IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AAKEGDAKEHJDHIDHJJDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEGDBAFHJJDAKEBGCFCB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBGIEGCF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCBGIIECGHCAKECAFBFHIJKEBK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCAEBFBKKJDHIDHIDBAEHCGIEH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IEHIIIJDAAAAAAKECBFB
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\JDGIIDHJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (789)
downloaded
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2312,i,16225279011638824055,3735573977793458152,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj$N
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://anglebug.com/7714
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://185.215.113.206l
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
http://185.215.113.206/746f34465cf17784/mozglue.dll7
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.184.206
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://185.215.113.206/6c4adf523b719729.phpcal
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
http://anglebug.com/4384
unknown
http://185.215.113.206/746f34465cf17784/nss3.dlle
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
http://185.215.113.206/746f34465cf17784/msvcp140.dll6
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://domains.google.com/suggest/flow
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://185.215.113.206/6c4adf523b719729.phpDBAFHJJDAKEBGCFCB
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
https://anglebug.com/7847
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.184.206
play.google.com
142.250.185.110
www.google.com
142.250.184.196
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
142.250.184.196
www.google.com
United States
239.255.255.250
unknown
Reserved
142.250.184.206
plus.l.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
381000
unkown
page execute and read and write
malicious
105E000
heap
page read and write
malicious
4E10000
direct allocation
page read and write
malicious
7C0017F8000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
2C5E000
heap
page read and write
1D453000
heap
page read and write
7C001624000
trusted library allocation
page read and write
7C001854000
trusted library allocation
page read and write
7C00189C000
trusted library allocation
page read and write
4E24006D4000
trusted library allocation
page read and write
10B5000
heap
page read and write
4981000
heap
page read and write
4E2400390000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
1CD9E000
stack
page read and write
24F1F088000
heap
page read and write
341F000
stack
page read and write
4E2400320000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
4E240060C000
trusted library allocation
page read and write
7C001B1C000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F086000
heap
page read and write
24F1F078000
heap
page read and write
237E1000
heap
page read and write
7C000CB8000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
3E28002A4000
trusted library allocation
page read and write
4981000
heap
page read and write
2363E000
stack
page read and write
7C000CA8000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
7C000454000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
7C001710000
trusted library allocation
page read and write
3E28002C0000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
1D45F000
heap
page read and write
1D457000
heap
page read and write
7C000CC0000
trusted library allocation
page read and write
7C002EDC000
trusted library allocation
page read and write
4E2400610000
trusted library allocation
page read and write
7C001B9C000
trusted library allocation
page read and write
3E28002A0000
trusted library allocation
page read and write
24F1F089000
heap
page read and write
7C001AF4000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
1D45F000
heap
page read and write
1CD5F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
7C000C8C000
trusted library allocation
page read and write
7C000C30000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
6C690000
unkown
page readonly
7C001718000
trusted library allocation
page read and write
6C691000
unkown
page execute read
7C0012E8000
trusted library allocation
page read and write
7C0001D0000
trusted library allocation
page read and write
7C00143C000
trusted library allocation
page read and write
7C0002C0000
trusted library allocation
page read and write
7C000354000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F070000
heap
page read and write
1058000
heap
page read and write
7C0016C8000
trusted library allocation
page read and write
124E000
stack
page read and write
24F1F06A000
heap
page read and write
24F1F086000
heap
page read and write
7C000214000
trusted library allocation
page read and write
4981000
heap
page read and write
7C001024000
trusted library allocation
page read and write
7C001054000
trusted library allocation
page read and write
7C0016E4000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
7C001AF0000
trusted library allocation
page read and write
4E24006E8000
trusted library allocation
page read and write
24F1F06C000
heap
page read and write
7C000334000
trusted library allocation
page read and write
7C001CB4000
trusted library allocation
page read and write
4981000
heap
page read and write
7C001A74000
trusted library allocation
page read and write
7C000C30000
trusted library allocation
page read and write
6C870000
unkown
page read and write
24F1F082000
heap
page read and write
2D5F000
stack
page read and write
7C000384000
trusted library allocation
page read and write
7C00178C000
trusted library allocation
page read and write
7C0002AC000
trusted library allocation
page read and write
7C0001C8000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
7C000F64000
trusted library allocation
page read and write
1D43B000
heap
page read and write
7C000348000
trusted library allocation
page read and write
4981000
heap
page read and write
7C0019BF000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
24F1F072000
heap
page read and write
61EB4000
direct allocation
page read and write
7C001904000
trusted library allocation
page read and write
7C001A4C000
trusted library allocation
page read and write
7C0019C8000
trusted library allocation
page read and write
237E1000
heap
page read and write
4E240075C000
trusted library allocation
page read and write
7C001478000
trusted library allocation
page read and write
4981000
heap
page read and write
7C0015DC000
trusted library allocation
page read and write
24F1F075000
heap
page read and write
7C001B28000
trusted library allocation
page read and write
4981000
heap
page read and write
7EE000
unkown
page execute and read and write
7C001024000
trusted library allocation
page read and write
2C40000
direct allocation
page read and write
4E240040C000
trusted library allocation
page read and write
7C000C5C000
trusted library allocation
page read and write
10A1000
heap
page read and write
4E2400248000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
7C001038000
trusted library allocation
page read and write
7C00186C000
trusted library allocation
page read and write
4E2400678000
trusted library allocation
page read and write
7C000308000
trusted library allocation
page read and write
2C40000
direct allocation
page read and write
7C000354000
trusted library allocation
page read and write
23501000
heap
page read and write
7C0007A8000
trusted library allocation
page read and write
24F1F08D000
heap
page read and write
495F000
stack
page read and write
1D430000
heap
page read and write
7C0012C4000
trusted library allocation
page read and write
1D474000
heap
page read and write
4E240035C000
trusted library allocation
page read and write
7C0016E0000
trusted library allocation
page read and write
7C00120C000
trusted library allocation
page read and write
7C0017D4000
trusted library allocation
page read and write
7C00180C000
trusted library allocation
page read and write
7C0007A8000
trusted library allocation
page read and write
7C001CB7000
trusted library allocation
page read and write
7C000F2C000
trusted library allocation
page read and write
7C001314000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F06C000
heap
page read and write
2A2E000
stack
page read and write
234C0000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
1D458000
heap
page read and write
4981000
heap
page read and write
7C0015CC000
trusted library allocation
page read and write
24F1F09C000
heap
page read and write
7C00160C000
trusted library allocation
page read and write
1D446000
heap
page read and write
1D456000
heap
page read and write
7C001858000
trusted library allocation
page read and write
B7C000
stack
page read and write
4E2400684000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F088000
heap
page read and write
1D46E000
heap
page read and write
4981000
heap
page read and write
900000
unkown
page execute and read and write
24F1F086000
heap
page read and write
24F1F070000
heap
page read and write
4981000
heap
page read and write
24F1F076000
heap
page read and write
24F1F07E000
heap
page read and write
7C001480000
trusted library allocation
page read and write
7C0002B2000
trusted library allocation
page read and write
4E24006BC000
trusted library allocation
page read and write
7C00135C000
trusted library allocation
page read and write
4981000
heap
page read and write
1D45D000
heap
page read and write
4981000
heap
page read and write
24F1F076000
heap
page read and write
4E2400320000
trusted library allocation
page read and write
4E24006F0000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
7C001394000
trusted library allocation
page read and write
1D555000
heap
page read and write
7C001B18000
trusted library allocation
page read and write
1D446000
heap
page read and write
7C000F64000
trusted library allocation
page read and write
7C001A14000
trusted library allocation
page read and write
4E2400688000
trusted library allocation
page read and write
7C00161C000
trusted library allocation
page read and write
485E000
stack
page read and write
2C40000
direct allocation
page read and write
3F5F000
stack
page read and write
527000
unkown
page execute and read and write
7C001D48000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
7C00022C000
trusted library allocation
page read and write
6C86E000
unkown
page read and write
7C0002C0000
trusted library allocation
page read and write
4981000
heap
page read and write
7C000CA8000
trusted library allocation
page read and write
4983000
heap
page read and write
7C000FA4000
trusted library allocation
page read and write
4FB000
unkown
page execute and read and write
7C0002AC000
trusted library allocation
page read and write
6C5F1000
unkown
page execute read
24F1F086000
heap
page read and write
6C5F0000
unkown
page readonly
7C001CB4000
trusted library allocation
page read and write
391F000
stack
page read and write
7C001664000
trusted library allocation
page read and write
1D465000
heap
page read and write
24F1F086000
heap
page read and write
24F1F07E000
heap
page read and write
24F1F06A000
heap
page read and write
3AC000
unkown
page execute and read and write
1D457000
heap
page read and write
1D456000
heap
page read and write
369F000
stack
page read and write
24F1F088000
heap
page read and write
1D440000
heap
page read and write
7C002C0C000
trusted library allocation
page read and write
24F1F082000
heap
page read and write
4E24006C8000
trusted library allocation
page read and write
4981000
heap
page read and write
7C000348000
trusted library allocation
page read and write
4E24006B4000
trusted library allocation
page read and write
7C001338000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
7C001C70000
trusted library allocation
page read and write
4E2400714000
trusted library allocation
page read and write
381000
unkown
page execute and write copy
7C001670000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C001714000
trusted library allocation
page read and write
24F1F5CC000
heap
page read and write
7C001A80000
trusted library allocation
page read and write
4E2400614000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
7C0002AC000
trusted library allocation
page read and write
1D46E000
heap
page read and write
23740000
trusted library allocation
page read and write
7C001AB8000
trusted library allocation
page read and write
4981000
heap
page read and write
7C001B0C000
trusted library allocation
page read and write
1D03E000
stack
page read and write
24F1F070000
heap
page read and write
7C001080000
trusted library allocation
page read and write
7C001C18000
trusted library allocation
page read and write
7C002EF4000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F080000
heap
page read and write
7C001044000
trusted library allocation
page read and write
7C001080000
trusted library allocation
page read and write
4E24006D0000
trusted library allocation
page read and write
7C000CA8000
trusted library allocation
page read and write
7C0015C8000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F070000
heap
page read and write
7C001BF0000
trusted library allocation
page read and write
7C0002AC000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
7C001A10000
trusted library allocation
page read and write
910000
unkown
page execute and read and write
4981000
heap
page read and write
5E8000
unkown
page execute and read and write
7C0015E8000
trusted library allocation
page read and write
7C00175C000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
24F1F070000
heap
page read and write
4981000
heap
page read and write
7C0017C0000
trusted library allocation
page read and write
910000
unkown
page execute and write copy
3E28002C0000
trusted library allocation
page read and write
7C000340000
trusted library allocation
page read and write
1D446000
heap
page read and write
7C00167C000
trusted library allocation
page read and write
7C001704000
trusted library allocation
page read and write
4981000
heap
page read and write
7C0016C4000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
7C001B24000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C000210000
trusted library allocation
page read and write
23529000
heap
page read and write
36DE000
stack
page read and write
7C00159C000
trusted library allocation
page read and write
7C001B14000
trusted library allocation
page read and write
7C000CD0000
trusted library allocation
page read and write
7C0019E8000
trusted library allocation
page read and write
3F9D000
stack
page read and write
4E2400320000
trusted library allocation
page read and write
6C66D000
unkown
page readonly
7C001850000
trusted library allocation
page read and write
7C0001EC000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F086000
heap
page read and write
4E2400664000
trusted library allocation
page read and write
7C00165C000
trusted library allocation
page read and write
7C000A38000
trusted library allocation
page read and write
2E5F000
stack
page read and write
4E2400694000
trusted library allocation
page read and write
7C001678000
trusted library allocation
page read and write
24F1F06A000
heap
page read and write
24F1F088000
heap
page read and write
2BEE000
stack
page read and write
24F1F086000
heap
page read and write
24F1F076000
heap
page read and write
24F1F086000
heap
page read and write
6F861000
unkown
page execute read
7C001338000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
7C001064000
trusted library allocation
page read and write
7C0002F8000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
1139000
heap
page read and write
7C0013C8000
trusted library allocation
page read and write
1D461000
heap
page read and write
7C0012D0000
trusted library allocation
page read and write
EFC000
stack
page read and write
7C00143C000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F082000
heap
page read and write
24F1F076000
heap
page read and write
66A000
unkown
page execute and read and write
7C000FF0000
trusted library allocation
page read and write
4981000
heap
page read and write
7C001A78000
trusted library allocation
page read and write
1D475000
heap
page read and write
7C001B88000
trusted library allocation
page read and write
1D460000
heap
page read and write
7C000F64000
trusted library allocation
page read and write
7C00024C000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F08E000
heap
page read and write
24F1F088000
heap
page read and write
7C000CA8000
trusted library allocation
page read and write
1D446000
heap
page read and write
4E24002FC000
trusted library allocation
page read and write
7C001378000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F072000
heap
page read and write
7C00129C000
trusted library allocation
page read and write
3E28002A4000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
1D550000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
7C00141C000
trusted library allocation
page read and write
7C000C78000
trusted library allocation
page read and write
7C0017C4000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
4E2400654000
trusted library allocation
page read and write
4990000
heap
page read and write
24F1F088000
heap
page read and write
7C001478000
trusted library allocation
page read and write
4E2400750000
trusted library allocation
page read and write
7C001C0C000
trusted library allocation
page read and write
1122000
heap
page read and write
61ED4000
direct allocation
page readonly
237DB000
heap
page read and write
7C001818000
trusted library allocation
page read and write
7C002CDC000
trusted library allocation
page read and write
7C0016A8000
trusted library allocation
page read and write
7C001638000
trusted library allocation
page read and write
1D453000
heap
page read and write
7C001724000
trusted library allocation
page read and write
2358B000
heap
page read and write
4981000
heap
page read and write
24F1F088000
heap
page read and write
7C0017B4000
trusted library allocation
page read and write
7C001830000
trusted library allocation
page read and write
4E2400354000
trusted library allocation
page read and write
7C000F2C000
trusted library allocation
page read and write
4E2400620000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C00100C000
trusted library allocation
page read and write
7C001314000
trusted library allocation
page read and write
2353D000
heap
page read and write
7C001728000
trusted library allocation
page read and write
7C001D54000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C001620000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
4981000
heap
page read and write
7C0002AC000
trusted library allocation
page read and write
7C000454000
trusted library allocation
page read and write
4981000
heap
page read and write
111D000
heap
page read and write
102E000
stack
page read and write
1D46E000
heap
page read and write
3E28002A0000
trusted library allocation
page read and write
7C002F10000
trusted library allocation
page read and write
7C001794000
trusted library allocation
page read and write
7C001D7C000
trusted library allocation
page read and write
7C001338000
trusted library allocation
page read and write
7C0016EC000
trusted library allocation
page read and write
24F1F082000
heap
page read and write
449E000
stack
page read and write
7C001D24000
trusted library allocation
page read and write
24F1F673000
heap
page read and write
1D456000
heap
page read and write
7C001B38000
trusted library allocation
page read and write
24F1F08E000
heap
page read and write
61ED0000
direct allocation
page read and write
7C0018A4000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
24F1F086000
heap
page read and write
7C001AF8000
trusted library allocation
page read and write
2C40000
direct allocation
page read and write
24F1F096000
heap
page read and write
1D46E000
heap
page read and write
7C000CD0000
trusted library allocation
page read and write
4E2400330000
trusted library allocation
page read and write
7C00142C000
trusted library allocation
page read and write
1D45A000
heap
page read and write
24F1F06E000
heap
page read and write
445F000
stack
page read and write
3E28002C0000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
7C001884000
trusted library allocation
page read and write
7C000F80000
trusted library allocation
page read and write
23524000
heap
page read and write
2C40000
direct allocation
page read and write
7C000FF0000
trusted library allocation
page read and write
24F1F07E000
heap
page read and write
1D459000
heap
page read and write
1D460000
heap
page read and write
7C000F3C000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
24F1F070000
heap
page read and write
2373E000
stack
page read and write
2C40000
direct allocation
page read and write
7C001B50000
trusted library allocation
page read and write
5C8000
unkown
page execute and read and write
1D45A000
heap
page read and write
24F1F088000
heap
page read and write
7C000454000
trusted library allocation
page read and write
EF2000
stack
page read and write
4F90000
direct allocation
page execute and read and write
7C001874000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
4E2400330000
trusted library allocation
page read and write
7C00176C000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
7C001790000
trusted library allocation
page read and write
32DF000
stack
page read and write
7C00164C000
trusted library allocation
page read and write
41DF000
stack
page read and write
24F1F06E000
heap
page read and write
7C000340000
trusted library allocation
page read and write
7C000384000
trusted library allocation
page read and write
2B6E000
stack
page read and write
7C000A38000
trusted library allocation
page read and write
2C5B000
heap
page read and write
494000
unkown
page execute and read and write
7C000F64000
trusted library allocation
page read and write
7C001BF0000
trusted library allocation
page read and write
7C0002AC000
trusted library allocation
page read and write
8D7000
unkown
page execute and read and write
1D479000
heap
page read and write
3E2800248000
trusted library allocation
page read and write
7C001024000
trusted library allocation
page read and write
24F1F068000
heap
page read and write
7C000308000
trusted library allocation
page read and write
1D454000
heap
page read and write
4E2400640000
trusted library allocation
page read and write
7C001AD0000
trusted library allocation
page read and write
4981000
heap
page read and write
237D3000
heap
page read and write
4981000
heap
page read and write
7C0018A8000
trusted library allocation
page read and write
7C0013DC000
trusted library allocation
page read and write
7C0003B0000
trusted library allocation
page read and write
BF0000
heap
page read and write
24F1F088000
heap
page read and write
7C0018C0000
trusted library allocation
page read and write
2C40000
direct allocation
page read and write
7C001588000
trusted library allocation
page read and write
7C001AE8000
trusted library allocation
page read and write
45DE000
stack
page read and write
7C0001E4000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
3E28002D8000
trusted library allocation
page read and write
BA0000
heap
page read and write
331E000
stack
page read and write
7C000234000
trusted library allocation
page read and write
BA5000
heap
page read and write
1D45F000
heap
page read and write
7C0007A8000
trusted library allocation
page read and write
24F1F089000
heap
page read and write
7C00040C000
trusted library allocation
page read and write
7C000354000
trusted library allocation
page read and write
8F9000
unkown
page execute and read and write
24F1F06E000
heap
page read and write
24F1F086000
heap
page read and write
1D18D000
stack
page read and write
7C0002FB000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F088000
heap
page read and write
7C001674000
trusted library allocation
page read and write
4E2400630000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F09D000
heap
page read and write
4F9E000
stack
page read and write
7C001D2E000
trusted library allocation
page read and write
7C000308000
trusted library allocation
page read and write
7C001640000
trusted library allocation
page read and write
1D460000
heap
page read and write
7C000340000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
24F1F070000
heap
page read and write
24F1F070000
heap
page read and write
1D45A000
heap
page read and write
7C000314000
trusted library allocation
page read and write
3E28002C0000
trusted library allocation
page read and write
24F1F08E000
heap
page read and write
7C000A38000
trusted library allocation
page read and write
3CDF000
stack
page read and write
24F1F076000
heap
page read and write
381E000
stack
page read and write
7C0002B2000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
24F1F088000
heap
page read and write
24F1F086000
heap
page read and write
4E2400760000
trusted library allocation
page read and write
1D449000
heap
page read and write
7C001B08000
trusted library allocation
page read and write
6C67E000
unkown
page read and write
7C0015F0000
trusted library allocation
page read and write
4E2400734000
trusted library allocation
page read and write
4E2400418000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
7C0002B0000
trusted library allocation
page read and write
24F1F090000
heap
page read and write
7C000248000
trusted library allocation
page read and write
2BAC000
stack
page read and write
4981000
heap
page read and write
3E5E000
stack
page read and write
24F1F070000
heap
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
7C0004B8000
trusted library allocation
page read and write
7C0001F8000
trusted library allocation
page read and write
3BDE000
stack
page read and write
24F1F086000
heap
page read and write
4E2400758000
trusted library allocation
page read and write
7C0013D4000
trusted library allocation
page read and write
7C0011A4000
trusted library allocation
page read and write
1D2CE000
stack
page read and write
466000
unkown
page execute and read and write
481F000
stack
page read and write
7C000FA8000
trusted library allocation
page read and write
7C001458000
trusted library allocation
page read and write
6C682000
unkown
page readonly
7C000230000
trusted library allocation
page read and write
6F860000
unkown
page readonly
1D459000
heap
page read and write
4960000
heap
page read and write
7C001064000
trusted library allocation
page read and write
7C00114C000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
7C0015D0000
trusted library allocation
page read and write
234C0000
trusted library allocation
page read and write
7C0002B0000
trusted library allocation
page read and write
7C001848000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
7C001B10000
trusted library allocation
page read and write
7C001480000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
1CFDF000
stack
page read and write
7C000340000
trusted library allocation
page read and write
7C001660000
trusted library allocation
page read and write
7C000E28000
trusted library allocation
page read and write
431F000
stack
page read and write
24F1F06E000
heap
page read and write
2C50000
heap
page read and write
7C001B10000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
4E10000
direct allocation
page read and write
1D465000
heap
page read and write
4981000
heap
page read and write
7C000354000
trusted library allocation
page read and write
7C001740000
trusted library allocation
page read and write
7C001A54000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
7C000CD0000
trusted library allocation
page read and write
380000
unkown
page read and write
7C0016E8000
trusted library allocation
page read and write
7C001A24000
trusted library allocation
page read and write
1D45D000
heap
page read and write
911000
unkown
page execute and write copy
2C40000
direct allocation
page read and write
7C001A98000
trusted library allocation
page read and write
7C0016A0000
trusted library allocation
page read and write
7C0017A0000
trusted library allocation
page read and write
23530000
heap
page read and write
4E2400380000
trusted library allocation
page read and write
24F1F084000
heap
page read and write
24F1F076000
heap
page read and write
24F1F088000
heap
page read and write
4E240033C000
trusted library allocation
page read and write
24F1F072000
heap
page read and write
7C0001C8000
trusted library allocation
page read and write
4981000
heap
page read and write
7C000250000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
1D458000
heap
page read and write
4E24006B0000
trusted library allocation
page read and write
24F1F080000
heap
page read and write
7C000340000
trusted library allocation
page read and write
421E000
stack
page read and write
7C00140C000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
7C000CB8000
trusted library allocation
page read and write
7C001AFC000
trusted library allocation
page read and write
3E28002C0000
trusted library allocation
page read and write
2C40000
direct allocation
page read and write
4E24003EC000
trusted library allocation
page read and write
1D45A000
heap
page read and write
3E28002B0000
trusted library allocation
page read and write
7C001D7C000
trusted library allocation
page read and write
24F1F673000
heap
page read and write
4981000
heap
page read and write
24F1F076000
heap
page read and write
1D460000
heap
page read and write
24F1F086000
heap
page read and write
7C001AA4000
trusted library allocation
page read and write
7C0002B0000
trusted library allocation
page read and write
7C0002CC000
trusted library allocation
page read and write
7C00023C000
trusted library allocation
page read and write
BE0000
heap
page read and write
7C0017BC000
trusted library allocation
page read and write
4E2400754000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
3E1F000
stack
page read and write
7C000E28000
trusted library allocation
page read and write
7C000C34000
trusted library allocation
page read and write
31DE000
stack
page read and write
7C000CC0000
trusted library allocation
page read and write
1D463000
heap
page read and write
1D446000
heap
page read and write
4E2400668000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
1D13F000
stack
page read and write
1D446000
heap
page read and write
4E2400730000
trusted library allocation
page read and write
7C000340000
trusted library allocation
page read and write
7C0007A8000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
4981000
heap
page read and write
24F1F06E000
heap
page read and write
4F90000
direct allocation
page execute and read and write
3A5F000
stack
page read and write
3E28002A0000
trusted library allocation
page read and write
7C001788000
trusted library allocation
page read and write
4E4B000
stack
page read and write
24F1F077000
heap
page read and write
3E28002E4000
trusted library allocation
page read and write
7C002EEC000
trusted library allocation
page read and write
4E2400658000
trusted library allocation
page read and write
7C00135C000
trusted library allocation
page read and write
7C000FA4000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
1D457000
heap
page read and write
24F1F070000
heap
page read and write
7C000FA4000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
24F1F088000
heap
page read and write
7C0019B4000
trusted library allocation
page read and write
4E24006E4000
trusted library allocation
page read and write
7C001868000
trusted library allocation
page read and write
4E2400368000
trusted library allocation
page read and write
1CEDE000
stack
page read and write
7C001A7C000
trusted library allocation
page read and write
4E240069C000
trusted library allocation
page read and write
7C000F2C000
trusted library allocation
page read and write
7C000308000
trusted library allocation
page read and write
44F400244000
direct allocation
page read and write
4E2400788000
trusted library allocation
page read and write
7C001B3C000
trusted library allocation
page read and write
7C0019BD000
trusted library allocation
page read and write
7C001A48000
trusted library allocation
page read and write
4981000
heap
page read and write
1D478000
heap
page read and write
1D28C000
stack
page read and write
1D46E000
heap
page read and write
24F1F088000
heap
page read and write
7C002EE8000
trusted library allocation
page read and write
7C0015F4000
trusted library allocation
page read and write
7C000CA8000
trusted library allocation
page read and write
7C001680000
trusted library allocation
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
7C00173C000
trusted library allocation
page read and write
7C0016D8000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F076000
heap
page read and write
24F1F070000
heap
page read and write
471E000
stack
page read and write
24F1F070000
heap
page read and write
7C001870000
trusted library allocation
page read and write
24F1F06D000
heap
page read and write
7C000384000
trusted library allocation
page read and write
7C000F80000
trusted library allocation
page read and write
23583000
heap
page read and write
24F1F076000
heap
page read and write
2B2F000
stack
page read and write
24F1F083000
heap
page read and write
4981000
heap
page read and write
7C001748000
trusted library allocation
page read and write
7C001750000
trusted library allocation
page read and write
6C86F000
unkown
page write copy
7C000FA4000
trusted library allocation
page read and write
7C001C6C000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
4981000
heap
page read and write
7C0015A8000
trusted library allocation
page read and write
7C001760000
trusted library allocation
page read and write
1D46E000
heap
page read and write
4980000
heap
page read and write
7C0001D0000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
24F1F088000
heap
page read and write
24F1F084000
heap
page read and write
7C0015A0000
trusted library allocation
page read and write
24F1F09E000
heap
page read and write
24F1F06E000
heap
page read and write
24F1F076000
heap
page read and write
7C001054000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F088000
heap
page read and write
7C0017C8000
trusted library allocation
page read and write
49DB000
heap
page read and write
7C0019E4000
trusted library allocation
page read and write
7C000F80000
trusted library allocation
page read and write
7C001AE4000
trusted library allocation
page read and write
7C0018AC000
trusted library allocation
page read and write
3E28002C8000
trusted library allocation
page read and write
4981000
heap
page read and write
1D3CD000
stack
page read and write
7C0015A4000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F088000
heap
page read and write
7C000CD0000
trusted library allocation
page read and write
4981000
heap
page read and write
7C0016FC000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
1050000
heap
page read and write
7C00181C000
trusted library allocation
page read and write
237E9000
heap
page read and write
7C000308000
trusted library allocation
page read and write
7C00172C000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F06E000
heap
page read and write
1D46E000
heap
page read and write
7C001A94000
trusted library allocation
page read and write
7C0016A4000
trusted library allocation
page read and write
7C00156C000
trusted library allocation
page read and write
24F1F06C000
heap
page read and write
24F1F06E000
heap
page read and write
7C001BA0000
trusted library allocation
page read and write
AAE000
unkown
page execute and read and write
7C001480000
trusted library allocation
page read and write
435E000
stack
page read and write
7C000CA8000
trusted library allocation
page read and write
4F4F000
stack
page read and write
2C40000
direct allocation
page read and write
7C001B58000
trusted library allocation
page read and write
7C0019B4000
trusted library allocation
page read and write
7C000F3C000
trusted library allocation
page read and write
7C0017E4000
trusted library allocation
page read and write
24F1F077000
heap
page read and write
24F1F070000
heap
page read and write
7C000308000
trusted library allocation
page read and write
7C0017B8000
trusted library allocation
page read and write
3A9E000
stack
page read and write
7C00147C000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C00021C000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
7C000348000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F070000
heap
page read and write
7C001770000
trusted library allocation
page read and write
4981000
heap
page read and write
7C001AB0000
trusted library allocation
page read and write
7C000A38000
trusted library allocation
page read and write
7C000340000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
7C0003B0000
trusted library allocation
page read and write
359E000
stack
page read and write
7C001B20000
trusted library allocation
page read and write
4E2400624000
trusted library allocation
page read and write
355F000
stack
page read and write
7C000244000
trusted library allocation
page read and write
37DF000
stack
page read and write
7C001AEC000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
61ECD000
direct allocation
page readonly
24F1F06E000
heap
page read and write
7C001B4C000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
46DF000
stack
page read and write
6F907000
unkown
page read and write
24F1F088000
heap
page read and write
6F909000
unkown
page readonly
7C000F64000
trusted library allocation
page read and write
1118000
heap
page read and write
24F1F06E000
heap
page read and write
4E240080C000
trusted library allocation
page read and write
7C002EF4000
trusted library allocation
page read and write
7C001B8C000
trusted library allocation
page read and write
7C0002AC000
trusted library allocation
page read and write
1D45F000
heap
page read and write
7C001A0C000
trusted library allocation
page read and write
4E2400310000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C00163C000
trusted library allocation
page read and write
7C002F1C000
trusted library allocation
page read and write
7C000220000
trusted library allocation
page read and write
3E28002A0000
trusted library allocation
page read and write
7C0016DC000
trusted library allocation
page read and write
7C00182C000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F086000
heap
page read and write
4E2400354000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F076000
heap
page read and write
7C0012C4000
trusted library allocation
page read and write
7C000354000
trusted library allocation
page read and write
24F1F084000
heap
page read and write
4981000
heap
page read and write
7C001578000
trusted library allocation
page read and write
52A000
unkown
page execute and read and write
2C57000
heap
page read and write
7C001064000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
24F1F088000
heap
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
7C0013EC000
trusted library allocation
page read and write
7C001B58000
trusted library allocation
page read and write
7C001B78000
trusted library allocation
page read and write
24F1F077000
heap
page read and write
7C001448000
trusted library allocation
page read and write
7C0017B0000
trusted library allocation
page read and write
7C0018BC000
trusted library allocation
page read and write
7C001E04000
trusted library allocation
page read and write
7C000E24000
trusted library allocation
page read and write
7C00174C000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
24F1F088000
heap
page read and write
7C000F64000
trusted library allocation
page read and write
319F000
stack
page read and write
6C82F000
unkown
page readonly
7C0014BC000
trusted library allocation
page read and write
4981000
heap
page read and write
7C000C3C000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F088000
heap
page read and write
7C000454000
trusted library allocation
page read and write
7C0001E8000
trusted library allocation
page read and write
7C000340000
trusted library allocation
page read and write
1D479000
heap
page read and write
4981000
heap
page read and write
10D5000
heap
page read and write
2C40000
direct allocation
page read and write
7C0019B4000
trusted library allocation
page read and write
7C001B54000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
5EE000
unkown
page execute and read and write
24F1F076000
heap
page read and write
7C000F70000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
4E3B000
direct allocation
page read and write
AAF000
unkown
page execute and write copy
24F1F084000
heap
page read and write
24F1F088000
heap
page read and write
7C001C58000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
24F1F06E000
heap
page read and write
1CE9F000
stack
page read and write
7C0018A0000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C000C30000
trusted library allocation
page read and write
7C000224000
trusted library allocation
page read and write
4E2400704000
trusted library allocation
page read and write
3E28002A0000
trusted library allocation
page read and write
7C001ABC000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
7C000308000
trusted library allocation
page read and write
305F000
stack
page read and write
1D432000
heap
page read and write
4981000
heap
page read and write
7C00129C000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F072000
heap
page read and write
2C30000
heap
page read and write
7C001AD4000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
7C00156C000
trusted library allocation
page read and write
7C000340000
trusted library allocation
page read and write
7C001844000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
7C000CA8000
trusted library allocation
page read and write
4EE000
unkown
page execute and read and write
4981000
heap
page read and write
24F1F078000
heap
page read and write
6C875000
unkown
page readonly
2F5F000
stack
page read and write
4981000
heap
page read and write
24F1F088000
heap
page read and write
409E000
stack
page read and write
24F1F070000
heap
page read and write
7C000320000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
EF8000
stack
page read and write
7C000E28000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
24F1F086000
heap
page read and write
24F1F083000
heap
page read and write
2C40000
direct allocation
page read and write
7C00040C000
trusted library allocation
page read and write
7C000354000
trusted library allocation
page read and write
24F1F06C000
heap
page read and write
1D43D000
heap
page read and write
24F1F06E000
heap
page read and write
4E240033C000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
7C000308000
trusted library allocation
page read and write
24F1F684000
heap
page read and write
24F1F076000
heap
page read and write
7C00168C000
trusted library allocation
page read and write
3D1E000
stack
page read and write
7C000228000
trusted library allocation
page read and write
7C002EF4000
trusted library allocation
page read and write
7C000FA4000
trusted library allocation
page read and write
7C000CB8000
trusted library allocation
page read and write
4E2400644000
trusted library allocation
page read and write
4981000
heap
page read and write
7C002EDC000
trusted library allocation
page read and write
7C000CC0000
trusted library allocation
page read and write
7C0013A8000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
23536000
heap
page read and write
23521000
heap
page read and write
7C001A44000
trusted library allocation
page read and write
1134000
heap
page read and write
309E000
stack
page read and write
7C0007A8000
trusted library allocation
page read and write
7C00169C000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
7C000218000
trusted library allocation
page read and write
4E2400408000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
24F1F070000
heap
page read and write
6F8C1000
unkown
page readonly
7C000384000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
1D453000
heap
page read and write
1D476000
heap
page read and write
7C000354000
trusted library allocation
page read and write
7C000454000
trusted library allocation
page read and write
24F1F082000
heap
page read and write
49A0000
heap
page read and write
2C40000
direct allocation
page read and write
380000
unkown
page readonly
3B9F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
7C001B64000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
7C001834000
trusted library allocation
page read and write
7C000384000
trusted library allocation
page read and write
1D46F000
heap
page read and write
24F1F070000
heap
page read and write
4981000
heap
page read and write
7C000E7C000
trusted library allocation
page read and write
2C2E000
stack
page read and write
4E24006CC000
trusted library allocation
page read and write
24F1F070000
heap
page read and write
7C000240000
trusted library allocation
page read and write
7C000F70000
trusted library allocation
page read and write
395E000
stack
page read and write
24F1F076000
heap
page read and write
24F1F076000
heap
page read and write
1D460000
heap
page read and write
7C001424000
trusted library allocation
page read and write
4E240039C000
trusted library allocation
page read and write
1D45C000
heap
page read and write
7C001A90000
trusted library allocation
page read and write
7C000CD0000
trusted library allocation
page read and write
7C001744000
trusted library allocation
page read and write
7C000348000
trusted library allocation
page read and write
345E000
stack
page read and write
7C000238000
trusted library allocation
page read and write
7C0019F8000
trusted library allocation
page read and write
7C0002CC000
trusted library allocation
page read and write
24F1F088000
heap
page read and write
4E2400698000
trusted library allocation
page read and write
24F1F086000
heap
page read and write
51B000
unkown
page execute and read and write
4E2400700000
trusted library allocation
page read and write
7C001ACC000
trusted library allocation
page read and write
4E2400424000
trusted library allocation
page read and write
1D477000
heap
page read and write
7C001700000
trusted library allocation
page read and write
2C40000
direct allocation
page read and write
1129000
heap
page read and write
7C000A38000
trusted library allocation
page read and write
7C001764000
trusted library allocation
page read and write
109E000
heap
page read and write
1D446000
heap
page read and write
7C00142C000
trusted library allocation
page read and write
1D46E000
heap
page read and write
459F000
stack
page read and write
4981000
heap
page read and write
7C0016B4000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
1D463000
heap
page read and write
3E28002A0000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
24F1F06E000
heap
page read and write
7C00020C000
trusted library allocation
page read and write
112F000
heap
page read and write
7C000F80000
trusted library allocation
page read and write
7C00204F000
trusted library allocation
page read and write
7C001598000
trusted library allocation
page read and write
7C001448000
trusted library allocation
page read and write
24F1F07E000
heap
page read and write
4E2400320000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F070000
heap
page read and write
40DE000
stack
page read and write
7C000308000
trusted library allocation
page read and write
4C9000
unkown
page execute and read and write
7C0016B8000
trusted library allocation
page read and write
7C001828000
trusted library allocation
page read and write
7C001894000
trusted library allocation
page read and write
7C00032C000
trusted library allocation
page read and write
7C000CC0000
trusted library allocation
page read and write
7C001768000
trusted library allocation
page read and write
7C00040C000
trusted library allocation
page read and write
24F1F076000
heap
page read and write
7C00184C000
trusted library allocation
page read and write
7C0015B8000
trusted library allocation
page read and write
4E24006E0000
trusted library allocation
page read and write
7C0015EC000
trusted library allocation
page read and write
24F1F06E000
heap
page read and write
7C000CB8000
trusted library allocation
page read and write
7C001B68000
trusted library allocation
page read and write
7C00135C000
trusted library allocation
page read and write
7C000454000
trusted library allocation
page read and write
7C000F64000
trusted library allocation
page read and write
24F1F07E000
heap
page read and write
24F1F076000
heap
page read and write
24F1F66A000
heap
page read and write
24F1F076000
heap
page read and write
4981000
heap
page read and write
4E24006FC000
trusted library allocation
page read and write
7C001784000
trusted library allocation
page read and write
7C000C30000
trusted library allocation
page read and write
7C0019B8000
trusted library allocation
page read and write
1D458000
heap
page read and write
4981000
heap
page read and write
1D45A000
heap
page read and write
7C0002AC000
trusted library allocation
page read and write
7C000348000
trusted library allocation
page read and write
7C00143C000
trusted library allocation
page read and write
7C001CB7000
trusted library allocation
page read and write
7C001C4C000
trusted library allocation
page read and write
4981000
heap
page read and write
24F1F076000
heap
page read and write
24F1F070000
heap
page read and write
234C0000
heap
page read and write
7C001A18000
trusted library allocation
page read and write
24F1F675000
heap
page read and write
4981000
heap
page read and write
234E0000
heap
page read and write
7C001864000
trusted library allocation
page read and write
7C001A34000
trusted library allocation
page read and write
7C0010B4000
trusted library allocation
page read and write
7C001A30000
trusted library allocation
page read and write
1D45A000
heap
page read and write
There are 1079 hidden memdumps, click here to show them.