IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AFHJJEHI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGDGHJEHJJDAAAKEBGCFCAAAAE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGCAAFBFBKFIDGDHJDBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECGDAAFIIJDAAAAKFHID
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIIIIDGHJEBFBGDHDGII
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\GIJDAFBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JKJDBAAAEHIEGCAKFHCGDHIEGD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (5166)
downloaded
Chrome Cache Entry: 76
ASCII text
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 --field-trial-handle=2432,i,10837436430540024699,4376489110652293416,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://google-ohttp-relay-join.fastly-edge.com/8z
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dlll
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/8
unknown
https://google-ohttp-relay-join.fastly-edge.com/?
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://google-ohttp-relay-join.fastly-edge.com/C
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/I
unknown
http://185.215.113.206Q
unknown
https://google-ohttp-relay-join.fastly-edge.com/L
unknown
http://unisolated.invalid/
unknown
https://google-ohttp-relay-join.fastly-edge.com/R
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://drive-daily-3.corp.googlP60JP60J//drive-daily-4.corp.google.com/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/Y
unknown
https://google-ohttp-relay-join.fastly-edge.com/_
unknown
http://anglebug.com/6929
unknown
http://185.215.113.206/6c4adf523b719729.phpam
unknown
http://185.215.113.206/746f34465cf17784/mozglue.dllh
unknown
http://anglebug.com/5281
unknown
https://google-ohttp-relay-join.fastly-edge.com/b
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://chromium-i18n.appspot.com/ssl-aggregate-address/J0
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://185.215.113.206/6c4adf523b719729.phpSs
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
http://185.215.113.206JJD
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certsJ0
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/4901J0G
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
216.58.206.46
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://google-ohttp-relay-join.fastly-edge.com/Zx
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoresent.
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
http://185.215.113.206/6c4adf523b719729.phplZs
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/kx
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
216.58.206.46
play.google.com
216.58.206.78
www.google.com
172.217.16.196
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
216.58.206.78
play.google.com
United States
216.58.206.46
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
172.217.16.196
www.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4C50000
direct allocation
page read and write
malicious
119E000
heap
page read and write
malicious
351000
unkown
page execute and read and write
malicious
4A3001DC4000
trusted library allocation
page read and write
2CCA5FD000
stack
page read and write
4A30028F0000
trusted library allocation
page read and write
1631805E000
heap
page read and write
4A3000FEC000
trusted library allocation
page read and write
4A3001778000
trusted library allocation
page read and write
2F0F000
stack
page read and write
4A3000C9E000
trusted library allocation
page read and write
16318610000
trusted library section
page read and write
16318074000
heap
page read and write
26C000
stack
page read and write
16318063000
heap
page read and write
766C002C0000
trusted library allocation
page read and write
4A30004D4000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A30017C8000
trusted library allocation
page read and write
4A3001894000
trusted library allocation
page read and write
4A3001B0C000
trusted library allocation
page read and write
2CA25FA000
stack
page read and write
4A3000CB0000
trusted library allocation
page read and write
1631851B000
heap
page read and write
4A3000EE0000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A300040C000
trusted library allocation
page read and write
FA4000
heap
page read and write
16318070000
heap
page read and write
2CC4DFE000
unkown
page readonly
4A3001D1D000
trusted library allocation
page read and write
1631806B000
heap
page read and write
16318063000
heap
page read and write
4A3000801000
trusted library allocation
page read and write
1631806B000
heap
page read and write
10AE000
stack
page read and write
4A3000214000
trusted library allocation
page read and write
4A3001D9E000
trusted library allocation
page read and write
4A3001038000
trusted library allocation
page read and write
4A3001668000
trusted library allocation
page read and write
8CF000
unkown
page execute and read and write
4A3000540000
trusted library allocation
page read and write
4A30006A4000
trusted library allocation
page read and write
1631C8DA000
heap
page read and write
4A300190C000
trusted library allocation
page read and write
6FD000320000
trusted library allocation
page read and write
4A300109C000
trusted library allocation
page read and write
4A30001C4000
trusted library allocation
page read and write
4A30002E3000
trusted library allocation
page read and write
4A300048C000
trusted library allocation
page read and write
4A300297F000
trusted library allocation
page read and write
4A3000884000
trusted library allocation
page read and write
6FD000704000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A30016E4000
trusted library allocation
page read and write
16318063000
heap
page read and write
464000
unkown
page execute and read and write
4A3001130000
trusted library allocation
page read and write
4A30002B4000
trusted library allocation
page read and write
4A300067C000
trusted library allocation
page read and write
2CC9DFE000
unkown
page readonly
16318059000
heap
page read and write
4A3000228000
trusted library allocation
page read and write
6FD000320000
trusted library allocation
page read and write
4A3000C88000
trusted library allocation
page read and write
3F0F000
stack
page read and write
4A3000A28000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001388000
trusted library allocation
page read and write
4A300080C000
trusted library allocation
page read and write
4A300167C000
trusted library allocation
page read and write
766C002A0000
trusted library allocation
page read and write
16318070000
heap
page read and write
4A3002918000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
4A3000FD8000
trusted library allocation
page read and write
1CD3E000
stack
page read and write
1631806B000
heap
page read and write
1631806B000
heap
page read and write
4A3000C38000
trusted library allocation
page read and write
2CACDFE000
unkown
page readonly
6FD000348000
trusted library allocation
page read and write
4A30002F4000
trusted library allocation
page read and write
16318557000
heap
page read and write
1631806B000
heap
page read and write
4A3001340000
trusted library allocation
page read and write
4A30002B4000
trusted library allocation
page read and write
47D1000
heap
page read and write
63C800274000
direct allocation
page read and write
4A3001074000
trusted library allocation
page read and write
FA4000
heap
page read and write
1631806B000
heap
page read and write
2CB1DFE000
unkown
page readonly
1D297000
heap
page read and write
4A30009DC000
trusted library allocation
page read and write
163149B0000
heap
page read and write
4A3002B30000
trusted library allocation
page read and write
4A300029A000
trusted library allocation
page read and write
4A3001168000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3000FB2000
trusted library allocation
page read and write
4A300185C000
trusted library allocation
page read and write
47D4000
heap
page read and write
16318070000
heap
page read and write
4A30010A8000
trusted library allocation
page read and write
1631E393000
trusted library section
page read and write
23368000
heap
page read and write
4A30016A4000
trusted library allocation
page read and write
6FD000620000
trusted library allocation
page read and write
4A3000C88000
trusted library allocation
page read and write
766C002B0000
trusted library allocation
page read and write
46CE000
stack
page read and write
1D2AE000
heap
page read and write
4A3001690000
trusted library allocation
page read and write
4A3001B0C000
trusted library allocation
page read and write
1631806B000
heap
page read and write
6FD00039C000
trusted library allocation
page read and write
2C6E000
stack
page read and write
2CAD5FA000
stack
page read and write
F90000
direct allocation
page read and write
4A3001AA0000
trusted library allocation
page read and write
16318537000
heap
page read and write
16318063000
heap
page read and write
2CBF5FD000
stack
page read and write
4A3001638000
trusted library allocation
page read and write
63C8002A8000
direct allocation
page read and write
4A3000F94000
trusted library allocation
page read and write
1D298000
heap
page read and write
163180B0000
heap
page read and write
4A300020C000
trusted library allocation
page read and write
2CCB5FA000
stack
page read and write
4A300180C000
trusted library allocation
page read and write
FA4000
heap
page read and write
4A30001B4000
trusted library allocation
page read and write
6FD000354000
trusted library allocation
page read and write
2CAA5FE000
stack
page read and write
4A3000DD8000
trusted library allocation
page read and write
1631806B000
heap
page read and write
1631807A000
heap
page read and write
4A30012D4000
trusted library allocation
page read and write
23625000
heap
page read and write
4A30001E8000
trusted library allocation
page read and write
6FD0002E4000
trusted library allocation
page read and write
4A3001B20000
trusted library allocation
page read and write
1CE7E000
stack
page read and write
1631807A000
heap
page read and write
766C00250000
trusted library allocation
page read and write
6FD0002F0000
trusted library allocation
page read and write
4A300038C000
trusted library allocation
page read and write
4A3001CD4000
trusted library allocation
page read and write
33E000
stack
page read and write
4A3000908000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A30014E4000
trusted library allocation
page read and write
1631807A000
heap
page read and write
1631806B000
heap
page read and write
4A3001AC0000
trusted library allocation
page read and write
4A30012AC000
trusted library allocation
page read and write
6FD0006AC000
trusted library allocation
page read and write
4A3000785000
trusted library allocation
page read and write
8AA000
unkown
page execute and read and write
4A3000378000
trusted library allocation
page read and write
4A300001C000
trusted library allocation
page read and write
6C58E000
unkown
page read and write
F90000
direct allocation
page read and write
4A300033C000
trusted library allocation
page read and write
1631806B000
heap
page read and write
16318063000
heap
page read and write
436000
unkown
page execute and read and write
1D298000
heap
page read and write
4A3000468000
trusted library allocation
page read and write
4A3000FC0000
trusted library allocation
page read and write
4A3001CB4000
trusted library allocation
page read and write
BF0000
heap
page read and write
1631EDAE000
trusted library section
page read and write
47D1000
heap
page read and write
1631807A000
heap
page read and write
4A30003C8000
trusted library allocation
page read and write
1631C907000
heap
page read and write
4A3000FB0000
trusted library allocation
page read and write
6C7A1000
unkown
page execute read
4A3000CB0000
trusted library allocation
page read and write
4A3002A5A000
trusted library allocation
page read and write
16318522000
heap
page read and write
4A3001B4C000
trusted library allocation
page read and write
4A30006E1000
trusted library allocation
page read and write
2CBEDFE000
unkown
page readonly
1D2A3000
heap
page read and write
1631F15E000
trusted library section
page read and write
4A300160C000
trusted library allocation
page read and write
4A300177C000
trusted library allocation
page read and write
4A3001B08000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A30002EB000
trusted library allocation
page read and write
4A3001698000
trusted library allocation
page read and write
4A3000F84000
trusted library allocation
page read and write
4A3001CA8000
trusted library allocation
page read and write
4A3001201000
trusted library allocation
page read and write
4A3001340000
trusted library allocation
page read and write
4A30015A8000
trusted library allocation
page read and write
6FD000714000
trusted library allocation
page read and write
4A3000C88000
trusted library allocation
page read and write
2337C000
heap
page read and write
4A30002E0000
trusted library allocation
page read and write
4A30018B4000
trusted library allocation
page read and write
6FD000678000
trusted library allocation
page read and write
23625000
heap
page read and write
4A3000230000
trusted library allocation
page read and write
1D29F000
heap
page read and write
4A300089C000
trusted library allocation
page read and write
4A3000E0E000
trusted library allocation
page read and write
1631805E000
heap
page read and write
1631E1C3000
heap
page read and write
2CB15FE000
stack
page read and write
454F000
stack
page read and write
1D296000
heap
page read and write
16318074000
heap
page read and write
1D390000
trusted library allocation
page read and write
4A3001920000
trusted library allocation
page read and write
4A3001D8A000
trusted library allocation
page read and write
47D1000
heap
page read and write
1631C680000
trusted library section
page read and write
4A3000E44000
trusted library allocation
page read and write
1631855E000
heap
page read and write
4A30015BC000
trusted library allocation
page read and write
FA0000
heap
page read and write
4A3000F84000
trusted library allocation
page read and write
4A30019F1000
trusted library allocation
page read and write
4A3002860000
trusted library allocation
page read and write
4A30003AC000
trusted library allocation
page read and write
6C780000
unkown
page read and write
350000
unkown
page readonly
1631806B000
heap
page read and write
1D286000
heap
page read and write
4A3001414000
trusted library allocation
page read and write
4A30003DC000
trusted library allocation
page read and write
6FD0006D0000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A30006EC000
trusted library allocation
page read and write
4A30015D4000
trusted library allocation
page read and write
2CCBDFE000
unkown
page readonly
16318063000
heap
page read and write
4A3001930000
trusted library allocation
page read and write
16314BA0000
heap
page read and write
4A30001EC000
trusted library allocation
page read and write
4A3000A4C000
trusted library allocation
page read and write
4A3000054000
trusted library allocation
page read and write
2CAB5FE000
stack
page read and write
4A3000CB0000
trusted library allocation
page read and write
2CA6DFE000
unkown
page readonly
16318063000
heap
page read and write
FA4000
heap
page read and write
4A30017F0000
trusted library allocation
page read and write
4A30013AC000
trusted library allocation
page read and write
FA4000
heap
page read and write
16318073000
heap
page read and write
4A3001B94000
trusted library allocation
page read and write
16318074000
heap
page read and write
FA4000
heap
page read and write
6FD000310000
trusted library allocation
page read and write
4A30004D0000
trusted library allocation
page read and write
1631807A000
heap
page read and write
1631806B000
heap
page read and write
4A300175C000
trusted library allocation
page read and write
4A3000294000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4C7B000
direct allocation
page read and write
6FD0002ED000
trusted library allocation
page read and write
4A300140C000
trusted library allocation
page read and write
4A30003DC000
trusted library allocation
page read and write
4A3000C88000
trusted library allocation
page read and write
4A30001F0000
trusted library allocation
page read and write
4A3001898000
trusted library allocation
page read and write
16318074000
heap
page read and write
16318063000
heap
page read and write
63A000
unkown
page execute and read and write
4A3001AE8000
trusted library allocation
page read and write
4A3000E24000
trusted library allocation
page read and write
4A3001AE4000
trusted library allocation
page read and write
1254000
heap
page read and write
1D2AE000
heap
page read and write
4A30001E0000
trusted library allocation
page read and write
4A3000210000
trusted library allocation
page read and write
4A3001D8A000
trusted library allocation
page read and write
2CC1DFE000
unkown
page readonly
4A30005A0000
trusted library allocation
page read and write
6C501000
unkown
page execute read
3C8F000
stack
page read and write
4A3001810000
trusted library allocation
page read and write
4A30001F4000
trusted library allocation
page read and write
1631805E000
heap
page read and write
1D2B6000
heap
page read and write
4A30000E0000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A30018E8000
trusted library allocation
page read and write
6FD000250000
trusted library allocation
page read and write
4A3000E5C000
trusted library allocation
page read and write
4A30015F0000
trusted library allocation
page read and write
6FD000610000
trusted library allocation
page read and write
16318063000
heap
page read and write
6FD0006B8000
trusted library allocation
page read and write
1631EE01000
trusted library section
page read and write
1631806B000
heap
page read and write
16318552000
heap
page read and write
47D1000
heap
page read and write
4A3001A28000
trusted library allocation
page read and write
468F000
stack
page read and write
766C00248000
trusted library allocation
page read and write
16314BF0000
trusted library allocation
page read and write
16318063000
heap
page read and write
2CC85FC000
stack
page read and write
4A30029CC000
trusted library allocation
page read and write
4A3001718000
trusted library allocation
page read and write
4A3000224000
trusted library allocation
page read and write
4A3000F1C000
trusted library allocation
page read and write
4A30003B8000
trusted library allocation
page read and write
F4B000
stack
page read and write
1631EDA2000
trusted library section
page read and write
4A30003C8000
trusted library allocation
page read and write
38CF000
stack
page read and write
1631E700000
trusted library section
page read and write
4A30000F0000
trusted library allocation
page read and write
1D297000
heap
page read and write
63C800210000
direct allocation
page read and write
4A300188C000
trusted library allocation
page read and write
16318062000
heap
page read and write
47D1000
heap
page read and write
1D296000
heap
page read and write
4A3000CA0000
trusted library allocation
page read and write
4A3000F94000
trusted library allocation
page read and write
4A3001C0C000
trusted library allocation
page read and write
4A3000A9C000
trusted library allocation
page read and write
4A3000198000
trusted library allocation
page read and write
47D1000
heap
page read and write
63C800220000
direct allocation
page read and write
1D286000
heap
page read and write
4A3000060000
trusted library allocation
page read and write
4A300000C000
trusted library allocation
page read and write
4A30018AC000
trusted library allocation
page read and write
1D293000
heap
page read and write
4A3001BE0000
trusted library allocation
page read and write
4A300009F000
trusted library allocation
page read and write
4A3001601000
trusted library allocation
page read and write
4A300129C000
trusted library allocation
page read and write
4A3000958000
trusted library allocation
page read and write
2CC65FE000
stack
page read and write
4A3000134000
trusted library allocation
page read and write
4A3001820000
trusted library allocation
page read and write
4A3001B98000
trusted library allocation
page read and write
4A30001AC000
trusted library allocation
page read and write
4A300033C000
trusted library allocation
page read and write
16318074000
heap
page read and write
6FD000758000
trusted library allocation
page read and write
6FD000288000
trusted library allocation
page read and write
300F000
stack
page read and write
4A30018E4000
trusted library allocation
page read and write
6FD000601000
trusted library allocation
page read and write
4A30016D8000
trusted library allocation
page read and write
16318092000
heap
page read and write
4A3000C40000
trusted library allocation
page read and write
4A3001938000
trusted library allocation
page read and write
4A3000E01000
trusted library allocation
page read and write
4A3001364000
trusted library allocation
page read and write
6FD000210000
trusted library allocation
page read and write
2C9F5FE000
stack
page read and write
4A30016D4000
trusted library allocation
page read and write
16318062000
heap
page read and write
1631807B000
heap
page read and write
16318063000
heap
page read and write
6FD000784000
trusted library allocation
page read and write
4A3000648000
trusted library allocation
page read and write
4A300116A000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A30018C8000
trusted library allocation
page read and write
4A3000820000
trusted library allocation
page read and write
16318070000
heap
page read and write
4A30002A4000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A3001650000
trusted library allocation
page read and write
4A3000A0C000
trusted library allocation
page read and write
1631EBE7000
unclassified section
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
4A3000A0C000
trusted library allocation
page read and write
16318074000
heap
page read and write
16318070000
heap
page read and write
4A3002ADC000
trusted library allocation
page read and write
1631807A000
heap
page read and write
1631807A000
heap
page read and write
6FD0002B0000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
4A3001750000
trusted library allocation
page read and write
FA4000
heap
page read and write
4A30019E8000
trusted library allocation
page read and write
4A30001D8000
trusted library allocation
page read and write
6FD000330000
trusted library allocation
page read and write
4A300179C000
trusted library allocation
page read and write
1D2A5000
heap
page read and write
47D1000
heap
page read and write
63C800290000
direct allocation
page read and write
4A3001488000
trusted library allocation
page read and write
4A300171C000
trusted library allocation
page read and write
4A3002A01000
trusted library allocation
page read and write
4A3001B04000
trusted library allocation
page read and write
4A3001388000
trusted library allocation
page read and write
1D27B000
heap
page read and write
16318063000
heap
page read and write
4A3001670000
trusted library allocation
page read and write
4A30018CC000
trusted library allocation
page read and write
4A3000398000
trusted library allocation
page read and write
4A3000BC4000
trusted library allocation
page read and write
47D1000
heap
page read and write
1631807A000
heap
page read and write
4A3001620000
trusted library allocation
page read and write
47D1000
heap
page read and write
6FD000718000
trusted library allocation
page read and write
4A30001C8000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A3000F54000
trusted library allocation
page read and write
4A30016D0000
trusted library allocation
page read and write
4A3002A32000
trusted library allocation
page read and write
6FD00085C000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
F90000
direct allocation
page read and write
63C80024C000
direct allocation
page read and write
47D1000
heap
page read and write
482F000
heap
page read and write
1631806B000
heap
page read and write
6FD0003EC000
trusted library allocation
page read and write
4A3000358000
trusted library allocation
page read and write
4A3001B34000
trusted library allocation
page read and write
4A3000CA0000
trusted library allocation
page read and write
4A3001D9C000
trusted library allocation
page read and write
4A3000384000
trusted library allocation
page read and write
16318074000
heap
page read and write
2CA4DFE000
unkown
page readonly
16318074000
heap
page read and write
61EB7000
direct allocation
page readonly
2CC45FE000
stack
page read and write
4A3000744000
trusted library allocation
page read and write
1631807A000
heap
page read and write
6FD000230000
trusted library allocation
page read and write
4A3000DB4000
trusted library allocation
page read and write
47D1000
heap
page read and write
1631806B000
heap
page read and write
6FD00080C000
trusted library allocation
page read and write
16318075000
heap
page read and write
4A3000ECC000
trusted library allocation
page read and write
4A3001764000
trusted library allocation
page read and write
63C800284000
direct allocation
page read and write
4A3000AE0000
trusted library allocation
page read and write
16318063000
heap
page read and write
4A3000C18000
trusted library allocation
page read and write
4A3000BA8000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A300017C000
trusted library allocation
page read and write
1631854A000
heap
page read and write
4A3001364000
trusted library allocation
page read and write
4A3000C19000
trusted library allocation
page read and write
4A300165C000
trusted library allocation
page read and write
2CB6DFE000
unkown
page readonly
4A3000F60000
trusted library allocation
page read and write
6FD00075C000
trusted library allocation
page read and write
1D2A3000
heap
page read and write
4A3001A30000
trusted library allocation
page read and write
6FD000688000
trusted library allocation
page read and write
408E000
stack
page read and write
1631806B000
heap
page read and write
1631806B000
heap
page read and write
4BE000
unkown
page execute and read and write
16318063000
heap
page read and write
4A3001478000
trusted library allocation
page read and write
2CB5DFE000
unkown
page readonly
1631C264000
trusted library allocation
page read and write
6FD000408000
trusted library allocation
page read and write
6FD000658000
trusted library allocation
page read and write
6FD000770000
trusted library allocation
page read and write
4A3001B30000
trusted library allocation
page read and write
1631ED70000
trusted library section
page read and write
4A3002924000
trusted library allocation
page read and write
16318063000
heap
page read and write
4A3002EF8000
trusted library allocation
page read and write
FA4000
heap
page read and write
16318074000
heap
page read and write
4A3001388000
trusted library allocation
page read and write
2CA55FB000
stack
page read and write
2CB45FC000
stack
page read and write
1631807A000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
2CC25FD000
stack
page read and write
16318070000
heap
page read and write
4A3000850000
trusted library allocation
page read and write
6C77F000
unkown
page write copy
1631806C000
heap
page read and write
4A300033C000
trusted library allocation
page read and write
1631805E000
heap
page read and write
4A30014A4000
trusted library allocation
page read and write
6C77E000
unkown
page read and write
63C800201000
direct allocation
page read and write
6FD000310000
trusted library allocation
page read and write
4A3000384000
trusted library allocation
page read and write
7C8000
unkown
page execute and read and write
FA4000
heap
page read and write
4A300129C000
trusted library allocation
page read and write
2CA65FB000
stack
page read and write
16318063000
heap
page read and write
2CA85FC000
stack
page read and write
766C002C8000
trusted library allocation
page read and write
4A30000A8000
trusted library allocation
page read and write
4A3002EF0000
trusted library allocation
page read and write
63C800294000
direct allocation
page read and write
1631808C000
heap
page read and write
766C002B0000
trusted library allocation
page read and write
4A3000E30000
trusted library allocation
page read and write
4A30018FC000
trusted library allocation
page read and write
4A300109C000
trusted library allocation
page read and write
4A3000C70000
trusted library allocation
page read and write
2C9B5EF000
stack
page read and write
6FD00035C000
trusted library allocation
page read and write
1631806F000
heap
page read and write
4A300020C000
trusted library allocation
page read and write
4A3000F60000
trusted library allocation
page read and write
163180AD000
heap
page read and write
1631807A000
heap
page read and write
4A3000E50000
trusted library allocation
page read and write
4A30012E4000
trusted library allocation
page read and write
2CA15FD000
stack
page read and write
1D2A0000
heap
page read and write
766C002F0000
trusted library allocation
page read and write
4A30002F0000
trusted library allocation
page read and write
4A3000298000
trusted library allocation
page read and write
766C002A4000
trusted library allocation
page read and write
6FD0006FC000
trusted library allocation
page read and write
1D2AE000
heap
page read and write
FA4000
heap
page read and write
1213000
heap
page read and write
4A3001D8A000
trusted library allocation
page read and write
4A3001614000
trusted library allocation
page read and write
FA4000
heap
page read and write
4A300080C000
trusted library allocation
page read and write
2CB7DFE000
unkown
page readonly
4A3001098000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A3001A74000
trusted library allocation
page read and write
42CF000
stack
page read and write
2346E000
stack
page read and write
6FD0002CC000
trusted library allocation
page read and write
4A3000A01000
trusted library allocation
page read and write
B9D000
stack
page read and write
FA4000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4A3000298000
trusted library allocation
page read and write
6FD00033C000
trusted library allocation
page read and write
4A3000938000
trusted library allocation
page read and write
4A300088C000
trusted library allocation
page read and write
6FD00060C000
trusted library allocation
page read and write
6FD0006E8000
trusted library allocation
page read and write
4A3000A7C000
trusted library allocation
page read and write
1631806C000
heap
page read and write
4A3000E18000
trusted library allocation
page read and write
4A30019E8000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A30016A0000
trusted library allocation
page read and write
4A3001A90000
trusted library allocation
page read and write
1D299000
heap
page read and write
4A3001790000
trusted library allocation
page read and write
6C849000
unkown
page readonly
4A3000184000
trusted library allocation
page read and write
4A3000D04000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001AFC000
trusted library allocation
page read and write
4A300174C000
trusted library allocation
page read and write
4A3001C5C000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
47D1000
heap
page read and write
4A30019E8000
trusted library allocation
page read and write
4A3001610000
trusted library allocation
page read and write
16318063000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
2CB95FB000
stack
page read and write
6FD000664000
trusted library allocation
page read and write
4A3002F04000
trusted library allocation
page read and write
4A3000C88000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3000398000
trusted library allocation
page read and write
4A30012BC000
trusted library allocation
page read and write
16318094000
heap
page read and write
1631806B000
heap
page read and write
4A300038C000
trusted library allocation
page read and write
8E7000
unkown
page execute and read and write
4A3001C68000
trusted library allocation
page read and write
1273000
heap
page read and write
4A3000C0C000
trusted library allocation
page read and write
FA4000
heap
page read and write
1631806B000
heap
page read and write
1631EF10000
trusted library section
page read and write
2CBC5FD000
stack
page read and write
4A3002AC1000
trusted library allocation
page read and write
6FD0006F0000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A3001CD4000
trusted library allocation
page read and write
16318070000
heap
page read and write
4A3001B48000
trusted library allocation
page read and write
4A3001B8C000
trusted library allocation
page read and write
350000
unkown
page read and write
16318069000
heap
page read and write
1631807A000
heap
page read and write
1631F350000
trusted library section
page read and write
418F000
stack
page read and write
4A3000F94000
trusted library allocation
page read and write
1631807C000
heap
page read and write
3CCE000
stack
page read and write
16318074000
heap
page read and write
364F000
stack
page read and write
16314B2C000
heap
page read and write
4A3000B5C000
trusted library allocation
page read and write
2CB65FC000
stack
page read and write
4A30001AC000
trusted library allocation
page read and write
4A3001B58000
trusted library allocation
page read and write
4A30008E4000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A300244F000
trusted library allocation
page read and write
4A300283D000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
8E8000
unkown
page execute and write copy
47D1000
heap
page read and write
16318063000
heap
page read and write
4A3000CA0000
trusted library allocation
page read and write
4A300100C000
trusted library allocation
page read and write
4A3001A01000
trusted library allocation
page read and write
1631806B000
heap
page read and write
6FD000760000
trusted library allocation
page read and write
1631806A000
heap
page read and write
2CC3DFE000
unkown
page readonly
4A30014F8000
trusted library allocation
page read and write
6FD000734000
trusted library allocation
page read and write
4A3002A0F000
trusted library allocation
page read and write
6FD000248000
trusted library allocation
page read and write
4A30002F4000
trusted library allocation
page read and write
4A300033C000
trusted library allocation
page read and write
4A3000BEC000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
766C00230000
trusted library allocation
page read and write
63C8002EC000
direct allocation
page read and write
4A30017DC000
trusted library allocation
page read and write
4A3001388000
trusted library allocation
page read and write
11E4000
heap
page read and write
4A30018F0000
trusted library allocation
page read and write
163180AE000
heap
page read and write
4A3001038000
trusted library allocation
page read and write
1D2AE000
heap
page read and write
16318063000
heap
page read and write
F8E000
stack
page read and write
1631806B000
heap
page read and write
4A3001B3C000
trusted library allocation
page read and write
6C73F000
unkown
page readonly
4A3000B1C000
trusted library allocation
page read and write
4A30017C4000
trusted library allocation
page read and write
1D2AE000
heap
page read and write
4A3000CB0000
trusted library allocation
page read and write
6FD00025C000
trusted library allocation
page read and write
4A300106C000
trusted library allocation
page read and write
4A3002991000
trusted library allocation
page read and write
1631A6B0000
trusted library allocation
page read and write
4A3000CF4000
trusted library allocation
page read and write
6C5A1000
unkown
page execute read
4A30010B8000
trusted library allocation
page read and write
4A3000A0C000
trusted library allocation
page read and write
4A3000F94000
trusted library allocation
page read and write
2CA0DFE000
unkown
page readonly
126C000
heap
page read and write
4A3001488000
trusted library allocation
page read and write
4A3000BC8000
trusted library allocation
page read and write
4A300008E000
trusted library allocation
page read and write
4A3000F18000
trusted library allocation
page read and write
4A3001AB8000
trusted library allocation
page read and write
4A30001DC000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A30003EC000
trusted library allocation
page read and write
2CA8DFE000
unkown
page readonly
354E000
stack
page read and write
6FD000730000
trusted library allocation
page read and write
4A3001704000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A30001D0000
trusted library allocation
page read and write
6C7A0000
unkown
page readonly
4A3000C5C000
trusted library allocation
page read and write
1631807A000
heap
page read and write
766C00220000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A300015C000
trusted library allocation
page read and write
4A30018D8000
trusted library allocation
page read and write
47D1000
heap
page read and write
3E0E000
stack
page read and write
6FD000220000
trusted library allocation
page read and write
4A3000EF0000
trusted library allocation
page read and write
4A3000294000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A3001C67000
trusted library allocation
page read and write
2CAC5FE000
stack
page read and write
390E000
stack
page read and write
1631806B000
heap
page read and write
4A300080C000
trusted library allocation
page read and write
63C8002AC000
direct allocation
page read and write
766C002C0000
trusted library allocation
page read and write
4A300181C000
trusted library allocation
page read and write
598000
unkown
page execute and read and write
1631806B000
heap
page read and write
16318070000
heap
page read and write
16314C85000
heap
page read and write
2C9C5FD000
unkown
page read and write
4A3001CA8000
trusted library allocation
page read and write
6FD0006EC000
trusted library allocation
page read and write
16318062000
heap
page read and write
1631851F000
heap
page read and write
47D1000
heap
page read and write
2CAE5FE000
stack
page read and write
4A3001340000
trusted library allocation
page read and write
4A3001388000
trusted library allocation
page read and write
1D293000
heap
page read and write
63C800234000
direct allocation
page read and write
6FD000238000
trusted library allocation
page read and write
6FD000700000
trusted library allocation
page read and write
4A3000739000
trusted library allocation
page read and write
4A3000201000
trusted library allocation
page read and write
FA4000
heap
page read and write
1D289000
heap
page read and write
4A30018C4000
trusted library allocation
page read and write
4A3000A0C000
trusted library allocation
page read and write
16318063000
heap
page read and write
1631806B000
heap
page read and write
47D1000
heap
page read and write
16318074000
heap
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
2CBE5FD000
stack
page read and write
2CBB5FE000
stack
page read and write
6FD00069C000
trusted library allocation
page read and write
4A3001CAC000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3000F2C000
trusted library allocation
page read and write
4A30018E0000
trusted library allocation
page read and write
1631807A000
heap
page read and write
1D2B9000
heap
page read and write
4A3001C71000
trusted library allocation
page read and write
4A30008F8000
trusted library allocation
page read and write
4A3002F20000
trusted library allocation
page read and write
1631806E000
heap
page read and write
1631E950000
trusted library section
page read and write
4A3000A18000
trusted library allocation
page read and write
1D2A0000
heap
page read and write
163185A8000
heap
page read and write
4A3001D8A000
trusted library allocation
page read and write
FA4000
heap
page read and write
2357E000
stack
page read and write
1631806C000
heap
page read and write
1631856A000
heap
page read and write
1631806B000
heap
page read and write
16318065000
heap
page read and write
4A300038C000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A30017A4000
trusted library allocation
page read and write
4A30016C4000
trusted library allocation
page read and write
16318062000
heap
page read and write
4A3000C24000
trusted library allocation
page read and write
4A3000294000
trusted library allocation
page read and write
6FD000390000
trusted library allocation
page read and write
FA4000
heap
page read and write
6FD000404000
trusted library allocation
page read and write
16318070000
heap
page read and write
4D8F000
stack
page read and write
2CB9DFE000
unkown
page readonly
4A300100C000
trusted library allocation
page read and write
1631852E000
heap
page read and write
1631808F000
heap
page read and write
4A3001A8C000
trusted library allocation
page read and write
766C00235000
trusted library allocation
page read and write
1631806B000
heap
page read and write
16318070000
heap
page read and write
4A300115C000
trusted library allocation
page read and write
16318063000
heap
page read and write
4A30001AC000
trusted library allocation
page read and write
4A3000FA0000
trusted library allocation
page read and write
4A3001B00000
trusted library allocation
page read and write
4A30015AC000
trusted library allocation
page read and write
4A3000D30000
trusted library allocation
page read and write
4A30019EC000
trusted library allocation
page read and write
4A3000601000
trusted library allocation
page read and write
4A3000078000
trusted library allocation
page read and write
16318074000
heap
page read and write
1631E3D6000
trusted library section
page read and write
4DC0000
direct allocation
page execute and read and write
4A300101C000
trusted library allocation
page read and write
6FD000788000
trusted library allocation
page read and write
2CC5DFE000
unkown
page readonly
11F9000
heap
page read and write
4A300169C000
trusted library allocation
page read and write
4A3001B54000
trusted library allocation
page read and write
4A300283F000
trusted library allocation
page read and write
4A3002EEC000
trusted library allocation
page read and write
4A300101C000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3001165000
trusted library allocation
page read and write
4A3000728000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A30018A8000
trusted library allocation
page read and write
2CAEDFE000
unkown
page readonly
4A3001784000
trusted library allocation
page read and write
4A3000B2C000
trusted library allocation
page read and write
8D8000
unkown
page execute and read and write
2CA9DFE000
unkown
page readonly
2CB25FD000
stack
page read and write
4A3000378000
trusted library allocation
page read and write
16318070000
heap
page read and write
766C002F8000
trusted library allocation
page read and write
766C002A0000
trusted library allocation
page read and write
1631806B000
heap
page read and write
48D0000
trusted library allocation
page read and write
1631806B000
heap
page read and write
2C9E5FE000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
4A300057C000
trusted library allocation
page read and write
FA4000
heap
page read and write
3B8E000
stack
page read and write
4A3000F2C000
trusted library allocation
page read and write
4A3002E01000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
163180AD000
heap
page read and write
4A300009D000
trusted library allocation
page read and write
4A3001BBC000
trusted library allocation
page read and write
4A3000398000
trusted library allocation
page read and write
4A3001438000
trusted library allocation
page read and write
6FD000754000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
4A30028FC000
trusted library allocation
page read and write
6FD0006C8000
trusted library allocation
page read and write
4A3002A30000
trusted library allocation
page read and write
4A30019F3000
trusted library allocation
page read and write
A90000
unkown
page execute and read and write
16314AA0000
heap
page read and write
61E00000
direct allocation
page execute and read and write
1631EDE0000
trusted library section
page read and write
4CB000
unkown
page execute and read and write
16318575000
heap
page read and write
47D1000
heap
page read and write
1D2AE000
heap
page read and write
1631806B000
heap
page read and write
1631807A000
heap
page read and write
4A3000914000
trusted library allocation
page read and write
4A3000535000
trusted library allocation
page read and write
4A3001440000
trusted library allocation
page read and write
138E000
stack
page read and write
6FD000724000
trusted library allocation
page read and write
16318074000
heap
page read and write
1198000
heap
page read and write
4A3000D28000
trusted library allocation
page read and write
766C002A0000
trusted library allocation
page read and write
2CBBDFE000
unkown
page readonly
47D1000
heap
page read and write
4A30017F8000
trusted library allocation
page read and write
4A3000D61000
trusted library allocation
page read and write
4A3001AC4000
trusted library allocation
page read and write
766C002C0000
trusted library allocation
page read and write
4A3000F84000
trusted library allocation
page read and write
1D2A0000
heap
page read and write
4A3000C98000
trusted library allocation
page read and write
4A3001A4C000
trusted library allocation
page read and write
4A3001634000
trusted library allocation
page read and write
16317250000
unkown
page read and write
2CBADFE000
unkown
page readonly
4A3001AE0000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001AD4000
trusted library allocation
page read and write
1CCFF000
stack
page read and write
2CB2DFE000
unkown
page readonly
4A3000118000
trusted library allocation
page read and write
6FD00078C000
trusted library allocation
page read and write
4A3001A0C000
trusted library allocation
page read and write
4A3000668000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A3000F0C000
trusted library allocation
page read and write
1D280000
heap
page read and write
FA4000
heap
page read and write
2336F000
heap
page read and write
63C8002DC000
direct allocation
page read and write
4A3002AE8000
trusted library allocation
page read and write
4A30009AF000
trusted library allocation
page read and write
4A3001488000
trusted library allocation
page read and write
766C002A4000
trusted library allocation
page read and write
4A3001860000
trusted library allocation
page read and write
16318068000
heap
page read and write
6C801000
unkown
page readonly
4A3001B6C000
trusted library allocation
page read and write
16318030000
heap
page read and write
1D297000
heap
page read and write
16318074000
heap
page read and write
4A3001840000
trusted library allocation
page read and write
4A3001824000
trusted library allocation
page read and write
2E0F000
stack
page read and write
4A3000F89000
trusted library allocation
page read and write
1631809C000
heap
page read and write
16314C80000
heap
page read and write
16318063000
heap
page read and write
1D299000
heap
page read and write
4A3002204000
trusted library allocation
page read and write
766C00278000
trusted library allocation
page read and write
16318070000
heap
page read and write
4A3001450000
trusted library allocation
page read and write
4A3001304000
trusted library allocation
page read and write
16318092000
heap
page read and write
4A3001DE0000
trusted library allocation
page read and write
1631807A000
heap
page read and write
6FD00027C000
trusted library allocation
page read and write
4A30005B4000
trusted library allocation
page read and write
16318062000
heap
page read and write
1CE3E000
stack
page read and write
4A3002B10000
trusted library allocation
page read and write
1D2A5000
heap
page read and write
4A3001DB8000
trusted library allocation
page read and write
1631EDF0000
trusted library section
page read and write
4A3001748000
trusted library allocation
page read and write
310F000
stack
page read and write
1D29C000
heap
page read and write
4A3001780000
trusted library allocation
page read and write
4A3000C98000
trusted library allocation
page read and write
4A300033C000
trusted library allocation
page read and write
4A3001E04000
trusted library allocation
page read and write
4A3000BC4000
trusted library allocation
page read and write
1D2B7000
heap
page read and write
163167D0000
heap
page read and write
4A3000CB0000
trusted library allocation
page read and write
4A3001470000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
FA4000
heap
page read and write
4A300045C000
trusted library allocation
page read and write
4A300058C000
trusted library allocation
page read and write
4A3001DC4000
trusted library allocation
page read and write
6FD000644000
trusted library allocation
page read and write
4A3002AEF000
trusted library allocation
page read and write
2C9D5FE000
stack
page read and write
61ECC000
direct allocation
page read and write
4A3001B9C000
trusted library allocation
page read and write
1D29F000
heap
page read and write
FA4000
heap
page read and write
766C002A4000
trusted library allocation
page read and write
4A3000CEC000
trusted library allocation
page read and write
4A30015E0000
trusted library allocation
page read and write
23300000
heap
page read and write
4A3001001000
trusted library allocation
page read and write
6FD000684000
trusted library allocation
page read and write
16318074000
heap
page read and write
47E0000
heap
page read and write
2CBCDFE000
unkown
page readonly
47D1000
heap
page read and write
4A3001B1C000
trusted library allocation
page read and write
16318074000
heap
page read and write
1631806B000
heap
page read and write
6FD0007D0000
trusted library allocation
page read and write
16318094000
heap
page read and write
4F7000
unkown
page execute and read and write
63C8002D0000
direct allocation
page read and write
4A3001A58000
trusted library allocation
page read and write
1D29A000
heap
page read and write
16318063000
heap
page read and write
6C592000
unkown
page readonly
4A300016C000
trusted library allocation
page read and write
4A300014C000
trusted library allocation
page read and write
1D293000
heap
page read and write
4A3001B50000
trusted library allocation
page read and write
23341000
heap
page read and write
16314A90000
heap
page readonly
4A3001B60000
trusted library allocation
page read and write
6FD00020C000
trusted library allocation
page read and write
1631808C000
heap
page read and write
4A3001768000
trusted library allocation
page read and write
4A30017F4000
trusted library allocation
page read and write
4A3001D9C000
trusted library allocation
page read and write
4A3002801000
trusted library allocation
page read and write
2CAE000
stack
page read and write
4A300033C000
trusted library allocation
page read and write
16318068000
heap
page read and write
4A300033C000
trusted library allocation
page read and write
6FD0006B4000
trusted library allocation
page read and write
4A300053A000
trusted library allocation
page read and write
4A3000348000
trusted library allocation
page read and write
4A3000298000
trusted library allocation
page read and write
4A30002A8000
trusted library allocation
page read and write
4A3002F10000
trusted library allocation
page read and write
4A3000398000
trusted library allocation
page read and write
1D2AE000
heap
page read and write
16318079000
heap
page read and write
6FD0006CC000
trusted library allocation
page read and write
766C00238000
trusted library allocation
page read and write
4A3001878000
trusted library allocation
page read and write
4A30019E8000
trusted library allocation
page read and write
4A30017B4000
trusted library allocation
page read and write
16316803000
heap
page read and write
2CA75FB000
stack
page read and write
4A30008BC000
trusted library allocation
page read and write
4A3001708000
trusted library allocation
page read and write
16314B30000
heap
page read and write
1631806B000
heap
page read and write
4A30014C4000
trusted library allocation
page read and write
1631EC27000
unclassified section
page read and write
4A300109C000
trusted library allocation
page read and write
4A3001C5C000
trusted library allocation
page read and write
1631808F000
heap
page read and write
FA4000
heap
page read and write
4A300082C000
trusted library allocation
page read and write
4A30012BC000
trusted library allocation
page read and write
4A300046C000
trusted library allocation
page read and write
4A3001AA4000
trusted library allocation
page read and write
4A3000D98000
trusted library allocation
page read and write
350F000
stack
page read and write
FA4000
heap
page read and write
4A30006B4000
trusted library allocation
page read and write
4A30006C8000
trusted library allocation
page read and write
37CE000
stack
page read and write
63C80020C000
direct allocation
page read and write
116E000
stack
page read and write
16318079000
heap
page read and write
16318074000
heap
page read and write
4A3000092000
trusted library allocation
page read and write
368E000
stack
page read and write
766C00274000
trusted library allocation
page read and write
1631C282000
trusted library allocation
page read and write
4A3000B34000
trusted library allocation
page read and write
1631E1C0000
heap
page read and write
16318075000
heap
page read and write
4A30002F4000
trusted library allocation
page read and write
4A3000CCC000
trusted library allocation
page read and write
4A3000F60000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001788000
trusted library allocation
page read and write
1180000
direct allocation
page read and write
16318063000
heap
page read and write
766C002A0000
trusted library allocation
page read and write
4A3001A88000
trusted library allocation
page read and write
4A3001124000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3001854000
trusted library allocation
page read and write
1631807A000
heap
page read and write
16318074000
heap
page read and write
1CFCD000
stack
page read and write
4A3000D70000
trusted library allocation
page read and write
1631EEDD000
trusted library section
page read and write
4A3001858000
trusted library allocation
page read and write
16318074000
heap
page read and write
2CBDDFE000
unkown
page readonly
4A3002C01000
trusted library allocation
page read and write
6FD000750000
trusted library allocation
page read and write
4A3001D1D000
trusted library allocation
page read and write
4A3001BAC000
trusted library allocation
page read and write
6FD00033C000
trusted library allocation
page read and write
1631806B000
heap
page read and write
6FD0007C8000
trusted library allocation
page read and write
4A3000988000
trusted library allocation
page read and write
4A30009EC000
trusted library allocation
page read and write
6C785000
unkown
page readonly
4A3001910000
trusted library allocation
page read and write
4A3002867000
trusted library allocation
page read and write
2D0B000
heap
page read and write
2C9FDFE000
unkown
page readonly
16318092000
heap
page read and write
1251000
heap
page read and write
4A3000DC0000
trusted library allocation
page read and write
4A30005D9000
trusted library allocation
page read and write
4A3002825000
trusted library allocation
page read and write
4A30013EC000
trusted library allocation
page read and write
16318074000
heap
page read and write
1631806B000
heap
page read and write
1631806A000
heap
page read and write
16318074000
heap
page read and write
4A3000F1C000
trusted library allocation
page read and write
47D1000
heap
page read and write
2CA45FC000
stack
page read and write
4A300077C000
trusted library allocation
page read and write
1D29A000
heap
page read and write
2CA1DFE000
unkown
page readonly
4A30029B9000
trusted library allocation
page read and write
16314C30000
trusted library section
page readonly
16318074000
heap
page read and write
2CA2DFE000
unkown
page readonly
6FD00035C000
trusted library allocation
page read and write
766C00260000
trusted library allocation
page read and write
233C2000
heap
page read and write
1631806B000
heap
page read and write
6FD0007B4000
trusted library allocation
page read and write
4A30003C8000
trusted library allocation
page read and write
1631EED2000
trusted library section
page read and write
766C002C0000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001B90000
trusted library allocation
page read and write
4A3001BC0000
trusted library allocation
page read and write
4A3001A84000
trusted library allocation
page read and write
2CA7DFE000
unkown
page readonly
2CA5DFE000
unkown
page readonly
4A30017AC000
trusted library allocation
page read and write
4A3001364000
trusted library allocation
page read and write
1631E95C000
trusted library section
page read and write
4A3001888000
trusted library allocation
page read and write
4A3000BE1000
trusted library allocation
page read and write
4A3000298000
trusted library allocation
page read and write
4A30017B0000
trusted library allocation
page read and write
1631806E000
heap
page read and write
16318074000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
378F000
stack
page read and write
2D00000
heap
page read and write
1631806B000
heap
page read and write
4A30014C8000
trusted library allocation
page read and write
4A3001DC6000
trusted library allocation
page read and write
1631807A000
heap
page read and write
2CB75FC000
stack
page read and write
4A30003A4000
trusted library allocation
page read and write
16314C00000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A30003C8000
trusted library allocation
page read and write
16318063000
heap
page read and write
4A3000B0C000
trusted library allocation
page read and write
16318070000
heap
page read and write
1D29A000
heap
page read and write
4A3000BD8000
trusted library allocation
page read and write
16318063000
heap
page read and write
1631807B000
heap
page read and write
1631808D000
heap
page read and write
6FD000424000
trusted library allocation
page read and write
47D1000
heap
page read and write
5BE000
unkown
page execute and read and write
4A3001C74000
trusted library allocation
page read and write
16318063000
heap
page read and write
4A3000384000
trusted library allocation
page read and write
340F000
stack
page read and write
2CC2DFE000
unkown
page readonly
2C9CDFE000
unkown
page readonly
47D1000
heap
page read and write
163180AE000
heap
page read and write
1631807A000
heap
page read and write
4A300027C000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3000790000
trusted library allocation
page read and write
4A3001458000
trusted library allocation
page read and write
1631806B000
heap
page read and write
1631855B000
heap
page read and write
1D2AE000
heap
page read and write
FA4000
heap
page read and write
1631806B000
heap
page read and write
4A30004AC000
trusted library allocation
page read and write
3A0F000
stack
page read and write
4A3000370000
trusted library allocation
page read and write
4A3001B88000
trusted library allocation
page read and write
16318074000
heap
page read and write
6FD0006E4000
trusted library allocation
page read and write
2CCC5FE000
stack
page read and write
4A3001630000
trusted library allocation
page read and write
4A3000DB4000
trusted library allocation
page read and write
6FD000368000
trusted library allocation
page read and write
4A3001801000
trusted library allocation
page read and write
4A3000BC8000
trusted library allocation
page read and write
4A3001A64000
trusted library allocation
page read and write
4A300189C000
trusted library allocation
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
4A3000D0C000
trusted library allocation
page read and write
4A30017D8000
trusted library allocation
page read and write
4A30012C8000
trusted library allocation
page read and write
1631806B000
heap
page read and write
16318070000
heap
page read and write
1631806B000
heap
page read and write
16318070000
heap
page read and write
4A30015D0000
trusted library allocation
page read and write
4A3000568000
trusted library allocation
page read and write
1D27D000
heap
page read and write
1631806A000
heap
page read and write
766C002F4000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3000537000
trusted library allocation
page read and write
4A3001C90000
trusted library allocation
page read and write
16314B5D000
heap
page read and write
2D0E000
heap
page read and write
4A3001738000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A3001B38000
trusted library allocation
page read and write
2CA95FE000
stack
page read and write
4A3000290000
trusted library allocation
page read and write
2CA3DFE000
unkown
page readonly
4A3000BC4000
trusted library allocation
page read and write
2CC7DFE000
unkown
page readonly
4A3001D9E000
trusted library allocation
page read and write
4A3000C24000
trusted library allocation
page read and write
4A30001B4000
trusted library allocation
page read and write
4A30017A0000
trusted library allocation
page read and write
6FD000698000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
1D20C000
stack
page read and write
4A30017E0000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
4A3000CB0000
trusted library allocation
page read and write
1D399000
heap
page read and write
4A3000294000
trusted library allocation
page read and write
1259000
heap
page read and write
4A3001CC0000
trusted library allocation
page read and write
1631806C000
heap
page read and write
47D1000
heap
page read and write
1631806E000
heap
page read and write
3A4E000
stack
page read and write
1631808D000
heap
page read and write
1631B760000
trusted library section
page read and write
2CCCDFE000
unkown
page readonly
1631806B000
heap
page read and write
6FD0006E0000
trusted library allocation
page read and write
4A3002A16000
trusted library allocation
page read and write
1631C8C0000
heap
page read and write
4A3000294000
trusted library allocation
page read and write
4A30009D4000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3002E0C000
trusted library allocation
page read and write
6FD000640000
trusted library allocation
page read and write
163185CD000
heap
page read and write
4A3001A50000
trusted library allocation
page read and write
4A3000B48000
trusted library allocation
page read and write
6FD000401000
trusted library allocation
page read and write
FA4000
heap
page read and write
16314B45000
heap
page read and write
1D2B9000
heap
page read and write
6FD0006BC000
trusted library allocation
page read and write
4A3001890000
trusted library allocation
page read and write
2CBD5FD000
stack
page read and write
4A30013AC000
trusted library allocation
page read and write
6FD0002F4000
trusted library allocation
page read and write
4A3001C65000
trusted library allocation
page read and write
6FD000248000
trusted library allocation
page read and write
1631806E000
heap
page read and write
4A30007DC000
trusted library allocation
page read and write
4A30015B8000
trusted library allocation
page read and write
1D29D000
heap
page read and write
4A3001BE4000
trusted library allocation
page read and write
4A3000EFC000
trusted library allocation
page read and write
4A3001B68000
trusted library allocation
page read and write
1D2B5000
heap
page read and write
16314B9D000
heap
page read and write
4A300062C000
trusted library allocation
page read and write
1631809C000
heap
page read and write
4A3002EE0000
trusted library allocation
page read and write
4A300006C000
trusted library allocation
page read and write
4A3000220000
trusted library allocation
page read and write
63C800260000
direct allocation
page read and write
4A300101C000
trusted library allocation
page read and write
FA4000
heap
page read and write
F0E000
stack
page read and write
1631809C000
heap
page read and write
766C00264000
trusted library allocation
page read and write
FA4000
heap
page read and write
4A300142C000
trusted library allocation
page read and write
4A3000718000
trusted library allocation
page read and write
4A3000F54000
trusted library allocation
page read and write
766C002A0000
trusted library allocation
page read and write
1D286000
heap
page read and write
4A3000B54000
trusted library allocation
page read and write
4A3000FBC000
trusted library allocation
page read and write
1631E2B7000
unclassified section
page read and write
4A30006E3000
trusted library allocation
page read and write
4A3000D68000
trusted library allocation
page read and write
16318074000
heap
page read and write
4A3001388000
trusted library allocation
page read and write
8E7000
unkown
page execute and write copy
4A3000558000
trusted library allocation
page read and write
4A30013AC000
trusted library allocation
page read and write
1631808C000
heap
page read and write
FA4000
heap
page read and write
4A3001A70000
trusted library allocation
page read and write
4A30009A0000
trusted library allocation
page read and write
4A300140D000
trusted library allocation
page read and write
4A30028D6000
trusted library allocation
page read and write
2362D000
heap
page read and write
4A30001F8000
trusted library allocation
page read and write
163180AD000
heap
page read and write
F90000
direct allocation
page read and write
1631805E000
heap
page read and write
4A30013AC000
trusted library allocation
page read and write
766C002C0000
trusted library allocation
page read and write
4A300172C000
trusted library allocation
page read and write
4A3002930000
trusted library allocation
page read and write
4A3001724000
trusted library allocation
page read and write
4C8C000
stack
page read and write
4A3001110000
trusted library allocation
page read and write
1D2B4000
heap
page read and write
4A300029A000
trusted library allocation
page read and write
63C800303000
direct allocation
page read and write
2C2F000
stack
page read and write
16314AA8000
heap
page read and write
2CB05FE000
stack
page read and write
6FD000354000
trusted library allocation
page read and write
16318063000
heap
page read and write
16318074000
heap
page read and write
4A3001BA8000
trusted library allocation
page read and write
4A3001AF4000
trusted library allocation
page read and write
4A3000C01000
trusted library allocation
page read and write
766C0020C000
trusted library allocation
page read and write
4A30015A8000
trusted library allocation
page read and write
4A3000294000
trusted library allocation
page read and write
404F000
stack
page read and write
4A30002E0000
trusted library allocation
page read and write
1631DF50000
trusted library allocation
page read and write
4A30006D4000
trusted library allocation
page read and write
16318063000
heap
page read and write
4A30001D4000
trusted library allocation
page read and write
163185F1000
heap
page read and write
4A3001364000
trusted library allocation
page read and write
4A3000468000
trusted library allocation
page read and write
4A3001ABC000
trusted library allocation
page read and write
4A30009B8000
trusted library allocation
page read and write
766C00270000
trusted library allocation
page read and write
1D286000
heap
page read and write
4A3001A2C000
trusted library allocation
page read and write
1D2A0000
heap
page read and write
1631857A000
heap
page read and write
B98000
stack
page read and write
4A3001170000
trusted library allocation
page read and write
2CA05FE000
stack
page read and write
2D07000
heap
page read and write
4A3002A4C000
trusted library allocation
page read and write
4A3001CEC000
trusted library allocation
page read and write
6C5A0000
unkown
page readonly
1631860E000
heap
page read and write
4A3000D14000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A30018C0000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001C60000
trusted library allocation
page read and write
6FD00085C000
trusted library allocation
page read and write
4A3000FA0000
trusted library allocation
page read and write
4A3000F84000
trusted library allocation
page read and write
1CBBF000
stack
page read and write
23580000
trusted library allocation
page read and write
4A3000F84000
trusted library allocation
page read and write
4A30005E4000
trusted library allocation
page read and write
16318063000
heap
page read and write
2CB3DFE000
unkown
page readonly
4C20000
heap
page read and write
1631E1E7000
unclassified section
page read and write
16318063000
heap
page read and write
4A30015CC000
trusted library allocation
page read and write
2CC75FA000
stack
page read and write
63C800215000
direct allocation
page read and write
499000
unkown
page execute and read and write
4A3000CE8000
trusted library allocation
page read and write
16318094000
heap
page read and write
2CC05FC000
stack
page read and write
4A3000CDC000
trusted library allocation
page read and write
63C8002E4000
direct allocation
page read and write
23361000
heap
page read and write
4A3001B64000
trusted library allocation
page read and write
2CC8DFE000
unkown
page readonly
4A30002C0000
trusted library allocation
page read and write
4A300296D000
trusted library allocation
page read and write
1D29F000
heap
page read and write
4A3000D3C000
trusted library allocation
page read and write
2CAF5FE000
stack
page read and write
4A3001BC0000
trusted library allocation
page read and write
1D29A000
heap
page read and write
4A30001AC000
trusted library allocation
page read and write
2CC0DFE000
unkown
page readonly
4A3001494000
trusted library allocation
page read and write
4A30014D8000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A30013E4000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A300033C000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
4A3002A74000
trusted library allocation
page read and write
4A300021C000
trusted library allocation
page read and write
16318063000
heap
page read and write
61ECD000
direct allocation
page readonly
6FD000330000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A300163C000
trusted library allocation
page read and write
4A30017CC000
trusted library allocation
page read and write
4A30001B4000
trusted library allocation
page read and write
2361D000
heap
page read and write
4A3001090000
trusted library allocation
page read and write
4A30015D8000
trusted library allocation
page read and write
FA4000
heap
page read and write
6FD000330000
trusted library allocation
page read and write
16318079000
heap
page read and write
4EB000
unkown
page execute and read and write
4A30004E0000
trusted library allocation
page read and write
4A3001DB8000
trusted library allocation
page read and write
4A30014EE000
trusted library allocation
page read and write
6FD000380000
trusted library allocation
page read and write
1631807A000
heap
page read and write
2CA35FA000
stack
page read and write
16318063000
heap
page read and write
4A300178C000
trusted library allocation
page read and write
1631C8C7000
heap
page read and write
4A30013AC000
trusted library allocation
page read and write
4A3001B04000
trusted library allocation
page read and write
4A3000CC0000
trusted library allocation
page read and write
2CB55FB000
stack
page read and write
4A3000FD8000
trusted library allocation
page read and write
1631807A000
heap
page read and write
47D1000
heap
page read and write
4A3001A3C000
trusted library allocation
page read and write
47D1000
heap
page read and write
2CC6DFE000
unkown
page readonly
4A300060C000
trusted library allocation
page read and write
1D0CD000
stack
page read and write
16318073000
heap
page read and write
4A3001D1D000
trusted library allocation
page read and write
4A300191C000
trusted library allocation
page read and write
4A3002C0C000
trusted library allocation
page read and write
47D1000
heap
page read and write
16318070000
heap
page read and write
63C800270000
direct allocation
page read and write
1631807A000
heap
page read and write
1D286000
heap
page read and write
4A300080C000
trusted library allocation
page read and write
4A3001868000
trusted library allocation
page read and write
4A30028C4000
trusted library allocation
page read and write
16318062000
heap
page read and write
16318068000
heap
page read and write
4A3000AF4000
trusted library allocation
page read and write
1631808F000
heap
page read and write
4A3001B54000
trusted library allocation
page read and write
1CBFE000
stack
page read and write
FA4000
heap
page read and write
126E000
heap
page read and write
47CF000
stack
page read and write
2CC55FE000
stack
page read and write
63C800244000
direct allocation
page read and write
6FD0007CC000
trusted library allocation
page read and write
444E000
stack
page read and write
4A3001110000
trusted library allocation
page read and write
1631807A000
heap
page read and write
2CF0000
direct allocation
page execute and read and write
16318063000
heap
page read and write
4A3001844000
trusted library allocation
page read and write
1D286000
heap
page read and write
5B8000
unkown
page execute and read and write
B92000
stack
page read and write
4A3000DD0000
trusted library allocation
page read and write
1631808C000
heap
page read and write
3DCF000
stack
page read and write
6FD000364000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3000218000
trusted library allocation
page read and write
1631806B000
heap
page read and write
16318074000
heap
page read and write
4A30000D0000
trusted library allocation
page read and write
6C847000
unkown
page read and write
1631807A000
heap
page read and write
63C800250000
direct allocation
page read and write
1631807A000
heap
page read and write
4FA000
unkown
page execute and read and write
4A30018EC000
trusted library allocation
page read and write
125F000
heap
page read and write
1631806A000
heap
page read and write
6FD0002D4000
trusted library allocation
page read and write
2CC95FE000
stack
page read and write
4A3002888000
trusted library allocation
page read and write
4A300022C000
trusted library allocation
page read and write
1D297000
heap
page read and write
47D1000
heap
page read and write
1631806A000
heap
page read and write
63C800280000
direct allocation
page read and write
6FD000630000
trusted library allocation
page read and write
1631807A000
heap
page read and write
6FD000654000
trusted library allocation
page read and write
4A3001340000
trusted library allocation
page read and write
766C00201000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001401000
trusted library allocation
page read and write
1631806B000
heap
page read and write
6FD000668000
trusted library allocation
page read and write
4A30018DC000
trusted library allocation
page read and write
163180AE000
heap
page read and write
4A300204F000
trusted library allocation
page read and write
1D272000
heap
page read and write
4A3001850000
trusted library allocation
page read and write
4A3000C2C000
trusted library allocation
page read and write
1631807A000
heap
page read and write
2CAFDFE000
unkown
page readonly
4A30028BE000
trusted library allocation
page read and write
4A3000E8C000
trusted library allocation
page read and write
37C000
unkown
page execute and read and write
2CABDFE000
unkown
page readonly
FA4000
heap
page read and write
4A30001A0000
trusted library allocation
page read and write
1631808D000
heap
page read and write
6FD000374000
trusted library allocation
page read and write
4A3001640000
trusted library allocation
page read and write
16318063000
heap
page read and write
FA4000
heap
page read and write
41CE000
stack
page read and write
766C002E4000
trusted library allocation
page read and write
4A3002823000
trusted library allocation
page read and write
4A3000001000
trusted library allocation
page read and write
6FD000418000
trusted library allocation
page read and write
4A30017A8000
trusted library allocation
page read and write
4A3000401000
trusted library allocation
page read and write
4A3000CA0000
trusted library allocation
page read and write
6FD0002B8000
trusted library allocation
page read and write
47D0000
heap
page read and write
4A3001BCC000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3001488000
trusted library allocation
page read and write
16318591000
heap
page read and write
4A3001494000
trusted library allocation
page read and write
4A3001760000
trusted library allocation
page read and write
1D286000
heap
page read and write
4A300120C000
trusted library allocation
page read and write
23375000
heap
page read and write
2CB4DFE000
unkown
page readonly
4A300168C000
trusted library allocation
page read and write
16318074000
heap
page read and write
F90000
direct allocation
page read and write
4A3000098000
trusted library allocation
page read and write
FA4000
heap
page read and write
4A30013C8000
trusted library allocation
page read and write
1631807A000
heap
page read and write
6FD00040C000
trusted library allocation
page read and write
6FD000614000
trusted library allocation
page read and write
FA4000
heap
page read and write
4A3000BC4000
trusted library allocation
page read and write
4A3002966000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3000E80000
trusted library allocation
page read and write
16318058000
heap
page read and write
16318063000
heap
page read and write
3F4E000
stack
page read and write
2CB35FA000
stack
page read and write
1D2A0000
heap
page read and write
16318063000
heap
page read and write
23363000
heap
page read and write
1D294000
heap
page read and write
2C9EDFE000
unkown
page readonly
FA4000
heap
page read and write
458E000
stack
page read and write
16318074000
heap
page read and write
16318063000
heap
page read and write
6FD000624000
trusted library allocation
page read and write
47D1000
heap
page read and write
FA4000
heap
page read and write
4A30018B0000
trusted library allocation
page read and write
2CB8DFE000
unkown
page readonly
47D1000
heap
page read and write
4A3001364000
trusted library allocation
page read and write
4A3001478000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3000AC4000
trusted library allocation
page read and write
4A3001C01000
trusted library allocation
page read and write
1D10E000
stack
page read and write
47D1000
heap
page read and write
1631806B000
heap
page read and write
4A3000FED000
trusted library allocation
page read and write
1631807A000
heap
page read and write
FA4000
heap
page read and write
6FD0006B0000
trusted library allocation
page read and write
4A3002AC3000
trusted library allocation
page read and write
2C0000
heap
page read and write
10EE000
stack
page read and write
4A3000994000
trusted library allocation
page read and write
4A3000F2C000
trusted library allocation
page read and write
4A30029A4000
trusted library allocation
page read and write
4A3002EEC000
trusted library allocation
page read and write
4A30016B0000
trusted library allocation
page read and write
2362B000
heap
page read and write
4A3002AA7000
trusted library allocation
page read and write
1631806B000
heap
page read and write
61ED3000
direct allocation
page read and write
4A300080C000
trusted library allocation
page read and write
1D29D000
heap
page read and write
1631EF5E000
trusted library section
page read and write
1D296000
heap
page read and write
2CBFDFE000
unkown
page readonly
4A30016C0000
trusted library allocation
page read and write
4A3001B78000
trusted library allocation
page read and write
440F000
stack
page read and write
2D0000
heap
page read and write
6FD000320000
trusted library allocation
page read and write
4A3000E0C000
trusted library allocation
page read and write
4A3001CD8000
trusted library allocation
page read and write
4A30001E4000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A3001164000
trusted library allocation
page read and write
1D2B8000
heap
page read and write
4A3001C5C000
trusted library allocation
page read and write
4A300117C000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3001A54000
trusted library allocation
page read and write
1631806B000
heap
page read and write
766C00294000
trusted library allocation
page read and write
4A3000F1C000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
16318559000
heap
page read and write
766C00288000
trusted library allocation
page read and write
4A3001720000
trusted library allocation
page read and write
4A3000EBC000
trusted library allocation
page read and write
2CC15FD000
stack
page read and write
4A30014C4000
trusted library allocation
page read and write
1631EF50000
trusted library section
page read and write
23320000
heap
page read and write
2CB85FD000
stack
page read and write
4A30003C8000
trusted library allocation
page read and write
16318063000
heap
page read and write
1CF7F000
stack
page read and write
1631ED81000
trusted library section
page read and write
1631808C000
heap
page read and write
4A30008C4000
trusted library allocation
page read and write
23300000
trusted library allocation
page read and write
4A3001BD0000
trusted library allocation
page read and write
16318040000
heap
page read and write
163180AE000
heap
page read and write
4A30014C4000
trusted library allocation
page read and write
1D29A000
heap
page read and write
1D2AF000
heap
page read and write
4A3000358000
trusted library allocation
page read and write
16318074000
heap
page read and write
6FD0002FC000
trusted library allocation
page read and write
16318510000
heap
page read and write
4A3000D4C000
trusted library allocation
page read and write
1631806B000
heap
page read and write
112E000
stack
page read and write
2CB0DFE000
unkown
page readonly
16318074000
heap
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
6FD000694000
trusted library allocation
page read and write
1631F150000
trusted library section
page read and write
1631806B000
heap
page read and write
4A3000ED0000
trusted library allocation
page read and write
4A3001C73000
trusted library allocation
page read and write
4A300166C000
trusted library allocation
page read and write
1631807A000
heap
page read and write
4A3002A58000
trusted library allocation
page read and write
1631807A000
heap
page read and write
16318070000
heap
page read and write
1631807A000
heap
page read and write
1631806B000
heap
page read and write
1631806B000
heap
page read and write
4A3000C50000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
4A3001834000
trusted library allocation
page read and write
4A3001654000
trusted library allocation
page read and write
2CADDFE000
unkown
page readonly
6C500000
unkown
page readonly
4A3002CDC000
trusted library allocation
page read and write
4A30005DF000
trusted library allocation
page read and write
1180000
direct allocation
page read and write
4A3000ABC000
trusted library allocation
page read and write
4A3000BE0000
trusted library allocation
page read and write
4A3001AB4000
trusted library allocation
page read and write
4A3001164000
trusted library allocation
page read and write
4A3001B5C000
trusted library allocation
page read and write
1631E457000
unclassified section
page read and write
1CABE000
stack
page read and write
1631806B000
heap
page read and write
4A3000F14000
trusted library allocation
page read and write
63C800230000
direct allocation
page read and write
1631E290000
heap
page read and write
351000
unkown
page execute and write copy
16314BD0000
heap
page read and write
4A3000E68000
trusted library allocation
page read and write
6C57D000
unkown
page readonly
4A3000CB0000
trusted library allocation
page read and write
4A30016F4000
trusted library allocation
page read and write
6FD000430000
trusted library allocation
page read and write
4A3002AAB000
trusted library allocation
page read and write
6FD000201000
trusted library allocation
page read and write
1631806B000
heap
page read and write
4A300109C000
trusted library allocation
page read and write
1631807A000
heap
page read and write
766C002A0000
trusted library allocation
page read and write
1631C8D2000
heap
page read and write
4A3000A0C000
trusted library allocation
page read and write
4A3000128000
trusted library allocation
page read and write
6FD0006D4000
trusted library allocation
page read and write
63C800217000
direct allocation
page read and write
16316800000
heap
page read and write
2CCADFE000
unkown
page readonly
1266000
heap
page read and write
766C002D8000
trusted library allocation
page read and write
47D1000
heap
page read and write
4A3000F94000
trusted library allocation
page read and write
2CBA5FE000
stack
page read and write
4A3001694000
trusted library allocation
page read and write
BDD000
stack
page read and write
47F0000
heap
page read and write
766C002A0000
trusted library allocation
page read and write
4A30007B8000
trusted library allocation
page read and write
330F000
stack
page read and write
3B4F000
stack
page read and write
1D29A000
heap
page read and write
1631807A000
heap
page read and write
4A3001468000
trusted library allocation
page read and write
23300000
trusted library allocation
page read and write
4A3001658000
trusted library allocation
page read and write
1631806B000
heap
page read and write
1D29F000
heap
page read and write
4A3000DE8000
trusted library allocation
page read and write
4A3001AFC000
trusted library allocation
page read and write
1631806A000
heap
page read and write
4A30005DB000
trusted library allocation
page read and write
4A30015DC000
trusted library allocation
page read and write
4A300038C000
trusted library allocation
page read and write
4A3001864000
trusted library allocation
page read and write
4A3000AAC000
trusted library allocation
page read and write
4A3000BE6000
trusted library allocation
page read and write
1631C930000
heap
page read and write
430E000
stack
page read and write
1D270000
heap
page read and write
766C002C0000
trusted library allocation
page read and write
4A3000DA4000
trusted library allocation
page read and write
1631807A000
heap
page read and write
320F000
stack
page read and write
4A3000F54000
trusted library allocation
page read and write
1D2A1000
heap
page read and write
FA4000
heap
page read and write
4A3001C6C000
trusted library allocation
page read and write
1190000
heap
page read and write
4A3000834000
trusted library allocation
page read and write
4A3000A0C000
trusted library allocation
page read and write
4A3000DB0000
trusted library allocation
page read and write
4A3000474000
trusted library allocation
page read and write
4A30004EC000
trusted library allocation
page read and write
6FD000320000
trusted library allocation
page read and write
16318070000
heap
page read and write
4A3001728000
trusted library allocation
page read and write
4A3000398000
trusted library allocation
page read and write
4A300079C000
trusted library allocation
page read and write
2CAADFE000
unkown
page readonly
16318074000
heap
page read and write
2CC35FE000
stack
page read and write
2CEE000
stack
page read and write
16318074000
heap
page read and write
16318063000
heap
page read and write
1631806B000
heap
page read and write
6FD000744000
trusted library allocation
page read and write
There are 1731 hidden memdumps, click here to show them.