IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAKEGIJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\AKKEGHJDHDAFHIDHCFHD
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\CGDHIEGCFHCGDGCAECBG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIIDBGDA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IECBGIDAEHCGDGCBKEBGDGIJDG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJDBFCAEBFIJJKFHDAEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJJEBGDAFHJEBGDGIJDHCAKJKK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 76
Unicode text, UTF-8 text, with very long lines (5431)
downloaded
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 --field-trial-handle=1908,i,11351815084681940783,16203471309566197544,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/6c4adf523b719729.phpAZ
unknown
https://google-ohttp-relay-join.fastly-edge.com/0
unknown
https://google-ohttp-relay-join.fastly-edge.com/6
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://google-ohttp-relay-join.fastly-edge.com/A
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dllq
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/G
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/J
unknown
https://anglebug.com/7714
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dllM
unknown
https://google-ohttp-relay-join.fastly-edge.com/P
unknown
https://google-ohttp-relay-join.fastly-edge.com/W
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://google-ohttp-relay-join.fastly-edge.com/f
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.74.206
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://sandbox.google.com/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
https://google-ohttp-relay-join.fastly-edge.com/4z
unknown
http://185.215.113.206/6c4adf523b719729.phpcal
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://domains.google.com/suggest/flow
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.74.206
play.google.com
142.250.186.174
www.google.com
172.217.18.4
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.74.206
plus.l.google.com
United States
142.250.186.174
play.google.com
United States
172.217.18.4
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4D50000
direct allocation
page read and write
malicious
9AE000
heap
page read and write
malicious
E71000
unkown
page execute and read and write
malicious
1D342C86000
heap
page read and write
2B4401D94000
trusted library allocation
page read and write
1D37A000
heap
page read and write
2B4401B14000
trusted library allocation
page read and write
1D342C86000
heap
page read and write
6F902000
unkown
page readonly
864000
heap
page read and write
2B4401C90000
trusted library allocation
page read and write
864000
heap
page read and write
48D1000
heap
page read and write
28BC006F0000
trusted library allocation
page read and write
2B44010BC000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D343246000
heap
page read and write
28BC00390000
trusted library allocation
page read and write
28BC006B0000
trusted library allocation
page read and write
28BC00658000
trusted library allocation
page read and write
28BC0035C000
trusted library allocation
page read and write
2B4402684000
trusted library allocation
page read and write
2B44001F4000
trusted library allocation
page read and write
2B4401C68000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
2B44016C4000
trusted library allocation
page read and write
2B4400384000
trusted library allocation
page read and write
1D343247000
heap
page read and write
2B44018D8000
trusted library allocation
page read and write
864000
heap
page read and write
233E0000
trusted library allocation
page read and write
1D342C84000
heap
page read and write
1D342C8B000
heap
page read and write
48D1000
heap
page read and write
864000
heap
page read and write
2B4401BE0000
trusted library allocation
page read and write
2B4401C20000
trusted library allocation
page read and write
1D366000
heap
page read and write
4D10000
heap
page read and write
1D35D000
heap
page read and write
2B4401C6C000
trusted library allocation
page read and write
1D360000
heap
page read and write
2B440120C000
trusted library allocation
page read and write
1D399000
heap
page read and write
2B440048C000
trusted library allocation
page read and write
28BC003EC000
trusted library allocation
page read and write
1D342C94000
heap
page read and write
1D342C8F000
heap
page read and write
1D342C89000
heap
page read and write
48D1000
heap
page read and write
864000
heap
page read and write
1D342C77000
heap
page read and write
1D37A000
heap
page read and write
2B440185C000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D342C9C000
heap
page read and write
48D1000
heap
page read and write
1D342C77000
heap
page read and write
2B44026A0000
trusted library allocation
page read and write
2B4400F24000
trusted library allocation
page read and write
1D342C8E000
heap
page read and write
2B4400340000
trusted library allocation
page read and write
1D342C94000
heap
page read and write
1406000
unkown
page execute and read and write
28BC00630000
trusted library allocation
page read and write
1D342CA9000
heap
page read and write
492C000
heap
page read and write
1D342C6B000
heap
page read and write
1D342C84000
heap
page read and write
13EE000
unkown
page execute and read and write
2B4402EF0000
trusted library allocation
page read and write
2B44018E4000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D33F765000
heap
page read and write
2B4400CEC000
trusted library allocation
page read and write
2B4401DDD000
trusted library allocation
page read and write
980000
direct allocation
page read and write
2B4401BE8000
trusted library allocation
page read and write
1D385000
heap
page read and write
1D342C6B000
heap
page read and write
3B4E000
stack
page read and write
74DC002C0000
trusted library allocation
page read and write
2B4400384000
trusted library allocation
page read and write
2B4401C2C000
trusted library allocation
page read and write
28BC006E8000
trusted library allocation
page read and write
2B44014C4000
trusted library allocation
page read and write
1D342C7C000
heap
page read and write
864000
heap
page read and write
6CF57000
unkown
page read and write
2B4400CC4000
trusted library allocation
page read and write
2B44018BC000
trusted library allocation
page read and write
2B4400475000
trusted library allocation
page read and write
1D342C86000
heap
page read and write
171000244000
direct allocation
page read and write
2B44002FB000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D342C6D000
heap
page read and write
28BC006BC000
trusted library allocation
page read and write
2B4401D40000
trusted library allocation
page read and write
28BC00248000
trusted library allocation
page read and write
2B44017A8000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D342C86000
heap
page read and write
28BC0060C000
trusted library allocation
page read and write
1D342C86000
heap
page read and write
2B440042C000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
1D342C65000
heap
page read and write
6CF11000
unkown
page readonly
233E0000
trusted library allocation
page read and write
28BC00754000
trusted library allocation
page read and write
2B4401BD8000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D342C89000
heap
page read and write
23421000
heap
page read and write
2B4400D0C000
trusted library allocation
page read and write
2B440148C000
trusted library allocation
page read and write
2B4400F7C000
trusted library allocation
page read and write
2B4401748000
trusted library allocation
page read and write
2B4400230000
trusted library allocation
page read and write
2B4400240000
trusted library allocation
page read and write
2B440102C000
trusted library allocation
page read and write
28BC00380000
trusted library allocation
page read and write
28BC0040C000
trusted library allocation
page read and write
1D342C8B000
heap
page read and write
28BC00310000
trusted library allocation
page read and write
2B4401534000
trusted library allocation
page read and write
28BC00730000
trusted library allocation
page read and write
1D342C86000
heap
page read and write
2B44018E8000
trusted library allocation
page read and write
6CF59000
unkown
page readonly
2B4400340000
trusted library allocation
page read and write
1D377000
heap
page read and write
2B44002AC000
trusted library allocation
page read and write
2B4401620000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B44016D4000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4401048000
trusted library allocation
page read and write
2B44018D4000
trusted library allocation
page read and write
1D37F000
heap
page read and write
1D342C77000
heap
page read and write
2B440023C000
trusted library allocation
page read and write
E5E000
stack
page read and write
2B4401650000
trusted library allocation
page read and write
2B44013D0000
trusted library allocation
page read and write
2B44017B4000
trusted library allocation
page read and write
3C8E000
stack
page read and write
2B440021C000
trusted library allocation
page read and write
6FD000
stack
page read and write
2B44013D0000
trusted library allocation
page read and write
2B4400354000
trusted library allocation
page read and write
1D342C82000
heap
page read and write
1D342C8F000
heap
page read and write
1D37C000
heap
page read and write
1D342C73000
heap
page read and write
1D373000
heap
page read and write
2B4400C0C000
trusted library allocation
page read and write
1D342C7F000
heap
page read and write
378E000
stack
page read and write
864000
heap
page read and write
2B4401510000
trusted library allocation
page read and write
1D342C97000
heap
page read and write
864000
heap
page read and write
2B44014D4000
trusted library allocation
page read and write
2B44014D4000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
2B440161C000
trusted library allocation
page read and write
1D342C8B000
heap
page read and write
1D366000
heap
page read and write
2B4401B70000
trusted library allocation
page read and write
2B44012D4000
trusted library allocation
page read and write
1CB9E000
stack
page read and write
2B4400354000
trusted library allocation
page read and write
1D342C7F000
heap
page read and write
1D342C85000
heap
page read and write
864000
heap
page read and write
864000
heap
page read and write
28BC00654000
trusted library allocation
page read and write
23701000
heap
page read and write
2B440140C000
trusted library allocation
page read and write
2B4400DA0000
trusted library allocation
page read and write
28BC00644000
trusted library allocation
page read and write
2B44001F8000
trusted library allocation
page read and write
1D342C84000
heap
page read and write
2B4401ADC000
trusted library allocation
page read and write
2B4400340000
trusted library allocation
page read and write
38CE000
stack
page read and write
970000
heap
page read and write
74DC002E4000
trusted library allocation
page read and write
28BC00678000
trusted library allocation
page read and write
48D1000
heap
page read and write
980000
direct allocation
page read and write
1D342C89000
heap
page read and write
2B4401798000
trusted library allocation
page read and write
2B440024C000
trusted library allocation
page read and write
1D342C6D000
heap
page read and write
6F8000
stack
page read and write
2B4400340000
trusted library allocation
page read and write
1D342C64000
heap
page read and write
2B44014BC000
trusted library allocation
page read and write
2B4400340000
trusted library allocation
page read and write
2B4401AC5000
trusted library allocation
page read and write
2CD0000
direct allocation
page execute and read and write
48D1000
heap
page read and write
23400000
heap
page read and write
74DC002A0000
trusted library allocation
page read and write
2E0F000
stack
page read and write
2B4401DD8000
trusted library allocation
page read and write
1D342C84000
heap
page read and write
1D342C77000
heap
page read and write
1D342C84000
heap
page read and write
1D342C86000
heap
page read and write
2B4401B84000
trusted library allocation
page read and write
1D342C65000
heap
page read and write
28BC0033C000
trusted library allocation
page read and write
2B440021C000
trusted library allocation
page read and write
96E000
stack
page read and write
28BC00788000
trusted library allocation
page read and write
468E000
stack
page read and write
2B4401B8C000
trusted library allocation
page read and write
1D342C83000
heap
page read and write
2B4400A18000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D342C7F000
heap
page read and write
1D350000
heap
page read and write
28BC00320000
trusted library allocation
page read and write
2B4400354000
trusted library allocation
page read and write
28BC006D0000
trusted library allocation
page read and write
2B440173C000
trusted library allocation
page read and write
1D342C83000
heap
page read and write
1D342C84000
heap
page read and write
2B44016E8000
trusted library allocation
page read and write
2B4401428000
trusted library allocation
page read and write
1D342C73000
heap
page read and write
2B4401628000
trusted library allocation
page read and write
3D8F000
stack
page read and write
2B4401894000
trusted library allocation
page read and write
1D396000
heap
page read and write
864000
heap
page read and write
2B440020C000
trusted library allocation
page read and write
2B4400FAC000
trusted library allocation
page read and write
2B4401D70000
trusted library allocation
page read and write
1D342C7F000
heap
page read and write
1D342C7F000
heap
page read and write
48D1000
heap
page read and write
2B44016EC000
trusted library allocation
page read and write
1D33F757000
heap
page read and write
1D342C98000
heap
page read and write
2B44018B8000
trusted library allocation
page read and write
1D342CAD000
heap
page read and write
2B4401BBC000
trusted library allocation
page read and write
E1B000
stack
page read and write
1D342C93000
heap
page read and write
2B44013AC000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
2D07000
heap
page read and write
864000
heap
page read and write
2B4400384000
trusted library allocation
page read and write
2B4401898000
trusted library allocation
page read and write
1D342CAF000
heap
page read and write
2B4400C10000
trusted library allocation
page read and write
2B4401A0C000
trusted library allocation
page read and write
2B44018FC000
trusted library allocation
page read and write
6F870000
unkown
page readonly
1D38E000
heap
page read and write
2B4400E34000
trusted library allocation
page read and write
2B4400CD4000
trusted library allocation
page read and write
1D342CA9000
heap
page read and write
61E00000
direct allocation
page execute and read and write
3ECF000
stack
page read and write
2B4400C0C000
trusted library allocation
page read and write
2B4400CC4000
trusted library allocation
page read and write
864000
heap
page read and write
2B44014E0000
trusted library allocation
page read and write
2B44001D0000
trusted library allocation
page read and write
1D342C71000
heap
page read and write
6CEB0000
unkown
page readonly
1D35B000
heap
page read and write
28BC00668000
trusted library allocation
page read and write
2B4400F88000
trusted library allocation
page read and write
2B4401B50000
trusted library allocation
page read and write
28BC00688000
trusted library allocation
page read and write
3B0F000
stack
page read and write
28BC0080C000
trusted library allocation
page read and write
E60000
direct allocation
page read and write
28BC00354000
trusted library allocation
page read and write
2B4401774000
trusted library allocation
page read and write
2B4401478000
trusted library allocation
page read and write
1D342C84000
heap
page read and write
2B44015E4000
trusted library allocation
page read and write
E9C000
unkown
page execute and read and write
864000
heap
page read and write
864000
heap
page read and write
2B4400F44000
trusted library allocation
page read and write
2B44017DC000
trusted library allocation
page read and write
2B44016D8000
trusted library allocation
page read and write
2B4401D1C000
trusted library allocation
page read and write
2B4401B6C000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
74DC002A0000
trusted library allocation
page read and write
2B4401DDD000
trusted library allocation
page read and write
2B4400F38000
trusted library allocation
page read and write
464F000
stack
page read and write
2B44016C0000
trusted library allocation
page read and write
2B4401D04000
trusted library allocation
page read and write
1D373000
heap
page read and write
1D33F736000
heap
page read and write
74DC002C0000
trusted library allocation
page read and write
1CF5E000
stack
page read and write
28BC00330000
trusted library allocation
page read and write
864000
heap
page read and write
1D342C65000
heap
page read and write
1D342C84000
heap
page read and write
1D342C8F000
heap
page read and write
1D38E000
heap
page read and write
2B44002AC000
trusted library allocation
page read and write
2B4401ABC000
trusted library allocation
page read and write
2B44018D0000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B44017E8000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
2B4401698000
trusted library allocation
page read and write
2B4401740000
trusted library allocation
page read and write
324F000
stack
page read and write
2B4400CB8000
trusted library allocation
page read and write
450F000
stack
page read and write
2B4400A18000
trusted library allocation
page read and write
2B44017A0000
trusted library allocation
page read and write
2B44002AC000
trusted library allocation
page read and write
28BC006C8000
trusted library allocation
page read and write
2B4400228000
trusted library allocation
page read and write
233E0000
heap
page read and write
28BC006B4000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
2B44017E4000
trusted library allocation
page read and write
2B44012AC000
trusted library allocation
page read and write
2B4401B34000
trusted library allocation
page read and write
2B4401E04000
trusted library allocation
page read and write
864000
heap
page read and write
48D1000
heap
page read and write
2B4401BCC000
trusted library allocation
page read and write
48D1000
heap
page read and write
42CE000
stack
page read and write
1D342C98000
heap
page read and write
2CE0000
direct allocation
page execute and read and write
1D342C85000
heap
page read and write
48D1000
heap
page read and write
2364F000
stack
page read and write
2B4401D10000
trusted library allocation
page read and write
28BC006E0000
trusted library allocation
page read and write
2B44016FC000
trusted library allocation
page read and write
314E000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
864000
heap
page read and write
1D342C67000
heap
page read and write
1D37F000
heap
page read and write
1D366000
heap
page read and write
2B4400340000
trusted library allocation
page read and write
1D380000
heap
page read and write
2B44018B4000
trusted library allocation
page read and write
980000
direct allocation
page read and write
2B4400C10000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
2B4400CEC000
trusted library allocation
page read and write
2B4400340000
trusted library allocation
page read and write
1D342C99000
heap
page read and write
13C9000
unkown
page execute and read and write
2B4400384000
trusted library allocation
page read and write
2B4401484000
trusted library allocation
page read and write
2B4400FE0000
trusted library allocation
page read and write
1D38F000
heap
page read and write
1D379000
heap
page read and write
1D342C76000
heap
page read and write
2B44007E8000
trusted library allocation
page read and write
48F0000
heap
page read and write
2B4401718000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
1D342C7F000
heap
page read and write
2B4401C0C000
trusted library allocation
page read and write
74DC002A0000
trusted library allocation
page read and write
2B4401834000
trusted library allocation
page read and write
2B44002AC000
trusted library allocation
page read and write
980000
direct allocation
page read and write
980000
direct allocation
page read and write
80E000
stack
page read and write
1D378000
heap
page read and write
1D342C8E000
heap
page read and write
28BC006E4000
trusted library allocation
page read and write
2B4400FAC000
trusted library allocation
page read and write
1D376000
heap
page read and write
48D1000
heap
page read and write
2B4400218000
trusted library allocation
page read and write
28BC00354000
trusted library allocation
page read and write
2B44017E0000
trusted library allocation
page read and write
23441000
heap
page read and write
1D470000
trusted library allocation
page read and write
2B440047B000
trusted library allocation
page read and write
2B4401ABC000
trusted library allocation
page read and write
1D381000
heap
page read and write
1D342C73000
heap
page read and write
2B4401B64000
trusted library allocation
page read and write
2B440160C000
trusted library allocation
page read and write
1D342C6B000
heap
page read and write
2B44017F0000
trusted library allocation
page read and write
2B4401D34000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
2B4401C34000
trusted library allocation
page read and write
980000
direct allocation
page read and write
48D1000
heap
page read and write
2B440179C000
trusted library allocation
page read and write
1D33F768000
heap
page read and write
1D37A000
heap
page read and write
864000
heap
page read and write
2B4401C4C000
trusted library allocation
page read and write
9A8000
heap
page read and write
2B440101C000
trusted library allocation
page read and write
1D342C84000
heap
page read and write
1D342C89000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
2B4401AF8000
trusted library allocation
page read and write
1D342C76000
heap
page read and write
2B44007E8000
trusted library allocation
page read and write
2B440107C000
trusted library allocation
page read and write
1D342C64000
heap
page read and write
2B44002C0000
trusted library allocation
page read and write
6F8FE000
unkown
page read and write
28BC00734000
trusted library allocation
page read and write
28BC0069C000
trusted library allocation
page read and write
1D05F000
stack
page read and write
2B4401530000
trusted library allocation
page read and write
864000
heap
page read and write
A81000
heap
page read and write
2B44018B0000
trusted library allocation
page read and write
864000
heap
page read and write
28BC006CC000
trusted library allocation
page read and write
6C7AE000
unkown
page read and write
2B4401660000
trusted library allocation
page read and write
48D1000
heap
page read and write
980000
direct allocation
page read and write
2B4400340000
trusted library allocation
page read and write
1D343240000
heap
page read and write
28BC00418000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4400354000
trusted library allocation
page read and write
2B4401778000
trusted library allocation
page read and write
48D1000
heap
page read and write
4D7B000
direct allocation
page read and write
864000
heap
page read and write
1D342C8B000
heap
page read and write
1D342C98000
heap
page read and write
1D342C71000
heap
page read and write
2B44002AC000
trusted library allocation
page read and write
1D376000
heap
page read and write
2B4401B90000
trusted library allocation
page read and write
2B4401724000
trusted library allocation
page read and write
2B44017EC000
trusted library allocation
page read and write
1D342C64000
heap
page read and write
2B4401640000
trusted library allocation
page read and write
2B4400FCC000
trusted library allocation
page read and write
2B4401944000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B440047B000
trusted library allocation
page read and write
2B44017D8000
trusted library allocation
page read and write
1D342C6A000
heap
page read and write
2B4400348000
trusted library allocation
page read and write
1D342C7B000
heap
page read and write
2B4401788000
trusted library allocation
page read and write
2B4401C1C000
trusted library allocation
page read and write
1D38E000
heap
page read and write
2B4401644000
trusted library allocation
page read and write
2B4400CD4000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
2B4400A18000
trusted library allocation
page read and write
74DC00248000
trusted library allocation
page read and write
1D342C77000
heap
page read and write
1D342C8B000
heap
page read and write
1D342C6B000
heap
page read and write
1D342CB3000
heap
page read and write
2B44007E8000
trusted library allocation
page read and write
2B4401784000
trusted library allocation
page read and write
2B4400CC4000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
F56000
unkown
page execute and read and write
1D342C6B000
heap
page read and write
47CE000
stack
page read and write
2B440175C000
trusted library allocation
page read and write
1D342C8F000
heap
page read and write
48D1000
heap
page read and write
115A000
unkown
page execute and read and write
1D342C7B000
heap
page read and write
1D342C6D000
heap
page read and write
2B440042C000
trusted library allocation
page read and write
48D1000
heap
page read and write
74DC002A0000
trusted library allocation
page read and write
864000
heap
page read and write
980000
direct allocation
page read and write
2B440022C000
trusted library allocation
page read and write
13F7000
unkown
page execute and read and write
4E8F000
stack
page read and write
1D342C99000
heap
page read and write
1D342C71000
heap
page read and write
1D342C73000
heap
page read and write
478F000
stack
page read and write
E60000
direct allocation
page read and write
864000
heap
page read and write
1D342C99000
heap
page read and write
1D369000
heap
page read and write
2B44017D4000
trusted library allocation
page read and write
350E000
stack
page read and write
1D342C80000
heap
page read and write
48D1000
heap
page read and write
2B4401868000
trusted library allocation
page read and write
1D383000
heap
page read and write
2B4401B00000
trusted library allocation
page read and write
2B4401908000
trusted library allocation
page read and write
2B44013AC000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
1D342C89000
heap
page read and write
1D377000
heap
page read and write
2B4401760000
trusted library allocation
page read and write
1D342C6B000
heap
page read and write
2B440180C000
trusted library allocation
page read and write
2B4401744000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D395000
heap
page read and write
2CF0000
direct allocation
page execute and read and write
3C0000
heap
page read and write
2B4401CB4000
trusted library allocation
page read and write
2B440184C000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4401114000
trusted library allocation
page read and write
2B4400F38000
trusted library allocation
page read and write
1D342CB3000
heap
page read and write
1D342C86000
heap
page read and write
2B4400475000
trusted library allocation
page read and write
2B4400348000
trusted library allocation
page read and write
1D1AD000
stack
page read and write
1D342C89000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
1D342C89000
heap
page read and write
2B4401BC8000
trusted library allocation
page read and write
2B44014C4000
trusted library allocation
page read and write
2B4400FE0000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
1D342C7B000
heap
page read and write
2B4401444000
trusted library allocation
page read and write
28BC00320000
trusted library allocation
page read and write
1D342C64000
heap
page read and write
2B4401680000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4401924000
trusted library allocation
page read and write
2B440163C000
trusted library allocation
page read and write
2B4400C0C000
trusted library allocation
page read and write
48D1000
heap
page read and write
23700000
heap
page read and write
2B4401D04000
trusted library allocation
page read and write
2B4400334000
trusted library allocation
page read and write
1D398000
heap
page read and write
1D342C93000
heap
page read and write
2B4400CC4000
trusted library allocation
page read and write
2B44018EC000
trusted library allocation
page read and write
2B4401510000
trusted library allocation
page read and write
1D342C8F000
heap
page read and write
1D342C89000
heap
page read and write
48D1000
heap
page read and write
2B4400476000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B440149C000
trusted library allocation
page read and write
2B44002CC000
trusted library allocation
page read and write
10DE000
unkown
page execute and read and write
74DC002C8000
trusted library allocation
page read and write
3C4F000
stack
page read and write
2B4401048000
trusted library allocation
page read and write
2B4400308000
trusted library allocation
page read and write
2B44018C0000
trusted library allocation
page read and write
28BC006FC000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4401BD0000
trusted library allocation
page read and write
338E000
stack
page read and write
1D37D000
heap
page read and write
FEB000
unkown
page execute and read and write
1D342C93000
heap
page read and write
2B440168C000
trusted library allocation
page read and write
2B4400244000
trusted library allocation
page read and write
2B440129C000
trusted library allocation
page read and write
2B44002AC000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
6C7B5000
unkown
page readonly
1D342C8B000
heap
page read and write
1D342C8C000
heap
page read and write
1D342C84000
heap
page read and write
864000
heap
page read and write
2B4401C24000
trusted library allocation
page read and write
2B4401830000
trusted library allocation
page read and write
2B4400340000
trusted library allocation
page read and write
6F4000
stack
page read and write
28BC00664000
trusted library allocation
page read and write
2B4400FCC000
trusted library allocation
page read and write
6C5D0000
unkown
page readonly
2B4401BE4000
trusted library allocation
page read and write
404E000
stack
page read and write
34CF000
stack
page read and write
33CE000
stack
page read and write
1D342C77000
heap
page read and write
2B44017AC000
trusted library allocation
page read and write
1D38E000
heap
page read and write
2B4401C7C000
trusted library allocation
page read and write
1D383000
heap
page read and write
1D342C89000
heap
page read and write
428F000
stack
page read and write
1D342C99000
heap
page read and write
74DC002C0000
trusted library allocation
page read and write
980000
direct allocation
page read and write
1CE1E000
stack
page read and write
2B4401738000
trusted library allocation
page read and write
6C7B0000
unkown
page read and write
1D479000
heap
page read and write
A6C000
heap
page read and write
2B44018D8000
trusted library allocation
page read and write
1D37D000
heap
page read and write
2B4401328000
trusted library allocation
page read and write
2B44002B0000
trusted library allocation
page read and write
1D342C6B000
heap
page read and write
48D1000
heap
page read and write
2B4401C3C000
trusted library allocation
page read and write
2B4401828000
trusted library allocation
page read and write
1017000
unkown
page execute and read and write
2B4401ABC000
trusted library allocation
page read and write
2B4400474000
trusted library allocation
page read and write
A07000
heap
page read and write
2B4402EEC000
trusted library allocation
page read and write
2B4400DEC000
trusted library allocation
page read and write
28BC00320000
trusted library allocation
page read and write
2B440169C000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
74DC002A0000
trusted library allocation
page read and write
2B4401C80000
trusted library allocation
page read and write
864000
heap
page read and write
1D342C6B000
heap
page read and write
300F000
stack
page read and write
2B440166C000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
1D342C6B000
heap
page read and write
2B4400F88000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
48D1000
heap
page read and write
2B44001EC000
trusted library allocation
page read and write
1D342C6B000
heap
page read and write
1D342C7B000
heap
page read and write
2B4400348000
trusted library allocation
page read and write
2B4400CEC000
trusted library allocation
page read and write
1D342C99000
heap
page read and write
1D342C7F000
heap
page read and write
2B4401704000
trusted library allocation
page read and write
2B4401C10000
trusted library allocation
page read and write
2B440102C000
trusted library allocation
page read and write
1D366000
heap
page read and write
2B44002AC000
trusted library allocation
page read and write
2B4401C60000
trusted library allocation
page read and write
1D342C6B000
heap
page read and write
2B4400A18000
trusted library allocation
page read and write
12E9000
unkown
page execute and read and write
1D342C82000
heap
page read and write
980000
direct allocation
page read and write
2B440204F000
trusted library allocation
page read and write
F84000
unkown
page execute and read and write
2B4400C68000
trusted library allocation
page read and write
1D0AD000
stack
page read and write
2B4401904000
trusted library allocation
page read and write
2B4400D88000
trusted library allocation
page read and write
2B4401B28000
trusted library allocation
page read and write
864000
heap
page read and write
1D373000
heap
page read and write
2B44017A4000
trusted library allocation
page read and write
6F2000
stack
page read and write
864000
heap
page read and write
864000
heap
page read and write
28BC00330000
trusted library allocation
page read and write
1D385000
heap
page read and write
2B4401384000
trusted library allocation
page read and write
28BC00614000
trusted library allocation
page read and write
1D342C99000
heap
page read and write
2B4400250000
trusted library allocation
page read and write
2B44012EC000
trusted library allocation
page read and write
980000
direct allocation
page read and write
1D37F000
heap
page read and write
28BC00750000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4400F38000
trusted library allocation
page read and write
864000
heap
page read and write
1D394000
heap
page read and write
864000
heap
page read and write
236F3000
heap
page read and write
2B4401C30000
trusted library allocation
page read and write
1406000
unkown
page execute and write copy
2B440189C000
trusted library allocation
page read and write
2B4400214000
trusted library allocation
page read and write
1D342C88000
heap
page read and write
2B44002C0000
trusted library allocation
page read and write
2B4401114000
trusted library allocation
page read and write
28BC002FC000
trusted library allocation
page read and write
1D342CB3000
heap
page read and write
2B4401AC7000
trusted library allocation
page read and write
1D343230000
heap
page read and write
236FB000
heap
page read and write
2B440129C000
trusted library allocation
page read and write
2B4400340000
trusted library allocation
page read and write
2B4401710000
trusted library allocation
page read and write
2B44018CC000
trusted library allocation
page read and write
2B4400D0C000
trusted library allocation
page read and write
2B4401888000
trusted library allocation
page read and write
1D343247000
heap
page read and write
1D37A000
heap
page read and write
2B4400398000
trusted library allocation
page read and write
1D342C88000
heap
page read and write
2B440109C000
trusted library allocation
page read and write
2B4401AFC000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4400F54000
trusted library allocation
page read and write
FB9000
unkown
page execute and read and write
2B4400C98000
trusted library allocation
page read and write
28BC0039C000
trusted library allocation
page read and write
2B4400F24000
trusted library allocation
page read and write
1D342C84000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
2B44007E8000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
1D378000
heap
page read and write
1D342CB3000
heap
page read and write
1D342C7F000
heap
page read and write
23708000
heap
page read and write
35C000
stack
page read and write
1D342C77000
heap
page read and write
864000
heap
page read and write
1D377000
heap
page read and write
2B4401AC0000
trusted library allocation
page read and write
1D37F000
heap
page read and write
3B0000
heap
page read and write
74DC002A4000
trusted library allocation
page read and write
2B440165C000
trusted library allocation
page read and write
1D342C86000
heap
page read and write
2B4401B68000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
A7A000
heap
page read and write
2B4401728000
trusted library allocation
page read and write
1D342C94000
heap
page read and write
48D1000
heap
page read and write
2B4401348000
trusted library allocation
page read and write
1D380000
heap
page read and write
1D342C8C000
heap
page read and write
2B44013D0000
trusted library allocation
page read and write
2B4400F88000
trusted library allocation
page read and write
28BC0075C000
trusted library allocation
page read and write
2B44002AC000
trusted library allocation
page read and write
1D342C77000
heap
page read and write
48D1000
heap
page read and write
1D342C89000
heap
page read and write
2B440047B000
trusted library allocation
page read and write
2C8E000
stack
page read and write
28BC00368000
trusted library allocation
page read and write
864000
heap
page read and write
2B440047B000
trusted library allocation
page read and write
1D342C7B000
heap
page read and write
2B44001D0000
trusted library allocation
page read and write
2B440187C000
trusted library allocation
page read and write
28BC00320000
trusted library allocation
page read and write
A6F000
heap
page read and write
2B4400224000
trusted library allocation
page read and write
2B4402D54000
trusted library allocation
page read and write
2B4401890000
trusted library allocation
page read and write
6C5D1000
unkown
page execute read
2B4400F44000
trusted library allocation
page read and write
4D8C000
stack
page read and write
2B4402C84000
trusted library allocation
page read and write
1D342C8A000
heap
page read and write
28BC00694000
trusted library allocation
page read and write
2B440176C000
trusted library allocation
page read and write
6C7AF000
unkown
page write copy
2B4400E90000
trusted library allocation
page read and write
2B4400210000
trusted library allocation
page read and write
1D38E000
heap
page read and write
1D342C8B000
heap
page read and write
1D38E000
heap
page read and write
A74000
heap
page read and write
864000
heap
page read and write
1D342C73000
heap
page read and write
1D342C77000
heap
page read and write
48D1000
heap
page read and write
2CCE000
stack
page read and write
1D342C73000
heap
page read and write
2B4401714000
trusted library allocation
page read and write
2B4401B1C000
trusted library allocation
page read and write
1D342C6B000
heap
page read and write
100B000
unkown
page execute and read and write
1D1EE000
stack
page read and write
1D378000
heap
page read and write
2B4400CC4000
trusted library allocation
page read and write
74DC002B0000
trusted library allocation
page read and write
1D342C77000
heap
page read and write
2B4401BB0000
trusted library allocation
page read and write
2B4400C0C000
trusted library allocation
page read and write
23660000
trusted library allocation
page read and write
310F000
stack
page read and write
10D8000
unkown
page execute and read and write
28BC00624000
trusted library allocation
page read and write
28BC00684000
trusted library allocation
page read and write
2B4400C10000
trusted library allocation
page read and write
2B4401084000
trusted library allocation
page read and write
1D342C93000
heap
page read and write
2B44016BC000
trusted library allocation
page read and write
2B4401C64000
trusted library allocation
page read and write
E70000
unkown
page readonly
74DC002A0000
trusted library allocation
page read and write
2B4400CC4000
trusted library allocation
page read and write
2B4401914000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4401870000
trusted library allocation
page read and write
6F8ED000
unkown
page readonly
2B44014B4000
trusted library allocation
page read and write
3F0E000
stack
page read and write
74DC002D8000
trusted library allocation
page read and write
1D366000
heap
page read and write
1D374000
heap
page read and write
2B4401C90000
trusted library allocation
page read and write
28BC0033C000
trusted library allocation
page read and write
1D342C6B000
heap
page read and write
48D1000
heap
page read and write
864000
heap
page read and write
414F000
stack
page read and write
1D342C8F000
heap
page read and write
2B4401318000
trusted library allocation
page read and write
2B4401BA0000
trusted library allocation
page read and write
A86000
heap
page read and write
2B44001F0000
trusted library allocation
page read and write
2B4400F24000
trusted library allocation
page read and write
2B4400F88000
trusted library allocation
page read and write
2B4400C0C000
trusted library allocation
page read and write
2B44002AC000
trusted library allocation
page read and write
48E6000
heap
page read and write
61E01000
direct allocation
page execute read
48D1000
heap
page read and write
388F000
stack
page read and write
1D342C65000
heap
page read and write
1D343247000
heap
page read and write
2B4401770000
trusted library allocation
page read and write
1CC9F000
stack
page read and write
1D342C8B000
heap
page read and write
2D0B000
heap
page read and write
2B4402672000
trusted library allocation
page read and write
48D1000
heap
page read and write
9A0000
heap
page read and write
74DC002C0000
trusted library allocation
page read and write
2B4401BF8000
trusted library allocation
page read and write
2B4400C3C000
trusted library allocation
page read and write
1D379000
heap
page read and write
980000
direct allocation
page read and write
1D342C8C000
heap
page read and write
48D0000
heap
page read and write
2B4401684000
trusted library allocation
page read and write
1D342C94000
heap
page read and write
1D342C65000
heap
page read and write
1D342CB3000
heap
page read and write
28BC006D4000
trusted library allocation
page read and write
1D342C93000
heap
page read and write
2B44014F0000
trusted library allocation
page read and write
2B4401C28000
trusted library allocation
page read and write
1D342C73000
heap
page read and write
2B4400248000
trusted library allocation
page read and write
1CCDE000
stack
page read and write
364E000
stack
page read and write
2B4401668000
trusted library allocation
page read and write
28BC00610000
trusted library allocation
page read and write
2D0E000
heap
page read and write
2B4400FAC000
trusted library allocation
page read and write
1D342C8F000
heap
page read and write
2B4401BD4000
trusted library allocation
page read and write
2B44001D0000
trusted library allocation
page read and write
2B4401BB4000
trusted library allocation
page read and write
1D342C7F000
heap
page read and write
2B4401DD8000
trusted library allocation
page read and write
1D343245000
heap
page read and write
2B4401C38000
trusted library allocation
page read and write
2B44001C8000
trusted library allocation
page read and write
2B4400354000
trusted library allocation
page read and write
1D342C77000
heap
page read and write
1D2ED000
stack
page read and write
28BC00700000
trusted library allocation
page read and write
48D1000
heap
page read and write
400F000
stack
page read and write
2B4400348000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
2B44015E4000
trusted library allocation
page read and write
1D342C86000
heap
page read and write
1D342C82000
heap
page read and write
2B4400F38000
trusted library allocation
page read and write
1D342C77000
heap
page read and write
2B4400340000
trusted library allocation
page read and write
2B4400CEC000
trusted library allocation
page read and write
2B44017D0000
trusted library allocation
page read and write
2B44002B2000
trusted library allocation
page read and write
15AB000
unkown
page execute and read and write
28BC00620000
trusted library allocation
page read and write
2B4400FB8000
trusted library allocation
page read and write
2B4401C50000
trusted library allocation
page read and write
2354E000
stack
page read and write
1CDDE000
stack
page read and write
43CF000
stack
page read and write
1D342C84000
heap
page read and write
1D342C89000
heap
page read and write
28BC00758000
trusted library allocation
page read and write
2B440167C000
trusted library allocation
page read and write
2B4401BD4000
trusted library allocation
page read and write
2B440032C000
trusted library allocation
page read and write
2B4401664000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
980000
direct allocation
page read and write
1D342CAC000
heap
page read and write
2B4401B80000
trusted library allocation
page read and write
2B4401900000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
1D342CB3000
heap
page read and write
2B4401818000
trusted library allocation
page read and write
10B8000
unkown
page execute and read and write
48D1000
heap
page read and write
48CF000
stack
page read and write
1D342C64000
heap
page read and write
1D342C7F000
heap
page read and write
374F000
stack
page read and write
1407000
unkown
page execute and write copy
1D342C73000
heap
page read and write
2B44014A4000
trusted library allocation
page read and write
1D352000
heap
page read and write
1D342C65000
heap
page read and write
1D342C7C000
heap
page read and write
1D342C98000
heap
page read and write
1D342C6B000
heap
page read and write
28BC00760000
trusted library allocation
page read and write
1D342C89000
heap
page read and write
2B440174C000
trusted library allocation
page read and write
2B4400F54000
trusted library allocation
page read and write
28BC00640000
trusted library allocation
page read and write
1D366000
heap
page read and write
48D1000
heap
page read and write
2B4401688000
trusted library allocation
page read and write
E70000
unkown
page read and write
2B4401700000
trusted library allocation
page read and write
E71000
unkown
page execute and write copy
2B44015F0000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
2B44007E8000
trusted library allocation
page read and write
1D376000
heap
page read and write
3DCE000
stack
page read and write
2B440162C000
trusted library allocation
page read and write
48D1000
heap
page read and write
1D342C7F000
heap
page read and write
980000
direct allocation
page read and write
2B4400320000
trusted library allocation
page read and write
1D342C8E000
heap
page read and write
1D342CA9000
heap
page read and write
1D342C89000
heap
page read and write
4E90000
direct allocation
page execute and read and write
1D343205000
heap
page read and write
2B4401458000
trusted library allocation
page read and write
2B440065C000
trusted library allocation
page read and write
1D366000
heap
page read and write
2B4402EE0000
trusted library allocation
page read and write
2B4400D0C000
trusted library allocation
page read and write
2B44016D0000
trusted library allocation
page read and write
1D343242000
heap
page read and write
1D342C77000
heap
page read and write
2B44002F8000
trusted library allocation
page read and write
3A0E000
stack
page read and write
1D342C65000
heap
page read and write
1D342C7F000
heap
page read and write
2F0F000
stack
page read and write
1D342C77000
heap
page read and write
1D342C7E000
heap
page read and write
48D1000
heap
page read and write
2B440101C000
trusted library allocation
page read and write
28BC00698000
trusted library allocation
page read and write
2B4400384000
trusted library allocation
page read and write
2B4401838000
trusted library allocation
page read and write
2B4401CB0000
trusted library allocation
page read and write
2B44002B6000
trusted library allocation
page read and write
2B4401D90000
trusted library allocation
page read and write
1D34320C000
heap
page read and write
DDE000
stack
page read and write
28BC00424000
trusted library allocation
page read and write
2B4402F04000
trusted library allocation
page read and write
48D1000
heap
page read and write
2B4401CA0000
trusted library allocation
page read and write
2B4401D7C000
trusted library allocation
page read and write
2B4400C0C000
trusted library allocation
page read and write
2B4400238000
trusted library allocation
page read and write
864000
heap
page read and write
2D00000
heap
page read and write
39CF000
stack
page read and write
2B440042C000
trusted library allocation
page read and write
2B44014D4000
trusted library allocation
page read and write
2B4402686000
trusted library allocation
page read and write
2B4400F7C000
trusted library allocation
page read and write
1D38E000
heap
page read and write
6C76F000
unkown
page readonly
860000
heap
page read and write
1D342C6B000
heap
page read and write
B9E000
stack
page read and write
2B4400F38000
trusted library allocation
page read and write
2B4401C9C000
trusted library allocation
page read and write
1D397000
heap
page read and write
2B4400C7C000
trusted library allocation
page read and write
2B4400475000
trusted library allocation
page read and write
1D342C90000
heap
page read and write
1D342C95000
heap
page read and write
1D342C84000
heap
page read and write
28BC00408000
trusted library allocation
page read and write
864000
heap
page read and write
1D37A000
heap
page read and write
2B44026AC000
trusted library allocation
page read and write
9F1000
heap
page read and write
1D342C65000
heap
page read and write
1D380000
heap
page read and write
48D1000
heap
page read and write
1D342C84000
heap
page read and write
234AA000
heap
page read and write
2B4400CC4000
trusted library allocation
page read and write
1D342C98000
heap
page read and write
A28000
heap
page read and write
1D37A000
heap
page read and write
2B4400CEC000
trusted library allocation
page read and write
74DC002C0000
trusted library allocation
page read and write
1D342C77000
heap
page read and write
1D342C7B000
heap
page read and write
1D342C84000
heap
page read and write
2B4401624000
trusted library allocation
page read and write
6CEB1000
unkown
page execute read
48D1000
heap
page read and write
1D342C89000
heap
page read and write
2B440102C000
trusted library allocation
page read and write
28BC00714000
trusted library allocation
page read and write
1D399000
heap
page read and write
1D342C77000
heap
page read and write
2B440182C000
trusted library allocation
page read and write
328E000
stack
page read and write
1D380000
heap
page read and write
1D380000
heap
page read and write
454E000
stack
page read and write
2B4400234000
trusted library allocation
page read and write
2B4402EF8000
trusted library allocation
page read and write
84D000
stack
page read and write
1CF1F000
stack
page read and write
2B4401BA4000
trusted library allocation
page read and write
1D343248000
heap
page read and write
1D343227000
heap
page read and write
1D342C8E000
heap
page read and write
2C4F000
stack
page read and write
28BC00704000
trusted library allocation
page read and write
2B4400E30000
trusted library allocation
page read and write
2B4400FAC000
trusted library allocation
page read and write
6F871000
unkown
page execute read
2B4401BDC000
trusted library allocation
page read and write
2B440190C000
trusted library allocation
page read and write
48D1000
heap
page read and write
FDE000
unkown
page execute and read and write
2B4400220000
trusted library allocation
page read and write
440E000
stack
page read and write
360F000
stack
page read and write
74DC002A4000
trusted library allocation
page read and write
1D38E000
heap
page read and write
2B4400CDC000
trusted library allocation
page read and write
2B44001C8000
trusted library allocation
page read and write
2B4400314000
trusted library allocation
page read and write
1D342C65000
heap
page read and write
1D342CB3000
heap
page read and write
1D342C64000
heap
page read and write
1D342C8B000
heap
page read and write
2B4401B10000
trusted library allocation
page read and write
2B44014E0000
trusted library allocation
page read and write
1D3431F9000
heap
page read and write
1D342C86000
heap
page read and write
1D342C93000
heap
page read and write
A1A000
heap
page read and write
418E000
stack
page read and write
2B44017B0000
trusted library allocation
page read and write
There are 1076 hidden memdumps, click here to show them.