IOC Report
GoldenContinent.exe

loading gif

Files

File Path
Type
Category
Malicious
GoldenContinent.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\523266\Relationship.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\8Y5XTR16XLN7\2DTJEU
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\8Y5XTR16XLN7\68QI5P
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\8Y5XTR16XLN7\C2VKNO
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\8Y5XTR16XLN7\D2NGDJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\8Y5XTR16XLN7\EC2N7Y
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\8Y5XTR16XLN7\MYC2D2
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\8Y5XTR16XLN7\Q1NGDT
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\8Y5XTR16XLN7\UKX47GDB1
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\8Y5XTR16XLN7\WT0R1DJWB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\523266\x
data
dropped
C:\Users\user\AppData\Local\Temp\Altered
data
dropped
C:\Users\user\AppData\Local\Temp\Ca
data
dropped
C:\Users\user\AppData\Local\Temp\Distribution
OpenPGP Public Key Version 3, Created Sun Jul 12 11:54:22 2026, Unknown Algorithm (0xe6)
dropped
C:\Users\user\AppData\Local\Temp\Dsc
data
dropped
C:\Users\user\AppData\Local\Temp\Elvis
data
dropped
C:\Users\user\AppData\Local\Temp\Existing
data
dropped
C:\Users\user\AppData\Local\Temp\Faculty
data
dropped
C:\Users\user\AppData\Local\Temp\Futures
data
dropped
C:\Users\user\AppData\Local\Temp\Gnu
Targa image data - RLE 8 x 8 x 8 +8 +8 "\010"
dropped
C:\Users\user\AppData\Local\Temp\Jam
ASCII text, with very long lines (1428), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Jam.cmd (copy)
ASCII text, with very long lines (1428), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Lower
data
dropped
C:\Users\user\AppData\Local\Temp\Sap
data
dropped
C:\Users\user\AppData\Local\Temp\Screens
data
dropped
C:\Users\user\AppData\Local\Temp\Travelling
data
dropped
C:\Users\user\AppData\Local\Temp\Unfortunately
data
dropped
C:\Users\user\AppData\Local\Temp\Wants
OpenPGP Public Key
dropped
Chrome Cache Entry: 78
Unicode text, UTF-8 text, with very long lines (6186)
downloaded
Chrome Cache Entry: 79
ASCII text
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 82
SVG Scalable Vector Graphics image
downloaded
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GoldenContinent.exe
"C:\Users\user\Desktop\GoldenContinent.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Jam Jam.cmd & Jam.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 523266
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "landing" Ca
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Existing + ..\Lower + ..\Wants + ..\Elvis + ..\Distribution x
malicious
C:\Users\user\AppData\Local\Temp\523266\Relationship.com
Relationship.com x
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 --field-trial-handle=2344,i,12562058897419694895,3034342051900266821,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\user\AppData\Local\Temp\523266\Relationship.com" & rd /s /q "C:\ProgramData\8Y5XTR16XLN7" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://docs.google.com/document/J
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/C
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://google-ohttp-relay-join.fastly-edge.com/F
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/M
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/Q
unknown
https://google-ohttp-relay-join.fastly-edge.com/P
unknown
https://google-ohttp-relay-join.fastly-edge.com/W
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://google-ohttp-relay-join.fastly-edge.com/T
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/Z
unknown
https://t.me/k04aelKm
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://google-ohttp-relay-join.fastly-edge.com/a
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://google-ohttp-relay-join.fastly-edge.com/e
unknown
https://google-ohttp-relay-join.fastly-edge.com/d
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://t.me/k04aelm0nk3Mozilla/5.0
unknown
http://www.autoitscript.com/autoit3/X
unknown
https://chrome.google.com/webstore?hl=en4
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://google-ohttp-relay-query.fastly-edge.com/https://google-ohttp-relay-join.fastly-edge.com/x
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://toptek.sbsosh;
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
https://t.m
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
toptek.sbs
94.130.188.57
malicious
t.me
149.154.167.99
www.google.com
142.250.181.68
ezaZTimpWHt.ezaZTimpWHt
unknown

IPs

IP
Domain
Country
Malicious
94.130.188.57
toptek.sbs
Germany
malicious
192.168.2.4
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
149.154.167.99
t.me
United Kingdom
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
43F1000
direct allocation
page execute and read and write
malicious
18A1000
heap
page read and write
malicious
43FE000
trusted library allocation
page read and write
malicious
40F8000
trusted library allocation
page read and write
malicious
1864000
heap
page read and write
malicious
40F0000
trusted library allocation
page read and write
malicious
73A000390000
trusted library allocation
page read and write
73A000714000
trusted library allocation
page read and write
78100254C000
trusted library allocation
page read and write
2B54EFFE000
heap
page read and write
7810023DC000
trusted library allocation
page read and write
449D000
direct allocation
page execute and read and write
7810023D0000
trusted library allocation
page read and write
781004E48000
trusted library allocation
page read and write
3E43000
heap
page read and write
3E43000
heap
page read and write
2B54EFDF000
heap
page read and write
2B54EFFE000
heap
page read and write
7EF000
heap
page read and write
781003E78000
trusted library allocation
page read and write
3E43000
heap
page read and write
13BE000
stack
page read and write
2B54EFD4000
heap
page read and write
73A000688000
trusted library allocation
page read and write
2D10000
heap
page read and write
781004BE8000
trusted library allocation
page read and write
632C002D4000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
DA7000
heap
page read and write
7C74000
trusted library allocation
page read and write
509E000
stack
page read and write
2B54EFE4000
heap
page read and write
73A000760000
trusted library allocation
page read and write
3E43000
heap
page read and write
4371000
trusted library allocation
page read and write
4190000
trusted library allocation
page read and write
2A70000
heap
page read and write
781004B38000
trusted library allocation
page read and write
7810031DC000
trusted library allocation
page read and write
C8D000
unkown
page readonly
2B54EFE4000
heap
page read and write
B0F000
stack
page read and write
43C3000
trusted library allocation
page read and write
68D5000
trusted library allocation
page read and write
70E000
stack
page read and write
7FC000
heap
page read and write
781003F41000
trusted library allocation
page read and write
2B54EFED000
heap
page read and write
6BCA000
trusted library allocation
page read and write
15EE000
heap
page read and write
781003F1D000
trusted library allocation
page read and write
2328000
heap
page read and write
61FF000
stack
page read and write
429E000
trusted library allocation
page read and write
27ED000
stack
page read and write
2C10000
heap
page read and write
DBD000
stack
page read and write
4245000
trusted library allocation
page read and write
78100254C000
trusted library allocation
page read and write
781004CE4000
trusted library allocation
page read and write
73A000364000
trusted library allocation
page read and write
3E43000
heap
page read and write
7810050E8000
trusted library allocation
page read and write
7810034B0000
trusted library allocation
page read and write
2F83000
heap
page read and write
7BE9000
trusted library allocation
page read and write
781004FD4000
trusted library allocation
page read and write
3E43000
heap
page read and write
78100508C000
trusted library allocation
page read and write
781002540000
trusted library allocation
page read and write
500000
unkown
page readonly
2B54EFE8000
heap
page read and write
3E41000
heap
page read and write
78100509C000
trusted library allocation
page read and write
7810050E4000
trusted library allocation
page read and write
8ED000
heap
page read and write
781004C88000
trusted library allocation
page read and write
781002414000
trusted library allocation
page read and write
73A000724000
trusted library allocation
page read and write
781004F3C000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
73A00034C000
trusted library allocation
page read and write
5DC0000
remote allocation
page read and write
73A000424000
trusted library allocation
page read and write
781004BC0000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
73A0006A8000
trusted library allocation
page read and write
781003FD2000
trusted library allocation
page read and write
73A000700000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
82D000
heap
page read and write
781003FFA000
trusted library allocation
page read and write
3E43000
heap
page read and write
C8D000
unkown
page readonly
2B54EFD4000
heap
page read and write
68A5000
trusted library allocation
page read and write
781004C2C000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
781002A6B000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
7E6000
heap
page read and write
2B54EFE4000
heap
page read and write
7810025A4000
trusted library allocation
page read and write
2B54EFE2000
heap
page read and write
18EF000
heap
page read and write
78100325C000
trusted library allocation
page read and write
1540000
heap
page read and write
2B54EFE8000
heap
page read and write
2A60000
heap
page read and write
781002EF4000
trusted library allocation
page read and write
400000
unkown
page readonly
2F9A000
heap
page read and write
781005044000
trusted library allocation
page read and write
3E43000
heap
page read and write
632C002EC000
trusted library allocation
page read and write
3920000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
75E2000
trusted library allocation
page read and write
7810031B8000
trusted library allocation
page read and write
4A2E000
stack
page read and write
2B54EFDA000
heap
page read and write
781004DD8000
trusted library allocation
page read and write
4155000
trusted library allocation
page read and write
2B54EFCD000
heap
page read and write
434000
unkown
page read and write
78100506C000
trusted library allocation
page read and write
7EE000
stack
page read and write
43E9000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFE6000
heap
page read and write
80E000
heap
page read and write
2B54EFDF000
heap
page read and write
2FAD000
heap
page read and write
781004C48000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
98000
stack
page read and write
781004AF4000
trusted library allocation
page read and write
74C3000
trusted library allocation
page read and write
632C002D4000
trusted library allocation
page read and write
677A000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
740000
heap
page read and write
78F000
stack
page read and write
2B54EFE8000
heap
page read and write
41F1000
trusted library allocation
page read and write
781004C98000
trusted library allocation
page read and write
4CE0000
heap
page read and write
8722000
trusted library allocation
page read and write
2F9A000
heap
page read and write
2B54EFD1000
heap
page read and write
1909000
heap
page read and write
43A7000
trusted library allocation
page read and write
781004DC8000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFFE000
heap
page read and write
781004B1C000
trusted library allocation
page read and write
7810050AC000
trusted library allocation
page read and write
781004C4C000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
2B54EFDD000
heap
page read and write
781003240000
trusted library allocation
page read and write
781004974000
trusted library allocation
page read and write
781002EF4000
trusted library allocation
page read and write
781002418000
trusted library allocation
page read and write
2F7F000
heap
page read and write
73A0006F0000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
7A0000
heap
page read and write
781003604000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
2B54EFD1000
heap
page read and write
401000
unkown
page execute read
632C002A8000
trusted library allocation
page read and write
1960000
heap
page read and write
2FAD000
heap
page read and write
2B54EFD4000
heap
page read and write
781004F60000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
43BA000
trusted library allocation
page read and write
8C8000
heap
page read and write
3E43000
heap
page read and write
67DD000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
781002E34000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
13FF000
stack
page read and write
18B9000
heap
page read and write
781004D34000
trusted library allocation
page read and write
1578000
heap
page read and write
8FB000
heap
page read and write
2B54EFD2000
heap
page read and write
781002E34000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781002560000
trusted library allocation
page read and write
3E43000
heap
page read and write
7810024AA000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
7AE000
heap
page read and write
99F000
stack
page read and write
442A000
direct allocation
page execute and read and write
781004D04000
trusted library allocation
page read and write
73A00080C000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
2B54EFD1000
heap
page read and write
73A0003A0000
trusted library allocation
page read and write
781004D88000
trusted library allocation
page read and write
311C000
stack
page read and write
242E000
stack
page read and write
469F000
stack
page read and write
73C000
stack
page read and write
2B54EFD2000
heap
page read and write
2B54F01C000
heap
page read and write
2B54EFDA000
heap
page read and write
B8F000
stack
page read and write
781002514000
trusted library allocation
page read and write
7810031E8000
trusted library allocation
page read and write
43AD000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
78100491C000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
2B54EFE5000
heap
page read and write
2FAD000
heap
page read and write
459C000
direct allocation
page execute and read and write
781004B68000
trusted library allocation
page read and write
7CE000
stack
page read and write
8E0000
heap
page read and write
2A93000
heap
page read and write
2B54EFD4000
heap
page read and write
2B54EFDA000
heap
page read and write
781003E71000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFE8000
heap
page read and write
78100340C000
trusted library allocation
page read and write
7810024A4000
trusted library allocation
page read and write
43D5000
trusted library allocation
page read and write
DC6000
heap
page read and write
2A50000
heap
page read and write
80A000
heap
page read and write
68C0000
trusted library allocation
page read and write
2B54EFEB000
heap
page read and write
1550000
heap
page read and write
7810048FC000
trusted library allocation
page read and write
781003134000
trusted library allocation
page read and write
5E0000
heap
page read and write
8FB000
heap
page read and write
3E43000
heap
page read and write
2B54EFCD000
heap
page read and write
781004CC8000
trusted library allocation
page read and write
4297000
trusted library allocation
page read and write
781002514000
trusted library allocation
page read and write
781005088000
trusted library allocation
page read and write
1510000
heap
page read and write
80F000
heap
page read and write
28CF000
stack
page read and write
781004BB8000
trusted library allocation
page read and write
73A000330000
trusted library allocation
page read and write
316E000
stack
page read and write
3E43000
heap
page read and write
3910000
trusted library allocation
page read and write
7810048EC000
trusted library allocation
page read and write
4399000
trusted library allocation
page read and write
73A0006E0000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
2B54EFD4000
heap
page read and write
632C002D8000
trusted library allocation
page read and write
781002EEC000
trusted library allocation
page read and write
4137000
trusted library allocation
page read and write
781004E28000
trusted library allocation
page read and write
7810050C4000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
2B54EFD4000
heap
page read and write
3E43000
heap
page read and write
26ED000
stack
page read and write
2B54EFD4000
heap
page read and write
2B54EFE4000
heap
page read and write
7810024A4000
trusted library allocation
page read and write
1663000
heap
page read and write
2B54EFD4000
heap
page read and write
2B54EFE4000
heap
page read and write
2B54EFD2000
heap
page read and write
781002A60000
trusted library allocation
page read and write
74D8000
trusted library allocation
page read and write
632C002B8000
trusted library allocation
page read and write
781004DF8000
trusted library allocation
page read and write
7810023B4000
trusted library allocation
page read and write
2250000
heap
page read and write
3E43000
heap
page read and write
781005064000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
2F9A000
heap
page read and write
781005194000
trusted library allocation
page read and write
2B54EFCD000
heap
page read and write
2B54EFD2000
heap
page read and write
78100254C000
trusted library allocation
page read and write
7BDE000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
781002A69000
trusted library allocation
page read and write
781004FB0000
trusted library allocation
page read and write
781003E94000
trusted library allocation
page read and write
67D5000
trusted library allocation
page read and write
632C002D4000
trusted library allocation
page read and write
781004934000
trusted library allocation
page read and write
7810032D0000
trusted library allocation
page read and write
7810025EC000
trusted library allocation
page read and write
781002EDC000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFE4000
heap
page read and write
781004CCC000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781005018000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
2B54EFE8000
heap
page read and write
7810024F0000
trusted library allocation
page read and write
78100240C000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
CC5000
unkown
page readonly
6995000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
781002EDC000
trusted library allocation
page read and write
781005060000
trusted library allocation
page read and write
3E43000
heap
page read and write
781005230000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004F20000
trusted library allocation
page read and write
7810023B4000
trusted library allocation
page read and write
2320000
heap
page read and write
3E43000
heap
page read and write
2B54EFE1000
heap
page read and write
3E43000
heap
page read and write
2B54EFE4000
heap
page read and write
78100241C000
trusted library allocation
page read and write
CC5000
unkown
page readonly
781004DD0000
trusted library allocation
page read and write
78100254C000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
549F000
stack
page read and write
7D5E000
trusted library allocation
page read and write
781002EF4000
trusted library allocation
page read and write
73A000620000
trusted library allocation
page read and write
781004FB8000
trusted library allocation
page read and write
781004AF0000
trusted library allocation
page read and write
7C94000
trusted library allocation
page read and write
446C000
direct allocation
page execute and read and write
6778000
trusted library allocation
page read and write
399C000
heap
page read and write
2B54EFD2000
heap
page read and write
78100495C000
trusted library allocation
page read and write
2FAB000
heap
page read and write
781004E18000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
49EF000
stack
page read and write
2B54EFFE000
heap
page read and write
2B54EFD2000
heap
page read and write
781003E3C000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
781002514000
trusted library allocation
page read and write
3E43000
heap
page read and write
781003EBC000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
3050000
heap
page read and write
781004DDC000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
6795000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
28D0000
heap
page read and write
29D0000
heap
page read and write
2B54EFE5000
heap
page read and write
78100500C000
trusted library allocation
page read and write
746000
heap
page read and write
3910000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
2B54EFD2000
heap
page read and write
781004F0C000
trusted library allocation
page read and write
1952000
heap
page read and write
781004D38000
trusted library allocation
page read and write
781003E8A000
trusted library allocation
page read and write
8E3000
heap
page read and write
2B54EFE5000
heap
page read and write
781002E34000
trusted library allocation
page read and write
2B54EFCA000
heap
page read and write
781004D0C000
trusted library allocation
page read and write
6781000
trusted library allocation
page read and write
3E43000
heap
page read and write
781002590000
trusted library allocation
page read and write
1570000
heap
page read and write
BD9000
stack
page read and write
78100502C000
trusted library allocation
page read and write
781002EF4000
trusted library allocation
page read and write
813000
heap
page read and write
73A000630000
trusted library allocation
page read and write
781004CB4000
trusted library allocation
page read and write
6298000
trusted library allocation
page read and write
7810031E8000
trusted library allocation
page read and write
632C002E0000
trusted library allocation
page read and write
78100310C000
trusted library allocation
page read and write
2B54EFCA000
heap
page read and write
781003180000
trusted library allocation
page read and write
6214000
trusted library allocation
page read and write
7810051A4000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
781005188000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
4391000
trusted library allocation
page read and write
4367000
trusted library allocation
page read and write
2484000
heap
page read and write
82D000
heap
page read and write
2B54EFD1000
heap
page read and write
2B54EFDA000
heap
page read and write
2B54EFD2000
heap
page read and write
3E43000
heap
page read and write
31B8000
heap
page read and write
73A00061C000
trusted library allocation
page read and write
2DE8000
heap
page read and write
41EC000
trusted library allocation
page read and write
59E000
stack
page read and write
75CD000
trusted library allocation
page read and write
781004DA0000
trusted library allocation
page read and write
6B79000
trusted library allocation
page read and write
16F8000
heap
page read and write
73A000770000
trusted library allocation
page read and write
5D4F000
stack
page read and write
40C000
unkown
page read and write
3E43000
heap
page read and write
7810023B4000
trusted library allocation
page read and write
73A000710000
trusted library allocation
page read and write
781004AC8000
trusted library allocation
page read and write
781004B3C000
trusted library allocation
page read and write
5DE000
stack
page read and write
80A000
heap
page read and write
7810023E4000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004D94000
trusted library allocation
page read and write
750D000
trusted library allocation
page read and write
4289000
trusted library allocation
page read and write
781004ADC000
trusted library allocation
page read and write
632C002FC000
trusted library allocation
page read and write
632C00248000
trusted library allocation
page read and write
78100325C000
trusted library allocation
page read and write
2B0F000
stack
page read and write
781002E34000
trusted library allocation
page read and write
3E43000
heap
page read and write
7810052B0000
trusted library allocation
page read and write
7F9000
heap
page read and write
781005030000
trusted library allocation
page read and write
78100507C000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
781003144000
trusted library allocation
page read and write
781004CE0000
trusted library allocation
page read and write
428F000
trusted library allocation
page read and write
781002514000
trusted library allocation
page read and write
781005070000
trusted library allocation
page read and write
78100510C000
trusted library allocation
page read and write
78100252C000
trusted library allocation
page read and write
73A000330000
trusted library allocation
page read and write
4299000
trusted library allocation
page read and write
7810050D4000
trusted library allocation
page read and write
4B10000
heap
page read and write
4AF0000
heap
page read and write
781004A0C000
trusted library allocation
page read and write
82D000
heap
page read and write
2B54EFD2000
heap
page read and write
3910000
trusted library allocation
page read and write
505D000
stack
page read and write
430B000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
2B54EFD2000
heap
page read and write
781004D58000
trusted library allocation
page read and write
BF1000
unkown
page execute read
2B54EFDF000
heap
page read and write
44C7000
direct allocation
page execute and read and write
2B54F005000
heap
page read and write
DA0000
heap
page read and write
639A000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
2B54EFD4000
heap
page read and write
781002EF4000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFDA000
heap
page read and write
4347000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFE8000
heap
page read and write
2B54EFD2000
heap
page read and write
2B54EFE1000
heap
page read and write
677C000
trusted library allocation
page read and write
68F5000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
7810032C4000
trusted library allocation
page read and write
75ED000
trusted library allocation
page read and write
41E2000
trusted library allocation
page read and write
781003FF8000
trusted library allocation
page read and write
3E43000
heap
page read and write
195A000
heap
page read and write
2B54F00B000
heap
page read and write
2B54EFE4000
heap
page read and write
2B54EFE1000
heap
page read and write
6CE2000
trusted library allocation
page read and write
78100494C000
trusted library allocation
page read and write
7810023AC000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
781002C38000
trusted library allocation
page read and write
41D9000
trusted library allocation
page read and write
781002A60000
trusted library allocation
page read and write
49B000
unkown
page read and write
2B54EFE8000
heap
page read and write
2980000
heap
page read and write
74CB000
trusted library allocation
page read and write
781002590000
trusted library allocation
page read and write
2B54EFEA000
heap
page read and write
7810024A4000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
2B54EFCA000
heap
page read and write
2B54EFE4000
heap
page read and write
781003240000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
781003F54000
trusted library allocation
page read and write
18D8000
heap
page read and write
2B54EFE5000
heap
page read and write
2B54F01C000
heap
page read and write
781004AF8000
trusted library allocation
page read and write
43B4000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
781004CAC000
trusted library allocation
page read and write
73A00030C000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
6789000
trusted library allocation
page read and write
781004B40000
trusted library allocation
page read and write
3E0000
heap
page read and write
781003584000
trusted library allocation
page read and write
18DE000
heap
page read and write
7810024F3000
trusted library allocation
page read and write
781002560000
trusted library allocation
page read and write
4323000
trusted library allocation
page read and write
78100520C000
trusted library allocation
page read and write
4C5D000
stack
page read and write
4177000
trusted library allocation
page read and write
BB0000
heap
page read and write
5E5000
heap
page read and write
2B54EFDA000
heap
page read and write
781004DD4000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004F0C000
trusted library allocation
page read and write
781004C60000
trusted library allocation
page read and write
781005058000
trusted library allocation
page read and write
7662000
trusted library allocation
page read and write
7810024A4000
trusted library allocation
page read and write
3E43000
heap
page read and write
781005264000
trusted library allocation
page read and write
2B54F002000
heap
page read and write
80F000
stack
page read and write
4312000
trusted library allocation
page read and write
8EE000
heap
page read and write
781002A60000
trusted library allocation
page read and write
75A2000
trusted library allocation
page read and write
89F000
stack
page read and write
409000
unkown
page readonly
747C000
stack
page read and write
3910000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
3E43000
heap
page read and write
2B54EFD4000
heap
page read and write
781003168000
trusted library allocation
page read and write
2B54F001000
heap
page read and write
2B54EFE8000
heap
page read and write
2B54EFD4000
heap
page read and write
BF0000
unkown
page readonly
781004C10000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
17A2000
heap
page read and write
2B54EFE4000
heap
page read and write
781004B64000
trusted library allocation
page read and write
41F0000
trusted library allocation
page read and write
781004FA0000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
2B54EFD2000
heap
page read and write
7810050DC000
trusted library allocation
page read and write
632C002A8000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
73A0006B0000
trusted library allocation
page read and write
781002434000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
2B54EFE4000
heap
page read and write
43F0000
direct allocation
page read and write
2B54EFDA000
heap
page read and write
781004DEC000
trusted library allocation
page read and write
3E43000
heap
page read and write
3E43000
heap
page read and write
3E41000
heap
page read and write
2D0F000
stack
page read and write
2A7B000
heap
page read and write
781004C70000
trusted library allocation
page read and write
2B54F005000
heap
page read and write
7810031B8000
trusted library allocation
page read and write
781005298000
trusted library allocation
page read and write
632C002D8000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
3980000
heap
page read and write
2B54EFD2000
heap
page read and write
2B54EFD4000
heap
page read and write
44CD000
direct allocation
page execute and read and write
781002EF4000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781002590000
trusted library allocation
page read and write
75D8000
trusted library allocation
page read and write
594E000
stack
page read and write
2A95000
heap
page read and write
2B54EFE1000
heap
page read and write
CC1000
unkown
page write copy
781004BB4000
trusted library allocation
page read and write
2B54EFED000
heap
page read and write
7810050C0000
trusted library allocation
page read and write
3E43000
heap
page read and write
28D5000
heap
page read and write
3E43000
heap
page read and write
2B54EFE4000
heap
page read and write
2B54EFE5000
heap
page read and write
7810050EC000
trusted library allocation
page read and write
632C002A8000
trusted library allocation
page read and write
7810024A4000
trusted library allocation
page read and write
3E43000
heap
page read and write
1900000
heap
page read and write
7810024A8000
trusted library allocation
page read and write
781002E38000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
431B000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781003F2F000
trusted library allocation
page read and write
4720000
heap
page read and write
781004CA8000
trusted library allocation
page read and write
781004940000
trusted library allocation
page read and write
781005090000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
2B54EFE1000
heap
page read and write
3984000
heap
page read and write
781003180000
trusted library allocation
page read and write
3E43000
heap
page read and write
2D9E000
stack
page read and write
2B54EFE4000
heap
page read and write
3E43000
heap
page read and write
1596000
heap
page read and write
4173000
trusted library allocation
page read and write
3E43000
heap
page read and write
390E000
stack
page read and write
2B54EFD2000
heap
page read and write
781003224000
trusted library allocation
page read and write
4627000
direct allocation
page execute and read and write
781002880000
trusted library allocation
page read and write
4168000
trusted library allocation
page read and write
908000
heap
page read and write
3E43000
heap
page read and write
781004B08000
trusted library allocation
page read and write
7810048E8000
trusted library allocation
page read and write
781002EEC000
trusted library allocation
page read and write
78100353D000
trusted library allocation
page read and write
6C1A000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFE1000
heap
page read and write
3E43000
heap
page read and write
436E000
trusted library allocation
page read and write
632C002D4000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004BA4000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
2B54EFDB000
heap
page read and write
3E43000
heap
page read and write
429F000
trusted library allocation
page read and write
2B54F005000
heap
page read and write
2B54EFCA000
heap
page read and write
3E43000
heap
page read and write
781002D34000
trusted library allocation
page read and write
3E43000
heap
page read and write
78100254C000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
7810050D8000
trusted library allocation
page read and write
2B54EFCD000
heap
page read and write
2B54F01C000
heap
page read and write
2B54EFCA000
heap
page read and write
174E000
heap
page read and write
781002FF8000
trusted library allocation
page read and write
8C0000
heap
page read and write
2B54EFE4000
heap
page read and write
2B54EFE5000
heap
page read and write
3030000
heap
page read and write
2B54EFDA000
heap
page read and write
78100320C000
trusted library allocation
page read and write
781002EEC000
trusted library allocation
page read and write
7810050E0000
trusted library allocation
page read and write
3E43000
heap
page read and write
781003168000
trusted library allocation
page read and write
781004CC0000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54F005000
heap
page read and write
781004C30000
trusted library allocation
page read and write
7810051A4000
trusted library allocation
page read and write
781003134000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
632C002D4000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFE4000
heap
page read and write
2B54EFDF000
heap
page read and write
BF1000
unkown
page execute read
781004FE0000
trusted library allocation
page read and write
781003E78000
trusted library allocation
page read and write
781004D00000
trusted library allocation
page read and write
781005274000
trusted library allocation
page read and write
781004B2C000
trusted library allocation
page read and write
67E7000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
4327000
trusted library allocation
page read and write
781004CF0000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
187D000
heap
page read and write
2B54EFFE000
heap
page read and write
409000
unkown
page readonly
7E6000
heap
page read and write
632C002D4000
trusted library allocation
page read and write
3E43000
heap
page read and write
7810024A4000
trusted library allocation
page read and write
781004D5C000
trusted library allocation
page read and write
90F000
heap
page read and write
781002EDC000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
781005020000
trusted library allocation
page read and write
2B54F005000
heap
page read and write
73A000650000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
73A00040C000
trusted library allocation
page read and write
4740000
heap
page read and write
4419000
direct allocation
page execute and read and write
73A00036C000
trusted library allocation
page read and write
781004D84000
trusted library allocation
page read and write
2B54EFCD000
heap
page read and write
781005110000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
43E5000
trusted library allocation
page read and write
781003180000
trusted library allocation
page read and write
3E43000
heap
page read and write
6B92000
trusted library allocation
page read and write
781002E94000
trusted library allocation
page read and write
781004B48000
trusted library allocation
page read and write
781005228000
trusted library allocation
page read and write
31AF000
stack
page read and write
73A000418000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
7B89000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
2F7F000
heap
page read and write
781002C38000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFDF000
heap
page read and write
781000A24000
trusted library allocation
page read and write
781003E0C000
trusted library allocation
page read and write
781002420000
trusted library allocation
page read and write
1544000
heap
page read and write
2B54EFDA000
heap
page read and write
2B54EFDA000
heap
page read and write
2B54EFE4000
heap
page read and write
2B54EFE2000
heap
page read and write
2B54EFE2000
heap
page read and write
7810044F8000
trusted library allocation
page read and write
781005048000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
2CAE000
unkown
page read and write
781002EDC000
trusted library allocation
page read and write
632C002B8000
trusted library allocation
page read and write
2B54EFD1000
heap
page read and write
78100494C000
trusted library allocation
page read and write
73A000624000
trusted library allocation
page read and write
781004BF4000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
73A000678000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
73A0006C8000
trusted library allocation
page read and write
781004C0C000
trusted library allocation
page read and write
420E000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
2B54EFDA000
heap
page read and write
D30000
heap
page read and write
7810051D8000
trusted library allocation
page read and write
2B54EFE2000
heap
page read and write
80E000
heap
page read and write
781004DF4000
trusted library allocation
page read and write
2B54EFED000
heap
page read and write
2B54EFCD000
heap
page read and write
46B000
unkown
page read and write
781002690000
trusted library allocation
page read and write
2B54EFD1000
heap
page read and write
781002538000
trusted library allocation
page read and write
781004BF8000
trusted library allocation
page read and write
CB3000
unkown
page readonly
781003168000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781004D64000
trusted library allocation
page read and write
3E43000
heap
page read and write
7810052CC000
trusted library allocation
page read and write
7810023B4000
trusted library allocation
page read and write
4208000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
781005084000
trusted library allocation
page read and write
781004B70000
trusted library allocation
page read and write
73A000640000
trusted library allocation
page read and write
4467000
direct allocation
page execute and read and write
2B54EFD2000
heap
page read and write
73A00034C000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
7810034CC000
trusted library allocation
page read and write
3E43000
heap
page read and write
31B0000
heap
page read and write
73A000694000
trusted library allocation
page read and write
781004D60000
trusted library allocation
page read and write
73A000634000
trusted library allocation
page read and write
4340000
trusted library allocation
page read and write
7810024A4000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
8DE000
heap
page read and write
2B54EFDA000
heap
page read and write
2B54EFD4000
heap
page read and write
2B54EFDA000
heap
page read and write
2B54EFD2000
heap
page read and write
3E43000
heap
page read and write
781003338000
trusted library allocation
page read and write
2B90000
heap
page read and write
2B54EFDA000
heap
page read and write
6B73000
trusted library allocation
page read and write
3E43000
heap
page read and write
2F60000
heap
page read and write
18E8000
heap
page read and write
2B54EFD4000
heap
page read and write
781004FCC000
trusted library allocation
page read and write
73A000378000
trusted library allocation
page read and write
781004C6C000
trusted library allocation
page read and write
1D6F000
stack
page read and write
73A0006F4000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
428F000
trusted library allocation
page read and write
32C000
stack
page read and write
2B54EFD2000
heap
page read and write
73A000330000
trusted library allocation
page read and write
781004D80000
trusted library allocation
page read and write
44A5000
direct allocation
page execute and read and write
7FA000
heap
page read and write
4AEF000
stack
page read and write
781002554000
trusted library allocation
page read and write
7DC000
heap
page read and write
781005068000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
43C5000
trusted library allocation
page read and write
18CC000
heap
page read and write
781003168000
trusted library allocation
page read and write
781005284000
trusted library allocation
page read and write
781002514000
trusted library allocation
page read and write
2B54EFCA000
heap
page read and write
2B54EFCD000
heap
page read and write
781003F69000
trusted library allocation
page read and write
5DFE000
stack
page read and write
6C52000
trusted library allocation
page read and write
781004ABC000
trusted library allocation
page read and write
781004C40000
trusted library allocation
page read and write
781003328000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
3E43000
heap
page read and write
78100505C000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
78100349C000
trusted library allocation
page read and write
2FD0000
heap
page read and write
7810025EC000
trusted library allocation
page read and write
181E000
heap
page read and write
80A000
heap
page read and write
2B54EFDA000
heap
page read and write
78100254C000
trusted library allocation
page read and write
781002D74000
trusted library allocation
page read and write
781003FD0000
trusted library allocation
page read and write
7810046DC000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
781003FAE000
trusted library allocation
page read and write
BB6000
heap
page read and write
2EDE000
stack
page read and write
3E43000
heap
page read and write
781003E3C000
trusted library allocation
page read and write
4AAE000
stack
page read and write
2B54EFD4000
heap
page read and write
781004B54000
trusted library allocation
page read and write
2DE0000
heap
page read and write
632C002D8000
trusted library allocation
page read and write
28DC000
stack
page read and write
2B54EFDA000
heap
page read and write
781002430000
trusted library allocation
page read and write
3E43000
heap
page read and write
423D000
trusted library allocation
page read and write
781004DA4000
trusted library allocation
page read and write
13D1000
stack
page read and write
781004C44000
trusted library allocation
page read and write
2EEF000
stack
page read and write
2B54EFE8000
heap
page read and write
2B54EFDF000
heap
page read and write
1530000
direct allocation
page execute and read and write
7810034CC000
trusted library allocation
page read and write
13EF000
stack
page read and write
41F1000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004E34000
trusted library allocation
page read and write
781005124000
trusted library allocation
page read and write
73A000320000
trusted library allocation
page read and write
7C7E000
trusted library allocation
page read and write
41C3000
trusted library allocation
page read and write
7810028B4000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
7810050F0000
trusted library allocation
page read and write
301C000
stack
page read and write
2B54EFDA000
heap
page read and write
3E43000
heap
page read and write
2B54EFFE000
heap
page read and write
2B54EFE1000
heap
page read and write
632C002D8000
trusted library allocation
page read and write
73A000668000
trusted library allocation
page read and write
781002EDC000
trusted library allocation
page read and write
781002E38000
trusted library allocation
page read and write
7538000
trusted library allocation
page read and write
2FAD000
heap
page read and write
78100242C000
trusted library allocation
page read and write
781003EE4000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
3E43000
heap
page read and write
781004DF0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
7C9E000
trusted library allocation
page read and write
44BE000
direct allocation
page execute and read and write
41F1000
trusted library allocation
page read and write
78100318C000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
3910000
trusted library allocation
page read and write
802000
heap
page read and write
3910000
trusted library allocation
page read and write
4AAE000
stack
page read and write
2B54EFE8000
heap
page read and write
73A000654000
trusted library allocation
page read and write
73A000740000
trusted library allocation
page read and write
679D000
trusted library allocation
page read and write
8FB000
heap
page read and write
781004B20000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
6FC000
stack
page read and write
41B8000
trusted library allocation
page read and write
78100254C000
trusted library allocation
page read and write
78100325C000
trusted library allocation
page read and write
2B54EFD1000
heap
page read and write
781004FBC000
trusted library allocation
page read and write
2B54EFCD000
heap
page read and write
2B54EFE8000
heap
page read and write
7F0000
heap
page read and write
415E000
trusted library allocation
page read and write
7810023E0000
trusted library allocation
page read and write
2B54EFD1000
heap
page read and write
3E43000
heap
page read and write
8DE000
heap
page read and write
632C00248000
trusted library allocation
page read and write
78100460C000
trusted library allocation
page read and write
781002590000
trusted library allocation
page read and write
781002D74000
trusted library allocation
page read and write
73A0006C0000
trusted library allocation
page read and write
3E43000
heap
page read and write
78100358C000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
2F4E000
stack
page read and write
2B54EFDF000
heap
page read and write
6F0000
heap
page read and write
3E43000
heap
page read and write
3E43000
heap
page read and write
291C000
stack
page read and write
A9F000
stack
page read and write
781003290000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
2B54EFE5000
heap
page read and write
781004C8C000
trusted library allocation
page read and write
781003E8A000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
41B8000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
7810031A8000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
781003570000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
7AA000
heap
page read and write
73A000340000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFDA000
heap
page read and write
40F1000
trusted library allocation
page read and write
6847000
trusted library allocation
page read and write
781003068000
trusted library allocation
page read and write
73A0003AC000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
6390000
trusted library allocation
page read and write
2B54EFFE000
heap
page read and write
3E43000
heap
page read and write
2B54EFCA000
heap
page read and write
73A00060C000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFD2000
heap
page read and write
7D14000
trusted library allocation
page read and write
7810024A4000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004CEC000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
73A000248000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
6981000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
73A000798000
trusted library allocation
page read and write
632C002C8000
trusted library allocation
page read and write
7BBE000
trusted library allocation
page read and write
3E43000
heap
page read and write
19A000
stack
page read and write
79E000
stack
page read and write
2B54EFD2000
heap
page read and write
2B54EFDA000
heap
page read and write
43DC000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
2B54EFDA000
heap
page read and write
3E43000
heap
page read and write
413F000
trusted library allocation
page read and write
B4E000
stack
page read and write
781002EDC000
trusted library allocation
page read and write
2B54EFD1000
heap
page read and write
5DC0000
remote allocation
page read and write
781003240000
trusted library allocation
page read and write
6792000
trusted library allocation
page read and write
781005120000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
632C002F8000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
2B54EFE5000
heap
page read and write
421E000
trusted library allocation
page read and write
550000
heap
page read and write
73A000664000
trusted library allocation
page read and write
781004FF0000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004FD0000
trusted library allocation
page read and write
422C000
trusted library allocation
page read and write
2B54EFE7000
heap
page read and write
781004D50000
trusted library allocation
page read and write
3E53000
heap
page read and write
7810032C4000
trusted library allocation
page read and write
7810051D8000
trusted library allocation
page read and write
2480000
heap
page read and write
73A000764000
trusted library allocation
page read and write
7E2000
heap
page read and write
2B54EFFE000
heap
page read and write
781004ACC000
trusted library allocation
page read and write
7F0000
heap
page read and write
4108000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
2B54EFCD000
heap
page read and write
6832000
trusted library allocation
page read and write
781004FA4000
trusted library allocation
page read and write
3E43000
heap
page read and write
4624000
direct allocation
page execute and read and write
781004B88000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
781003224000
trusted library allocation
page read and write
781004CDC000
trusted library allocation
page read and write
3E43000
heap
page read and write
781002554000
trusted library allocation
page read and write
7810023EC000
trusted library allocation
page read and write
781004D98000
trusted library allocation
page read and write
781005098000
trusted library allocation
page read and write
7810023F8000
trusted library allocation
page read and write
13DB000
stack
page read and write
443D000
direct allocation
page execute and read and write
2B54EFDA000
heap
page read and write
3E43000
heap
page read and write
2B54EFE4000
heap
page read and write
781004ABC000
trusted library allocation
page read and write
73A0006C4000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
3E43000
heap
page read and write
781004FDC000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781002A60000
trusted library allocation
page read and write
73A00070C000
trusted library allocation
page read and write
420000
unkown
page read and write
78100525C000
trusted library allocation
page read and write
2F8E000
heap
page read and write
781004BBC000
trusted library allocation
page read and write
3E43000
heap
page read and write
3E43000
heap
page read and write
781002520000
trusted library allocation
page read and write
781004FD8000
trusted library allocation
page read and write
781004BD0000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
6892000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
3E43000
heap
page read and write
40C000
unkown
page write copy
78100254C000
trusted library allocation
page read and write
180D000
heap
page read and write
781002A60000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
781004E5C000
trusted library allocation
page read and write
781004C5C000
trusted library allocation
page read and write
3090000
heap
page read and write
41A2000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
43CE000
trusted library allocation
page read and write
78100501C000
trusted library allocation
page read and write
73A000674000
trusted library allocation
page read and write
18F9000
heap
page read and write
73A00085C000
trusted library allocation
page read and write
8FB000
heap
page read and write
73A0006D8000
trusted library allocation
page read and write
3E43000
heap
page read and write
73A000408000
trusted library allocation
page read and write
73A0006F8000
trusted library allocation
page read and write
781004BA0000
trusted library allocation
page read and write
7810048DC000
trusted library allocation
page read and write
700000
heap
page read and write
1805000
heap
page read and write
781004B04000
trusted library allocation
page read and write
41C0000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
781003564000
trusted library allocation
page read and write
781004DA8000
trusted library allocation
page read and write
D7E000
stack
page read and write
6210000
trusted library allocation
page read and write
781005040000
trusted library allocation
page read and write
3E43000
heap
page read and write
6C4A000
trusted library allocation
page read and write
4225000
trusted library allocation
page read and write
3E43000
heap
page read and write
781004CB8000
trusted library allocation
page read and write
7B7C000
trusted library allocation
page read and write
540000
heap
page read and write
781003F15000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
7DF000
heap
page read and write
781005094000
trusted library allocation
page read and write
781002E34000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFC8000
heap
page read and write
2B54EFE5000
heap
page read and write
3040000
heap
page read and write
2B54EFD2000
heap
page read and write
813000
heap
page read and write
2B54EFE4000
heap
page read and write
4397000
trusted library allocation
page read and write
781005128000
trusted library allocation
page read and write
6C42000
trusted library allocation
page read and write
781004B9C000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
D7C000
stack
page read and write
781004F84000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
781003240000
trusted library allocation
page read and write
781004B0C000
trusted library allocation
page read and write
3E43000
heap
page read and write
400000
unkown
page readonly
3E43000
heap
page read and write
3E43000
heap
page read and write
2B54EFDA000
heap
page read and write
2B54EFE5000
heap
page read and write
7C89000
trusted library allocation
page read and write
7810024C4000
trusted library allocation
page read and write
781003FEC000
trusted library allocation
page read and write
85E000
stack
page read and write
2B54EFD4000
heap
page read and write
4139000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
3E8B000
heap
page read and write
2B54EFE1000
heap
page read and write
73A000698000
trusted library allocation
page read and write
7810044F8000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
78100517C000
trusted library allocation
page read and write
781004C78000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
2F68000
heap
page read and write
781004C74000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
2B54EFDA000
heap
page read and write
781005080000
trusted library allocation
page read and write
781003230000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781002590000
trusted library allocation
page read and write
3E43000
heap
page read and write
6BAA000
trusted library allocation
page read and write
7810024AA000
trusted library allocation
page read and write
7810025A4000
trusted library allocation
page read and write
781004F94000
trusted library allocation
page read and write
781004CC4000
trusted library allocation
page read and write
2B54EFE8000
heap
page read and write
7810031B8000
trusted library allocation
page read and write
781005100000
trusted library allocation
page read and write
781002424000
trusted library allocation
page read and write
73A00076C000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
58DC000
stack
page read and write
3E43000
heap
page read and write
90F000
heap
page read and write
18B3000
heap
page read and write
781002EB0000
trusted library allocation
page read and write
7810023F0000
trusted library allocation
page read and write
2A0E000
stack
page read and write
3E43000
heap
page read and write
78100254C000
trusted library allocation
page read and write
160D000
heap
page read and write
3910000
trusted library allocation
page read and write
1697000
heap
page read and write
41BB000
trusted library allocation
page read and write
DC0000
heap
page read and write
2B54EFE1000
heap
page read and write
4C1C000
stack
page read and write
7B74000
trusted library allocation
page read and write
64DC000
stack
page read and write
BF0000
unkown
page readonly
7810031A8000
trusted library allocation
page read and write
781004B44000
trusted library allocation
page read and write
13CC000
stack
page read and write
2B54F003000
heap
page read and write
632C002C8000
trusted library allocation
page read and write
781002554000
trusted library allocation
page read and write
18D1000
heap
page read and write
1828000
heap
page read and write
683D000
trusted library allocation
page read and write
781002A64000
trusted library allocation
page read and write
2B54EFD2000
heap
page read and write
2B54EFE4000
heap
page read and write
2F80000
heap
page read and write
6288000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
2B54EFDF000
heap
page read and write
7810048DC000
trusted library allocation
page read and write
7810034BC000
trusted library allocation
page read and write
781004B6C000
trusted library allocation
page read and write
150E000
stack
page read and write
2B54F005000
heap
page read and write
909000
heap
page read and write
2B54EFD4000
heap
page read and write
4335000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
781004D3C000
trusted library allocation
page read and write
7810031DE000
trusted library allocation
page read and write
2B54EFDB000
heap
page read and write
7810050BC000
trusted library allocation
page read and write
D8E000
stack
page read and write
41A2000
trusted library allocation
page read and write
7810052A8000
trusted library allocation
page read and write
4AEF000
stack
page read and write
2FAD000
heap
page read and write
2B54EFE4000
heap
page read and write
78100310C000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
781002C38000
trusted library allocation
page read and write
29CE000
stack
page read and write
3E43000
heap
page read and write
781004F84000
trusted library allocation
page read and write
78100517C000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
90F000
heap
page read and write
3E43000
heap
page read and write
781002EDC000
trusted library allocation
page read and write
781004D28000
trusted library allocation
page read and write
7B9E000
trusted library allocation
page read and write
632C002D8000
trusted library allocation
page read and write
781002554000
trusted library allocation
page read and write
36C000
stack
page read and write
3E43000
heap
page read and write
2DAF000
unkown
page read and write
2B54EFE4000
heap
page read and write
6289000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
781005290000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
781003564000
trusted library allocation
page read and write
781004D08000
trusted library allocation
page read and write
2DEE000
stack
page read and write
7810051B4000
trusted library allocation
page read and write
7810023F4000
trusted library allocation
page read and write
781004CE8000
trusted library allocation
page read and write
43CB000
trusted library allocation
page read and write
73A0006DC000
trusted library allocation
page read and write
781002560000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
2B54EFDF000
heap
page read and write
781003558000
trusted library allocation
page read and write
423F000
trusted library allocation
page read and write
3E43000
heap
page read and write
781003558000
trusted library allocation
page read and write
413C000
trusted library allocation
page read and write
4271000
trusted library allocation
page read and write
3E43000
heap
page read and write
7810025EC000
trusted library allocation
page read and write
7BB4000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
781003E71000
trusted library allocation
page read and write
781002C38000
trusted library allocation
page read and write
781002428000
trusted library allocation
page read and write
46DE000
stack
page read and write
3E43000
heap
page read and write
2B54EFDA000
heap
page read and write
73A000744000
trusted library allocation
page read and write
73A0006E4000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
13D8000
stack
page read and write
7B94000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
2B54EFDA000
heap
page read and write
D80000
heap
page read and write
2B54EFE8000
heap
page read and write
1545000
heap
page read and write
4540000
trusted library allocation
page read and write
3E43000
heap
page read and write
7810048F8000
trusted library allocation
page read and write
3E43000
heap
page read and write
2F9A000
heap
page read and write
2B54EFD2000
heap
page read and write
73A000340000
trusted library allocation
page read and write
3E43000
heap
page read and write
2B54EFFE000
heap
page read and write
2B54EFD2000
heap
page read and write
2B54EFDE000
heap
page read and write
3E43000
heap
page read and write
396C000
stack
page read and write
813000
heap
page read and write
2FDF000
stack
page read and write
781002E5C000
trusted library allocation
page read and write
75E000
stack
page read and write
781004FB4000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
2B54EFDA000
heap
page read and write
781004B84000
trusted library allocation
page read and write
76AD000
trusted library allocation
page read and write
162B000
heap
page read and write
781002E84000
trusted library allocation
page read and write
54DB000
stack
page read and write
8D9000
heap
page read and write
781004CB0000
trusted library allocation
page read and write
781003EB0000
trusted library allocation
page read and write
752D000
trusted library allocation
page read and write
781004F60000
trusted library allocation
page read and write
781002E38000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
424B000
trusted library allocation
page read and write
781002560000
trusted library allocation
page read and write
3E43000
heap
page read and write
73A000768000
trusted library allocation
page read and write
7810023E8000
trusted library allocation
page read and write
781003ED8000
trusted library allocation
page read and write
781002410000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
78100512C000
trusted library allocation
page read and write
728000
heap
page read and write
78100494C000
trusted library allocation
page read and write
7810052B8000
trusted library allocation
page read and write
781004D9C000
trusted library allocation
page read and write
3D0000
heap
page read and write
720000
heap
page read and write
781004F3C000
trusted library allocation
page read and write
73A0006AC000
trusted library allocation
page read and write
781003180000
trusted library allocation
page read and write
78100384F000
trusted library allocation
page read and write
7810024B8000
trusted library allocation
page read and write
781004B74000
trusted library allocation
page read and write
7810025EC000
trusted library allocation
page read and write
74ED000
trusted library allocation
page read and write
781004D4C000
trusted library allocation
page read and write
2B54EFFE000
heap
page read and write
4470000
direct allocation
page execute and read and write
781004C3C000
trusted library allocation
page read and write
CBD000
unkown
page write copy
500000
unkown
page readonly
2B54EFE8000
heap
page read and write
781003564000
trusted library allocation
page read and write
781003F7C000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
781002560000
trusted library allocation
page read and write
43C1000
trusted library allocation
page read and write
781002560000
trusted library allocation
page read and write
3E43000
heap
page read and write
439F000
trusted library allocation
page read and write
781004B8C000
trusted library allocation
page read and write
41C6000
trusted library allocation
page read and write
458F000
direct allocation
page execute and read and write
2B54EFE4000
heap
page read and write
187D000
heap
page read and write
4141000
trusted library allocation
page read and write
CB3000
unkown
page readonly
781004CBC000
trusted library allocation
page read and write
2B54EFD3000
heap
page read and write
16AF000
heap
page read and write
781004BE4000
trusted library allocation
page read and write
2B54EFD4000
heap
page read and write
2B54EFE8000
heap
page read and write
471F000
stack
page read and write
CBD000
unkown
page read and write
632C002C8000
trusted library allocation
page read and write
7C53000
trusted library allocation
page read and write
2F8D000
heap
page read and write
7810023AC000
trusted library allocation
page read and write
3E43000
heap
page read and write
689D000
trusted library allocation
page read and write
781004DCC000
trusted library allocation
page read and write
2B54EFDA000
heap
page read and write
781004D54000
trusted library allocation
page read and write
781004BA8000
trusted library allocation
page read and write
2EF0000
heap
page read and write
2FAA000
heap
page read and write
3E43000
heap
page read and write
73A000330000
trusted library allocation
page read and write
7A0000
heap
page read and write
3E43000
heap
page read and write
781004B78000
trusted library allocation
page read and write
2B54EFDF000
heap
page read and write
73A000364000
trusted library allocation
page read and write
5DC0000
remote allocation
page read and write
41F1000
trusted library allocation
page read and write
2B54EFFE000
heap
page read and write
2B54EFDF000
heap
page read and write
4A6F000
stack
page read and write
2B54EFE4000
heap
page read and write
2B54EFDF000
heap
page read and write
2B54EFE5000
heap
page read and write
90F000
heap
page read and write
2B54EFF2000
heap
page read and write
781003230000
trusted library allocation
page read and write
781004BD4000
trusted library allocation
page read and write
78100318C000
trusted library allocation
page read and write
2B54EFE4000
heap
page read and write
781002EF4000
trusted library allocation
page read and write
2B54EFE5000
heap
page read and write
6770000
trusted library allocation
page read and write
7810024A4000
trusted library allocation
page read and write
2D5D000
stack
page read and write
3E43000
heap
page read and write
781004934000
trusted library allocation
page read and write
7810023CC000
trusted library allocation
page read and write
2B54EFE1000
heap
page read and write
781003FB6000
trusted library allocation
page read and write
401000
unkown
page execute read
187D000
heap
page read and write
7810028B4000
trusted library allocation
page read and write
There are 1430 hidden memdumps, click here to show them.