IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BAKEBFBAKKFCBGDHDGHDBAFIIE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DAECAECFCAAEBFHIEHDG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DHDHJJJECFIECBGDGCAAAEHIEG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\ECAFHDBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IECFIEGDBKJKFIDHIECG
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\IJEHCGIJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKJKKKJJJKJKFHJJJJEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (823)
downloaded
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 --field-trial-handle=2336,i,3958362710798390015,37809118720636991,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dllz
unknown
https://duckduckgo.com/ac/?q=
unknown
https://google-ohttp-relay-join.fastly-edge.com/7
unknown
https://docs.google.com/document/J
unknown
http://185.215.113.206/6c4adf523b719729.php0r
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://google-ohttp-relay-join.fastly-edge.com/A
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/D
unknown
https://google-ohttp-relay-join.fastly-edge.com/J
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/M
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/Q
unknown
https://google-ohttp-relay-join.fastly-edge.com/W
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/Z
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
http://185.215.113.206/6c4adf523b719729.phpenSSH
unknown
https://google-ohttp-relay-join.fastly-edge.com/a
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://google-ohttp-relay-join.fastly-edge.com/Jn
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.184.206
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://anglebug.com/7556
unknown
http://185.215.113.206GCB
unknown
https://google-ohttp-relay-join.fastly-edge.com/:l
unknown
https://drive-preprod.corp.google.com/
unknown
https://google-ohttp-relay-join.fastly-edge.com/:m
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://docs.google.com/presentation/:
unknown
https://google-ohttp-relay-join.fastly-edge.com/hjPv
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://185.215.113.206/6c4adf523b719729.phpKKKJJJKJKFHJJJJEC
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Visual
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://google-ohttp-relay-join.fastly-edge.com/#l
unknown
https://google-ohttp-relay-join.fastly-edge.com/en
unknown
https://labs.google.com/search?source=ntp
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.184.206
play.google.com
142.250.185.238
www.google.com
172.217.16.196
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
142.250.184.206
plus.l.google.com
United States
172.217.16.196
www.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
74E000
heap
page read and write
malicious
C81000
unkown
page execute and read and write
malicious
4D90000
direct allocation
page read and write
malicious
368E000
stack
page read and write
5F401578000
trusted library allocation
page read and write
5F4013C0000
trusted library allocation
page read and write
5F40136C000
trusted library allocation
page read and write
354E000
stack
page read and write
20F4428B000
heap
page read and write
1D3B0000
heap
page read and write
AAE000
stack
page read and write
5F4016C4000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
20F40D58000
heap
page read and write
20F4426A000
heap
page read and write
20F4426C000
heap
page read and write
5F4009D4000
trusted library allocation
page read and write
1CFBE000
stack
page read and write
20F4425E000
heap
page read and write
4911000
heap
page read and write
20F44279000
heap
page read and write
78E4002C0000
trusted library allocation
page read and write
5F4001B4000
trusted library allocation
page read and write
5F401BF8000
trusted library allocation
page read and write
4F00000
direct allocation
page execute and read and write
D94000
unkown
page execute and read and write
20F44267000
heap
page read and write
894000
heap
page read and write
1D3EE000
heap
page read and write
5F402ACC000
trusted library allocation
page read and write
20F44255000
heap
page read and write
236AE000
stack
page read and write
5F401510000
trusted library allocation
page read and write
20F4425F000
heap
page read and write
5F40184C000
trusted library allocation
page read and write
5F4009D4000
trusted library allocation
page read and write
20F44267000
heap
page read and write
4911000
heap
page read and write
20F4426C000
heap
page read and write
7650002FC000
trusted library allocation
page read and write
1D3D7000
heap
page read and write
20F40D83000
heap
page read and write
765000354000
trusted library allocation
page read and write
5F401A88000
trusted library allocation
page read and write
5F401AD4000
trusted library allocation
page read and write
20F44260000
heap
page read and write
5F401838000
trusted library allocation
page read and write
5F400304000
trusted library allocation
page read and write
5F400C48000
trusted library allocation
page read and write
2C60000
direct allocation
page read and write
5F400350000
trusted library allocation
page read and write
408E000
stack
page read and write
458E000
stack
page read and write
20F44260000
heap
page read and write
1D3EE000
heap
page read and write
765000354000
trusted library allocation
page read and write
5F401A74000
trusted library allocation
page read and write
3A4E000
stack
page read and write
5F40137C000
trusted library allocation
page read and write
20F44267000
heap
page read and write
765000684000
trusted library allocation
page read and write
5F400FE0000
trusted library allocation
page read and write
5F4014FC000
trusted library allocation
page read and write
C4B000
stack
page read and write
1D3D3000
heap
page read and write
20F44288000
heap
page read and write
20F44261000
heap
page read and write
5F401933000
trusted library allocation
page read and write
5F401720000
trusted library allocation
page read and write
4911000
heap
page read and write
20F4426C000
heap
page read and write
20F4426C000
heap
page read and write
20F4426C000
heap
page read and write
20F4426F000
heap
page read and write
5F4014E8000
trusted library allocation
page read and write
20F44267000
heap
page read and write
3CCE000
stack
page read and write
5F4012EC000
trusted library allocation
page read and write
234BC000
heap
page read and write
5F4016CC000
trusted library allocation
page read and write
234B5000
heap
page read and write
5F400A3C000
trusted library allocation
page read and write
20F4426B000
heap
page read and write
5F4013C0000
trusted library allocation
page read and write
11D6000
unkown
page execute and read and write
20F44292000
heap
page read and write
765000408000
trusted library allocation
page read and write
23760000
heap
page read and write
5F40100C000
trusted library allocation
page read and write
5F402D5C000
trusted library allocation
page read and write
20F44259000
heap
page read and write
894000
heap
page read and write
81C000
heap
page read and write
76500033C000
trusted library allocation
page read and write
748000
heap
page read and write
5F400F34000
trusted library allocation
page read and write
20F44279000
heap
page read and write
20F44274000
heap
page read and write
20F44261000
heap
page read and write
20F44285000
heap
page read and write
5F400F34000
trusted library allocation
page read and write
1D3E0000
heap
page read and write
5F401A28000
trusted library allocation
page read and write
20F44279000
heap
page read and write
4911000
heap
page read and write
1D3D6000
heap
page read and write
894000
heap
page read and write
4911000
heap
page read and write
5F400C98000
trusted library allocation
page read and write
5F400304000
trusted library allocation
page read and write
20F4426C000
heap
page read and write
5F401570000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
5F400380000
trusted library allocation
page read and write
5F4017A8000
trusted library allocation
page read and write
234A3000
heap
page read and write
C60000
direct allocation
page read and write
6F8FE000
unkown
page read and write
20F4424C000
heap
page read and write
1D3E0000
heap
page read and write
5F401790000
trusted library allocation
page read and write
20F44292000
heap
page read and write
318E000
stack
page read and write
4911000
heap
page read and write
7650006E8000
trusted library allocation
page read and write
13BA000
unkown
page execute and read and write
4F10000
direct allocation
page execute and read and write
6F8000
stack
page read and write
20F4426F000
heap
page read and write
20F44279000
heap
page read and write
20F4426B000
heap
page read and write
20F4426F000
heap
page read and write
20F44267000
heap
page read and write
20F4425D000
heap
page read and write
5F401590000
trusted library allocation
page read and write
4911000
heap
page read and write
5F400210000
trusted library allocation
page read and write
1D3F5000
heap
page read and write
2F0E000
stack
page read and write
20F446F0000
heap
page read and write
5F400350000
trusted library allocation
page read and write
894000
heap
page read and write
20F446CA000
heap
page read and write
894000
heap
page read and write
5F40154C000
trusted library allocation
page read and write
20F4426B000
heap
page read and write
5F4024F0000
trusted library allocation
page read and write
4911000
heap
page read and write
5F40168C000
trusted library allocation
page read and write
20F44246000
heap
page read and write
5F40153C000
trusted library allocation
page read and write
5F401A98000
trusted library allocation
page read and write
765000380000
trusted library allocation
page read and write
1D3D8000
heap
page read and write
5F400F50000
trusted library allocation
page read and write
5F4001F8000
trusted library allocation
page read and write
20F44274000
heap
page read and write
2D8F000
stack
page read and write
894000
heap
page read and write
20F44279000
heap
page read and write
5F400A3C000
trusted library allocation
page read and write
56EC00244000
direct allocation
page read and write
5F402D4C000
trusted library allocation
page read and write
E27000
unkown
page execute and read and write
20F44279000
heap
page read and write
5F401560000
trusted library allocation
page read and write
894000
heap
page read and write
5F4017C4000
trusted library allocation
page read and write
20F44251000
heap
page read and write
4911000
heap
page read and write
5F400EFC000
trusted library allocation
page read and write
20F446F0000
heap
page read and write
20F44256000
heap
page read and write
234A1000
heap
page read and write
5F4015A0000
trusted library allocation
page read and write
20F44288000
heap
page read and write
20F44285000
heap
page read and write
20F44274000
heap
page read and write
20F4426F000
heap
page read and write
5F40040C000
trusted library allocation
page read and write
5F4001C8000
trusted library allocation
page read and write
1D3C6000
heap
page read and write
5F4013F0000
trusted library allocation
page read and write
4911000
heap
page read and write
2C60000
direct allocation
page read and write
5F4013C0000
trusted library allocation
page read and write
5F4024D4000
trusted library allocation
page read and write
5F401750000
trusted library allocation
page read and write
5F40040C000
trusted library allocation
page read and write
D66000
unkown
page execute and read and write
78E4002B0000
trusted library allocation
page read and write
765000698000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
894000
heap
page read and write
4911000
heap
page read and write
810000
heap
page read and write
20F44260000
heap
page read and write
20F44267000
heap
page read and write
5F401774000
trusted library allocation
page read and write
20F44261000
heap
page read and write
78E4002C0000
trusted library allocation
page read and write
20F4425D000
heap
page read and write
5F4019EC000
trusted library allocation
page read and write
5F401798000
trusted library allocation
page read and write
23752000
heap
page read and write
894000
heap
page read and write
1D3E0000
heap
page read and write
20F446EC000
heap
page read and write
5F401674000
trusted library allocation
page read and write
5F400698000
trusted library allocation
page read and write
20F44274000
heap
page read and write
EC8000
unkown
page execute and read and write
894000
heap
page read and write
7650006BC000
trusted library allocation
page read and write
20F44261000
heap
page read and write
DEE000
unkown
page execute and read and write
3DCF000
stack
page read and write
765000368000
trusted library allocation
page read and write
5F401928000
trusted library allocation
page read and write
5F40105C000
trusted library allocation
page read and write
765000418000
trusted library allocation
page read and write
5F401E4F000
trusted library allocation
page read and write
5F401B08000
trusted library allocation
page read and write
4911000
heap
page read and write
1CF7F000
stack
page read and write
5F4017DC000
trusted library allocation
page read and write
5F402D7C000
trusted library allocation
page read and write
20F44250000
heap
page read and write
787000
heap
page read and write
2ECF000
stack
page read and write
765000754000
trusted library allocation
page read and write
5F401390000
trusted library allocation
page read and write
894000
heap
page read and write
7650006E4000
trusted library allocation
page read and write
4911000
heap
page read and write
5F401538000
trusted library allocation
page read and write
5F4013B0000
trusted library allocation
page read and write
4930000
heap
page read and write
1D3E0000
heap
page read and write
5F40183C000
trusted library allocation
page read and write
765000664000
trusted library allocation
page read and write
4911000
heap
page read and write
5F402D58000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
5F401784000
trusted library allocation
page read and write
894000
heap
page read and write
5F400C98000
trusted library allocation
page read and write
1CE7E000
stack
page read and write
5F401238000
trusted library allocation
page read and write
1D3EE000
heap
page read and write
20F4426A000
heap
page read and write
5F4017C8000
trusted library allocation
page read and write
5F401A3C000
trusted library allocation
page read and write
5F401828000
trusted library allocation
page read and write
20F4425C000
heap
page read and write
5F4002A4000
trusted library allocation
page read and write
4911000
heap
page read and write
5F4002A4000
trusted library allocation
page read and write
1D3EE000
heap
page read and write
5F401994000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
5F4001AC000
trusted library allocation
page read and write
5F401AF4000
trusted library allocation
page read and write
20F44279000
heap
page read and write
61EB4000
direct allocation
page read and write
1CCFF000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
765000700000
trusted library allocation
page read and write
6C5D0000
unkown
page readonly
5F401990000
trusted library allocation
page read and write
20F44279000
heap
page read and write
20F40D77000
heap
page read and write
5F4019BC000
trusted library allocation
page read and write
20F44279000
heap
page read and write
765000760000
trusted library allocation
page read and write
5F400F34000
trusted library allocation
page read and write
20F44267000
heap
page read and write
C60000
direct allocation
page read and write
364F000
stack
page read and write
20F4425D000
heap
page read and write
20F4426C000
heap
page read and write
5F401998000
trusted library allocation
page read and write
4911000
heap
page read and write
1D3D6000
heap
page read and write
20F44265000
heap
page read and write
5F401514000
trusted library allocation
page read and write
20F44260000
heap
page read and write
20F44293000
heap
page read and write
5F401518000
trusted library allocation
page read and write
5F4014F8000
trusted library allocation
page read and write
5F4001EC000
trusted library allocation
page read and write
20F44279000
heap
page read and write
5F401878000
trusted library allocation
page read and write
20F446EC000
heap
page read and write
765000714000
trusted library allocation
page read and write
20F4425B000
heap
page read and write
5F401B7C000
trusted library allocation
page read and write
5F401524000
trusted library allocation
page read and write
1D3C6000
heap
page read and write
20F44267000
heap
page read and write
20F4426C000
heap
page read and write
1D3DF000
heap
page read and write
20F4426A000
heap
page read and write
5F400EEC000
trusted library allocation
page read and write
20F44261000
heap
page read and write
765000758000
trusted library allocation
page read and write
20F44267000
heap
page read and write
5F400F24000
trusted library allocation
page read and write
5F4012C8000
trusted library allocation
page read and write
5F401160000
trusted library allocation
page read and write
20F44279000
heap
page read and write
5F4002A4000
trusted library allocation
page read and write
328F000
stack
page read and write
1D3DA000
heap
page read and write
20F4426C000
heap
page read and write
20F4426F000
heap
page read and write
5F40040C000
trusted library allocation
page read and write
5F401668000
trusted library allocation
page read and write
4911000
heap
page read and write
20F44279000
heap
page read and write
4911000
heap
page read and write
76500060C000
trusted library allocation
page read and write
4911000
heap
page read and write
5F400F24000
trusted library allocation
page read and write
5F401AA4000
trusted library allocation
page read and write
76500033C000
trusted library allocation
page read and write
5F40158C000
trusted library allocation
page read and write
5F401260000
trusted library allocation
page read and write
5F401A4C000
trusted library allocation
page read and write
1D3DA000
heap
page read and write
C50000
heap
page read and write
5F4001AC000
trusted library allocation
page read and write
1216000
unkown
page execute and write copy
20F44248000
heap
page read and write
20F44279000
heap
page read and write
20F4426B000
heap
page read and write
5F401324000
trusted library allocation
page read and write
5F4012C8000
trusted library allocation
page read and write
5F4015D4000
trusted library allocation
page read and write
5F400F74000
trusted library allocation
page read and write
5F400F50000
trusted library allocation
page read and write
5F400C98000
trusted library allocation
page read and write
5F4009D4000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
5F40196C000
trusted library allocation
page read and write
5F400D68000
trusted library allocation
page read and write
5F401678000
trusted library allocation
page read and write
20F44279000
heap
page read and write
5F4002B8000
trusted library allocation
page read and write
20F4424D000
heap
page read and write
5F4017B0000
trusted library allocation
page read and write
1D3E5000
heap
page read and write
20F44265000
heap
page read and write
5F4001E4000
trusted library allocation
page read and write
5F401248000
trusted library allocation
page read and write
20F44265000
heap
page read and write
1D3BD000
heap
page read and write
5F400F34000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
5F4013B0000
trusted library allocation
page read and write
5F40164C000
trusted library allocation
page read and write
5F401664000
trusted library allocation
page read and write
5F401AE0000
trusted library allocation
page read and write
5F400350000
trusted library allocation
page read and write
20F44267000
heap
page read and write
20F44260000
heap
page read and write
88E000
stack
page read and write
20F44259000
heap
page read and write
5F401094000
trusted library allocation
page read and write
78E4002A0000
trusted library allocation
page read and write
20F44256000
heap
page read and write
5F400BE4000
trusted library allocation
page read and write
4911000
heap
page read and write
765000320000
trusted library allocation
page read and write
20F44246000
heap
page read and write
5F401338000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
5F400C2C000
trusted library allocation
page read and write
20F44279000
heap
page read and write
1D3D9000
heap
page read and write
5F401B1C000
trusted library allocation
page read and write
5F400218000
trusted library allocation
page read and write
5F4016A4000
trusted library allocation
page read and write
20F44285000
heap
page read and write
5F401BE4000
trusted library allocation
page read and write
76500069C000
trusted library allocation
page read and write
6C76F000
unkown
page readonly
20F4425D000
heap
page read and write
4ECF000
stack
page read and write
5F401A44000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
5F40165C000
trusted library allocation
page read and write
33CF000
stack
page read and write
20F44268000
heap
page read and write
6C7AE000
unkown
page read and write
5F40160C000
trusted library allocation
page read and write
5F401958000
trusted library allocation
page read and write
20F4425E000
heap
page read and write
5F4019E8000
trusted library allocation
page read and write
5F400F40000
trusted library allocation
page read and write
C0E000
stack
page read and write
78E4002A0000
trusted library allocation
page read and write
5F401B2C000
trusted library allocation
page read and write
444E000
stack
page read and write
5F4013A0000
trusted library allocation
page read and write
5F400BE4000
trusted library allocation
page read and write
20F44267000
heap
page read and write
5F40192C000
trusted library allocation
page read and write
5F401B7C000
trusted library allocation
page read and write
3B8E000
stack
page read and write
765000640000
trusted library allocation
page read and write
5F400C58000
trusted library allocation
page read and write
1D3D9000
heap
page read and write
765000424000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
1D3EF000
heap
page read and write
5F401734000
trusted library allocation
page read and write
894000
heap
page read and write
5F40155C000
trusted library allocation
page read and write
765000688000
trusted library allocation
page read and write
740000
heap
page read and write
6C7B5000
unkown
page readonly
5F401574000
trusted library allocation
page read and write
5F401980000
trusted library allocation
page read and write
5F4013D0000
trusted library allocation
page read and write
78E4002A0000
trusted library allocation
page read and write
20F4467D000
heap
page read and write
5F40162C000
trusted library allocation
page read and write
1D3E3000
heap
page read and write
5F4017E4000
trusted library allocation
page read and write
5F400F74000
trusted library allocation
page read and write
20F44279000
heap
page read and write
20F44261000
heap
page read and write
5F4002F0000
trusted library allocation
page read and write
5F4015A8000
trusted library allocation
page read and write
5F401A68000
trusted library allocation
page read and write
20F44266000
heap
page read and write
4911000
heap
page read and write
5F4002A4000
trusted library allocation
page read and write
20F44279000
heap
page read and write
2C80000
heap
page read and write
20F44259000
heap
page read and write
5F400C98000
trusted library allocation
page read and write
20F4428D000
heap
page read and write
5F400304000
trusted library allocation
page read and write
5F400350000
trusted library allocation
page read and write
20F44260000
heap
page read and write
20F446FC000
heap
page read and write
5F4004AC000
trusted library allocation
page read and write
5F40161C000
trusted library allocation
page read and write
7650006B4000
trusted library allocation
page read and write
5F400344000
trusted library allocation
page read and write
5F400228000
trusted library allocation
page read and write
20F4426A000
heap
page read and write
1D3D6000
heap
page read and write
5F400380000
trusted library allocation
page read and write
37CE000
stack
page read and write
5F400304000
trusted library allocation
page read and write
1D3C6000
heap
page read and write
765000734000
trusted library allocation
page read and write
7C4000
heap
page read and write
5F4024D6000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
20F44260000
heap
page read and write
20F44292000
heap
page read and write
20F44279000
heap
page read and write
5F400CE8000
trusted library allocation
page read and write
20F44279000
heap
page read and write
1D3F7000
heap
page read and write
5F400F98000
trusted library allocation
page read and write
20F44265000
heap
page read and write
5F401690000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
894000
heap
page read and write
20F44260000
heap
page read and write
894000
heap
page read and write
5F401A30000
trusted library allocation
page read and write
20F4426E000
heap
page read and write
4911000
heap
page read and write
20F4426C000
heap
page read and write
5F401A8C000
trusted library allocation
page read and write
23460000
heap
page read and write
1CD3E000
stack
page read and write
5F4024C2000
trusted library allocation
page read and write
5F4016D0000
trusted library allocation
page read and write
5F4010EC000
trusted library allocation
page read and write
20F44249000
heap
page read and write
5F400328000
trusted library allocation
page read and write
20F44279000
heap
page read and write
6F871000
unkown
page execute read
20F4426C000
heap
page read and write
E2A000
unkown
page execute and read and write
20F44267000
heap
page read and write
20F4426C000
heap
page read and write
1205000
unkown
page execute and read and write
765000630000
trusted library allocation
page read and write
5F400FCC000
trusted library allocation
page read and write
20F44267000
heap
page read and write
5F40173C000
trusted library allocation
page read and write
5F4017F4000
trusted library allocation
page read and write
4911000
heap
page read and write
5F40100C000
trusted library allocation
page read and write
5F401A64000
trusted library allocation
page read and write
894000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
5F4001F0000
trusted library allocation
page read and write
5F400344000
trusted library allocation
page read and write
5F400F34000
trusted library allocation
page read and write
5F4002A4000
trusted library allocation
page read and write
20F44279000
heap
page read and write
5F4016BC000
trusted library allocation
page read and write
234A8000
heap
page read and write
20F44279000
heap
page read and write
20F44279000
heap
page read and write
5F4016EC000
trusted library allocation
page read and write
5F4012C8000
trusted library allocation
page read and write
4911000
heap
page read and write
3F0F000
stack
page read and write
5F401A50000
trusted library allocation
page read and write
1D3D3000
heap
page read and write
4911000
heap
page read and write
2C5F000
stack
page read and write
5F401A1C000
trusted library allocation
page read and write
5F4019E4000
trusted library allocation
page read and write
5F400BE4000
trusted library allocation
page read and write
894000
heap
page read and write
5F4016E8000
trusted library allocation
page read and write
4911000
heap
page read and write
20F44279000
heap
page read and write
894000
heap
page read and write
20F44261000
heap
page read and write
5F401931000
trusted library allocation
page read and write
78E400248000
trusted library allocation
page read and write
78E4002A4000
trusted library allocation
page read and write
5F400F50000
trusted library allocation
page read and write
20F44267000
heap
page read and write
4911000
heap
page read and write
20F446D1000
heap
page read and write
20F4426C000
heap
page read and write
894000
heap
page read and write
20F44265000
heap
page read and write
20F44254000
heap
page read and write
5F401700000
trusted library allocation
page read and write
430E000
stack
page read and write
42CF000
stack
page read and write
5F401AF8000
trusted library allocation
page read and write
5F400454000
trusted library allocation
page read and write
20F44260000
heap
page read and write
20F4426F000
heap
page read and write
1D3E0000
heap
page read and write
20F44261000
heap
page read and write
5F401AA0000
trusted library allocation
page read and write
894000
heap
page read and write
5F4015EC000
trusted library allocation
page read and write
5F401A2C000
trusted library allocation
page read and write
20F4428B000
heap
page read and write
5F4001D8000
trusted library allocation
page read and write
490F000
stack
page read and write
5F401AE4000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
C60000
direct allocation
page read and write
5F40100C000
trusted library allocation
page read and write
5F40033C000
trusted library allocation
page read and write
2375A000
heap
page read and write
13BB000
unkown
page execute and write copy
20F44258000
heap
page read and write
5F40021C000
trusted library allocation
page read and write
765000320000
trusted library allocation
page read and write
78E4002C0000
trusted library allocation
page read and write
81F000
heap
page read and write
4911000
heap
page read and write
6C889000
unkown
page readonly
5F4016B8000
trusted library allocation
page read and write
20F446EC000
heap
page read and write
20F44261000
heap
page read and write
5F400344000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
1D3F6000
heap
page read and write
20F4426F000
heap
page read and write
23440000
trusted library allocation
page read and write
894000
heap
page read and write
5F40022C000
trusted library allocation
page read and write
6C5D1000
unkown
page execute read
5F401928000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
5F40176C000
trusted library allocation
page read and write
20F44260000
heap
page read and write
4911000
heap
page read and write
20F40D8B000
heap
page read and write
894000
heap
page read and write
20F44267000
heap
page read and write
20F44288000
heap
page read and write
1D3DA000
heap
page read and write
61ED0000
direct allocation
page read and write
2DCE000
stack
page read and write
890000
heap
page read and write
5F401630000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
5F4001DC000
trusted library allocation
page read and write
78E4002C0000
trusted library allocation
page read and write
20F446D8000
heap
page read and write
5F4003DC000
trusted library allocation
page read and write
3A0F000
stack
page read and write
20F44250000
heap
page read and write
5F401AB4000
trusted library allocation
page read and write
20F44258000
heap
page read and write
4911000
heap
page read and write
5F400EFC000
trusted library allocation
page read and write
20F44264000
heap
page read and write
20F4426F000
heap
page read and write
5F401BD8000
trusted library allocation
page read and write
894000
heap
page read and write
4911000
heap
page read and write
20F44260000
heap
page read and write
5F4013A8000
trusted library allocation
page read and write
1D34D000
stack
page read and write
20F44288000
heap
page read and write
5F400304000
trusted library allocation
page read and write
5F4002A4000
trusted library allocation
page read and write
47CF000
stack
page read and write
5F400220000
trusted library allocation
page read and write
5F4001D4000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
1D3D4000
heap
page read and write
20F44250000
heap
page read and write
1D3DA000
heap
page read and write
78E4002C8000
trusted library allocation
page read and write
5F40033C000
trusted library allocation
page read and write
5F401028000
trusted library allocation
page read and write
7650006F0000
trusted library allocation
page read and write
20F44279000
heap
page read and write
5F400A3C000
trusted library allocation
page read and write
1D3D7000
heap
page read and write
765000750000
trusted library allocation
page read and write
20F44260000
heap
page read and write
4911000
heap
page read and write
5F400380000
trusted library allocation
page read and write
5F4012A4000
trusted library allocation
page read and write
5F400380000
trusted library allocation
page read and write
E1B000
unkown
page execute and read and write
46CE000
stack
page read and write
4911000
heap
page read and write
1D3DD000
heap
page read and write
5F401A84000
trusted library allocation
page read and write
5F4017AC000
trusted library allocation
page read and write
20F44261000
heap
page read and write
20F4425E000
heap
page read and write
1D3E5000
heap
page read and write
5F4009D4000
trusted library allocation
page read and write
765000330000
trusted library allocation
page read and write
20F44285000
heap
page read and write
5F401A9C000
trusted library allocation
page read and write
5F401730000
trusted library allocation
page read and write
765000320000
trusted library allocation
page read and write
2C70000
direct allocation
page execute and read and write
5F401B0C000
trusted library allocation
page read and write
7650006B0000
trusted library allocation
page read and write
1D3D3000
heap
page read and write
5F4015D0000
trusted library allocation
page read and write
5F4017D8000
trusted library allocation
page read and write
20F44265000
heap
page read and write
5F4015E8000
trusted library allocation
page read and write
5F401028000
trusted library allocation
page read and write
4911000
heap
page read and write
1D3F4000
heap
page read and write
3BC000
stack
page read and write
5F401A0C000
trusted library allocation
page read and write
20F4428B000
heap
page read and write
20F4426F000
heap
page read and write
1D3C6000
heap
page read and write
440F000
stack
page read and write
5F401638000
trusted library allocation
page read and write
5F4014E8000
trusted library allocation
page read and write
5F4016D4000
trusted library allocation
page read and write
20F44260000
heap
page read and write
5F4002A8000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
1D4D4000
heap
page read and write
5F40195C000
trusted library allocation
page read and write
5F400E44000
trusted library allocation
page read and write
765000788000
trusted library allocation
page read and write
5F40000C000
trusted library allocation
page read and write
454F000
stack
page read and write
1D20D000
stack
page read and write
234AF000
heap
page read and write
1D3BB000
heap
page read and write
1CBFE000
stack
page read and write
20F4425F000
heap
page read and write
20F44265000
heap
page read and write
5F4002A4000
trusted library allocation
page read and write
C80000
unkown
page readonly
20F4428D000
heap
page read and write
A6E000
stack
page read and write
5F401A70000
trusted library allocation
page read and write
20F44267000
heap
page read and write
4920000
heap
page read and write
C60000
direct allocation
page read and write
20F44260000
heap
page read and write
20F4426F000
heap
page read and write
6F902000
unkown
page readonly
1D3DA000
heap
page read and write
5F400C68000
trusted library allocation
page read and write
4911000
heap
page read and write
20F4425C000
heap
page read and write
BAF000
stack
page read and write
20F44285000
heap
page read and write
20F4424A000
heap
page read and write
2C8B000
heap
page read and write
4911000
heap
page read and write
20F4426C000
heap
page read and write
4911000
heap
page read and write
5F401830000
trusted library allocation
page read and write
5F40033C000
trusted library allocation
page read and write
765000694000
trusted library allocation
page read and write
1D3C6000
heap
page read and write
5F401694000
trusted library allocation
page read and write
5F400304000
trusted library allocation
page read and write
C80000
unkown
page read and write
20F4428D000
heap
page read and write
418F000
stack
page read and write
20F4426E000
heap
page read and write
1D3D8000
heap
page read and write
20F44267000
heap
page read and write
5F400C98000
trusted library allocation
page read and write
765000644000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
4911000
heap
page read and write
10F0000
unkown
page execute and read and write
794000
heap
page read and write
5F401740000
trusted library allocation
page read and write
765000310000
trusted library allocation
page read and write
5F401634000
trusted library allocation
page read and write
5F400DF8000
trusted library allocation
page read and write
41CE000
stack
page read and write
5F401A6C000
trusted library allocation
page read and write
4911000
heap
page read and write
2C87000
heap
page read and write
7650006CC000
trusted library allocation
page read and write
20F44249000
heap
page read and write
20F4466A000
heap
page read and write
20F446EA000
heap
page read and write
5F401780000
trusted library allocation
page read and write
1D0BF000
stack
page read and write
61E01000
direct allocation
page execute read
20F44267000
heap
page read and write
4911000
heap
page read and write
5F400350000
trusted library allocation
page read and write
5F400FB0000
trusted library allocation
page read and write
1D3D7000
heap
page read and write
20F44260000
heap
page read and write
78E4002A4000
trusted library allocation
page read and write
20F44267000
heap
page read and write
5F401788000
trusted library allocation
page read and write
5F400304000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
5F401AD8000
trusted library allocation
page read and write
3F4E000
stack
page read and write
710000
heap
page read and write
5F4019A4000
trusted library allocation
page read and write
6C841000
unkown
page readonly
236C0000
trusted library allocation
page read and write
20F4425D000
heap
page read and write
5F4016C8000
trusted library allocation
page read and write
20F44267000
heap
page read and write
5F401364000
trusted library allocation
page read and write
20F44288000
heap
page read and write
894000
heap
page read and write
765000614000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
5F401B88000
trusted library allocation
page read and write
5F401618000
trusted library allocation
page read and write
5F4013F0000
trusted library allocation
page read and write
78E4002C0000
trusted library allocation
page read and write
5F4017D4000
trusted library allocation
page read and write
5F4015B0000
trusted library allocation
page read and write
20F44279000
heap
page read and write
61E00000
direct allocation
page execute and read and write
5F400F74000
trusted library allocation
page read and write
894000
heap
page read and write
765000320000
trusted library allocation
page read and write
5F402D48000
trusted library allocation
page read and write
1D3EE000
heap
page read and write
11FE000
unkown
page execute and read and write
5F400344000
trusted library allocation
page read and write
23440000
trusted library allocation
page read and write
5F400F34000
trusted library allocation
page read and write
20F44250000
heap
page read and write
5F4002F3000
trusted library allocation
page read and write
20F4426A000
heap
page read and write
4911000
heap
page read and write
6F2000
stack
page read and write
894000
heap
page read and write
20F446F0000
heap
page read and write
20F4426F000
heap
page read and write
5F40171C000
trusted library allocation
page read and write
20F4426C000
heap
page read and write
5F400BE8000
trusted library allocation
page read and write
1D3EE000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
765000730000
trusted library allocation
page read and write
4911000
heap
page read and write
5F4003B0000
trusted library allocation
page read and write
3C8F000
stack
page read and write
5F401C04000
trusted library allocation
page read and write
20F44274000
heap
page read and write
1D3F9000
heap
page read and write
5F4002A4000
trusted library allocation
page read and write
20F44267000
heap
page read and write
1D3F8000
heap
page read and write
76500039C000
trusted library allocation
page read and write
1215000
unkown
page execute and write copy
20F44265000
heap
page read and write
5F4015AC000
trusted library allocation
page read and write
20F44265000
heap
page read and write
20F44288000
heap
page read and write
20F44250000
heap
page read and write
894000
heap
page read and write
6C7B0000
unkown
page read and write
78E4002A0000
trusted library allocation
page read and write
1D24E000
stack
page read and write
20F4426C000
heap
page read and write
5F401648000
trusted library allocation
page read and write
1D3DA000
heap
page read and write
20F44267000
heap
page read and write
20F44279000
heap
page read and write
EEE000
unkown
page execute and read and write
5F4015C0000
trusted library allocation
page read and write
5F4019D0000
trusted library allocation
page read and write
4911000
heap
page read and write
5F40020C000
trusted library allocation
page read and write
805000
heap
page read and write
5F4017E8000
trusted library allocation
page read and write
5F401A60000
trusted library allocation
page read and write
765000668000
trusted library allocation
page read and write
20F4424B000
heap
page read and write
1D3DF000
heap
page read and write
5F4016A0000
trusted library allocation
page read and write
20F4428E000
heap
page read and write
1D3EE000
heap
page read and write
20F44259000
heap
page read and write
20F44259000
heap
page read and write
5F401AF0000
trusted library allocation
page read and write
5F401AE4000
trusted library allocation
page read and write
20F44279000
heap
page read and write
5F401770000
trusted library allocation
page read and write
5F400F34000
trusted library allocation
page read and write
5F401744000
trusted library allocation
page read and write
5F4017E0000
trusted library allocation
page read and write
5F4001B4000
trusted library allocation
page read and write
4911000
heap
page read and write
20F44261000
heap
page read and write
5F401644000
trusted library allocation
page read and write
4D60000
heap
page read and write
5F400CB0000
trusted library allocation
page read and write
20F44279000
heap
page read and write
EE8000
unkown
page execute and read and write
20F4428D000
heap
page read and write
5F400234000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
6C7AF000
unkown
page write copy
20F4426B000
heap
page read and write
5F40033C000
trusted library allocation
page read and write
4911000
heap
page read and write
20F44285000
heap
page read and write
7650006D4000
trusted library allocation
page read and write
468F000
stack
page read and write
5F400214000
trusted library allocation
page read and write
5F401ADC000
trusted library allocation
page read and write
4911000
heap
page read and write
1D3DD000
heap
page read and write
314F000
stack
page read and write
20F44279000
heap
page read and write
5F4001E0000
trusted library allocation
page read and write
5F40100C000
trusted library allocation
page read and write
765000678000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
4911000
heap
page read and write
5F402C0C000
trusted library allocation
page read and write
765000658000
trusted library allocation
page read and write
5F4013C0000
trusted library allocation
page read and write
38CF000
stack
page read and write
5F401308000
trusted library allocation
page read and write
4DCC000
stack
page read and write
4911000
heap
page read and write
894000
heap
page read and write
20F4426B000
heap
page read and write
20F44259000
heap
page read and write
20F44267000
heap
page read and write
765000610000
trusted library allocation
page read and write
C81000
unkown
page execute and write copy
5F400454000
trusted library allocation
page read and write
765000620000
trusted library allocation
page read and write
20F4424B000
heap
page read and write
5F400CB0000
trusted library allocation
page read and write
824000
heap
page read and write
1D10D000
stack
page read and write
5F4001F4000
trusted library allocation
page read and write
1D3C6000
heap
page read and write
5F401BD8000
trusted library allocation
page read and write
5F400CA8000
trusted library allocation
page read and write
5F400C98000
trusted library allocation
page read and write
20F4426B000
heap
page read and write
765000624000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
5F400F40000
trusted library allocation
page read and write
5F400454000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
20F44258000
heap
page read and write
5F4016E4000
trusted library allocation
page read and write
5F40159C000
trusted library allocation
page read and write
20F4425D000
heap
page read and write
5F401928000
trusted library allocation
page read and write
20F4426C000
heap
page read and write
DC9000
unkown
page execute and read and write
20F44279000
heap
page read and write
3E0E000
stack
page read and write
1D3E1000
heap
page read and write
5F4016C0000
trusted library allocation
page read and write
894000
heap
page read and write
5F400454000
trusted library allocation
page read and write
4911000
heap
page read and write
CAC000
unkown
page execute and read and write
5F4019B8000
trusted library allocation
page read and write
78E4002A0000
trusted library allocation
page read and write
7650006C8000
trusted library allocation
page read and write
20F4426C000
heap
page read and write
20F4468F000
heap
page read and write
4911000
heap
page read and write
20F44279000
heap
page read and write
20F44279000
heap
page read and write
20F4467C000
heap
page read and write
4911000
heap
page read and write
5F401824000
trusted library allocation
page read and write
20F4428D000
heap
page read and write
20F44285000
heap
page read and write
894000
heap
page read and write
7650006E0000
trusted library allocation
page read and write
5F400380000
trusted library allocation
page read and write
6FD000
stack
page read and write
20F44267000
heap
page read and write
C60000
direct allocation
page read and write
5F401A48000
trusted library allocation
page read and write
20F44261000
heap
page read and write
5F400F34000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
5F400304000
trusted library allocation
page read and write
5F400CB0000
trusted library allocation
page read and write
20F4425A000
heap
page read and write
20F4425F000
heap
page read and write
7A6000
heap
page read and write
5F40033C000
trusted library allocation
page read and write
78E4002E4000
trusted library allocation
page read and write
5F4016A8000
trusted library allocation
page read and write
6F870000
unkown
page readonly
2350A000
heap
page read and write
5F401028000
trusted library allocation
page read and write
765000704000
trusted library allocation
page read and write
5F400FB0000
trusted library allocation
page read and write
5F40240C000
trusted library allocation
page read and write
76500035C000
trusted library allocation
page read and write
20F4426C000
heap
page read and write
5F401438000
trusted library allocation
page read and write
5F4014EC000
trusted library allocation
page read and write
23481000
heap
page read and write
7650006D0000
trusted library allocation
page read and write
20F44244000
heap
page read and write
765000390000
trusted library allocation
page read and write
5F40193C000
trusted library allocation
page read and write
765000248000
trusted library allocation
page read and write
5F4012EC000
trusted library allocation
page read and write
5F4015A4000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
20F4424B000
heap
page read and write
5F4002C4000
trusted library allocation
page read and write
5F4002A4000
trusted library allocation
page read and write
5F400454000
trusted library allocation
page read and write
1D3F9000
heap
page read and write
5F400FB0000
trusted library allocation
page read and write
5F401794000
trusted library allocation
page read and write
5F4002AA000
trusted library allocation
page read and write
20F44260000
heap
page read and write
1D3E3000
heap
page read and write
765000330000
trusted library allocation
page read and write
1D3DC000
heap
page read and write
1D3C0000
heap
page read and write
5F401AC4000
trusted library allocation
page read and write
2376B000
heap
page read and write
20F4428B000
heap
page read and write
23763000
heap
page read and write
4911000
heap
page read and write
20F4426F000
heap
page read and write
76500040C000
trusted library allocation
page read and write
5F40182C000
trusted library allocation
page read and write
20F44267000
heap
page read and write
20F44279000
heap
page read and write
20F40D70000
heap
page read and write
32CE000
stack
page read and write
5F401970000
trusted library allocation
page read and write
3B4F000
stack
page read and write
5F4013C0000
trusted library allocation
page read and write
7650003EC000
trusted library allocation
page read and write
5F401330000
trusted library allocation
page read and write
5F40033C000
trusted library allocation
page read and write
1215000
unkown
page execute and read and write
20F44261000
heap
page read and write
5F40033C000
trusted library allocation
page read and write
76500080C000
trusted library allocation
page read and write
20F44255000
heap
page read and write
5F4013F4000
trusted library allocation
page read and write
350F000
stack
page read and write
5F4002A4000
trusted library allocation
page read and write
5F4012EC000
trusted library allocation
page read and write
5F40167C000
trusted library allocation
page read and write
390E000
stack
page read and write
5F4019B4000
trusted library allocation
page read and write
5F40178C000
trusted library allocation
page read and write
20F44267000
heap
page read and write
5F402C74000
trusted library allocation
page read and write
78E4002A0000
trusted library allocation
page read and write
5F40033C000
trusted library allocation
page read and write
20F44267000
heap
page read and write
20F4425C000
heap
page read and write
1D3B2000
heap
page read and write
23440000
heap
page read and write
5F40175C000
trusted library allocation
page read and write
20F44279000
heap
page read and write
20F44261000
heap
page read and write
5F401738000
trusted library allocation
page read and write
5F401AAC000
trusted library allocation
page read and write
5F400FCC000
trusted library allocation
page read and write
5F4002A8000
trusted library allocation
page read and write
5F401660000
trusted library allocation
page read and write
4DBB000
direct allocation
page read and write
61ECC000
direct allocation
page read and write
6C7E1000
unkown
page execute read
1D4D0000
trusted library allocation
page read and write
5F402D70000
trusted library allocation
page read and write
5F400344000
trusted library allocation
page read and write
20F40D7C000
heap
page read and write
20F44261000
heap
page read and write
5F400F50000
trusted library allocation
page read and write
5F401588000
trusted library allocation
page read and write
5F401960000
trusted library allocation
page read and write
20F44279000
heap
page read and write
20F44274000
heap
page read and write
1D3C9000
heap
page read and write
20F44267000
heap
page read and write
496F000
heap
page read and write
5F400330000
trusted library allocation
page read and write
894000
heap
page read and write
6F8ED000
unkown
page readonly
5F4001B4000
trusted library allocation
page read and write
20F44261000
heap
page read and write
5F400230000
trusted library allocation
page read and write
20F44288000
heap
page read and write
1D3C6000
heap
page read and write
304E000
stack
page read and write
F6A000
unkown
page execute and read and write
5F401834000
trusted library allocation
page read and write
5F401278000
trusted library allocation
page read and write
4911000
heap
page read and write
340E000
stack
page read and write
7650006FC000
trusted library allocation
page read and write
23502000
heap
page read and write
720000
heap
page read and write
20F4426A000
heap
page read and write
5F400F74000
trusted library allocation
page read and write
5F400BE4000
trusted library allocation
page read and write
76500075C000
trusted library allocation
page read and write
5F401558000
trusted library allocation
page read and write
5F400224000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
20F44261000
heap
page read and write
5F4019D4000
trusted library allocation
page read and write
5F4003B0000
trusted library allocation
page read and write
1CE3F000
stack
page read and write
5F400CA8000
trusted library allocation
page read and write
20F4426F000
heap
page read and write
4910000
heap
page read and write
5F401AB0000
trusted library allocation
page read and write
5F40122C000
trusted library allocation
page read and write
1D3D7000
heap
page read and write
20F44274000
heap
page read and write
20F4426C000
heap
page read and write
5F401248000
trusted library allocation
page read and write
20F4426C000
heap
page read and write
5F4001E8000
trusted library allocation
page read and write
5F4002B8000
trusted library allocation
page read and write
4ED0000
direct allocation
page execute and read and write
5F401388000
trusted library allocation
page read and write
5F401AA8000
trusted library allocation
page read and write
300F000
stack
page read and write
5F401714000
trusted library allocation
page read and write
404E000
stack
page read and write
20F44260000
heap
page read and write
80A000
heap
page read and write
C60000
direct allocation
page read and write
78E4002D8000
trusted library allocation
page read and write
235AE000
stack
page read and write
5F400350000
trusted library allocation
page read and write
5F4015CC000
trusted library allocation
page read and write
5F400EEC000
trusted library allocation
page read and write
5F401B94000
trusted library allocation
page read and write
765000654000
trusted library allocation
page read and write
480E000
stack
page read and write
1D3DF000
heap
page read and write
5F4013F4000
trusted library allocation
page read and write
894000
heap
page read and write
894000
heap
page read and write
5F400C98000
trusted library allocation
page read and write
5F40150C000
trusted library allocation
page read and write
20F44267000
heap
page read and write
5F400EEC000
trusted library allocation
page read and write
4911000
heap
page read and write
2C8E000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
1D3EE000
heap
page read and write
20F44279000
heap
page read and write
817000
heap
page read and write
1D3DF000
heap
page read and write
DFB000
unkown
page execute and read and write
5F40170C000
trusted library allocation
page read and write
20F44260000
heap
page read and write
378F000
stack
page read and write
894000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
5F400304000
trusted library allocation
page read and write
5F4012A4000
trusted library allocation
page read and write
20F44256000
heap
page read and write
4911000
heap
page read and write
6C7E0000
unkown
page readonly
20F4426C000
heap
page read and write
5F400FE0000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
5F4016E0000
trusted library allocation
page read and write
20F44267000
heap
page read and write
6C887000
unkown
page read and write
5F40033C000
trusted library allocation
page read and write
There are 1131 hidden memdumps, click here to show them.