IOC Report
fxsWdzl.exe

FilesProcessesURLsDomainsIPsMemdumps64201,00010010Label

Files

File Path
Type
Category
Malicious
Download
fxsWdzl.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\sjmo8\3ec2va
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\sjmo8\bai5xbsjw
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\sjmo8\ctj5p8
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\sjmo8\ekf37y
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\sjmo8\k6fkfc
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\sjmo8\trieuk
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\sjmo8\vs2dje
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\sjmo8\xtr1dt
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\sjmo8\ym7qq1n79
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
Chrome Cache Entry: 61
ASCII text, with very long lines (6787)
downloaded
Chrome Cache Entry: 62
ASCII text, with very long lines (2410)
downloaded
Chrome Cache Entry: 63
ASCII text
downloaded
Chrome Cache Entry: 64
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 65
ASCII text, with very long lines (1395)
downloaded
Chrome Cache Entry: 66
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 67
SVG Scalable Vector Graphics image
downloaded
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fxsWdzl.exe
"C:\Users\user\Desktop\fxsWdzl.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2204,i,7148642926760932529,5839527924704465693,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\sjmo8" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
https://lfissrtg.rest/
116.203.164.230
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/Zq
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://google-ohttp-relay-join.fastly-edge.com/(u
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://anglebug.com/7714
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://www.opengis.net/gml/3.2
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://lfissrtg.rest/ezB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://lfissrtg.rest/8
unknown
https://drive-daily-5.corp.google.com/
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://google-ohttp-relay-join.fastly-edge.com/kq
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://lfissrtg.rest/f
unknown
https://lfissrtg.rest/e
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://t.me/w0ctznfc0stnMozilla/5.0
unknown
https://lfissrtg.rest/Z
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://steamcommunity.com/profiles/76561199817305251
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://lfissrtg.rest
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
http://anglebug.com/4384
unknown
http://www.opengis.net/gml
unknown
https://lfissrtg.rest%
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
https://google-ohttp-relay-join.fastly-edge.com/uq
unknown
http://anglebug.com/3970
unknown
https://lfissrtg.rest9
unknown
https://apis.google.com
unknown
https://lfissrtg.rest5
unknown
https://lfissrtg.rest7
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://domains.google.com/suggest/flow
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://google-ohttp-relay-join.fastly-edge.com/er
unknown
https://lfissrtg.rest-
unknown
https://lfissrtg.restI
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://google-ohttp-relay-join.fastly-edge.com/xq
unknown
https://lfissrtg.restA
unknown
https://google-ohttp-relay-join.fastly-edge.com/Wq
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://lfissrtg.rest=
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
lfissrtg.rest
116.203.164.230
malicious
plus.l.google.com
172.217.16.142
play.google.com
142.250.186.110
t.me
149.154.167.99
www.google.com
142.250.186.164
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
116.203.164.230
lfissrtg.rest
Germany
malicious
192.168.2.4
unknown
unknown
malicious
149.154.167.99
t.me
United Kingdom
239.255.255.250
unknown
Reserved
142.250.186.164
www.google.com
United States
142.250.186.110
play.google.com
United States
127.0.0.1
unknown
unknown
172.217.16.142
plus.l.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2E2F000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
B3A000
unkown
page readonly
malicious
B3A000
unkown
page readonly
malicious
2E2F000
heap
page read and write
malicious
2E2E000
heap
page read and write
malicious
2E31000
heap
page read and write
malicious
A430000
direct allocation
page read and write
3AF4002C0000
trusted library allocation
page read and write
68A2000
heap
page read and write
5C8B000
heap
page read and write
196E8150000
heap
page read and write
2DE6000
heap
page read and write
38E401764000
trusted library allocation
page read and write
196E8153000
heap
page read and write
196E8153000
heap
page read and write
196E8156000
heap
page read and write
38E401B50000
trusted library allocation
page read and write
74E5000
heap
page read and write
2D3E000
stack
page read and write
196E813E000
heap
page read and write
A8B8000
direct allocation
page read and write
A556000
direct allocation
page read and write
196E8156000
heap
page read and write
75C000
stack
page read and write
A708000
direct allocation
page read and write
38E40029C000
trusted library allocation
page read and write
38E40185C000
trusted library allocation
page read and write
38E400294000
trusted library allocation
page read and write
196E815A000
heap
page read and write
38E401880000
trusted library allocation
page read and write
38E4019A4000
trusted library allocation
page read and write
196E8153000
heap
page read and write
A8F2000
direct allocation
page read and write
38E4015E4000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E401A18000
trusted library allocation
page read and write
196E8150000
heap
page read and write
128C000
stack
page read and write
38E400CBC000
trusted library allocation
page read and write
196E814A000
heap
page read and write
38E400398000
trusted library allocation
page read and write
38E400220000
trusted library allocation
page read and write
196E815B000
heap
page read and write
A48E000
direct allocation
page read and write
A614000
direct allocation
page read and write
51C0000
heap
page read and write
38E401B24000
trusted library allocation
page read and write
38E4002A4000
trusted library allocation
page read and write
4C0000320000
trusted library allocation
page read and write
38E401444000
trusted library allocation
page read and write
A690000
direct allocation
page read and write
4C000033C000
trusted library allocation
page read and write
59BA000
heap
page read and write
38E401850000
trusted library allocation
page read and write
196E8156000
heap
page read and write
4EFC000
stack
page read and write
A6FA000
direct allocation
page read and write
2D7F000
stack
page read and write
2DFC000
heap
page read and write
2E15000
heap
page read and write
4C000080C000
trusted library allocation
page read and write
5310000
heap
page read and write
196E8156000
heap
page read and write
38E401384000
trusted library allocation
page read and write
38E4017A8000
trusted library allocation
page read and write
38E401044000
trusted library allocation
page read and write
5351000
heap
page read and write
196E8156000
heap
page read and write
F6E000
unkown
page read and write
38E400CAC000
trusted library allocation
page read and write
31AE000
heap
page read and write
38E400398000
trusted library allocation
page read and write
38E400824000
trusted library allocation
page read and write
38E401864000
trusted library allocation
page read and write
196E8150000
heap
page read and write
38E4015B4000
trusted library allocation
page read and write
38E400824000
trusted library allocation
page read and write
196E8153000
heap
page read and write
196E8156000
heap
page read and write
273E000
unkown
page read and write
196E8144000
heap
page read and write
38E401AE4000
trusted library allocation
page read and write
14F0000
heap
page read and write
196E8150000
heap
page read and write
38E40160C000
trusted library allocation
page read and write
38E401AF0000
trusted library allocation
page read and write
A538000
direct allocation
page read and write
A730000
direct allocation
page read and write
196E8150000
heap
page read and write
A710000
direct allocation
page read and write
38E4015C0000
trusted library allocation
page read and write
A494000
direct allocation
page read and write
196E814E000
heap
page read and write
5626000
heap
page read and write
38E401414000
trusted library allocation
page read and write
38E40180C000
trusted library allocation
page read and write
2EA8000
heap
page read and write
38E401A94000
trusted library allocation
page read and write
38E40033C000
trusted library allocation
page read and write
38E401AC4000
trusted library allocation
page read and write
A5E6000
direct allocation
page read and write
3AF4002BC000
trusted library allocation
page read and write
A452000
direct allocation
page read and write
A672000
direct allocation
page read and write
A66E000
direct allocation
page read and write
38E400378000
trusted library allocation
page read and write
196E8150000
heap
page read and write
38E400E6C000
trusted library allocation
page read and write
38E401718000
trusted library allocation
page read and write
4C0000678000
trusted library allocation
page read and write
750000
stack
page read and write
A5A0000
direct allocation
page read and write
38E401798000
trusted library allocation
page read and write
38E401860000
trusted library allocation
page read and write
A462000
direct allocation
page read and write
56B0000
heap
page read and write
3AF4002B0000
trusted library allocation
page read and write
38E400EBC000
trusted library allocation
page read and write
F72000
unkown
page read and write
4C0000630000
trusted library allocation
page read and write
38E4001C8000
trusted library allocation
page read and write
A55C000
direct allocation
page read and write
196E814A000
heap
page read and write
196E8144000
heap
page read and write
38E400384000
trusted library allocation
page read and write
38E401CB4000
trusted library allocation
page read and write
38E4016D4000
trusted library allocation
page read and write
38E400D74000
trusted library allocation
page read and write
196E8156000
heap
page read and write
196E8150000
heap
page read and write
196E8143000
heap
page read and write
A5A2000
direct allocation
page read and write
196E815B000
heap
page read and write
2A4FF000
stack
page read and write
38E4019C4000
trusted library allocation
page read and write
2EA9000
heap
page read and write
A484000
direct allocation
page read and write
196E8156000
heap
page read and write
196E8144000
heap
page read and write
A8F4000
direct allocation
page read and write
52C8000
heap
page read and write
196E8153000
heap
page read and write
38E401A58000
trusted library allocation
page read and write
38E400F58000
trusted library allocation
page read and write
531F000
heap
page read and write
A484000
direct allocation
page read and write
A712000
direct allocation
page read and write
196E8150000
heap
page read and write
38E4017F4000
trusted library allocation
page read and write
4C000033C000
trusted library allocation
page read and write
A603000
direct allocation
page read and write
38E4019D4000
trusted library allocation
page read and write
5725000
heap
page read and write
196E8144000
heap
page read and write
1AF5000
direct allocation
page read and write
A632000
direct allocation
page read and write
38E40142C000
trusted library allocation
page read and write
196E814A000
heap
page read and write
196E814A000
heap
page read and write
A55A000
direct allocation
page read and write
196E8156000
heap
page read and write
196E8150000
heap
page read and write
3AF4002BC000
trusted library allocation
page read and write
2E77000
heap
page read and write
196E8150000
heap
page read and write
38E401424000
trusted library allocation
page read and write
196E8156000
heap
page read and write
5363000
heap
page read and write
38E4018C4000
trusted library allocation
page read and write
1AA0000
heap
page read and write
2FAE000
stack
page read and write
A636000
direct allocation
page read and write
196E8142000
heap
page read and write
4C0000408000
trusted library allocation
page read and write
196E814A000
heap
page read and write
38E4017D0000
trusted library allocation
page read and write
38E401598000
trusted library allocation
page read and write
A914000
direct allocation
page read and write
38E40033C000
trusted library allocation
page read and write
38E4017F8000
trusted library allocation
page read and write
196E8150000
heap
page read and write
AB48000
direct allocation
page read and write
4C000075C000
trusted library allocation
page read and write
A914000
direct allocation
page read and write
38E4015CC000
trusted library allocation
page read and write
38E401A84000
trusted library allocation
page read and write
2DFC000
heap
page read and write
4C0000754000
trusted library allocation
page read and write
5722000
heap
page read and write
51B0000
trusted library allocation
page read and write
3AF4002C0000
trusted library allocation
page read and write
A55A000
direct allocation
page read and write
3AF4002A0000
trusted library allocation
page read and write
A48E000
direct allocation
page read and write
A5CA000
direct allocation
page read and write
A56C000
direct allocation
page read and write
38E401444000
trusted library allocation
page read and write
50B1000
heap
page read and write
38E401D50000
trusted library allocation
page read and write
38E4012BC000
trusted library allocation
page read and write
196E8144000
heap
page read and write
A6FC000
direct allocation
page read and write
A85C000
direct allocation
page read and write
38E401990000
trusted library allocation
page read and write
910000
heap
page read and write
1588000
direct allocation
page read and write
196E8156000
heap
page read and write
38E400F7C000
trusted library allocation
page read and write
A580000
direct allocation
page read and write
38E401828000
trusted library allocation
page read and write
196E813E000
heap
page read and write
A6FC000
direct allocation
page read and write
196E814A000
heap
page read and write
52EB000
heap
page read and write
4C0000320000
trusted library allocation
page read and write
38E400F7C000
trusted library allocation
page read and write
A714000
direct allocation
page read and write
196E8145000
heap
page read and write
A5CE000
direct allocation
page read and write
5731000
heap
page read and write
38E401770000
trusted library allocation
page read and write
A508000
direct allocation
page read and write
196E8153000
heap
page read and write
38E40183C000
trusted library allocation
page read and write
38E400F70000
trusted library allocation
page read and write
AA72000
direct allocation
page read and write
3AF4002BC000
trusted library allocation
page read and write
67B8000
heap
page read and write
A42E000
direct allocation
page read and write
196E816C000
heap
page read and write
38E401614000
trusted library allocation
page read and write
AA92000
direct allocation
page read and write
38E401990000
trusted library allocation
page read and write
54F2000
heap
page read and write
196E8150000
heap
page read and write
196E8144000
heap
page read and write
196E8153000
heap
page read and write
A5A0000
direct allocation
page read and write
196E8156000
heap
page read and write
5393000
heap
page read and write
38E401C6C000
trusted library allocation
page read and write
2E6E000
heap
page read and write
38E401994000
trusted library allocation
page read and write
38E400F0C000
trusted library allocation
page read and write
A5B6000
direct allocation
page read and write
50B1000
heap
page read and write
196E8156000
heap
page read and write
A5F8000
direct allocation
page read and write
4F5E000
stack
page read and write
196E8156000
heap
page read and write
38E4013E0000
trusted library allocation
page read and write
38E400C80000
trusted library allocation
page read and write
6918000
heap
page read and write
196E8150000
heap
page read and write
4C00003EC000
trusted library allocation
page read and write
A552000
direct allocation
page read and write
196E816C000
heap
page read and write
38E400CAC000
trusted library allocation
page read and write
A614000
direct allocation
page read and write
196E8153000
heap
page read and write
196E816C000
heap
page read and write
196E814A000
heap
page read and write
15F0000
direct allocation
page read and write
38E400384000
trusted library allocation
page read and write
38E400CAC000
trusted library allocation
page read and write
196E8153000
heap
page read and write
196E8144000
heap
page read and write
38E400CAC000
trusted library allocation
page read and write
2A6F000
unkown
page read and write
555A000
heap
page read and write
55AA000
heap
page read and write
4C0000668000
trusted library allocation
page read and write
38E400A28000
trusted library allocation
page read and write
38E401450000
trusted library allocation
page read and write
196E813E000
heap
page read and write
1AE0000
direct allocation
page read and write
2A6BF000
stack
page read and write
51B0000
trusted library allocation
page read and write
5BEB000
heap
page read and write
196E8156000
heap
page read and write
A46E000
direct allocation
page read and write
A712000
direct allocation
page read and write
196E814A000
heap
page read and write
52E9000
heap
page read and write
55C8000
heap
page read and write
55B6000
heap
page read and write
196E8156000
heap
page read and write
61D9000
heap
page read and write
196E8156000
heap
page read and write
5623000
heap
page read and write
5516000
heap
page read and write
196E8156000
heap
page read and write
55B8000
heap
page read and write
26FD000
stack
page read and write
A6FA000
direct allocation
page read and write
5720000
heap
page read and write
A47E000
direct allocation
page read and write
A57E000
direct allocation
page read and write
4C000085C000
trusted library allocation
page read and write
38E400BF4000
trusted library allocation
page read and write
A71A000
direct allocation
page read and write
A720000
direct allocation
page read and write
196E8142000
heap
page read and write
196E8150000
heap
page read and write
38E4019E4000
trusted library allocation
page read and write
38E401658000
trusted library allocation
page read and write
196E814A000
heap
page read and write
A708000
direct allocation
page read and write
A500000
direct allocation
page read and write
38E401AF4000
trusted library allocation
page read and write
38E401ACC000
trusted library allocation
page read and write
55CC000
heap
page read and write
38E4016A0000
trusted library allocation
page read and write
196E8150000
heap
page read and write
196E814A000
heap
page read and write
54AC000
stack
page read and write
2E1F000
heap
page read and write
38E4015E0000
trusted library allocation
page read and write
5371000
heap
page read and write
38E40170C000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E401A9C000
trusted library allocation
page read and write
38E401434000
trusted library allocation
page read and write
57BA000
heap
page read and write
38E40120C000
trusted library allocation
page read and write
A47E000
direct allocation
page read and write
196E8144000
heap
page read and write
38E401A1C000
trusted library allocation
page read and write
2E1A000
heap
page read and write
38E401B0C000
trusted library allocation
page read and write
A3AA000
direct allocation
page read and write
38E4019F8000
trusted library allocation
page read and write
38E400F70000
trusted library allocation
page read and write
52EE000
heap
page read and write
2E6F000
heap
page read and write
38E401A5C000
trusted library allocation
page read and write
A5A4000
direct allocation
page read and write
A5BC000
direct allocation
page read and write
38E40184C000
trusted library allocation
page read and write
4C0000684000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
3AF4002C8000
trusted library allocation
page read and write
196E814A000
heap
page read and write
A56C000
direct allocation
page read and write
38E400CAC000
trusted library allocation
page read and write
38E401AA4000
trusted library allocation
page read and write
38E400BF4000
trusted library allocation
page read and write
A6F4000
direct allocation
page read and write
38E400384000
trusted library allocation
page read and write
2C50000
heap
page read and write
A600000
direct allocation
page read and write
546C000
stack
page read and write
196E8153000
heap
page read and write
38E401A20000
trusted library allocation
page read and write
38E40033C000
trusted library allocation
page read and write
195D000
stack
page read and write
38E401704000
trusted library allocation
page read and write
196E8150000
heap
page read and write
A530000
direct allocation
page read and write
196E814A000
heap
page read and write
38E401AD4000
trusted library allocation
page read and write
5325000
heap
page read and write
196E8156000
heap
page read and write
38E40033C000
trusted library allocation
page read and write
196E8144000
heap
page read and write
F2B000
unkown
page read and write
5384000
heap
page read and write
52B0000
heap
page read and write
38E4001E0000
trusted library allocation
page read and write
196E8156000
heap
page read and write
4C0000730000
trusted library allocation
page read and write
2E77000
heap
page read and write
A444000
direct allocation
page read and write
678D000
heap
page read and write
557A000
heap
page read and write
1580000
direct allocation
page read and write
4C0000714000
trusted library allocation
page read and write
196E8156000
heap
page read and write
5810000
heap
page read and write
38E401AA0000
trusted library allocation
page read and write
196E8144000
heap
page read and write
196E8156000
heap
page read and write
1A5F000
stack
page read and write
38E4003DC000
trusted library allocation
page read and write
196E8144000
heap
page read and write
7C0000
heap
page read and write
38E401890000
trusted library allocation
page read and write
A59A000
direct allocation
page read and write
38E400F34000
trusted library allocation
page read and write
4D3C000
stack
page read and write
A588000
direct allocation
page read and write
A498000
direct allocation
page read and write
196E8156000
heap
page read and write
196E8150000
heap
page read and write
A676000
direct allocation
page read and write
196E8153000
heap
page read and write
3AF4002D8000
trusted library allocation
page read and write
AA42000
direct allocation
page read and write
196E814A000
heap
page read and write
138E000
stack
page read and write
196E814A000
heap
page read and write
38E4019C0000
trusted library allocation
page read and write
38E401B14000
trusted library allocation
page read and write
ABA4000
direct allocation
page read and write
2DE1000
heap
page read and write
38E401748000
trusted library allocation
page read and write
55FD000
heap
page read and write
5D23000
heap
page read and write
38E401344000
trusted library allocation
page read and write
A49A000
direct allocation
page read and write
196E814A000
heap
page read and write
38E401D2B000
trusted library allocation
page read and write
4F20000
remote allocation
page read and write
4C00006E8000
trusted library allocation
page read and write
38E401C68000
trusted library allocation
page read and write
A578000
direct allocation
page read and write
196E8156000
heap
page read and write
38E400214000
trusted library allocation
page read and write
38E400A28000
trusted library allocation
page read and write
38E401CB0000
trusted library allocation
page read and write
4C0000610000
trusted library allocation
page read and write
38E40038C000
trusted library allocation
page read and write
38E401368000
trusted library allocation
page read and write
55DC000
heap
page read and write
196E8156000
heap
page read and write
196E8150000
heap
page read and write
196E8171000
heap
page read and write
38E400294000
trusted library allocation
page read and write
196E814A000
heap
page read and write
539B000
heap
page read and write
1AD0000
heap
page read and write
38E4003C8000
trusted library allocation
page read and write
A566000
direct allocation
page read and write
4C0000700000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E400BF8000
trusted library allocation
page read and write
F7C000
unkown
page read and write
38E401344000
trusted library allocation
page read and write
5609000
heap
page read and write
CA7000
unkown
page readonly
38E401A48000
trusted library allocation
page read and write
196E814D000
heap
page read and write
38E40033C000
trusted library allocation
page read and write
196E814A000
heap
page read and write
38E401D3D000
trusted library allocation
page read and write
38E40158C000
trusted library allocation
page read and write
38E400FDC000
trusted library allocation
page read and write
38E4016CC000
trusted library allocation
page read and write
2DB0000
heap
page read and write
6778000
heap
page read and write
A580000
direct allocation
page read and write
4C0000620000
trusted library allocation
page read and write
38E40167C000
trusted library allocation
page read and write
196E8150000
heap
page read and write
38E4015A8000
trusted library allocation
page read and write
6857000
heap
page read and write
38E4013A0000
trusted library allocation
page read and write
A710000
direct allocation
page read and write
55E7000
heap
page read and write
38E4001AC000
trusted library allocation
page read and write
5891000
heap
page read and write
6882000
heap
page read and write
38E400298000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E401714000
trusted library allocation
page read and write
50B0000
heap
page read and write
3AF4002B0000
trusted library allocation
page read and write
38E4003C8000
trusted library allocation
page read and write
A67E000
direct allocation
page read and write
55E5000
heap
page read and write
3AF4002A0000
trusted library allocation
page read and write
552D000
heap
page read and write
38E400BF4000
trusted library allocation
page read and write
A636000
direct allocation
page read and write
55E3000
heap
page read and write
196E8150000
heap
page read and write
196E8156000
heap
page read and write
8BE000
stack
page read and write
38E4002F4000
trusted library allocation
page read and write
38E400398000
trusted library allocation
page read and write
A6F4000
direct allocation
page read and write
5805000
heap
page read and write
38E400F58000
trusted library allocation
page read and write
38E400224000
trusted library allocation
page read and write
196E8143000
heap
page read and write
38E4017E0000
trusted library allocation
page read and write
38E40021C000
trusted library allocation
page read and write
A53A000
direct allocation
page read and write
196E8150000
heap
page read and write
60D9000
heap
page read and write
38E4001F4000
trusted library allocation
page read and write
38E401B48000
trusted library allocation
page read and write
38E4001AC000
trusted library allocation
page read and write
38E401A30000
trusted library allocation
page read and write
38E4002F4000
trusted library allocation
page read and write
196E8142000
heap
page read and write
2E1E000
heap
page read and write
553B000
heap
page read and write
38E401630000
trusted library allocation
page read and write
196E8156000
heap
page read and write
196E8156000
heap
page read and write
38E401758000
trusted library allocation
page read and write
38E401044000
trusted library allocation
page read and write
38E401638000
trusted library allocation
page read and write
5BD3000
heap
page read and write
A426000
direct allocation
page read and write
4C000069C000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E401C48000
trusted library allocation
page read and write
38E40178C000
trusted library allocation
page read and write
38E4019F4000
trusted library allocation
page read and write
3AF4002C0000
trusted library allocation
page read and write
196E8171000
heap
page read and write
38E400C10000
trusted library allocation
page read and write
38E400BF4000
trusted library allocation
page read and write
38E401848000
trusted library allocation
page read and write
38E401A64000
trusted library allocation
page read and write
A638000
direct allocation
page read and write
196E8153000
heap
page read and write
38E400A28000
trusted library allocation
page read and write
1600000
direct allocation
page read and write
196E8153000
heap
page read and write
196E814A000
heap
page read and write
196E8153000
heap
page read and write
196E814E000
heap
page read and write
196E8156000
heap
page read and write
38E4013E8000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
38E40171C000
trusted library allocation
page read and write
2E7A000
heap
page read and write
38E401898000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E400CBC000
trusted library allocation
page read and write
38E4018E0000
trusted library allocation
page read and write
1AE8000
direct allocation
page read and write
196E814A000
heap
page read and write
4C00006B0000
trusted library allocation
page read and write
196E8142000
heap
page read and write
5524000
heap
page read and write
3AF4002BC000
trusted library allocation
page read and write
4C0000330000
trusted library allocation
page read and write
5371000
heap
page read and write
38E400F70000
trusted library allocation
page read and write
196E8150000
heap
page read and write
38E400CAC000
trusted library allocation
page read and write
A42A000
direct allocation
page read and write
A726000
direct allocation
page read and write
38E4018A0000
trusted library allocation
page read and write
915000
heap
page read and write
4C000060C000
trusted library allocation
page read and write
196E8144000
heap
page read and write
196E8144000
heap
page read and write
38E400228000
trusted library allocation
page read and write
23E0000
heap
page read and write
196E814F000
heap
page read and write
5584000
heap
page read and write
1610000
direct allocation
page read and write
38E401B84000
trusted library allocation
page read and write
196E813E000
heap
page read and write
536C000
heap
page read and write
196E8144000
heap
page read and write
52E6000
heap
page read and write
8C0000
heap
page read and write
196E8153000
heap
page read and write
196E8156000
heap
page read and write
7A0000
unkown
page readonly
5322000
heap
page read and write
38E401B80000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E401434000
trusted library allocation
page read and write
38E401CB0000
trusted library allocation
page read and write
196E8150000
heap
page read and write
4C00006B4000
trusted library allocation
page read and write
55BD000
heap
page read and write
38E401174000
trusted library allocation
page read and write
196E8156000
heap
page read and write
FDB000
unkown
page readonly
60EE000
heap
page read and write
38E400294000
trusted library allocation
page read and write
38E401B10000
trusted library allocation
page read and write
A552000
direct allocation
page read and write
55A4000
heap
page read and write
196E8153000
heap
page read and write
38E4016D0000
trusted library allocation
page read and write
4F20000
remote allocation
page read and write
55EC000
heap
page read and write
196E8171000
heap
page read and write
38E401018000
trusted library allocation
page read and write
A45C000
direct allocation
page read and write
4DBF000
stack
page read and write
AA82000
direct allocation
page read and write
7A0000
unkown
page readonly
917000
heap
page read and write
AA52000
direct allocation
page read and write
196E813E000
heap
page read and write
38E401688000
trusted library allocation
page read and write
38E400EBC000
trusted library allocation
page read and write
4C3E000
stack
page read and write
6798000
heap
page read and write
1AEC000
direct allocation
page read and write
1B00000
direct allocation
page read and write
38E401B70000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E401678000
trusted library allocation
page read and write
38E40165C000
trusted library allocation
page read and write
626800234000
direct allocation
page read and write
4C0000424000
trusted library allocation
page read and write
23B0000
heap
page read and write
196E8156000
heap
page read and write
5BBA000
heap
page read and write
38E401028000
trusted library allocation
page read and write
38E400210000
trusted library allocation
page read and write
38E400F58000
trusted library allocation
page read and write
196E8153000
heap
page read and write
5C93000
heap
page read and write
196E8150000
heap
page read and write
38E401B70000
trusted library allocation
page read and write
5667000
heap
page read and write
A980000
direct allocation
page read and write
196E8150000
heap
page read and write
537B000
heap
page read and write
571D000
heap
page read and write
38E4016B4000
trusted library allocation
page read and write
196E8150000
heap
page read and write
196E8156000
heap
page read and write
196E8153000
heap
page read and write
196E8156000
heap
page read and write
2C0F000
stack
page read and write
38E401C0C000
trusted library allocation
page read and write
6139000
heap
page read and write
3AF4002E4000
trusted library allocation
page read and write
38E401BE8000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E401AC8000
trusted library allocation
page read and write
196E8150000
heap
page read and write
A5B6000
direct allocation
page read and write
38E400F34000
trusted library allocation
page read and write
610E000
heap
page read and write
196E8156000
heap
page read and write
A4A4000
direct allocation
page read and write
196E8153000
heap
page read and write
38E401A78000
trusted library allocation
page read and write
A714000
direct allocation
page read and write
38E400A28000
trusted library allocation
page read and write
587B000
heap
page read and write
38E400384000
trusted library allocation
page read and write
196E8144000
heap
page read and write
4C0000654000
trusted library allocation
page read and write
4C0000320000
trusted library allocation
page read and write
38E401878000
trusted library allocation
page read and write
38E400CAC000
trusted library allocation
page read and write
38E4010A4000
trusted library allocation
page read and write
196E814F000
heap
page read and write
38E400CAC000
trusted library allocation
page read and write
38E401584000
trusted library allocation
page read and write
A603000
direct allocation
page read and write
196E8156000
heap
page read and write
74E000
stack
page read and write
196E816F000
heap
page read and write
38E4001E8000
trusted library allocation
page read and write
3AF4002C0000
trusted library allocation
page read and write
38E4001F8000
trusted library allocation
page read and write
2C57000
heap
page read and write
8E0000
heap
page read and write
196E8150000
heap
page read and write
5327000
heap
page read and write
5612000
heap
page read and write
196E8156000
heap
page read and write
31A0000
heap
page read and write
196E8156000
heap
page read and write
A52A000
direct allocation
page read and write
196E814A000
heap
page read and write
27A0000
heap
page read and write
A522000
direct allocation
page read and write
4C000039C000
trusted library allocation
page read and write
38E402EEC000
trusted library allocation
page read and write
A454000
direct allocation
page read and write
196E8153000
heap
page read and write
196E8156000
heap
page read and write
196E814A000
heap
page read and write
38E401320000
trusted library allocation
page read and write
196E8156000
heap
page read and write
4C00002FC000
trusted library allocation
page read and write
196E8156000
heap
page read and write
55AF000
heap
page read and write
2DB8000
heap
page read and write
38E401720000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E4017F0000
trusted library allocation
page read and write
38E401844000
trusted library allocation
page read and write
A408000
direct allocation
page read and write
5389000
heap
page read and write
2EA1000
heap
page read and write
196E8150000
heap
page read and write
38E401A34000
trusted library allocation
page read and write
38E401028000
trusted library allocation
page read and write
A3BA000
direct allocation
page read and write
38E4001EC000
trusted library allocation
page read and write
196E8150000
heap
page read and write
4C0000248000
trusted library allocation
page read and write
196E8153000
heap
page read and write
917000
heap
page read and write
196E8153000
heap
page read and write
F2A000
unkown
page write copy
38E4017AC000
trusted library allocation
page read and write
38E4002E3000
trusted library allocation
page read and write
38E401818000
trusted library allocation
page read and write
4D7E000
stack
page read and write
38E40162C000
trusted library allocation
page read and write
38E400BF8000
trusted library allocation
page read and write
38E400F0C000
trusted library allocation
page read and write
38E400F70000
trusted library allocation
page read and write
535D000
heap
page read and write
38E401028000
trusted library allocation
page read and write
38E4016C8000
trusted library allocation
page read and write
2E28000
heap
page read and write
38E401698000
trusted library allocation
page read and write
38E400370000
trusted library allocation
page read and write
538D000
heap
page read and write
38E400CAC000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E401594000
trusted library allocation
page read and write
38E4016A4000
trusted library allocation
page read and write
A5D6000
direct allocation
page read and write
196E8156000
heap
page read and write
4C0000354000
trusted library allocation
page read and write
2EAA000
heap
page read and write
A566000
direct allocation
page read and write
A6F4000
direct allocation
page read and write
55F3000
heap
page read and write
A66A000
direct allocation
page read and write
38E401A74000
trusted library allocation
page read and write
67ED000
heap
page read and write
A670000
direct allocation
page read and write
A6EC000
direct allocation
page read and write
FA4000
unkown
page write copy
196E8143000
heap
page read and write
196E8156000
heap
page read and write
38E400A28000
trusted library allocation
page read and write
38E401450000
trusted library allocation
page read and write
27C3000
heap
page read and write
196E8153000
heap
page read and write
A462000
direct allocation
page read and write
38E401108000
trusted library allocation
page read and write
6878000
heap
page read and write
A970000
direct allocation
page read and write
54FA000
heap
page read and write
4C000040C000
trusted library allocation
page read and write
196E816C000
heap
page read and write
196E8142000
heap
page read and write
AA0000
heap
page read and write
196E814A000
heap
page read and write
38E4019D0000
trusted library allocation
page read and write
5677000
heap
page read and write
A6F8000
direct allocation
page read and write
2A5BD000
stack
page read and write
38E4001DC000
trusted library allocation
page read and write
57B0000
heap
page read and write
F6B000
unkown
page read and write
38E401654000
trusted library allocation
page read and write
2D80000
heap
page read and write
27AB000
heap
page read and write
6898000
heap
page read and write
196E814A000
heap
page read and write
38E401560000
trusted library allocation
page read and write
196E813B000
heap
page read and write
CA7000
unkown
page readonly
38E400DDC000
trusted library allocation
page read and write
38E4015C4000
trusted library allocation
page read and write
4C00006D0000
trusted library allocation
page read and write
4C0000688000
trusted library allocation
page read and write
196E8153000
heap
page read and write
196E8153000
heap
page read and write
38E4010A4000
trusted library allocation
page read and write
F35000
unkown
page write copy
38E4016EC000
trusted library allocation
page read and write
550A000
heap
page read and write
2B00000
heap
page read and write
196E814A000
heap
page read and write
38E40029A000
trusted library allocation
page read and write
A470000
direct allocation
page read and write
196E8156000
heap
page read and write
38E400384000
trusted library allocation
page read and write
196E8144000
heap
page read and write
14D0000
heap
page read and write
71B000
stack
page read and write
38E401648000
trusted library allocation
page read and write
7A1000
unkown
page execute read
196E8144000
heap
page read and write
38E400398000
trusted library allocation
page read and write
4C00006F0000
trusted library allocation
page read and write
196E8144000
heap
page read and write
38E401738000
trusted library allocation
page read and write
38E400F70000
trusted library allocation
page read and write
196E8170000
heap
page read and write
27C1000
heap
page read and write
38E400F70000
trusted library allocation
page read and write
38E401B98000
trusted library allocation
page read and write
196E814A000
heap
page read and write
38E401CB4000
trusted library allocation
page read and write
A622000
direct allocation
page read and write
5C0B000
heap
page read and write
196E8156000
heap
page read and write
9DF000
stack
page read and write
196E813D000
heap
page read and write
A6A6000
direct allocation
page read and write
67E2000
heap
page read and write
2E71000
heap
page read and write
1620000
heap
page read and write
196E8144000
heap
page read and write
5687000
heap
page read and write
38E401990000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E40199B000
trusted library allocation
page read and write
38E401A60000
trusted library allocation
page read and write
55D8000
heap
page read and write
196E8144000
heap
page read and write
38E400824000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E4017B4000
trusted library allocation
page read and write
196E814A000
heap
page read and write
38E40166C000
trusted library allocation
page read and write
38E4001B4000
trusted library allocation
page read and write
196E814A000
heap
page read and write
534E000
heap
page read and write
196E8153000
heap
page read and write
196E8156000
heap
page read and write
196E8144000
heap
page read and write
38E400F60000
trusted library allocation
page read and write
196E8156000
heap
page read and write
2E70000
heap
page read and write
38E4003C8000
trusted library allocation
page read and write
52F1000
heap
page read and write
4C0000368000
trusted library allocation
page read and write
38E4012D4000
trusted library allocation
page read and write
196E8156000
heap
page read and write
196E814A000
heap
page read and write
A400000
direct allocation
page read and write
38E401708000
trusted library allocation
page read and write
234D000
stack
page read and write
196E8156000
heap
page read and write
196E8156000
heap
page read and write
38E401AD0000
trusted library allocation
page read and write
38E400F60000
trusted library allocation
page read and write
38E401560000
trusted library allocation
page read and write
38E401A88000
trusted library allocation
page read and write
38E40140C000
trusted library allocation
page read and write
F9C000
unkown
page read and write
A446000
direct allocation
page read and write
38E401B44000
trusted library allocation
page read and write
A50A000
direct allocation
page read and write
38E400A28000
trusted library allocation
page read and write
5C5B000
heap
page read and write
196E8144000
heap
page read and write
38E400FE8000
trusted library allocation
page read and write
38E401444000
trusted library allocation
page read and write
536C000
heap
page read and write
196E8144000
heap
page read and write
38E4001D8000
trusted library allocation
page read and write
4C0000390000
trusted library allocation
page read and write
196E8150000
heap
page read and write
5344000
heap
page read and write
38E400F34000
trusted library allocation
page read and write
196E814A000
heap
page read and write
4DFB000
stack
page read and write
688D000
heap
page read and write
A6A8000
direct allocation
page read and write
2EA6000
heap
page read and write
4F20000
remote allocation
page read and write
196E8153000
heap
page read and write
38E401840000
trusted library allocation
page read and write
5BB4000
heap
page read and write
196E814A000
heap
page read and write
196E813E000
heap
page read and write
196E8142000
heap
page read and write
2E73000
heap
page read and write
38E401694000
trusted library allocation
page read and write
196E8156000
heap
page read and write
317E000
stack
page read and write
38E400BF8000
trusted library allocation
page read and write
196E8150000
heap
page read and write
38E401650000
trusted library allocation
page read and write
4C0000330000
trusted library allocation
page read and write
196E814A000
heap
page read and write
14F5000
heap
page read and write
196E8156000
heap
page read and write
2E1A000
heap
page read and write
38E40033C000
trusted library allocation
page read and write
A560000
direct allocation
page read and write
A43B000
direct allocation
page read and write
4C0000760000
trusted library allocation
page read and write
38E401999000
trusted library allocation
page read and write
196E8144000
heap
page read and write
AA32000
direct allocation
page read and write
A45C000
direct allocation
page read and write
A7A5000
direct allocation
page read and write
196E8156000
heap
page read and write
4C0000704000
trusted library allocation
page read and write
196E8171000
heap
page read and write
196E8153000
heap
page read and write
196E813B000
heap
page read and write
38E400DD8000
trusted library allocation
page read and write
38E400398000
trusted library allocation
page read and write
38E401AEC000
trusted library allocation
page read and write
38E400384000
trusted library allocation
page read and write
38E401344000
trusted library allocation
page read and write
196E8153000
heap
page read and write
3AF4002BC000
trusted library allocation
page read and write
196E8156000
heap
page read and write
A6F8000
direct allocation
page read and write
FA1000
unkown
page read and write
196E8156000
heap
page read and write
196E8150000
heap
page read and write
A470000
direct allocation
page read and write
196E814A000
heap
page read and write
2E28000
heap
page read and write
38E4003C8000
trusted library allocation
page read and write
A55E000
direct allocation
page read and write
4C00006D4000
trusted library allocation
page read and write
3AF4002A0000
trusted library allocation
page read and write
196E814A000
heap
page read and write
535D000
heap
page read and write
38E4015F8000
trusted library allocation
page read and write
A66C000
direct allocation
page read and write
196E8156000
heap
page read and write
551C000
heap
page read and write
38E400F70000
trusted library allocation
page read and write
196E8150000
heap
page read and write
5E0000
heap
page read and write
61CE000
heap
page read and write
196E8156000
heap
page read and write
38E401AD4000
trusted library allocation
page read and write
612E000
heap
page read and write
38E400CA0000
trusted library allocation
page read and write
4C0000418000
trusted library allocation
page read and write
38E4018B0000
trusted library allocation
page read and write
2E7D000
heap
page read and write
A50A000
direct allocation
page read and write
38E401044000
trusted library allocation
page read and write
4C0000310000
trusted library allocation
page read and write
38E4001AC000
trusted library allocation
page read and write
50B1000
heap
page read and write
A522000
direct allocation
page read and write
38E401734000
trusted library allocation
page read and write
A6FA000
direct allocation
page read and write
38E400294000
trusted library allocation
page read and write
A446000
direct allocation
page read and write
196E8153000
heap
page read and write
38E400364000
trusted library allocation
page read and write
A6F8000
direct allocation
page read and write
5535000
heap
page read and write
38E400398000
trusted library allocation
page read and write
38E40189C000
trusted library allocation
page read and write
38E401AD8000
trusted library allocation
page read and write
A466000
direct allocation
page read and write
38E4001F0000
trusted library allocation
page read and write
196E815B000
heap
page read and write
38E400FDC000
trusted library allocation
page read and write
A58C000
direct allocation
page read and write
F70000
unkown
page write copy
4C0000640000
trusted library allocation
page read and write
A538000
direct allocation
page read and write
5866000
heap
page read and write
38E4001B4000
trusted library allocation
page read and write
38E4012EC000
trusted library allocation
page read and write
AA92000
direct allocation
page read and write
A600000
direct allocation
page read and write
38E40038C000
trusted library allocation
page read and write
38E401728000
trusted library allocation
page read and write
38E401018000
trusted library allocation
page read and write
54B0000
heap
page read and write
196E8150000
heap
page read and write
38E400294000
trusted library allocation
page read and write
A4A8000
direct allocation
page read and write
74C000
stack
page read and write
196E8156000
heap
page read and write
38E4001D0000
trusted library allocation
page read and write
61A3000
heap
page read and write
196E8156000
heap
page read and write
52D8000
heap
page read and write
196E8150000
heap
page read and write
A904000
direct allocation
page read and write
196E8150000
heap
page read and write
196E8150000
heap
page read and write
555C000
heap
page read and write
A674000
direct allocation
page read and write
38E401460000
trusted library allocation
page read and write
38E401320000
trusted library allocation
page read and write
A35F000
stack
page read and write
38E400358000
trusted library allocation
page read and write
38E401870000
trusted library allocation
page read and write
38E400FE8000
trusted library allocation
page read and write
38E401A38000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E4014C0000
trusted library allocation
page read and write
38E401480000
trusted library allocation
page read and write
6962000
heap
page read and write
38E401028000
trusted library allocation
page read and write
196E8170000
heap
page read and write
38E4015F4000
trusted library allocation
page read and write
A6A0000
direct allocation
page read and write
95E000
stack
page read and write
5512000
heap
page read and write
38E4001D4000
trusted library allocation
page read and write
562F000
heap
page read and write
2E77000
heap
page read and write
4C00006FC000
trusted library allocation
page read and write
38E4012F4000
trusted library allocation
page read and write
5951000
heap
page read and write
38E40020C000
trusted library allocation
page read and write
5553000
heap
page read and write
A466000
direct allocation
page read and write
38E400294000
trusted library allocation
page read and write
38E400F70000
trusted library allocation
page read and write
38E40174C000
trusted library allocation
page read and write
38E401B7C000
trusted library allocation
page read and write
196E814A000
heap
page read and write
589B000
heap
page read and write
F6D000
unkown
page write copy
196E8153000
heap
page read and write
38E401754000
trusted library allocation
page read and write
6FD0000
heap
page read and write
FA5000
unkown
page readonly
38E401078000
trusted library allocation
page read and write
4C00006E0000
trusted library allocation
page read and write
A67E000
direct allocation
page read and write
A5A4000
direct allocation
page read and write
38E40033C000
trusted library allocation
page read and write
4C0000624000
trusted library allocation
page read and write
4C00006B8000
trusted library allocation
page read and write
38E40033C000
trusted library allocation
page read and write
38E401590000
trusted library allocation
page read and write
4C0000788000
trusted library allocation
page read and write
5307000
heap
page read and write
A70C000
direct allocation
page read and write
196E8150000
heap
page read and write
38E40169C000
trusted library allocation
page read and write
4C0000380000
trusted library allocation
page read and write
1B22000
direct allocation
page read and write
196E8153000
heap
page read and write
38E4017DC000
trusted library allocation
page read and write
917000
heap
page read and write
67C2000
heap
page read and write
38E401750000
trusted library allocation
page read and write
505F000
stack
page read and write
5581000
heap
page read and write
38E40033C000
trusted library allocation
page read and write
2E28000
heap
page read and write
38E402C0C000
trusted library allocation
page read and write
38E4001E4000
trusted library allocation
page read and write
4C0000658000
trusted library allocation
page read and write
38E40164C000
trusted library allocation
page read and write
38E401D21000
trusted library allocation
page read and write
196E8167000
heap
page read and write
196E8144000
heap
page read and write
196E8156000
heap
page read and write
A4A8000
direct allocation
page read and write
38E401610000
trusted library allocation
page read and write
4C0000698000
trusted library allocation
page read and write
38E401BE8000
trusted library allocation
page read and write
38E400CD4000
trusted library allocation
page read and write
2A73E000
stack
page read and write
6263000
heap
page read and write
537D000
heap
page read and write
196E8171000
heap
page read and write
A5CA000
direct allocation
page read and write
196E8156000
heap
page read and write
4C0000758000
trusted library allocation
page read and write
2E7A000
heap
page read and write
A53A000
direct allocation
page read and write
38E400384000
trusted library allocation
page read and write
38E40038C000
trusted library allocation
page read and write
A58C000
direct allocation
page read and write
196E8144000
heap
page read and write
50A0000
heap
page read and write
55C5000
heap
page read and write
196E8171000
heap
page read and write
38E400C84000
trusted library allocation
page read and write
38E401AE8000
trusted library allocation
page read and write
A61C000
direct allocation
page read and write
196E8144000
heap
page read and write
38E4003C8000
trusted library allocation
page read and write
4C000035C000
trusted library allocation
page read and write
A708000
direct allocation
page read and write
87F000
stack
page read and write
38E400FDC000
trusted library allocation
page read and write
196E8139000
heap
page read and write
38E400480000
trusted library allocation
page read and write
2E2B000
heap
page read and write
196E8156000
heap
page read and write
38E4015C8000
trusted library allocation
page read and write
62AE000
heap
page read and write
196E8150000
heap
page read and write
38E4002F4000
trusted library allocation
page read and write
38E4012B0000
trusted library allocation
page read and write
196E813E000
heap
page read and write
2B02000
heap
page read and write
38E400218000
trusted library allocation
page read and write
38E4017B0000
trusted library allocation
page read and write
13F0000
heap
page read and write
A21F000
stack
page read and write
38E401588000
trusted library allocation
page read and write
196E816C000
heap
page read and write
38E4002E0000
trusted library allocation
page read and write
196E8156000
heap
page read and write
2CFE000
stack
page read and write
2E76000
heap
page read and write
A5FA000
direct allocation
page read and write
196E8156000
heap
page read and write
38E402EE8000
trusted library allocation
page read and write
4C0000734000
trusted library allocation
page read and write
7A1000
unkown
page execute read
196E8144000
heap
page read and write
83E000
stack
page read and write
61EE000
heap
page read and write
38E4010A4000
trusted library allocation
page read and write
5377000
heap
page read and write
5871000
heap
page read and write
6780000
heap
page read and write
4C00006C8000
trusted library allocation
page read and write
38E401368000
trusted library allocation
page read and write
38E401B60000
trusted library allocation
page read and write
A6EC000
direct allocation
page read and write
196E814A000
heap
page read and write
196E8150000
heap
page read and write
38E402CDC000
trusted library allocation
page read and write
38E401C54000
trusted library allocation
page read and write
58B1000
heap
page read and write
38E400294000
trusted library allocation
page read and write
A530000
direct allocation
page read and write
38E40129C000
trusted library allocation
page read and write
196E814A000
heap
page read and write
52C000
stack
page read and write
38E400F34000
trusted library allocation
page read and write
38E400294000
trusted library allocation
page read and write
196E8150000
heap
page read and write
52C2000
heap
page read and write
38E401B38000
trusted library allocation
page read and write
A6DC000
direct allocation
page read and write
38E40204F000
trusted library allocation
page read and write
4C00006E4000
trusted library allocation
page read and write
2A83F000
stack
page read and write
A598000
direct allocation
page read and write
196E8144000
heap
page read and write
196E8144000
heap
page read and write
917000
heap
page read and write
196E8150000
heap
page read and write
5501000
heap
page read and write
196E816C000
heap
page read and write
38E401574000
trusted library allocation
page read and write
38E400F7C000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E400824000
trusted library allocation
page read and write
55D1000
heap
page read and write
23C0000
heap
page read and write
A596000
direct allocation
page read and write
196E814A000
heap
page read and write
1627000
heap
page read and write
38E401620000
trusted library allocation
page read and write
4C0000750000
trusted library allocation
page read and write
2E15000
heap
page read and write
5D0000
heap
page read and write
38E4019D8000
trusted library allocation
page read and write
2E12000
heap
page read and write
52DE000
heap
page read and write
A70C000
direct allocation
page read and write
38E4013B4000
trusted library allocation
page read and write
A70C000
direct allocation
page read and write
38E401760000
trusted library allocation
page read and write
38E400BF4000
trusted library allocation
page read and write
38E401B4C000
trusted library allocation
page read and write
2E15000
heap
page read and write
38E401B34000
trusted library allocation
page read and write
50B1000
heap
page read and write
38E401A98000
trusted library allocation
page read and write
2EA8000
heap
page read and write
196E8153000
heap
page read and write
5600000
heap
page read and write
56C000
stack
page read and write
38E401E04000
trusted library allocation
page read and write
4C0000694000
trusted library allocation
page read and write
196E814A000
heap
page read and write
A6FC000
direct allocation
page read and write
60C4000
heap
page read and write
196E814A000
heap
page read and write
4C0000614000
trusted library allocation
page read and write
38E400294000
trusted library allocation
page read and write
5363000
heap
page read and write
196E8155000
heap
page read and write
38E401724000
trusted library allocation
page read and write
38E4016E0000
trusted library allocation
page read and write
196E8156000
heap
page read and write
5C83000
heap
page read and write
A5BE000
direct allocation
page read and write
A556000
direct allocation
page read and write
196E8142000
heap
page read and write
A46E000
direct allocation
page read and write
38E40038C000
trusted library allocation
page read and write
FDB000
unkown
page readonly
196E8144000
heap
page read and write
196E8144000
heap
page read and write
38E401C18000
trusted library allocation
page read and write
38E4010A4000
trusted library allocation
page read and write
AA62000
direct allocation
page read and write
38E400230000
trusted library allocation
page read and write
38E400F60000
trusted library allocation
page read and write
A63A000
direct allocation
page read and write
196E8143000
heap
page read and write
A59E000
direct allocation
page read and write
38E40022C000
trusted library allocation
page read and write
1A9E000
stack
page read and write
A5E8000
direct allocation
page read and write
38E401710000
trusted library allocation
page read and write
3AF400248000
trusted library allocation
page read and write
4C0000354000
trusted library allocation
page read and write
277E000
stack
page read and write
38E4013D4000
trusted library allocation
page read and write
A5CE000
direct allocation
page read and write
196E8144000
heap
page read and write
196E8156000
heap
page read and write
4C0000320000
trusted library allocation
page read and write
38E400F58000
trusted library allocation
page read and write
196E8144000
heap
page read and write
38E401874000
trusted library allocation
page read and write
38E401564000
trusted library allocation
page read and write
2E2F000
heap
page read and write
196E814A000
heap
page read and write
38E4010B0000
trusted library allocation
page read and write
FA4000
unkown
page write copy
531A000
heap
page read and write
38E401634000
trusted library allocation
page read and write
38E40175C000
trusted library allocation
page read and write
196E8144000
heap
page read and write
38E401A90000
trusted library allocation
page read and write
196E8150000
heap
page read and write
196E8153000
heap
page read and write
196E8156000
heap
page read and write
196E8156000
heap
page read and write
6FDA000
heap
page read and write
38E400298000
trusted library allocation
page read and write
A41A000
direct allocation
page read and write
67A2000
heap
page read and write
A6DC000
direct allocation
page read and write
196E8144000
heap
page read and write
2E6B000
heap
page read and write
196E8150000
heap
page read and write
A6EC000
direct allocation
page read and write
196E8156000
heap
page read and write
38E4017C8000
trusted library allocation
page read and write
2E6A000
heap
page read and write
4C0000644000
trusted library allocation
page read and write
A578000
direct allocation
page read and write
38E4002B4000
trusted library allocation
page read and write
38E401778000
trusted library allocation
page read and write
38E401A0C000
trusted library allocation
page read and write
A39D000
stack
page read and write
196E8150000
heap
page read and write
3AF4002BC000
trusted library allocation
page read and write
A5D6000
direct allocation
page read and write
196E814A000
heap
page read and write
4BFD000
stack
page read and write
561A000
heap
page read and write
196E8142000
heap
page read and write
A620000
direct allocation
page read and write
38E401A3C000
trusted library allocation
page read and write
8DE000
stack
page read and write
38E400FC4000
trusted library allocation
page read and write
38E400398000
trusted library allocation
page read and write
38E40187C000
trusted library allocation
page read and write
196E814A000
heap
page read and write
38E400E6C000
trusted library allocation
page read and write
38E40033C000
trusted library allocation
page read and write
196E814A000
heap
page read and write
52F3000
heap
page read and write
533B000
heap
page read and write
196E815B000
heap
page read and write
FA5000
unkown
page readonly
A25D000
stack
page read and write
38E401B04000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E401B08000
trusted library allocation
page read and write
56B6000
heap
page read and write
38E40182C000
trusted library allocation
page read and write
A6DC000
direct allocation
page read and write
581B000
heap
page read and write
456000
remote allocation
page execute and read and write
A66A000
direct allocation
page read and write
196E8144000
heap
page read and write
38E4010A4000
trusted library allocation
page read and write
38E401368000
trusted library allocation
page read and write
38E400FA0000
trusted library allocation
page read and write
196E8153000
heap
page read and write
38E401570000
trusted library allocation
page read and write
A4A4000
direct allocation
page read and write
61E3000
heap
page read and write
4C00006CC000
trusted library allocation
page read and write
4C0000664000
trusted library allocation
page read and write
60CC000
heap
page read and write
38E401700000
trusted library allocation
page read and write
196E8156000
heap
page read and write
38E400C64000
trusted library allocation
page read and write
A52A000
direct allocation
page read and write
3AF4002C0000
trusted library allocation
page read and write
F2A000
unkown
page write copy
531D000
heap
page read and write
There are 1296 hidden memdumps, click here to show them.