
C72DDFB000
stack
page read and write
2C70AA20000
heap
page read and write
2C70AA0A000
heap
page read and write
2F34072F0000
trusted library allocation
page read and write
2C70AA03000
heap
page read and write
C73E5FE000
unkown
page readonly
2C711557000
unclassified section
page read and write
2C70AA0A000
heap
page read and write
288400210000
trusted library allocation
page read and write
2F3405CC0000
trusted library allocation
page read and write
2F340479C000
trusted library allocation
page read and write
2F3405030000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3404B30000
trusted library allocation
page read and write
2F3405D88000
trusted library allocation
page read and write
4D2B000
direct allocation
page read and write
2F3406B06000
trusted library allocation
page read and write
2C70AA05000
heap
page read and write
233A0000
trusted library allocation
page read and write
28840033C000
trusted library allocation
page read and write
288400220000
trusted library allocation
page read and write
C7225FE000
unkown
page readonly
2F3405F50000
trusted library allocation
page read and write
2F3404728000
trusted library allocation
page read and write
4E3400270000
trusted library allocation
page read and write
1D34E000
heap
page read and write
2C70AA0A000
heap
page read and write
2F340616D000
trusted library allocation
page read and write
2C70A9FF000
heap
page read and write
2F34053C0000
trusted library allocation
page read and write
2F34057CC000
trusted library allocation
page read and write
2F3405DA4000
trusted library allocation
page read and write
2C70A9F1000
heap
page read and write
2F3404854000
trusted library allocation
page read and write
2C70AA04000
heap
page read and write
2C70EBD4000
trusted library allocation
page read and write
C7115FE000
unkown
page readonly
2C70A9FF000
heap
page read and write
288400724000
trusted library allocation
page read and write
705800234000
direct allocation
page read and write
2F3404801000
trusted library allocation
page read and write
2F3406064000
trusted library allocation
page read and write
288400704000
trusted library allocation
page read and write
2F3405188000
trusted library allocation
page read and write
4E34002A0000
trusted library allocation
page read and write
233A0000
trusted library allocation
page read and write
2C70A9C0000
heap
page read and write
2F3404C01000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2C711980000
trusted library section
page read and write
2F3406068000
trusted library allocation
page read and write
C7395FE000
unkown
page readonly
2F3405904000
trusted library allocation
page read and write
323E000
stack
page read and write
2F34053C0000
trusted library allocation
page read and write
2F34045AC000
trusted library allocation
page read and write
2F3406078000
trusted library allocation
page read and write
28840025C000
trusted library allocation
page read and write
2F34053E4000
trusted library allocation
page read and write
2C70A9FA000
heap
page read and write
2C70AF85000
heap
page read and write
288400330000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
1D312000
heap
page read and write
4881000
heap
page read and write
4E34002C0000
trusted library allocation
page read and write
1D33C000
heap
page read and write
2F3405DB8000
trusted library allocation
page read and write
2F3406160000
trusted library allocation
page read and write
2F34050E4000
trusted library allocation
page read and write
2F340600C000
trusted library allocation
page read and write
2C70AA01000
heap
page read and write
2F3405D20000
trusted library allocation
page read and write
2C70AA05000
heap
page read and write
2C70AA0A000
heap
page read and write
2F3405ADC000
trusted library allocation
page read and write
2C7119A1000
trusted library section
page read and write
2884002CC000
trusted library allocation
page read and write
2F3405CA8000
trusted library allocation
page read and write
2F3401001000
trusted library allocation
page read and write
2F340540C000
trusted library allocation
page read and write
2F34050D4000
trusted library allocation
page read and write
2F34049C4000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
4881000
heap
page read and write
288400310000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
2F3405C58000
trusted library allocation
page read and write
2F3406050000
trusted library allocation
page read and write
4E3400250000
trusted library allocation
page read and write
2884002B8000
trusted library allocation
page read and write
2F34045DC000
trusted library allocation
page read and write
2F3405CC4000
trusted library allocation
page read and write
2F34046B4000
trusted library allocation
page read and write
812000
unkown
page execute and read and write
288400700000
trusted library allocation
page read and write
2F340471C000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
2F3405328000
trusted library allocation
page read and write
2884007D0000
trusted library allocation
page read and write
C72D5FE000
unkown
page readonly
2F3405498000
trusted library allocation
page read and write
413E000
stack
page read and write
2F3404601000
trusted library allocation
page read and write
2F3405FE0000
trusted library allocation
page read and write
2F3405B74000
trusted library allocation
page read and write
2884002ED000
trusted library allocation
page read and write
2341C000
heap
page read and write
2C70A9D0000
heap
page read and write
4E34002C0000
trusted library allocation
page read and write
1080000
direct allocation
page read and write
2C70AA04000
heap
page read and write
2F340720C000
trusted library allocation
page read and write
2C70A9F1000
heap
page read and write
D5C000
stack
page read and write
2F3404790000
trusted library allocation
page read and write
2F3405BAC000
trusted library allocation
page read and write
C7135FE000
unkown
page readonly
705800270000
direct allocation
page read and write
4E60000
direct allocation
page execute and read and write
C7245FE000
unkown
page readonly
4E34002B0000
trusted library allocation
page read and write
2F3405464000
trusted library allocation
page read and write
2F3403201000
trusted library allocation
page read and write
2F340587C000
trusted library allocation
page read and write
2C710C33000
heap
page read and write
2F3404C38000
trusted library allocation
page read and write
1D338000
heap
page read and write
2F3405F70000
trusted library allocation
page read and write
2F3407144000
trusted library allocation
page read and write
2F340523C000
trusted library allocation
page read and write
2F3405D60000
trusted library allocation
page read and write
2F340455C000
trusted library allocation
page read and write
2C709C90000
unkown
page read and write
2F3405258000
trusted library allocation
page read and write
C715DF9000
stack
page read and write
2C70AA0F000
heap
page read and write
2F340462C000
trusted library allocation
page read and write
2F340539C000
trusted library allocation
page read and write
2C707491000
heap
page read and write
2F3404F34000
trusted library allocation
page read and write
2F3405934000
trusted library allocation
page read and write
6C7B0000
unkown
page read and write
2F3405CE0000
trusted library allocation
page read and write
C73F5FE000
unkown
page readonly
1169000
heap
page read and write
2F3404854000
trusted library allocation
page read and write
2C70AA0A000
heap
page read and write
288400750000
trusted library allocation
page read and write
36FF000
stack
page read and write
2F3405E0C000
trusted library allocation
page read and write
2F340536C000
trusted library allocation
page read and write
288400230000
trusted library allocation
page read and write
EB4000
heap
page read and write
4881000
heap
page read and write
2C70A9F3000
heap
page read and write
C728DFB000
stack
page read and write
2F34053D0000
trusted library allocation
page read and write
2F3404AE2000
trusted library allocation
page read and write
288400404000
trusted library allocation
page read and write
2F3405438000
trusted library allocation
page read and write
2F3405C1C000
trusted library allocation
page read and write
2F3405128000
trusted library allocation
page read and write
6C7AE000
unkown
page read and write
2F34048CC000
trusted library allocation
page read and write
2F3404A38000
trusted library allocation
page read and write
2884002F4000
trusted library allocation
page read and write
2F3406F8E000
trusted library allocation
page read and write
2F34008E6000
trusted library allocation
page read and write
1070000
heap
page read and write
288400424000
trusted library allocation
page read and write
2C70A9F3000
heap
page read and write
2F34056C0000
trusted library allocation
page read and write
2F3404704000
trusted library allocation
page read and write
288400238000
trusted library allocation
page read and write
2C70A9F4000
heap
page read and write
2C711E20000
trusted library section
page read and write
C73B5FE000
unkown
page readonly
EB4000
heap
page read and write
2F3406074000
trusted library allocation
page read and write
2C70A9F9000
heap
page read and write
4E34002F4000
trusted library allocation
page read and write
C725DFB000
stack
page read and write
288400694000
trusted library allocation
page read and write
C739DFA000
stack
page read and write
There are 1832 hidden memdumps, click here to show them.