IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\CAFIJKFHIJKKEBGCFBFH
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\CBGCAFIIECBFIDHIJKFBAKEGDG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CFIIIJJKJKFHIDGDBAKJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBKKFCBAKKFBGCBFHJDGDGDHCA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DHJJEGHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBGCFBGCBFHJECBGDAKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEHIIDGC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (770)
downloaded
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2616 --field-trial-handle=2420,i,16735813809871212087,15061901151292447040,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://google-ohttp-relay-join.fastly-edge.com/)
unknown
https://duckduckgo.com/ac/?q=
unknown
https://google-ohttp-relay-join.fastly-edge.com//
unknown
https://google-ohttp-relay-join.fastly-edge.com/2
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/8
unknown
https://google-ohttp-relay-join.fastly-edge.com/?
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
http://185.215.113.206EBF
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dll3.206
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/jP
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://google-ohttp-relay-join.fastly-edge.com/hjH)
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
http://185.215.113.206/746f34465cf17784/mozglue.dllF
unknown
https://drive-daily-5.corp.google.com/
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.185.142
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
http://anglebug.com/7556
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dlls
unknown
https://drive-preprod.corp.google.com/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://domains.google.com/suggest/flow
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.185.142
play.google.com
142.250.186.110
www.google.com
142.250.184.196
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
142.250.184.196
www.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.142
plus.l.google.com
United States
142.250.186.110
play.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
5510000
direct allocation
page read and write
malicious
AB1000
unkown
page execute and read and write
malicious
176E000
heap
page read and write
malicious
353F000
stack
page read and write
6A5000340000
trusted library allocation
page read and write
6A5001740000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A500143C000
trusted library allocation
page read and write
6A5001B98000
trusted library allocation
page read and write
6A50001B4000
trusted library allocation
page read and write
211830D4000
heap
page read and write
56C0000
direct allocation
page execute and read and write
1DB30000
heap
page read and write
6A50003B0000
trusted library allocation
page read and write
211830D9000
heap
page read and write
211836BD000
heap
page read and write
5081000
heap
page read and write
211830E6000
heap
page read and write
211830E8000
heap
page read and write
211830E8000
heap
page read and write
6A500167C000
trusted library allocation
page read and write
211836A8000
heap
page read and write
6A5000334000
trusted library allocation
page read and write
211830D4000
heap
page read and write
5081000
heap
page read and write
6A5001694000
trusted library allocation
page read and write
6A50016B8000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
5081000
heap
page read and write
6A5000390000
trusted library allocation
page read and write
6A5001A44000
trusted library allocation
page read and write
4910002A0000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830E3000
heap
page read and write
211830EC000
heap
page read and write
211830E8000
heap
page read and write
211830E5000
heap
page read and write
6A5000F00000
trusted library allocation
page read and write
211836B2000
heap
page read and write
211830E5000
heap
page read and write
211830DA000
heap
page read and write
ADC000
unkown
page execute and read and write
211830EC000
heap
page read and write
1DB65000
heap
page read and write
6A50002F4000
trusted library allocation
page read and write
6A50016C4000
trusted library allocation
page read and write
1DB5A000
heap
page read and write
6A5000CA0000
trusted library allocation
page read and write
3337000
heap
page read and write
6A5001A3C000
trusted library allocation
page read and write
6A500179C000
trusted library allocation
page read and write
6A5001B50000
trusted library allocation
page read and write
211830D3000
heap
page read and write
5081000
heap
page read and write
6A5000BF8000
trusted library allocation
page read and write
6A5001310000
trusted library allocation
page read and write
6A5000BF8000
trusted library allocation
page read and write
294800654000
trusted library allocation
page read and write
211830E6000
heap
page read and write
6A50001DC000
trusted library allocation
page read and write
6A5001AD4000
trusted library allocation
page read and write
211830D2000
heap
page read and write
6A500142C000
trusted library allocation
page read and write
6A5000DE8000
trusted library allocation
page read and write
6A5001B20000
trusted library allocation
page read and write
1DB57000
heap
page read and write
6A5001B70000
trusted library allocation
page read and write
327E000
stack
page read and write
5690000
direct allocation
page execute and read and write
6A5000CB0000
trusted library allocation
page read and write
6A5001A28000
trusted library allocation
page read and write
1D73E000
stack
page read and write
1D88E000
stack
page read and write
1DB78000
heap
page read and write
6A5002F18000
trusted library allocation
page read and write
4910002A4000
trusted library allocation
page read and write
6A5000F74000
trusted library allocation
page read and write
6A500204F000
trusted library allocation
page read and write
1DB56000
heap
page read and write
1DB57000
heap
page read and write
211830E0000
heap
page read and write
1029000
unkown
page execute and read and write
6A5000320000
trusted library allocation
page read and write
6A5001874000
trusted library allocation
page read and write
211830CE000
heap
page read and write
211830EC000
heap
page read and write
AB1000
unkown
page execute and write copy
6A500154C000
trusted library allocation
page read and write
6A5000318000
trusted library allocation
page read and write
211830D2000
heap
page read and write
211836AD000
heap
page read and write
211830D4000
heap
page read and write
6A5001618000
trusted library allocation
page read and write
6A5000CA0000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A5000EF0000
trusted library allocation
page read and write
211830CC000
heap
page read and write
61ED3000
direct allocation
page read and write
211830DA000
heap
page read and write
11E8000
unkown
page execute and write copy
6A5000FE8000
trusted library allocation
page read and write
1DB65000
heap
page read and write
6A5001358000
trusted library allocation
page read and write
C57000
unkown
page execute and read and write
6C7B5000
unkown
page readonly
6C887000
unkown
page read and write
5081000
heap
page read and write
5081000
heap
page read and write
6A50002A4000
trusted library allocation
page read and write
294800390000
trusted library allocation
page read and write
211830EC000
heap
page read and write
2948006E0000
trusted library allocation
page read and write
6A5000DE8000
trusted library allocation
page read and write
553B000
direct allocation
page read and write
5680000
direct allocation
page execute and read and write
23BC0000
trusted library allocation
page read and write
211830DA000
heap
page read and write
6A5002EF4000
trusted library allocation
page read and write
211830DA000
heap
page read and write
6A5001D3E000
trusted library allocation
page read and write
211830D2000
heap
page read and write
6A5000F28000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A50001F8000
trusted library allocation
page read and write
211830D4000
heap
page read and write
6A50003B0000
trusted library allocation
page read and write
211830D3000
heap
page read and write
5081000
heap
page read and write
211830E0000
heap
page read and write
6A500129C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A5001038000
trusted library allocation
page read and write
211830EC000
heap
page read and write
6A500186C000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
29480040C000
trusted library allocation
page read and write
6A5000EF0000
trusted library allocation
page read and write
6A5000340000
trusted library allocation
page read and write
6A5001358000
trusted library allocation
page read and write
5081000
heap
page read and write
211830E0000
heap
page read and write
5081000
heap
page read and write
4BBE000
stack
page read and write
1DB59000
heap
page read and write
211830E5000
heap
page read and write
6A50013EC000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830E4000
heap
page read and write
491000248000
trusted library allocation
page read and write
6A5001754000
trusted library allocation
page read and write
294800380000
trusted library allocation
page read and write
6A50016C0000
trusted library allocation
page read and write
6A5001820000
trusted library allocation
page read and write
6A5001A98000
trusted library allocation
page read and write
6A50001D8000
trusted library allocation
page read and write
BF9000
unkown
page execute and read and write
6A5001358000
trusted library allocation
page read and write
5081000
heap
page read and write
1600000
heap
page read and write
294800320000
trusted library allocation
page read and write
211830EC000
heap
page read and write
6A50002A4000
trusted library allocation
page read and write
211830E4000
heap
page read and write
4910002C0000
trusted library allocation
page read and write
6A50015BC000
trusted library allocation
page read and write
211830EC000
heap
page read and write
6A5001AB0000
trusted library allocation
page read and write
211830D4000
heap
page read and write
211830E5000
heap
page read and write
6A5000F74000
trusted library allocation
page read and write
6A500158C000
trusted library allocation
page read and write
211830CE000
heap
page read and write
6A5001890000
trusted library allocation
page read and write
211830E5000
heap
page read and write
211830E0000
heap
page read and write
6A5001B04000
trusted library allocation
page read and write
1DB46000
heap
page read and write
6A5001334000
trusted library allocation
page read and write
6A5000710000
trusted library allocation
page read and write
211830E0000
heap
page read and write
294800730000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
6A5001AEC000
trusted library allocation
page read and write
6A500170C000
trusted library allocation
page read and write
6A5002EE0000
trusted library allocation
page read and write
6A5000A0C000
trusted library allocation
page read and write
6A5000214000
trusted library allocation
page read and write
6A5000710000
trusted library allocation
page read and write
4A7E000
stack
page read and write
1D5DE000
stack
page read and write
6A5001B0C000
trusted library allocation
page read and write
6A50002A4000
trusted library allocation
page read and write
3DFE000
stack
page read and write
2118368D000
heap
page read and write
6A5000234000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A50019C8000
trusted library allocation
page read and write
6A5001B94000
trusted library allocation
page read and write
50DF000
heap
page read and write
407E000
stack
page read and write
1DB56000
heap
page read and write
554B000
stack
page read and write
211830CE000
heap
page read and write
493E000
stack
page read and write
6A5000F80000
trusted library allocation
page read and write
5081000
heap
page read and write
6A5000334000
trusted library allocation
page read and write
1DB5A000
heap
page read and write
6A5001778000
trusted library allocation
page read and write
29480069C000
trusted library allocation
page read and write
211830CE000
heap
page read and write
5081000
heap
page read and write
6A5000CA0000
trusted library allocation
page read and write
6A5001B4C000
trusted library allocation
page read and write
6A5000340000
trusted library allocation
page read and write
6A5001680000
trusted library allocation
page read and write
D9A000
unkown
page execute and read and write
211830D3000
heap
page read and write
6A5001A74000
trusted library allocation
page read and write
5081000
heap
page read and write
211830D4000
heap
page read and write
48FF000
stack
page read and write
211836AD000
heap
page read and write
23C01000
heap
page read and write
29480080C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830E0000
heap
page read and write
1DB53000
heap
page read and write
211830D4000
heap
page read and write
6A500109C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
343F000
stack
page read and write
1DB53000
heap
page read and write
4910002D8000
trusted library allocation
page read and write
6A5001358000
trusted library allocation
page read and write
6A50015DC000
trusted library allocation
page read and write
5081000
heap
page read and write
6A50002A4000
trusted library allocation
page read and write
F22000
unkown
page execute and read and write
211830D2000
heap
page read and write
6A5001B34000
trusted library allocation
page read and write
1D59F000
stack
page read and write
6A5000CA0000
trusted library allocation
page read and write
6A5001B60000
trusted library allocation
page read and write
6A5000300000
trusted library allocation
page read and write
211836A5000
heap
page read and write
1DB49000
heap
page read and write
211830E5000
heap
page read and write
6A5000CB8000
trusted library allocation
page read and write
211830E3000
heap
page read and write
6A5001424000
trusted library allocation
page read and write
5081000
heap
page read and write
211830E8000
heap
page read and write
6A50003B0000
trusted library allocation
page read and write
1DB59000
heap
page read and write
211830CB000
heap
page read and write
6A5000DE8000
trusted library allocation
page read and write
5081000
heap
page read and write
6A5001038000
trusted library allocation
page read and write
211830DA000
heap
page read and write
6A50019A8000
trusted library allocation
page read and write
211830E0000
heap
page read and write
1750000
heap
page read and write
211830D2000
heap
page read and write
6A5000F74000
trusted library allocation
page read and write
6A5001860000
trusted library allocation
page read and write
211830E8000
heap
page read and write
6A5000F74000
trusted library allocation
page read and write
1DB60000
heap
page read and write
211830E0000
heap
page read and write
56B0000
direct allocation
page execute and read and write
1824000
heap
page read and write
211836B6000
heap
page read and write
6A5001A0C000
trusted library allocation
page read and write
5081000
heap
page read and write
61ED4000
direct allocation
page readonly
211830E8000
heap
page read and write
6A50012D4000
trusted library allocation
page read and write
6A500173C000
trusted library allocation
page read and write
6A5001B50000
trusted library allocation
page read and write
6A5001A54000
trusted library allocation
page read and write
6A5000F28000
trusted library allocation
page read and write
211830E0000
heap
page read and write
17B2000
heap
page read and write
6A5000F00000
trusted library allocation
page read and write
1DB53000
heap
page read and write
6A500129C000
trusted library allocation
page read and write
6A500129C000
trusted library allocation
page read and write
5081000
heap
page read and write
211830DA000
heap
page read and write
211830E0000
heap
page read and write
294800694000
trusted library allocation
page read and write
3A3E000
stack
page read and write
6C7B0000
unkown
page read and write
211830EB000
heap
page read and write
211830EC000
heap
page read and write
6A5001A60000
trusted library allocation
page read and write
2948002FC000
trusted library allocation
page read and write
3C7F000
stack
page read and write
377F000
stack
page read and write
294800684000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
6A50015E8000
trusted library allocation
page read and write
6A50017D4000
trusted library allocation
page read and write
211836A8000
heap
page read and write
1DB63000
heap
page read and write
5081000
heap
page read and write
211830D4000
heap
page read and write
6A5000A0C000
trusted library allocation
page read and write
6A500022C000
trusted library allocation
page read and write
5081000
heap
page read and write
211830C9000
heap
page read and write
211830D4000
heap
page read and write
1DB5A000
heap
page read and write
6A5000FD4000
trusted library allocation
page read and write
4A3F000
stack
page read and write
211830E3000
heap
page read and write
211830DA000
heap
page read and write
211830EC000
heap
page read and write
211830CE000
heap
page read and write
211830E8000
heap
page read and write
6A5000CB8000
trusted library allocation
page read and write
6A50015EC000
trusted library allocation
page read and write
5081000
heap
page read and write
2948006B4000
trusted library allocation
page read and write
6A500178C000
trusted library allocation
page read and write
5081000
heap
page read and write
211830E3000
heap
page read and write
5081000
heap
page read and write
6A5001B1C000
trusted library allocation
page read and write
6A5000FAC000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
1DB5F000
heap
page read and write
211830E8000
heap
page read and write
3320000
direct allocation
page read and write
6A5001B84000
trusted library allocation
page read and write
294800704000
trusted library allocation
page read and write
211836E6000
heap
page read and write
6A5000C94000
trusted library allocation
page read and write
211830D4000
heap
page read and write
6C7AF000
unkown
page write copy
211830CE000
heap
page read and write
211836AF000
heap
page read and write
5081000
heap
page read and write
21187820000
heap
page read and write
211830DA000
heap
page read and write
294800700000
trusted library allocation
page read and write
211830EC000
heap
page read and write
21183105000
heap
page read and write
211830EB000
heap
page read and write
294800310000
trusted library allocation
page read and write
211830EB000
heap
page read and write
211830E0000
heap
page read and write
211830EB000
heap
page read and write
211830D3000
heap
page read and write
211830D4000
heap
page read and write
6A5000334000
trusted library allocation
page read and write
6A50016FC000
trusted library allocation
page read and write
6A5001584000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A5001884000
trusted library allocation
page read and write
211830D2000
heap
page read and write
6C889000
unkown
page readonly
6A50017F0000
trusted library allocation
page read and write
211830E4000
heap
page read and write
6A5000FBC000
trusted library allocation
page read and write
211830E6000
heap
page read and write
6A5001AF4000
trusted library allocation
page read and write
211830E0000
heap
page read and write
21183104000
heap
page read and write
211830D3000
heap
page read and write
211830E8000
heap
page read and write
17AE000
heap
page read and write
1DB6E000
heap
page read and write
5081000
heap
page read and write
211830CB000
heap
page read and write
6A500165C000
trusted library allocation
page read and write
3DBF000
stack
page read and write
211830E0000
heap
page read and write
211830E3000
heap
page read and write
6A5001A18000
trusted library allocation
page read and write
6A5001758000
trusted library allocation
page read and write
403F000
stack
page read and write
6A50016CC000
trusted library allocation
page read and write
6A50015E0000
trusted library allocation
page read and write
5090000
heap
page read and write
1DB40000
heap
page read and write
211830E6000
heap
page read and write
21183105000
heap
page read and write
6A5000EF0000
trusted library allocation
page read and write
1DB74000
heap
page read and write
211830D2000
heap
page read and write
211830DA000
heap
page read and write
6A5001334000
trusted library allocation
page read and write
6A5000710000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
211830E5000
heap
page read and write
5081000
heap
page read and write
211830E5000
heap
page read and write
211830EB000
heap
page read and write
39FF000
stack
page read and write
6A500021C000
trusted library allocation
page read and write
6A50017F4000
trusted library allocation
page read and write
211830F1000
heap
page read and write
6A500020C000
trusted library allocation
page read and write
6A5001B08000
trusted library allocation
page read and write
6C5D0000
unkown
page readonly
1DB57000
heap
page read and write
6A5000210000
trusted library allocation
page read and write
6A50016E0000
trusted library allocation
page read and write
6A5001A78000
trusted library allocation
page read and write
23C21000
heap
page read and write
6A5001B80000
trusted library allocation
page read and write
6A50016DC000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830E5000
heap
page read and write
6A500156C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
2948006E4000
trusted library allocation
page read and write
6A5000A0C000
trusted library allocation
page read and write
23D8A000
heap
page read and write
29480033C000
trusted library allocation
page read and write
6A5001B44000
trusted library allocation
page read and write
211830E3000
heap
page read and write
3320000
direct allocation
page read and write
211830E0000
heap
page read and write
211830CE000
heap
page read and write
1DB60000
heap
page read and write
6A50016A8000
trusted library allocation
page read and write
211830EB000
heap
page read and write
5081000
heap
page read and write
5081000
heap
page read and write
6A5000490000
trusted library allocation
page read and write
5081000
heap
page read and write
3320000
direct allocation
page read and write
211830E0000
heap
page read and write
294800354000
trusted library allocation
page read and write
6A50002B8000
trusted library allocation
page read and write
211830CE000
heap
page read and write
6A5001670000
trusted library allocation
page read and write
211830E9000
heap
page read and write
211830E8000
heap
page read and write
21183120000
heap
page read and write
1DB5A000
heap
page read and write
6A500161C000
trusted library allocation
page read and write
4910002C0000
trusted library allocation
page read and write
211830E8000
heap
page read and write
6A50017B0000
trusted library allocation
page read and write
1DB79000
heap
page read and write
211830EC000
heap
page read and write
38BF000
stack
page read and write
21183120000
heap
page read and write
6A500135C000
trusted library allocation
page read and write
4E3E000
stack
page read and write
47BF000
stack
page read and write
294800354000
trusted library allocation
page read and write
6A5000390000
trusted library allocation
page read and write
2948006F0000
trusted library allocation
page read and write
211830D2000
heap
page read and write
211830E5000
heap
page read and write
3F3E000
stack
page read and write
6A5001334000
trusted library allocation
page read and write
211830EC000
heap
page read and write
4CBF000
stack
page read and write
294800320000
trusted library allocation
page read and write
6A5001588000
trusted library allocation
page read and write
6A5001720000
trusted library allocation
page read and write
6A50017AC000
trusted library allocation
page read and write
6A5000BF8000
trusted library allocation
page read and write
6A5000F74000
trusted library allocation
page read and write
1DB5D000
heap
page read and write
1DB5F000
heap
page read and write
211830E5000
heap
page read and write
6A500181C000
trusted library allocation
page read and write
6A50015B0000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
6A5001AD0000
trusted library allocation
page read and write
C4B000
unkown
page execute and read and write
4910002E4000
trusted library allocation
page read and write
6A5001458000
trusted library allocation
page read and write
211830D4000
heap
page read and write
3CBE000
stack
page read and write
5081000
heap
page read and write
294800678000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A50010BC000
trusted library allocation
page read and write
211830D4000
heap
page read and write
6A5001394000
trusted library allocation
page read and write
211830E3000
heap
page read and write
50A0000
heap
page read and write
211830E0000
heap
page read and write
211830CE000
heap
page read and write
211830E0000
heap
page read and write
5081000
heap
page read and write
294800644000
trusted library allocation
page read and write
6A5001AF0000
trusted library allocation
page read and write
6A50012D4000
trusted library allocation
page read and write
5081000
heap
page read and write
5081000
heap
page read and write
6A50002AA000
trusted library allocation
page read and write
363F000
stack
page read and write
6F8ED000
unkown
page readonly
211830EC000
heap
page read and write
23D88000
heap
page read and write
5081000
heap
page read and write
6A5001BA4000
trusted library allocation
page read and write
211830DF000
heap
page read and write
6A5000CB0000
trusted library allocation
page read and write
1DB58000
heap
page read and write
21183104000
heap
page read and write
6A5001550000
trusted library allocation
page read and write
6A500174C000
trusted library allocation
page read and write
6A50017E4000
trusted library allocation
page read and write
211830E0000
heap
page read and write
1D98C000
stack
page read and write
211830DA000
heap
page read and write
172E000
stack
page read and write
6A5000CB0000
trusted library allocation
page read and write
2948006D0000
trusted library allocation
page read and write
37BE000
stack
page read and write
61E00000
direct allocation
page execute and read and write
211830F3000
heap
page read and write
6A5000BF8000
trusted library allocation
page read and write
211830E5000
heap
page read and write
23BC0000
heap
page read and write
6A50002A8000
trusted library allocation
page read and write
294800418000
trusted library allocation
page read and write
5081000
heap
page read and write
6A5001C84000
trusted library allocation
page read and write
211830DA000
heap
page read and write
3320000
direct allocation
page read and write
42BF000
stack
page read and write
1044000
unkown
page execute and write copy
6A5001C88000
trusted library allocation
page read and write
6A5000694000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
4910002C0000
trusted library allocation
page read and write
211830D2000
heap
page read and write
6A5000DD8000
trusted library allocation
page read and write
1DB60000
heap
page read and write
5081000
heap
page read and write
199E000
stack
page read and write
23D82000
heap
page read and write
6A5000228000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830D3000
heap
page read and write
6A50016BC000
trusted library allocation
page read and write
211836B4000
heap
page read and write
6A50002B8000
trusted library allocation
page read and write
6A500141C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830CE000
heap
page read and write
294800788000
trusted library allocation
page read and write
6A500032C000
trusted library allocation
page read and write
2948006FC000
trusted library allocation
page read and write
32BB000
stack
page read and write
211830DA000
heap
page read and write
6A50001E4000
trusted library allocation
page read and write
211830D5000
heap
page read and write
D1E000
unkown
page execute and read and write
6A5001730000
trusted library allocation
page read and write
211830CC000
heap
page read and write
6A5000334000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
1DC5B000
heap
page read and write
29480060C000
trusted library allocation
page read and write
6A5001AE8000
trusted library allocation
page read and write
6A5001478000
trusted library allocation
page read and write
211830E6000
heap
page read and write
1DB5D000
heap
page read and write
6A5000F4C000
trusted library allocation
page read and write
4B7F000
stack
page read and write
23C8A000
heap
page read and write
1DB79000
heap
page read and write
6A5000710000
trusted library allocation
page read and write
211830E0000
heap
page read and write
1D83F000
stack
page read and write
6A5001C50000
trusted library allocation
page read and write
1D49E000
stack
page read and write
6A50016E4000
trusted library allocation
page read and write
6A5000D50000
trusted library allocation
page read and write
211830DA000
heap
page read and write
6A5000C58000
trusted library allocation
page read and write
211830E3000
heap
page read and write
211830D6000
heap
page read and write
6A5000EF0000
trusted library allocation
page read and write
6A5000DD4000
trusted library allocation
page read and write
6A5001310000
trusted library allocation
page read and write
211830DA000
heap
page read and write
6A50017A8000
trusted library allocation
page read and write
211830D2000
heap
page read and write
294800248000
trusted library allocation
page read and write
294800408000
trusted library allocation
page read and write
6A50019F0000
trusted library allocation
page read and write
211830D4000
heap
page read and write
211830EC000
heap
page read and write
6A5000C2C000
trusted library allocation
page read and write
6A50001E8000
trusted library allocation
page read and write
211830ED000
heap
page read and write
6A5002F18000
trusted library allocation
page read and write
6A5002CDC000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A500154C000
trusted library allocation
page read and write
1605000
heap
page read and write
1DB6E000
heap
page read and write
6A5001B14000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A500155C000
trusted library allocation
page read and write
6A5001610000
trusted library allocation
page read and write
6A500032C000
trusted library allocation
page read and write
211830D3000
heap
page read and write
6A5000220000
trusted library allocation
page read and write
43FF000
stack
page read and write
211830CB000
heap
page read and write
4910002B0000
trusted library allocation
page read and write
1DC50000
trusted library allocation
page read and write
1DB6E000
heap
page read and write
211830DA000
heap
page read and write
443E000
stack
page read and write
6A5001AA8000
trusted library allocation
page read and write
211830D3000
heap
page read and write
2948006CC000
trusted library allocation
page read and write
195E000
stack
page read and write
211830D3000
heap
page read and write
211836DC000
heap
page read and write
2948006B0000
trusted library allocation
page read and write
21183696000
heap
page read and write
46BE000
stack
page read and write
6A500109C000
trusted library allocation
page read and write
417F000
stack
page read and write
211830E5000
heap
page read and write
6F902000
unkown
page readonly
1043000
unkown
page execute and write copy
294800320000
trusted library allocation
page read and write
6A5001D52000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A500160C000
trusted library allocation
page read and write
6A5001650000
trusted library allocation
page read and write
6A50019E8000
trusted library allocation
page read and write
211830E8000
heap
page read and write
211830D9000
heap
page read and write
211830E0000
heap
page read and write
6A500032C000
trusted library allocation
page read and write
1DB58000
heap
page read and write
6A50001D0000
trusted library allocation
page read and write
294800630000
trusted library allocation
page read and write
1DB6E000
heap
page read and write
1578000
stack
page read and write
6A50001AC000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830E5000
heap
page read and write
211830EC000
heap
page read and write
211830E0000
heap
page read and write
211830D2000
heap
page read and write
6A5001994000
trusted library allocation
page read and write
5690000
direct allocation
page execute and read and write
6A5000340000
trusted library allocation
page read and write
6A500199F000
trusted library allocation
page read and write
6A5000F74000
trusted library allocation
page read and write
6A5000FD4000
trusted library allocation
page read and write
294800714000
trusted library allocation
page read and write
6A50016A0000
trusted library allocation
page read and write
6A5000A0C000
trusted library allocation
page read and write
211830D2000
heap
page read and write
6A5000F28000
trusted library allocation
page read and write
6A5002F08000
trusted library allocation
page read and write
6C841000
unkown
page readonly
1DB3B000
heap
page read and write
6A5001848000
trusted library allocation
page read and write
211830CE000
heap
page read and write
5081000
heap
page read and write
211830E8000
heap
page read and write
211830E5000
heap
page read and write
211830DA000
heap
page read and write
5081000
heap
page read and write
6A5000DE8000
trusted library allocation
page read and write
6A500164C000
trusted library allocation
page read and write
211830D3000
heap
page read and write
23D00000
trusted library allocation
page read and write
5081000
heap
page read and write
211830D2000
heap
page read and write
6A5000230000
trusted library allocation
page read and write
5081000
heap
page read and write
6A500185C000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
211830D2000
heap
page read and write
4910002A4000
trusted library allocation
page read and write
211830E6000
heap
page read and write
29480033C000
trusted library allocation
page read and write
211830E5000
heap
page read and write
211830E0000
heap
page read and write
11E7000
unkown
page execute and read and write
5081000
heap
page read and write
1DB46000
heap
page read and write
2948006C8000
trusted library allocation
page read and write
6A5001D50000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830D4000
heap
page read and write
211830CB000
heap
page read and write
5081000
heap
page read and write
211830DA000
heap
page read and write
21183105000
heap
page read and write
147C000
stack
page read and write
23D90000
heap
page read and write
211830E5000
heap
page read and write
6A5001684000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A5001704000
trusted library allocation
page read and write
21183105000
heap
page read and write
294800754000
trusted library allocation
page read and write
4910002C0000
trusted library allocation
page read and write
4F3F000
stack
page read and write
1DB3D000
heap
page read and write
211830E0000
heap
page read and write
29480035C000
trusted library allocation
page read and write
211830EC000
heap
page read and write
211830DA000
heap
page read and write
6A5001A1C000
trusted library allocation
page read and write
211830E8000
heap
page read and write
3B3F000
stack
page read and write
6A50018D8000
trusted library allocation
page read and write
6A5000DD8000
trusted library allocation
page read and write
AB0000
unkown
page readonly
211830D2000
heap
page read and write
1D9CE000
stack
page read and write
21183681000
heap
page read and write
6A5000BF8000
trusted library allocation
page read and write
2948006BC000
trusted library allocation
page read and write
211830CE000
heap
page read and write
211836B2000
heap
page read and write
211830E5000
heap
page read and write
1D6DF000
stack
page read and write
211830E0000
heap
page read and write
21183674000
heap
page read and write
211830CC000
heap
page read and write
61ECC000
direct allocation
page read and write
564F000
stack
page read and write
211830E9000
heap
page read and write
6A50017BC000
trusted library allocation
page read and write
4F7E000
stack
page read and write
211830E0000
heap
page read and write
29480075C000
trusted library allocation
page read and write
BC4000
unkown
page execute and read and write
6A500032C000
trusted library allocation
page read and write
6A50016C8000
trusted library allocation
page read and write
211830E3000
heap
page read and write
211830E0000
heap
page read and write
211830EC000
heap
page read and write
21183696000
heap
page read and write
211836B6000
heap
page read and write
5081000
heap
page read and write
211830CE000
heap
page read and write
6A50012E0000
trusted library allocation
page read and write
6A5000F4C000
trusted library allocation
page read and write
6A5001690000
trusted library allocation
page read and write
211830D2000
heap
page read and write
6A5001858000
trusted library allocation
page read and write
211830CE000
heap
page read and write
3320000
direct allocation
page read and write
294800668000
trusted library allocation
page read and write
211830DB000
heap
page read and write
211830F3000
heap
page read and write
6A5001AD8000
trusted library allocation
page read and write
6A5001448000
trusted library allocation
page read and write
211830D3000
heap
page read and write
294800640000
trusted library allocation
page read and write
6A5001B48000
trusted library allocation
page read and write
3330000
heap
page read and write
6A50018E4000
trusted library allocation
page read and write
6A5001994000
trusted library allocation
page read and write
294800758000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
211830CE000
heap
page read and write
6A500101C000
trusted library allocation
page read and write
6A5001B18000
trusted library allocation
page read and write
211830E8000
heap
page read and write
6A500109C000
trusted library allocation
page read and write
211830E6000
heap
page read and write
211830D4000
heap
page read and write
6A500032C000
trusted library allocation
page read and write
6A5001A40000
trusted library allocation
page read and write
211836B4000
heap
page read and write
5081000
heap
page read and write
211830E0000
heap
page read and write
5510000
direct allocation
page read and write
211830EC000
heap
page read and write
6A500032C000
trusted library allocation
page read and write
6A5000DE8000
trusted library allocation
page read and write
6A5001310000
trusted library allocation
page read and write
211830E5000
heap
page read and write
211830E9000
heap
page read and write
2948006D4000
trusted library allocation
page read and write
6A50019EC000
trusted library allocation
page read and write
294800620000
trusted library allocation
page read and write
6A5001ABC000
trusted library allocation
page read and write
211830E8000
heap
page read and write
6A50019C4000
trusted library allocation
page read and write
1DB75000
heap
page read and write
6A50002A4000
trusted library allocation
page read and write
1DB61000
heap
page read and write
1DB6E000
heap
page read and write
6A50015E4000
trusted library allocation
page read and write
6A5000F28000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830E6000
heap
page read and write
333B000
heap
page read and write
6A5001614000
trusted library allocation
page read and write
6A5001A38000
trusted library allocation
page read and write
5081000
heap
page read and write
211830CB000
heap
page read and write
6A50019CC000
trusted library allocation
page read and write
211830ED000
heap
page read and write
6A5001B08000
trusted library allocation
page read and write
211830EB000
heap
page read and write
6A5001888000
trusted library allocation
page read and write
211830DA000
heap
page read and write
1DB60000
heap
page read and write
6A5001638000
trusted library allocation
page read and write
6A50016A4000
trusted library allocation
page read and write
6A5000380000
trusted library allocation
page read and write
6A50017A0000
trusted library allocation
page read and write
211830CC000
heap
page read and write
1DB77000
heap
page read and write
211830DA000
heap
page read and write
211830E0000
heap
page read and write
1DB46000
heap
page read and write
5081000
heap
page read and write
6A50002A4000
trusted library allocation
page read and write
6A5000390000
trusted library allocation
page read and write
6A5000CA0000
trusted library allocation
page read and write
6A5001AC0000
trusted library allocation
page read and write
1DB5A000
heap
page read and write
211836A1000
heap
page read and write
211830D2000
heap
page read and write
6A500188C000
trusted library allocation
page read and write
1DB32000
heap
page read and write
47FE000
stack
page read and write
211830D3000
heap
page read and write
6A5001840000
trusted library allocation
page read and write
6A500032C000
trusted library allocation
page read and write
211830DA000
heap
page read and write
211830CE000
heap
page read and write
211830EB000
heap
page read and write
211830DA000
heap
page read and write
6A5000340000
trusted library allocation
page read and write
294800330000
trusted library allocation
page read and write
294800688000
trusted library allocation
page read and write
453F000
stack
page read and write
6A5000F80000
trusted library allocation
page read and write
6A500032C000
trusted library allocation
page read and write
294800658000
trusted library allocation
page read and write
211830D4000
heap
page read and write
5081000
heap
page read and write
6A5001B30000
trusted library allocation
page read and write
1DB6E000
heap
page read and write
6A50002A4000
trusted library allocation
page read and write
5081000
heap
page read and write
211830F3000
heap
page read and write
211830EC000
heap
page read and write
6A5000CA0000
trusted library allocation
page read and write
6A5001310000
trusted library allocation
page read and write
2948006E8000
trusted library allocation
page read and write
6A50016F0000
trusted library allocation
page read and write
1035000
unkown
page execute and read and write
5081000
heap
page read and write
6A5001750000
trusted library allocation
page read and write
1A9F000
stack
page read and write
6A50018AC000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A5001C18000
trusted library allocation
page read and write
1DB5C000
heap
page read and write
5081000
heap
page read and write
6A5000CA0000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A5000CB8000
trusted library allocation
page read and write
21183104000
heap
page read and write
6A500140C000
trusted library allocation
page read and write
1DB46000
heap
page read and write
6A5001114000
trusted library allocation
page read and write
6A50001F0000
trusted library allocation
page read and write
211830E5000
heap
page read and write
5081000
heap
page read and write
211830DA000
heap
page read and write
6A5000FBC000
trusted library allocation
page read and write
6A500171C000
trusted library allocation
page read and write
6A5001844000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
294800624000
trusted library allocation
page read and write
6A5000C74000
trusted library allocation
page read and write
6A5000218000
trusted library allocation
page read and write
15E0000
heap
page read and write
211830E0000
heap
page read and write
211830E6000
heap
page read and write
1DB6F000
heap
page read and write
211830E0000
heap
page read and write
6A5001700000
trusted library allocation
page read and write
5081000
heap
page read and write
3320000
direct allocation
page read and write
5690000
direct allocation
page execute and read and write
41BE000
stack
page read and write
6A5000710000
trusted library allocation
page read and write
6A500175C000
trusted library allocation
page read and write
5510000
direct allocation
page read and write
4910002C8000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A5000340000
trusted library allocation
page read and write
211830D3000
heap
page read and write
6A500109C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
1DB76000
heap
page read and write
211830E8000
heap
page read and write
6A5001634000
trusted library allocation
page read and write
6A5002C0C000
trusted library allocation
page read and write
6A5000DE8000
trusted library allocation
page read and write
211830E0000
heap
page read and write
29480039C000
trusted library allocation
page read and write
1DB46000
heap
page read and write
1DB5F000
heap
page read and write
6A5001738000
trusted library allocation
page read and write
211830D4000
heap
page read and write
5660000
direct allocation
page execute and read and write
6A5002EE4000
trusted library allocation
page read and write
4CFE000
stack
page read and write
294800610000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830D4000
heap
page read and write
6C76F000
unkown
page readonly
5081000
heap
page read and write
6A5001A88000
trusted library allocation
page read and write
211830E5000
heap
page read and write
294800330000
trusted library allocation
page read and write
17C8000
heap
page read and write
294800664000
trusted library allocation
page read and write
6A5001AA4000
trusted library allocation
page read and write
211830D2000
heap
page read and write
6A5001334000
trusted library allocation
page read and write
294800368000
trusted library allocation
page read and write
294800320000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A5000224000
trusted library allocation
page read and write
21183104000
heap
page read and write
211830E8000
heap
page read and write
5081000
heap
page read and write
211830D4000
heap
page read and write
211830CB000
heap
page read and write
6A5001334000
trusted library allocation
page read and write
211830D4000
heap
page read and write
21183120000
heap
page read and write
211830E3000
heap
page read and write
211830E4000
heap
page read and write
2118310F000
heap
page read and write
6A50001EC000
trusted library allocation
page read and write
211830D4000
heap
page read and write
42FE000
stack
page read and write
294800760000
trusted library allocation
page read and write
6A500101C000
trusted library allocation
page read and write
6A500177C000
trusted library allocation
page read and write
6A50013D4000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
5081000
heap
page read and write
211830D4000
heap
page read and write
6A50002C4000
trusted library allocation
page read and write
211830E8000
heap
page read and write
211830E5000
heap
page read and write
211830E3000
heap
page read and write
211830E5000
heap
page read and write
6C7E1000
unkown
page execute read
6A5001580000
trusted library allocation
page read and write
211830ED000
heap
page read and write
211830D4000
heap
page read and write
6A500101C000
trusted library allocation
page read and write
211830DA000
heap
page read and write
6F870000
unkown
page readonly
211830E5000
heap
page read and write
211830DA000
heap
page read and write
4910002A0000
trusted library allocation
page read and write
6A50015AC000
trusted library allocation
page read and write
CF8000
unkown
page execute and read and write
6A5001B00000
trusted library allocation
page read and write
211830EC000
heap
page read and write
6A5001E04000
trusted library allocation
page read and write
1768000
heap
page read and write
6A5001038000
trusted library allocation
page read and write
6A500106C000
trusted library allocation
page read and write
6A5001448000
trusted library allocation
page read and write
6A5001658000
trusted library allocation
page read and write
211830D4000
heap
page read and write
32FE000
stack
page read and write
6A50001E0000
trusted library allocation
page read and write
211830D2000
heap
page read and write
1043000
unkown
page execute and read and write
211830DA000
heap
page read and write
211830E6000
heap
page read and write
15D0000
heap
page read and write
211830EF000
heap
page read and write
6A500100C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
5081000
heap
page read and write
6A5002F24000
trusted library allocation
page read and write
6A5001B10000
trusted library allocation
page read and write
1DB56000
heap
page read and write
6A5001660000
trusted library allocation
page read and write
6A50002C4000
trusted library allocation
page read and write
6A50017D0000
trusted library allocation
page read and write
211830E5000
heap
page read and write
6A50017A4000
trusted library allocation
page read and write
211830D9000
heap
page read and write
6A5002EF0000
trusted library allocation
page read and write
38FE000
stack
page read and write
211830E3000
heap
page read and write
211830EC000
heap
page read and write
1DB46000
heap
page read and write
6A500143C000
trusted library allocation
page read and write
1DB5A000
heap
page read and write
6A5001780000
trusted library allocation
page read and write
6A50002A8000
trusted library allocation
page read and write
211830EB000
heap
page read and write
211830E5000
heap
page read and write
211836AF000
heap
page read and write
6A5001AB4000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
23D90000
heap
page read and write
211830D2000
heap
page read and write
5081000
heap
page read and write
6A5001774000
trusted library allocation
page read and write
6F871000
unkown
page execute read
211830E5000
heap
page read and write
1DB6E000
heap
page read and write
211830D4000
heap
page read and write
211830DA000
heap
page read and write
333E000
heap
page read and write
1007000
unkown
page execute and read and write
3320000
direct allocation
page read and write
2948003EC000
trusted library allocation
page read and write
1DACD000
stack
page read and write
5081000
heap
page read and write
4910002C0000
trusted library allocation
page read and write
6A5001568000
trusted library allocation
page read and write
6A50019DC000
trusted library allocation
page read and write
294800698000
trusted library allocation
page read and write
211836A5000
heap
page read and write
211830EC000
heap
page read and write
294800424000
trusted library allocation
page read and write
1DB60000
heap
page read and write
6C7E0000
unkown
page readonly
4910002A0000
trusted library allocation
page read and write
6A500101C000
trusted library allocation
page read and write
6A500199D000
trusted library allocation
page read and write
21183661000
heap
page read and write
23BE0000
heap
page read and write
3320000
direct allocation
page read and write
1DB5F000
heap
page read and write
2118367A000
heap
page read and write
6A50015D0000
trusted library allocation
page read and write
6A5001378000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A500157C000
trusted library allocation
page read and write
6A5001C70000
trusted library allocation
page read and write
157D000
stack
page read and write
6A5001898000
trusted library allocation
page read and write
56A0000
direct allocation
page execute and read and write
5082000
heap
page read and write
6A500143C000
trusted library allocation
page read and write
211830E6000
heap
page read and write
211830DA000
heap
page read and write
61ED0000
direct allocation
page read and write
211830D7000
heap
page read and write
3EFF000
stack
page read and write
211830EC000
heap
page read and write
211830D2000
heap
page read and write
6A50017C0000
trusted library allocation
page read and write
6A5001770000
trusted library allocation
page read and write
1DB46000
heap
page read and write
6A5000390000
trusted library allocation
page read and write
6A50013A8000
trusted library allocation
page read and write
211830E8000
heap
page read and write
AB0000
unkown
page read and write
211830CE000
heap
page read and write
1760000
heap
page read and write
6A5001358000
trusted library allocation
page read and write
6A500109C000
trusted library allocation
page read and write
1DB6E000
heap
page read and write
C1E000
unkown
page execute and read and write
6F8FE000
unkown
page read and write
211830DA000
heap
page read and write
23C82000
heap
page read and write
1DB63000
heap
page read and write
211830DD000
heap
page read and write
211830F4000
heap
page read and write
3320000
direct allocation
page read and write
6A5001C0C000
trusted library allocation
page read and write
6A50017E0000
trusted library allocation
page read and write
C5A000
unkown
page execute and read and write
6C5D1000
unkown
page execute read
6A5001824000
trusted library allocation
page read and write
6A5000BF8000
trusted library allocation
page read and write
6A5001628000
trusted library allocation
page read and write
467F000
stack
page read and write
6A500100C000
trusted library allocation
page read and write
211830E3000
heap
page read and write
211830EB000
heap
page read and write
211830E8000
heap
page read and write
211830EB000
heap
page read and write
3300000
heap
page read and write
6A5001C30000
trusted library allocation
page read and write
211830EB000
heap
page read and write
B96000
unkown
page execute and read and write
1572000
stack
page read and write
6A5001838000
trusted library allocation
page read and write
211836A1000
heap
page read and write
5081000
heap
page read and write
6A50002A4000
trusted library allocation
page read and write
211830D4000
heap
page read and write
211830CC000
heap
page read and write
211830E6000
heap
page read and write
6A5000340000
trusted library allocation
page read and write
211830E8000
heap
page read and write
D18000
unkown
page execute and read and write
6A5000CB8000
trusted library allocation
page read and write
211830E8000
heap
page read and write
4DFF000
stack
page read and write
211830D4000
heap
page read and write
211830E5000
heap
page read and write
5081000
heap
page read and write
6A5000390000
trusted library allocation
page read and write
367E000
stack
page read and write
507F000
stack
page read and write
211830E5000
heap
page read and write
211830CE000
heap
page read and write
C2B000
unkown
page execute and read and write
6A500142C000
trusted library allocation
page read and write
5081000
heap
page read and write
4910002A0000
trusted library allocation
page read and write
6A50001F4000
trusted library allocation
page read and write
21183105000
heap
page read and write
6A5001AB8000
trusted library allocation
page read and write
211830D4000
heap
page read and write
6A5001C5C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A5001A5C000
trusted library allocation
page read and write
17E3000
heap
page read and write
211830E8000
heap
page read and write
21183105000
heap
page read and write
6A5000CB8000
trusted library allocation
page read and write
211830E5000
heap
page read and write
211830DA000
heap
page read and write
5081000
heap
page read and write
211830E0000
heap
page read and write
6A5001734000
trusted library allocation
page read and write
6A5000340000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
6A500183C000
trusted library allocation
page read and write
6A50002F4000
trusted library allocation
page read and write
6A5001834000
trusted library allocation
page read and write
211830D4000
heap
page read and write
1DB58000
heap
page read and write
211830E0000
heap
page read and write
6A50001AC000
trusted library allocation
page read and write
6A5001478000
trusted library allocation
page read and write
294800614000
trusted library allocation
page read and write
211830E4000
heap
page read and write
211830E3000
heap
page read and write
5081000
heap
page read and write
6A50002F4000
trusted library allocation
page read and write
6A500189C000
trusted library allocation
page read and write
211830D2000
heap
page read and write
1D45F000
stack
page read and write
6A5000CA0000
trusted library allocation
page read and write
6A500120C000
trusted library allocation
page read and write
211830E5000
heap
page read and write
5080000
heap
page read and write
6A50012A8000
trusted library allocation
page read and write
6A5001D6C000
trusted library allocation
page read and write
211836BD000
heap
page read and write
457E000
stack
page read and write
6C7AE000
unkown
page read and write
6A500149C000
trusted library allocation
page read and write
211830E6000
heap
page read and write
6A500032C000
trusted library allocation
page read and write
211830E9000
heap
page read and write
211830E0000
heap
page read and write
3B7E000
stack
page read and write
23BC0000
trusted library allocation
page read and write
211830E0000
heap
page read and write
6A5000334000
trusted library allocation
page read and write
5081000
heap
page read and write
211830E5000
heap
page read and write
6A5001998000
trusted library allocation
page read and write
6A500032C000
trusted library allocation
page read and write
2118368D000
heap
page read and write
211830E3000
heap
page read and write
211830E3000
heap
page read and write
4910002A0000
trusted library allocation
page read and write
211830CC000
heap
page read and write
211830E6000
heap
page read and write
6A500030C000
trusted library allocation
page read and write
211830E0000
heap
page read and write
211830D3000
heap
page read and write
1DB54000
heap
page read and write
4910002A0000
trusted library allocation
page read and write
5081000
heap
page read and write
211830E0000
heap
page read and write
211830DA000
heap
page read and write
6A5001A58000
trusted library allocation
page read and write
569E000
stack
page read and write
6A50013DC000
trusted library allocation
page read and write
6A5000383000
trusted library allocation
page read and write
6A50001D4000
trusted library allocation
page read and write
79E400244000
direct allocation
page read and write
6A5000E7C000
trusted library allocation
page read and write
5081000
heap
page read and write
211830CE000
heap
page read and write
211830D2000
heap
page read and write
6A5001854000
trusted library allocation
page read and write
5081000
heap
page read and write
211830E0000
heap
page read and write
6A5001994000
trusted library allocation
page read and write
211830E8000
heap
page read and write
6A50012E0000
trusted library allocation
page read and write
211830CE000
heap
page read and write
211830D4000
heap
page read and write
184B000
heap
page read and write
6A5001478000
trusted library allocation
page read and write
211830E6000
heap
page read and write
211830D4000
heap
page read and write
6A5001654000
trusted library allocation
page read and write
6A50013C8000
trusted library allocation
page read and write
294800750000
trusted library allocation
page read and write
211830EC000
heap
page read and write
5081000
heap
page read and write
5081000
heap
page read and write
211830E6000
heap
page read and write
5081000
heap
page read and write
6A5001648000
trusted library allocation
page read and write
6A5001AE4000
trusted library allocation
page read and write
211830D3000
heap
page read and write
294800734000
trusted library allocation
page read and write
5670000
direct allocation
page execute and read and write
6A5001708000
trusted library allocation
page read and write
6A50001B4000
trusted library allocation
page read and write
211830CE000
heap
page read and write
211830EB000
heap
page read and write
There are 1234 hidden memdumps, click here to show them.