IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\FCGIJKJJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHDHDGHJEBGIDGDGIJJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HCFIJKKKKKFCAAAAFBKF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\HIIIJDAAAAAAKECBFBAE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IECFHDBAAECAAKFHDHIIJKFHJE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IJEHCGIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFCAFIIDHIDGHIECGDGIDHCGCF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (4738)
downloaded
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=2320,i,17426783220369495163,5867397490255039380,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
https://google-ohttp-relay-join.fastly-edge.com/Ii
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://google-ohttp-relay-join.fastly-edge.com/=
unknown
https://google-ohttp-relay-join.fastly-edge.com/A
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/G
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/J
unknown
https://anglebug.com/7714
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/P
unknown
https://google-ohttp-relay-join.fastly-edge.com/W
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://google-ohttp-relay-join.fastly-edge.com/f
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://plus.google.com
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
https://google-ohttp-relay-join.fastly-edge.com/)k
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.186.110
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Java
unknown
https://google-ohttp-relay-join.fastly-edge.com/Jh
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://google-ohttp-relay-join.fastly-edge.com/Vi
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
http://anglebug.com/4384
unknown
https://google-ohttp-relay-join.fastly-edge.com/eh
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllrverAp
unknown
https://google-ohttp-relay-join.fastly-edge.com/3k
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://domains.google.com/suggest/flow
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dll-progrU
unknown
https://google-ohttp-relay-join.fastly-edge.com/hh
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.186.110
play.google.com
142.250.185.110
www.google.com
142.250.185.100
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
142.250.186.110
plus.l.google.com
United States
142.250.185.110
play.google.com
United States
142.250.185.100
www.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
C11000
unkown
page execute and read and write
malicious
19BE000
heap
page read and write
malicious
5670000
direct allocation
page read and write
malicious
1F3C00F3C000
trusted library allocation
page read and write
51E1000
heap
page read and write
51D0000
direct allocation
page read and write
1F3C0033C000
trusted library allocation
page read and write
EFA000
unkown
page execute and read and write
1F3C01690000
trusted library allocation
page read and write
1F3C01B68000
trusted library allocation
page read and write
1F3C001E4000
trusted library allocation
page read and write
3EEF000
stack
page read and write
1F3C01A24000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
2BC0002A0000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C009BC000
trusted library allocation
page read and write
1F3C01718000
trusted library allocation
page read and write
3B6E000
stack
page read and write
1F3C01A9C000
trusted library allocation
page read and write
6C57E000
unkown
page read and write
6C7F1000
unkown
page readonly
1F3C00C7C000
trusted library allocation
page read and write
1F3C01A5C000
trusted library allocation
page read and write
1F3C0178C000
trusted library allocation
page read and write
1F3C00FB8000
trusted library allocation
page read and write
1F3C00328000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B0467AF000
heap
page read and write
1DCB7000
heap
page read and write
1F3C01940000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C01688000
trusted library allocation
page read and write
1F3C00C84000
trusted library allocation
page read and write
1F3C00F20000
trusted library allocation
page read and write
1F3C0171C000
trusted library allocation
page read and write
19B8000
heap
page read and write
1F3C002F0000
trusted library allocation
page read and write
1F3C00314000
trusted library allocation
page read and write
1DCBA000
heap
page read and write
4C94006E0000
trusted library allocation
page read and write
1F3C016D0000
trusted library allocation
page read and write
1F3C01380000
trusted library allocation
page read and write
1F3C01558000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
3DEE000
stack
page read and write
1F3C00C6C000
trusted library allocation
page read and write
1F3C00294000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1B046D26000
heap
page read and write
1B0467B5000
heap
page read and write
1F3C02CF0000
trusted library allocation
page read and write
1F3C01788000
trusted library allocation
page read and write
4C9400760000
trusted library allocation
page read and write
1F3C00C6C000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
4C9400654000
trusted library allocation
page read and write
2BC0002C0000
trusted library allocation
page read and write
1F3C002F0000
trusted library allocation
page read and write
D7E000
unkown
page execute and read and write
1F3C01A28000
trusted library allocation
page read and write
1B0467A3000
heap
page read and write
1B0467C8000
heap
page read and write
1DCB6000
heap
page read and write
1A33000
heap
page read and write
1F3C01628000
trusted library allocation
page read and write
4C94006D0000
trusted library allocation
page read and write
2BC0002A4000
trusted library allocation
page read and write
4C9400714000
trusted library allocation
page read and write
1B0467BF000
heap
page read and write
1F3C015C8000
trusted library allocation
page read and write
1F3C019BC000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1F3C0157C000
trusted library allocation
page read and write
1F3C00DE0000
trusted library allocation
page read and write
1B04679C000
heap
page read and write
406E000
stack
page read and write
4C9400310000
trusted library allocation
page read and write
1F3C01668000
trusted library allocation
page read and write
2BC0002C0000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B0467D7000
heap
page read and write
51E1000
heap
page read and write
4C94006B0000
trusted library allocation
page read and write
1F3C00F88000
trusted library allocation
page read and write
1F3C01758000
trusted library allocation
page read and write
3590000
heap
page read and write
1F3C01610000
trusted library allocation
page read and write
11A1000
unkown
page execute and write copy
1F3C00330000
trusted library allocation
page read and write
1F3C019F4000
trusted library allocation
page read and write
1F3C01298000
trusted library allocation
page read and write
2BC000248000
trusted library allocation
page read and write
51E1000
heap
page read and write
354F000
stack
page read and write
1F3C015A0000
trusted library allocation
page read and write
1F3C00234000
trusted library allocation
page read and write
3A2E000
stack
page read and write
1F3C00F04000
trusted library allocation
page read and write
1F3C02D14000
trusted library allocation
page read and write
1F3C01A4C000
trusted library allocation
page read and write
1F3C014E0000
trusted library allocation
page read and write
4C9400354000
trusted library allocation
page read and write
23D20000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1189000
unkown
page execute and read and write
1F3C01964000
trusted library allocation
page read and write
1B0467AE000
heap
page read and write
51E1000
heap
page read and write
23E60000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1DCD8000
heap
page read and write
1F3C001AC000
trusted library allocation
page read and write
1DCA6000
heap
page read and write
51E1000
heap
page read and write
1F3C00294000
trusted library allocation
page read and write
1DCB6000
heap
page read and write
1B043376000
heap
page read and write
E78000
unkown
page execute and read and write
1DCBA000
heap
page read and write
51E1000
heap
page read and write
1F3C00F3C000
trusted library allocation
page read and write
1F3C0183C000
trusted library allocation
page read and write
4C9400630000
trusted library allocation
page read and write
1DCCE000
heap
page read and write
1B0467AF000
heap
page read and write
1B046D94000
heap
page read and write
1B0467AF000
heap
page read and write
1F3C003DC000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1F3C009BC000
trusted library allocation
page read and write
1F3C00C94000
trusted library allocation
page read and write
1F3C01754000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C00C6C000
trusted library allocation
page read and write
1F3C002F0000
trusted library allocation
page read and write
1F3C00328000
trusted library allocation
page read and write
1F3C01570000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
466F000
stack
page read and write
35A7000
heap
page read and write
1F3C012BC000
trusted library allocation
page read and write
1F3C01BB4000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1B0467B3000
heap
page read and write
4C9400320000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1B0467AF000
heap
page read and write
1F3C016B4000
trusted library allocation
page read and write
1F3C01390000
trusted library allocation
page read and write
1F3C00BE4000
trusted library allocation
page read and write
1F3C01A50000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C00A14000
trusted library allocation
page read and write
1B0467E1000
heap
page read and write
1F3C00F10000
trusted library allocation
page read and write
1F3C016E4000
trusted library allocation
page read and write
1F3C00C84000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C01A34000
trusted library allocation
page read and write
1F3C01708000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C01A70000
trusted library allocation
page read and write
3C6E000
stack
page read and write
1F3C01238000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1F3C01AD0000
trusted library allocation
page read and write
1B046DC6000
heap
page read and write
51D0000
direct allocation
page read and write
1B0467D6000
heap
page read and write
1B0467B5000
heap
page read and write
1F3C0140C000
trusted library allocation
page read and write
36AF000
stack
page read and write
4C9400734000
trusted library allocation
page read and write
51F0000
heap
page read and write
1B0467AD000
heap
page read and write
51E1000
heap
page read and write
1B046D9C000
heap
page read and write
51E1000
heap
page read and write
35AE000
heap
page read and write
57E0000
direct allocation
page execute and read and write
23EFF000
heap
page read and write
1F3C00C6C000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C012BC000
trusted library allocation
page read and write
1B046DB7000
heap
page read and write
2BC0002C8000
trusted library allocation
page read and write
1F3C01750000
trusted library allocation
page read and write
51E1000
heap
page read and write
1DC9D000
heap
page read and write
1F3C014F4000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C017EC000
trusted library allocation
page read and write
2BC0002A4000
trusted library allocation
page read and write
1F3C018F8000
trusted library allocation
page read and write
5800000
direct allocation
page execute and read and write
23D61000
heap
page read and write
1F3C01540000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
51E1000
heap
page read and write
61ED3000
direct allocation
page read and write
1F3C00FC4000
trusted library allocation
page read and write
1F3C00220000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
1B0467B6000
heap
page read and write
1F3C00FA0000
trusted library allocation
page read and write
1B0467BF000
heap
page read and write
1B0467BA000
heap
page read and write
61ECD000
direct allocation
page readonly
1F3C01534000
trusted library allocation
page read and write
1F3C003DC000
trusted library allocation
page read and write
1730000
heap
page read and write
1DCCE000
heap
page read and write
1F3C01B50000
trusted library allocation
page read and write
1F3C014BC000
trusted library allocation
page read and write
19AE000
stack
page read and write
1B0467AF000
heap
page read and write
19B0000
heap
page read and write
61ECC000
direct allocation
page read and write
1B0467B5000
heap
page read and write
1F3C002E3000
trusted library allocation
page read and write
1F3C01590000
trusted library allocation
page read and write
1F3C01594000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C016F8000
trusted library allocation
page read and write
1DCA6000
heap
page read and write
18BE000
stack
page read and write
1F3C0181C000
trusted library allocation
page read and write
1F3C01554000
trusted library allocation
page read and write
1B046DAA000
heap
page read and write
51E1000
heap
page read and write
1F3C0175C000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1F3C017D4000
trusted library allocation
page read and write
1F3C01530000
trusted library allocation
page read and write
1F3C01018000
trusted library allocation
page read and write
4C9400758000
trusted library allocation
page read and write
1F3C012E0000
trusted library allocation
page read and write
1F3C00BF4000
trusted library allocation
page read and write
1D99F000
stack
page read and write
51E1000
heap
page read and write
1F3C01268000
trusted library allocation
page read and write
1DCCE000
heap
page read and write
23D20000
trusted library allocation
page read and write
4C9400330000
trusted library allocation
page read and write
1F3C01368000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C016B0000
trusted library allocation
page read and write
1F3C015F4000
trusted library allocation
page read and write
1DDB0000
trusted library allocation
page read and write
1F3C00A14000
trusted library allocation
page read and write
1F3C019C4000
trusted library allocation
page read and write
1B0467D7000
heap
page read and write
1B0467AD000
heap
page read and write
1F3C01848000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C017A4000
trusted library allocation
page read and write
1DCD4000
heap
page read and write
192E000
stack
page read and write
1B046D86000
heap
page read and write
C3C000
unkown
page execute and read and write
51E1000
heap
page read and write
1F3C01674000
trusted library allocation
page read and write
2BC0002A0000
trusted library allocation
page read and write
4C940085C000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1F3C01670000
trusted library allocation
page read and write
1DC2C000
stack
page read and write
1F3C01A64000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C00328000
trusted library allocation
page read and write
4E2E000
stack
page read and write
1F3C017B8000
trusted library allocation
page read and write
1DDB2000
heap
page read and write
1B0467AF000
heap
page read and write
1B0467B5000
heap
page read and write
1B046D79000
heap
page read and write
1F3C00C6C000
trusted library allocation
page read and write
1B046D8A000
heap
page read and write
1CAE000
stack
page read and write
1F3C01658000
trusted library allocation
page read and write
23F07000
heap
page read and write
1F3C012BC000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1F3C00A14000
trusted library allocation
page read and write
1B046D86000
heap
page read and write
57D0000
direct allocation
page execute and read and write
51D0000
direct allocation
page read and write
4C9400248000
trusted library allocation
page read and write
1F3C00F64000
trusted library allocation
page read and write
51E1000
heap
page read and write
1DCC0000
heap
page read and write
1B0467B5000
heap
page read and write
1B046DF6000
heap
page read and write
51E1000
heap
page read and write
1F3C01A44000
trusted library allocation
page read and write
16F2000
stack
page read and write
1F3C0162C000
trusted library allocation
page read and write
1F3C014CC000
trusted library allocation
page read and write
1F3C00F04000
trusted library allocation
page read and write
1BAE000
stack
page read and write
1F3C001B4000
trusted library allocation
page read and write
1F3C0100C000
trusted library allocation
page read and write
4C940069C000
trusted library allocation
page read and write
1F3C00294000
trusted library allocation
page read and write
11A1000
unkown
page execute and read and write
51E1000
heap
page read and write
1F3C01A88000
trusted library allocation
page read and write
1F3C01A68000
trusted library allocation
page read and write
1F3C017E4000
trusted library allocation
page read and write
1F3C00F88000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
1F3C00394000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
1F3C00BE8000
trusted library allocation
page read and write
1F3C00F10000
trusted library allocation
page read and write
1F3C019F0000
trusted library allocation
page read and write
4C940080C000
trusted library allocation
page read and write
1F3C0033C000
trusted library allocation
page read and write
1F3C0192C000
trusted library allocation
page read and write
1F3C01784000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
4A2F000
stack
page read and write
1F3C016E0000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
C11000
unkown
page execute and write copy
1F3C01700000
trusted library allocation
page read and write
1F3C016E8000
trusted library allocation
page read and write
4C9400418000
trusted library allocation
page read and write
1B0467E1000
heap
page read and write
1F3C019C0000
trusted library allocation
page read and write
1F3C002A8000
trusted library allocation
page read and write
1F3C01238000
trusted library allocation
page read and write
1F3C0022C000
trusted library allocation
page read and write
35A0000
heap
page read and write
1F3C015E8000
trusted library allocation
page read and write
1F3C01268000
trusted library allocation
page read and write
4CAF000
stack
page read and write
1DAED000
stack
page read and write
1F3C00294000
trusted library allocation
page read and write
18D5000
heap
page read and write
1B0467AF000
heap
page read and write
1B046DD6000
heap
page read and write
1F3C01344000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B0467D7000
heap
page read and write
1F3C019E0000
trusted library allocation
page read and write
1F3C01AE0000
trusted library allocation
page read and write
1DCBF000
heap
page read and write
1F3C017A0000
trusted library allocation
page read and write
5820000
direct allocation
page execute and read and write
51D0000
direct allocation
page read and write
51AF000
stack
page read and write
51E1000
heap
page read and write
1191000
unkown
page execute and read and write
523E000
heap
page read and write
1F3C0166C000
trusted library allocation
page read and write
1F3C017A8000
trusted library allocation
page read and write
1F3C00F64000
trusted library allocation
page read and write
1B046D70000
heap
page read and write
1B0467BA000
heap
page read and write
1341000
unkown
page execute and read and write
1F3C00BE8000
trusted library allocation
page read and write
4C94006F0000
trusted library allocation
page read and write
1F3C01AAC000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
1B0467A8000
heap
page read and write
1B0467BA000
heap
page read and write
1F3C00BE4000
trusted library allocation
page read and write
1F3C01500000
trusted library allocation
page read and write
1DCD9000
heap
page read and write
51E1000
heap
page read and write
1F3C018F8000
trusted library allocation
page read and write
1F3C01984000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1B0467B5000
heap
page read and write
51E1000
heap
page read and write
1F3C01654000
trusted library allocation
page read and write
4C9400624000
trusted library allocation
page read and write
1DC9B000
heap
page read and write
1B0467BA000
heap
page read and write
1B0467AF000
heap
page read and write
1F3C01C04000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C0029A000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
C10000
unkown
page read and write
1F3C0198C000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1B0467AF000
heap
page read and write
4C9400354000
trusted library allocation
page read and write
4C9400424000
trusted library allocation
page read and write
1F3C01298000
trusted library allocation
page read and write
1F3C01A98000
trusted library allocation
page read and write
1F3C0174C000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C00C40000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1D5BF000
stack
page read and write
51E1000
heap
page read and write
1DCCE000
heap
page read and write
1F3C019EC000
trusted library allocation
page read and write
1F3C0033C000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
4C940035C000
trusted library allocation
page read and write
1F3C01158000
trusted library allocation
page read and write
1F3C002A8000
trusted library allocation
page read and write
1F3C01AB0000
trusted library allocation
page read and write
1F3C00F10000
trusted library allocation
page read and write
1F3C006F8000
trusted library allocation
page read and write
3DAF000
stack
page read and write
57F0000
direct allocation
page execute and read and write
492E000
stack
page read and write
1F3C00CE4000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
16FD000
stack
page read and write
1B046DB9000
heap
page read and write
1F3C01960000
trusted library allocation
page read and write
1DCA6000
heap
page read and write
1DCB8000
heap
page read and write
1F3C00F04000
trusted library allocation
page read and write
6C790000
unkown
page readonly
1F3C01A20000
trusted library allocation
page read and write
1B046D92000
heap
page read and write
6C56D000
unkown
page readonly
1F3C01640000
trusted library allocation
page read and write
1DCC0000
heap
page read and write
1B046DE6000
heap
page read and write
4C940033C000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C01684000
trusted library allocation
page read and write
1F3C00F04000
trusted library allocation
page read and write
1F3C01018000
trusted library allocation
page read and write
1B046D3C000
heap
page read and write
1F3C00480000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B046D3C000
heap
page read and write
1F3C01950000
trusted library allocation
page read and write
1F3C00FD8000
trusted library allocation
page read and write
402F000
stack
page read and write
4C9400640000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C001F8000
trusted library allocation
page read and write
1DCA6000
heap
page read and write
1F3C014F0000
trusted library allocation
page read and write
57AF000
stack
page read and write
1F3C01298000
trusted library allocation
page read and write
4C940033C000
trusted library allocation
page read and write
1F3C013CC000
trusted library allocation
page read and write
1F3C02B88000
trusted library allocation
page read and write
1F3C00294000
trusted library allocation
page read and write
1A02000
heap
page read and write
51E1000
heap
page read and write
1B0467BA000
heap
page read and write
1DCB6000
heap
page read and write
1F3C01650000
trusted library allocation
page read and write
4C9400698000
trusted library allocation
page read and write
4C94003EC000
trusted library allocation
page read and write
1F3C00294000
trusted library allocation
page read and write
4C9400704000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
51E1000
heap
page read and write
1F3C00C84000
trusted library allocation
page read and write
1DCBC000
heap
page read and write
1F3C00C84000
trusted library allocation
page read and write
1F3C014EC000
trusted library allocation
page read and write
4C94006CC000
trusted library allocation
page read and write
1F3C01244000
trusted library allocation
page read and write
43EF000
stack
page read and write
51D0000
direct allocation
page read and write
1F3C00C6C000
trusted library allocation
page read and write
1B046DB7000
heap
page read and write
1F3C0169C000
trusted library allocation
page read and write
1DCBD000
heap
page read and write
1B0467AF000
heap
page read and write
1B046D8F000
heap
page read and write
23D81000
heap
page read and write
1DCB7000
heap
page read and write
23D40000
heap
page read and write
1F3C013AC000
trusted library allocation
page read and write
4C9400788000
trusted library allocation
page read and write
68E800244000
direct allocation
page read and write
C10000
unkown
page readonly
1F3C01278000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1F3C015B4000
trusted library allocation
page read and write
1F3C00F64000
trusted library allocation
page read and write
1B046D8A000
heap
page read and write
1B0467AC000
heap
page read and write
1B0467AF000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1F3C00298000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C00214000
trusted library allocation
page read and write
1F3C014E8000
trusted library allocation
page read and write
1F3C00F88000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
23D20000
heap
page read and write
1F3C012FC000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1F3C01704000
trusted library allocation
page read and write
1DB2E000
stack
page read and write
1F3C01634000
trusted library allocation
page read and write
1F3C0036C000
trusted library allocation
page read and write
1F3C00C94000
trusted library allocation
page read and write
4C9400390000
trusted library allocation
page read and write
1DCA6000
heap
page read and write
1F3C019A0000
trusted library allocation
page read and write
4B6F000
stack
page read and write
1B0467BA000
heap
page read and write
1DCBA000
heap
page read and write
1B0467E1000
heap
page read and write
1B04679C000
heap
page read and write
1F3C00294000
trusted library allocation
page read and write
1F3C00C94000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C01990000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C0122C000
trusted library allocation
page read and write
1B0467B7000
heap
page read and write
1DCC3000
heap
page read and write
1F3C017E8000
trusted library allocation
page read and write
1F3C002B4000
trusted library allocation
page read and write
1DCBA000
heap
page read and write
1F3C001DC000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C00228000
trusted library allocation
page read and write
1F3C01B5C000
trusted library allocation
page read and write
1F3C01B00000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C01698000
trusted library allocation
page read and write
1B046D70000
heap
page read and write
1F3C00F20000
trusted library allocation
page read and write
1F3C012E0000
trusted library allocation
page read and write
1DCBA000
heap
page read and write
1F3C00394000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1B0467BA000
heap
page read and write
1B0467A3000
heap
page read and write
1B0467A3000
heap
page read and write
1F3C017CC000
trusted library allocation
page read and write
1F3C00210000
trusted library allocation
page read and write
1F3C013CC000
trusted library allocation
page read and write
1B04679E000
heap
page read and write
1B0467BA000
heap
page read and write
4C9400668000
trusted library allocation
page read and write
1F3C00C24000
trusted library allocation
page read and write
1F3C0036C000
trusted library allocation
page read and write
1DCBF000
heap
page read and write
39EF000
stack
page read and write
4C9400754000
trusted library allocation
page read and write
1DC92000
heap
page read and write
1F3C00308000
trusted library allocation
page read and write
1B046DF6000
heap
page read and write
1B0467AF000
heap
page read and write
1DCC0000
heap
page read and write
51E0000
heap
page read and write
51E1000
heap
page read and write
1B0467C0000
heap
page read and write
1B0467BA000
heap
page read and write
1F3C001F0000
trusted library allocation
page read and write
1F3C019D4000
trusted library allocation
page read and write
4C9400658000
trusted library allocation
page read and write
1F3C01694000
trusted library allocation
page read and write
16F8000
stack
page read and write
2BC0002C0000
trusted library allocation
page read and write
1F3C01260000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1F3C0173C000
trusted library allocation
page read and write
1F3C003DC000
trusted library allocation
page read and write
1F3C01A78000
trusted library allocation
page read and write
1F3C015CC000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
46AE000
stack
page read and write
1F3C01E4F000
trusted library allocation
page read and write
1F3C014BC000
trusted library allocation
page read and write
4C9400320000
trusted library allocation
page read and write
1F3C00294000
trusted library allocation
page read and write
1F3C01AC0000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1A17000
heap
page read and write
4C9400684000
trusted library allocation
page read and write
1F3C00CE4000
trusted library allocation
page read and write
1F3C01630000
trusted library allocation
page read and write
1F3C024D4000
trusted library allocation
page read and write
1F3C01598000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1B0467C3000
heap
page read and write
1B0467BA000
heap
page read and write
51D0000
direct allocation
page read and write
1F3C00C94000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1DCCE000
heap
page read and write
4C9400614000
trusted library allocation
page read and write
4C94006E4000
trusted library allocation
page read and write
1B0467C5000
heap
page read and write
1F3C01740000
trusted library allocation
page read and write
47AF000
stack
page read and write
1F3C0116C000
trusted library allocation
page read and write
2BC0002A0000
trusted library allocation
page read and write
E7E000
unkown
page execute and read and write
1F3C002F0000
trusted library allocation
page read and write
2BC0002A0000
trusted library allocation
page read and write
51E1000
heap
page read and write
6C76F000
unkown
page write copy
1F3C01BCC000
trusted library allocation
page read and write
1B0467D7000
heap
page read and write
1F3C01A74000
trusted library allocation
page read and write
1F3C01BA8000
trusted library allocation
page read and write
1F3C00294000
trusted library allocation
page read and write
3CAE000
stack
page read and write
1F3C002FC000
trusted library allocation
page read and write
51B0000
heap
page read and write
1F3C01954000
trusted library allocation
page read and write
1DCC3000
heap
page read and write
1B0467AF000
heap
page read and write
3F2E000
stack
page read and write
1F3C00328000
trusted library allocation
page read and write
196B000
stack
page read and write
1F3C00F04000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1B0467AA000
heap
page read and write
1DCA9000
heap
page read and write
1F3C00328000
trusted library allocation
page read and write
42EE000
stack
page read and write
23DEA000
heap
page read and write
1F3C0179C000
trusted library allocation
page read and write
1F3C0020C000
trusted library allocation
page read and write
1F3C001B4000
trusted library allocation
page read and write
1163000
unkown
page execute and read and write
1F3C00BE4000
trusted library allocation
page read and write
4C9400750000
trusted library allocation
page read and write
1F3C01B50000
trusted library allocation
page read and write
4C9400644000
trusted library allocation
page read and write
2BC0002A0000
trusted library allocation
page read and write
CF6000
unkown
page execute and read and write
51E1000
heap
page read and write
1B0467B5000
heap
page read and write
4C940040C000
trusted library allocation
page read and write
1F3C0155C000
trusted library allocation
page read and write
4C9400694000
trusted library allocation
page read and write
23F04000
heap
page read and write
51E1000
heap
page read and write
1B0467BD000
heap
page read and write
1B046D33000
heap
page read and write
1F3C00224000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
4C94002FC000
trusted library allocation
page read and write
1DCD9000
heap
page read and write
1F3C01068000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B046799000
heap
page read and write
1F3C01A0C000
trusted library allocation
page read and write
4A6E000
stack
page read and write
61EB4000
direct allocation
page read and write
6C582000
unkown
page readonly
1B0467AF000
heap
page read and write
1D5FE000
stack
page read and write
1B0467B5000
heap
page read and write
51E1000
heap
page read and write
6C837000
unkown
page read and write
47ED000
stack
page read and write
1F3C01324000
trusted library allocation
page read and write
1F3C01358000
trusted library allocation
page read and write
1F3C001D8000
trusted library allocation
page read and write
1F3C01930000
trusted library allocation
page read and write
1F3C0036C000
trusted library allocation
page read and write
4C94006B4000
trusted library allocation
page read and write
6C775000
unkown
page readonly
1DCC0000
heap
page read and write
4C9400610000
trusted library allocation
page read and write
1F3C016A8000
trusted library allocation
page read and write
1B046D96000
heap
page read and write
1B04679F000
heap
page read and write
1B0467B5000
heap
page read and write
1F3C00E24000
trusted library allocation
page read and write
DB7000
unkown
page execute and read and write
1F3C01790000
trusted library allocation
page read and write
1B046D82000
heap
page read and write
1F3C01A3C000
trusted library allocation
page read and write
1D6FF000
stack
page read and write
1F3C024B8000
trusted library allocation
page read and write
1DCB3000
heap
page read and write
6C590000
unkown
page readonly
1F3C01A40000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C016AC000
trusted library allocation
page read and write
1F3C015F8000
trusted library allocation
page read and write
DBA000
unkown
page execute and read and write
1DCA0000
heap
page read and write
1F3C024A6000
trusted library allocation
page read and write
57F0000
direct allocation
page execute and read and write
1F3C01034000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
4C94006C8000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
1F3C015B8000
trusted library allocation
page read and write
51E1000
heap
page read and write
1DCD6000
heap
page read and write
1F3C01AA0000
trusted library allocation
page read and write
56AC000
stack
page read and write
1B0467BA000
heap
page read and write
1B0467B5000
heap
page read and write
1F3C017D0000
trusted library allocation
page read and write
4C94006BC000
trusted library allocation
page read and write
1F3C002F0000
trusted library allocation
page read and write
1F3C01780000
trusted library allocation
page read and write
1F3C00BE4000
trusted library allocation
page read and write
1DCB4000
heap
page read and write
1DC90000
heap
page read and write
1F3C009BC000
trusted library allocation
page read and write
4C9400380000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
6C76E000
unkown
page read and write
1F3C0153C000
trusted library allocation
page read and write
1DCD7000
heap
page read and write
37AF000
stack
page read and write
38AF000
stack
page read and write
1F3C024BA000
trusted library allocation
page read and write
4C9400678000
trusted library allocation
page read and write
2BC0002B0000
trusted library allocation
page read and write
1F3C002F0000
trusted library allocation
page read and write
358E000
stack
page read and write
6C4F1000
unkown
page execute read
1F3C018F8000
trusted library allocation
page read and write
1F3C0194C000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B0467BA000
heap
page read and write
1B046D84000
heap
page read and write
1F3C00328000
trusted library allocation
page read and write
1F3C019A8000
trusted library allocation
page read and write
1DCBD000
heap
page read and write
1F3C01974000
trusted library allocation
page read and write
1F3C01AA4000
trusted library allocation
page read and write
1F3C00FD8000
trusted library allocation
page read and write
4C9400330000
trusted library allocation
page read and write
6C72F000
unkown
page readonly
51E1000
heap
page read and write
1F3C01370000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1DCCF000
heap
page read and write
50AE000
stack
page read and write
1F3C0139C000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B046D1E000
heap
page read and write
1F3C013CC000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
23F0D000
heap
page read and write
1F3C0033C000
trusted library allocation
page read and write
1DCA6000
heap
page read and write
1F3C00FB8000
trusted library allocation
page read and write
1DCC0000
heap
page read and write
4F6E000
stack
page read and write
1F3C002F0000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C009BC000
trusted library allocation
page read and write
11A2000
unkown
page execute and write copy
2BC0002E4000
trusted library allocation
page read and write
1F3C012BC000
trusted library allocation
page read and write
1F3C01AA8000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1B0467D1000
heap
page read and write
51E1000
heap
page read and write
1F3C01903000
trusted library allocation
page read and write
1DCD5000
heap
page read and write
1B0467AF000
heap
page read and write
1F3C0180C000
trusted library allocation
page read and write
1B046D82000
heap
page read and write
1B0467D7000
heap
page read and write
1F3C00F64000
trusted library allocation
page read and write
1B046797000
heap
page read and write
57F0000
direct allocation
page execute and read and write
1DCCE000
heap
page read and write
1DCB3000
heap
page read and write
4BAE000
stack
page read and write
1F3C0033C000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C00F88000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C0151C000
trusted library allocation
page read and write
1F3C01901000
trusted library allocation
page read and write
1B0467D7000
heap
page read and write
1B0467AF000
heap
page read and write
52E0000
trusted library allocation
page read and write
6C791000
unkown
page execute read
4C94006D4000
trusted library allocation
page read and write
1342000
unkown
page execute and write copy
1F3C01034000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C00BE8000
trusted library allocation
page read and write
1DCB9000
heap
page read and write
51E1000
heap
page read and write
1F3C00F04000
trusted library allocation
page read and write
1F3C01018000
trusted library allocation
page read and write
1F3C00330000
trusted library allocation
page read and write
1DCCE000
heap
page read and write
1F3C001F4000
trusted library allocation
page read and write
4C9400700000
trusted library allocation
page read and write
1F3C0190C000
trusted library allocation
page read and write
1F3C00218000
trusted library allocation
page read and write
1DCBF000
heap
page read and write
1DCB3000
heap
page read and write
1F3C003DC000
trusted library allocation
page read and write
1F3C0172C000
trusted library allocation
page read and write
1F3C01A6C000
trusted library allocation
page read and write
1F3C00DE4000
trusted library allocation
page read and write
13DC000
stack
page read and write
1F3C01664000
trusted library allocation
page read and write
1F3C00394000
trusted library allocation
page read and write
1DCB8000
heap
page read and write
1F3C00BE4000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
1F3C01100000
trusted library allocation
page read and write
1F3C01A48000
trusted library allocation
page read and write
1F3C0029A000
trusted library allocation
page read and write
1F3C00C94000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
442E000
stack
page read and write
1F3C00C84000
trusted library allocation
page read and write
1F3C01A1C000
trusted library allocation
page read and write
51E1000
heap
page read and write
6C770000
unkown
page read and write
1F3C014E4000
trusted library allocation
page read and write
416F000
stack
page read and write
51E1000
heap
page read and write
1F3C01AF4000
trusted library allocation
page read and write
5670000
direct allocation
page read and write
1F3C009BC000
trusted library allocation
page read and write
57FE000
stack
page read and write
61EB7000
direct allocation
page readonly
1DCC1000
heap
page read and write
1F3C0036C000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1F3C0036C000
trusted library allocation
page read and write
1F3C01AD0000
trusted library allocation
page read and write
1F3C01928000
trusted library allocation
page read and write
1F3C01738000
trusted library allocation
page read and write
1D9ED000
stack
page read and write
187E000
stack
page read and write
5200000
heap
page read and write
1DCC5000
heap
page read and write
1D83E000
stack
page read and write
1F3C001C8000
trusted library allocation
page read and write
5670000
direct allocation
page read and write
1F3C00BE4000
trusted library allocation
page read and write
D59000
unkown
page execute and read and write
1B0467D7000
heap
page read and write
6C4F0000
unkown
page readonly
1F3C00A14000
trusted library allocation
page read and write
4C9400408000
trusted library allocation
page read and write
1F3C001B4000
trusted library allocation
page read and write
1F3C00C94000
trusted library allocation
page read and write
1F3C0176C000
trusted library allocation
page read and write
1F3C01A60000
trusted library allocation
page read and write
6C839000
unkown
page readonly
1B0467B5000
heap
page read and write
452F000
stack
page read and write
1F3C01A38000
trusted library allocation
page read and write
1F3C0168C000
trusted library allocation
page read and write
4C9400368000
trusted library allocation
page read and write
1B0467D7000
heap
page read and write
4C9400688000
trusted library allocation
page read and write
1F3C00FB8000
trusted library allocation
page read and write
1F3C01970000
trusted library allocation
page read and write
51E1000
heap
page read and write
1B0467BA000
heap
page read and write
1F3C017AC000
trusted library allocation
page read and write
1F3C014C0000
trusted library allocation
page read and write
1B046DB9000
heap
page read and write
1B0467C5000
heap
page read and write
1B0467BA000
heap
page read and write
42AF000
stack
page read and write
1F3C016D4000
trusted library allocation
page read and write
1F3C002B4000
trusted library allocation
page read and write
1F3C019A4000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C00EC0000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C01ADC000
trusted library allocation
page read and write
1F3C00F20000
trusted library allocation
page read and write
1F3C01510000
trusted library allocation
page read and write
4C94006FC000
trusted library allocation
page read and write
4F2F000
stack
page read and write
1B0467BA000
heap
page read and write
1F3C01BC8000
trusted library allocation
page read and write
1B0467C4000
heap
page read and write
1F3C016B8000
trusted library allocation
page read and write
4C9400664000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
1F3C016FC000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1F3C01714000
trusted library allocation
page read and write
1F3C0021C000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C016CC000
trusted library allocation
page read and write
1B046DAA000
heap
page read and write
1F3C01580000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1F3C017BC000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
1B0467AF000
heap
page read and write
1DCCE000
heap
page read and write
1F3C00298000
trusted library allocation
page read and write
1F3C01624000
trusted library allocation
page read and write
506F000
stack
page read and write
1810000
heap
page read and write
4C9400320000
trusted library allocation
page read and write
1DCA6000
heap
page read and write
1F3C02D04000
trusted library allocation
page read and write
35AB000
heap
page read and write
1F3C01278000
trusted library allocation
page read and write
569B000
direct allocation
page read and write
1DCB7000
heap
page read and write
2BC0002C0000
trusted library allocation
page read and write
1F3C02CEC000
trusted library allocation
page read and write
51E1000
heap
page read and write
E58000
unkown
page execute and read and write
4C940060C000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1D73E000
stack
page read and write
1F3C00C94000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
4C9400620000
trusted library allocation
page read and write
6C591000
unkown
page execute read
456E000
stack
page read and write
1B0467BA000
heap
page read and write
1F3C00C7C000
trusted library allocation
page read and write
1B0467BA000
heap
page read and write
2BC0002C0000
trusted library allocation
page read and write
1F3C001D4000
trusted library allocation
page read and write
1F3C02D24000
trusted library allocation
page read and write
1D89E000
stack
page read and write
1F3C00E8C000
trusted library allocation
page read and write
38EE000
stack
page read and write
1F3C012E0000
trusted library allocation
page read and write
1B0467AF000
heap
page read and write
1B046D9C000
heap
page read and write
1F3C0066C000
trusted library allocation
page read and write
1B046DC6000
heap
page read and write
1F3C02AB8000
trusted library allocation
page read and write
1DCB8000
heap
page read and write
1F3C0156C000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1B0467D5000
heap
page read and write
DAB000
unkown
page execute and read and write
1F3C01560000
trusted library allocation
page read and write
4C9400730000
trusted library allocation
page read and write
1F3C01544000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
1F3C001EC000
trusted library allocation
page read and write
1F3C00330000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C00328000
trusted library allocation
page read and write
1B0467B5000
heap
page read and write
1F3C01388000
trusted library allocation
page read and write
4C94006E8000
trusted library allocation
page read and write
51F3000
heap
page read and write
1F3C00FC4000
trusted library allocation
page read and write
1F3C01620000
trusted library allocation
page read and write
1F3C0160C000
trusted library allocation
page read and write
1B0467BF000
heap
page read and write
51E1000
heap
page read and write
41AE000
stack
page read and write
1F3C001E8000
trusted library allocation
page read and write
1F3C01350000
trusted library allocation
page read and write
1089000
unkown
page execute and read and write
1F3C002E0000
trusted library allocation
page read and write
3B2F000
stack
page read and write
51E1000
heap
page read and write
1F3C00230000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
1DCBF000
heap
page read and write
51E1000
heap
page read and write
1F3C018FC000
trusted library allocation
page read and write
1F3C003DC000
trusted library allocation
page read and write
48EF000
stack
page read and write
1F3C001AC000
trusted library allocation
page read and write
1DCC5000
heap
page read and write
2BC0002D8000
trusted library allocation
page read and write
1F3C0033C000
trusted library allocation
page read and write
1F3C0031C000
trusted library allocation
page read and write
4C940039C000
trusted library allocation
page read and write
4C9400320000
trusted library allocation
page read and write
1F3C00328000
trusted library allocation
page read and write
1F3C00A14000
trusted library allocation
page read and write
1F3C01538000
trusted library allocation
page read and write
4CEE000
stack
page read and write
57C0000
direct allocation
page execute and read and write
1B0467AA000
heap
page read and write
51D0000
direct allocation
page read and write
1DCBA000
heap
page read and write
1F3C0139C000
trusted library allocation
page read and write
51E1000
heap
page read and write
2BC0002A0000
trusted library allocation
page read and write
1F3C001E0000
trusted library allocation
page read and write
1B0467B3000
heap
page read and write
23EFC000
heap
page read and write
61E01000
direct allocation
page execute read
D24000
unkown
page execute and read and write
1B0467B5000
heap
page read and write
18D0000
heap
page read and write
5810000
direct allocation
page execute and read and write
D8B000
unkown
page execute and read and write
1F3C0159C000
trusted library allocation
page read and write
1F3C015D0000
trusted library allocation
page read and write
1F3C01218000
trusted library allocation
page read and write
1B0467CC000
heap
page read and write
1B0467BA000
heap
page read and write
1DCB9000
heap
page read and write
1B0467AF000
heap
page read and write
51E1000
heap
page read and write
4DEF000
stack
page read and write
1B0467BA000
heap
page read and write
1F3C014D0000
trusted library allocation
page read and write
1F3C01AF0000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F3C00330000
trusted library allocation
page read and write
1F3C00C8A000
trusted library allocation
page read and write
1F3C00508000
trusted library allocation
page read and write
4C940075C000
trusted library allocation
page read and write
1F3C00ED8000
trusted library allocation
page read and write
There are 1013 hidden memdumps, click here to show them.