IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAEBAKKJKKEBKFIDBFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBAEHCAEGDHJKFHJKFIJKJEGHI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECGDHIDAAFHIIDGDBFIE
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\HDBKJEGIEBFHCAAKKEBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IEBFIEBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJDBAAEGDBKKECBGIJEBGDAEBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJJJKEHC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
modified
Chrome Cache Entry: 70
ASCII text, with very long lines (783)
downloaded
Chrome Cache Entry: 71
ASCII text
downloaded
Chrome Cache Entry: 72
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 73
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 74
SVG Scalable Vector Graphics image
downloaded
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2360,i,11729065314981487623,9119966847036491314,262144 /prefetch:8
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://109.107.157.132/955ccceeebf8214b/vcruntime140.dll
109.107.157.132
malicious
http://109.107.157.132/955ccceeebf8214b/nss3.dll
109.107.157.132
malicious
http://109.107.157.132/955ccceeebf8214b/freebl3.dll
109.107.157.132
malicious
http://109.107.157.132/
109.107.157.132
malicious
http://109.107.157.132/955ccceeebf8214b/softokn3.dll
109.107.157.132
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://109.107.157.132/7a5d4e643b804e99.php.
unknown
http://109.107.157.132/h
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
http://109.107.157.132/7a5d4e643b804e99.phpem
unknown
https://anglebug.com/7714
unknown
http://109.107.157.132/7a5d4e643b804e99.phpDHIDAAFHIIDGDBFIE
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
http://109.107.157.132/7a5d4e643b804e99.phpl
unknown
https://chrome.google.com/webstore
unknown
http://109.107.157.132/7a5d4e643b804e99.phpfi
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://109.107.157.132/7a5d4e643b804e99.phpv
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://109.107.157.132/7a5d4e643b804e99.phpH
unknown
http://anglebug.com/7556
unknown
http://109.107.157.132/7a5d4e643b804e99.phpLMA
unknown
https://drive-preprod.corp.google.com/
unknown
http://109.107.157.132/955ccceeebf8214b/nss3.dll&.
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://ocsp.sectigo.com0
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://109.107.157.132/7a5d4e643b804e99.phpVBG
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://109.107.157.132/955ccceeebf8214b/vcruntime140.dllcMf
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://anglebug.com/5906
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.217.21.36

IPs

IP
Domain
Country
Malicious
109.107.157.132
unknown
unknown
malicious
192.168.2.4
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2F57000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
362E000
heap
page read and write
malicious
183B7645000
heap
page read and write
183B7633000
heap
page read and write
183B7C52000
heap
page read and write
183B763F000
heap
page read and write
183B764F000
heap
page read and write
138800E60000
trusted library allocation
page read and write
2A14A000
heap
page read and write
23475000
heap
page read and write
6D000
unkown
page write copy
495E000
stack
page read and write
138800228000
trusted library allocation
page read and write
13880102C000
trusted library allocation
page read and write
23477000
heap
page read and write
1388022F0000
trusted library allocation
page read and write
138802A18000
trusted library allocation
page read and write
138802A48000
trusted library allocation
page read and write
1CCCF000
stack
page read and write
183B7648000
heap
page read and write
1388026DC000
trusted library allocation
page read and write
183B762D000
heap
page read and write
138802DD8000
trusted library allocation
page read and write
183B7639000
heap
page read and write
23450000
heap
page read and write
1388028BC000
trusted library allocation
page read and write
138801328000
trusted library allocation
page read and write
23470000
heap
page read and write
362A000
heap
page read and write
23487000
heap
page read and write
2345E000
heap
page read and write
183B763A000
heap
page read and write
36B0000
heap
page read and write
138802D78000
trusted library allocation
page read and write
23490000
heap
page read and write
1D3AD000
stack
page read and write
183B7C3C000
heap
page read and write
FFC00418000
trusted library allocation
page read and write
183B7C47000
heap
page read and write
183B7649000
heap
page read and write
23485000
heap
page read and write
31000
unkown
page execute read
183B763B000
heap
page read and write
2347F000
heap
page read and write
183B763E000
heap
page read and write
183B7639000
heap
page read and write
73000
unkown
page write copy
138802948000
trusted library allocation
page read and write
183B7C1C000
heap
page read and write
138800A34000
trusted library allocation
page read and write
183B7635000
heap
page read and write
2FE6000
heap
page read and write
183B7670000
heap
page read and write
183B7647000
heap
page read and write
138801320000
trusted library allocation
page read and write
183B763B000
heap
page read and write
73000
unkown
page write copy
23490000
heap
page read and write
183B7633000
heap
page read and write
138800338000
trusted library allocation
page read and write
183B763B000
heap
page read and write
183B7633000
heap
page read and write
183B7C3E000
heap
page read and write
23450000
trusted library allocation
page read and write
138802E40000
trusted library allocation
page read and write
1388026DC000
trusted library allocation
page read and write
2349B000
heap
page read and write
138802AFC000
trusted library allocation
page read and write
7748002C4000
trusted library allocation
page read and write
FFC00610000
trusted library allocation
page read and write
1388029AC000
trusted library allocation
page read and write
138800298000
trusted library allocation
page read and write
FFC00754000
trusted library allocation
page read and write
70000
unkown
page readonly
183B7681000
heap
page read and write
183B763B000
heap
page read and write
4A5F000
stack
page read and write
138801C73000
trusted library allocation
page read and write
2F10000
heap
page read and write
2347F000
heap
page read and write
183B763B000
heap
page read and write
23487000
heap
page read and write
138802B34000
trusted library allocation
page read and write
138802EB8000
trusted library allocation
page read and write
13880043C000
trusted library allocation
page read and write
183B7633000
heap
page read and write
23490000
heap
page read and write
138802D54000
trusted library allocation
page read and write
183B763E000
heap
page read and write
FFC00760000
trusted library allocation
page read and write
183B764F000
heap
page read and write
138802A94000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138801C75000
trusted library allocation
page read and write
2348E000
heap
page read and write
FFC00664000
trusted library allocation
page read and write
138800338000
trusted library allocation
page read and write
138800338000
trusted library allocation
page read and write
23477000
heap
page read and write
23719000
heap
page read and write
138802DBC000
trusted library allocation
page read and write
138802FB0000
trusted library allocation
page read and write
138800300000
trusted library allocation
page read and write
138802E84000
trusted library allocation
page read and write
1D3E1000
heap
page read and write
70000
unkown
page readonly
7748002A0000
trusted library allocation
page read and write
138802E0C000
trusted library allocation
page read and write
2F8D000
stack
page read and write
FFC00408000
trusted library allocation
page read and write
183B763F000
heap
page read and write
FFC00688000
trusted library allocation
page read and write
138800F60000
trusted library allocation
page read and write
2346C000
heap
page read and write
183B7647000
heap
page read and write
183B764F000
heap
page read and write
138800340000
trusted library allocation
page read and write
23490000
heap
page read and write
FFC00390000
trusted library allocation
page read and write
23721000
heap
page read and write
138802BB0000
trusted library allocation
page read and write
183B764F000
heap
page read and write
23485000
heap
page read and write
138802AD4000
trusted library allocation
page read and write
183B7C62000
heap
page read and write
1CA8E000
stack
page read and write
183B764C000
heap
page read and write
138802900000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138802FDC000
trusted library allocation
page read and write
138802B64000
trusted library allocation
page read and write
138800F60000
trusted library allocation
page read and write
138802C4C000
trusted library allocation
page read and write
138802D9C000
trusted library allocation
page read and write
138802DF0000
trusted library allocation
page read and write
183B7633000
heap
page read and write
1388001E8000
trusted library allocation
page read and write
2F97000
heap
page read and write
183BBDD5000
heap
page read and write
1388001F0000
trusted library allocation
page read and write
138800340000
trusted library allocation
page read and write
6F922000
unkown
page readonly
183B763E000
heap
page read and write
138802E2C000
trusted library allocation
page read and write
138800224000
trusted library allocation
page read and write
FFC0060C000
trusted library allocation
page read and write
138802A90000
trusted library allocation
page read and write
FFC00658000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138800F60000
trusted library allocation
page read and write
138802F54000
trusted library allocation
page read and write
2F50000
heap
page read and write
183B763E000
heap
page read and write
70000
unkown
page readonly
183B7649000
heap
page read and write
183B7647000
heap
page read and write
300C000
heap
page read and write
2FF4000
heap
page read and write
183B764F000
heap
page read and write
1388001D4000
trusted library allocation
page read and write
23470000
heap
page read and write
138800CBC000
trusted library allocation
page read and write
138802D9C000
trusted library allocation
page read and write
138800CAC000
trusted library allocation
page read and write
1388024DC000
trusted library allocation
page read and write
183B7635000
heap
page read and write
234F9000
heap
page read and write
3300000
heap
page read and write
1388029A4000
trusted library allocation
page read and write
1388009D3000
trusted library allocation
page read and write
183B7636000
heap
page read and write
183B7C32000
heap
page read and write
138800220000
trusted library allocation
page read and write
3620000
heap
page read and write
FFC00750000
trusted library allocation
page read and write
30000
unkown
page readonly
234F8000
heap
page read and write
183B763B000
heap
page read and write
13880292C000
trusted library allocation
page read and write
183B7628000
heap
page read and write
32FD000
stack
page read and write
7748002B8000
trusted library allocation
page read and write
138800EEC000
trusted library allocation
page read and write
183B7C4C000
heap
page read and write
138802BD0000
trusted library allocation
page read and write
183B7645000
heap
page read and write
7748002D8000
trusted library allocation
page read and write
1388001E0000
trusted library allocation
page read and write
183B7645000
heap
page read and write
183B764F000
heap
page read and write
138803030000
trusted library allocation
page read and write
138802968000
trusted library allocation
page read and write
1CE0E000
stack
page read and write
183B7647000
heap
page read and write
13880034C000
trusted library allocation
page read and write
138802A54000
trusted library allocation
page read and write
138802984000
trusted library allocation
page read and write
2346A000
heap
page read and write
2347F000
heap
page read and write
183B763E000
heap
page read and write
FFC006E0000
trusted library allocation
page read and write
23720000
heap
page read and write
1388009D1000
trusted library allocation
page read and write
183B763B000
heap
page read and write
183B764F000
heap
page read and write
13880034C000
trusted library allocation
page read and write
183B763E000
heap
page read and write
FFC006B0000
trusted library allocation
page read and write
1388009C8000
trusted library allocation
page read and write
183B763B000
heap
page read and write
138800484000
trusted library allocation
page read and write
13880164F000
trusted library allocation
page read and write
183B7649000
heap
page read and write
183B7647000
heap
page read and write
FFC00730000
trusted library allocation
page read and write
138802918000
trusted library allocation
page read and write
2346E000
heap
page read and write
138800CAC000
trusted library allocation
page read and write
183B763B000
heap
page read and write
13880021C000
trusted library allocation
page read and write
23487000
heap
page read and write
138802EE0000
trusted library allocation
page read and write
183B763F000
heap
page read and write
13880037C000
trusted library allocation
page read and write
138800394000
trusted library allocation
page read and write
138802D38000
trusted library allocation
page read and write
183B7625000
heap
page read and write
138800F14000
trusted library allocation
page read and write
70000
unkown
page readonly
23485000
heap
page read and write
FFC006C8000
trusted library allocation
page read and write
183B7C04000
heap
page read and write
6C431000
unkown
page execute read
1388028E0000
trusted library allocation
page read and write
FFC006F0000
trusted library allocation
page read and write
FFC0085C000
trusted library allocation
page read and write
183B763A000
heap
page read and write
2C7B000
stack
page read and write
2349B000
heap
page read and write
138800F60000
trusted library allocation
page read and write
23461000
heap
page read and write
138802BC4000
trusted library allocation
page read and write
138800DE0000
trusted library allocation
page read and write
7748002A0000
trusted library allocation
page read and write
183B7645000
heap
page read and write
330C000
heap
page read and write
183B7C47000
heap
page read and write
138802A34000
trusted library allocation
page read and write
183B7649000
heap
page read and write
1388030C4000
trusted library allocation
page read and write
13880037C000
trusted library allocation
page read and write
FFC00354000
trusted library allocation
page read and write
138800EEC000
trusted library allocation
page read and write
183B7682000
heap
page read and write
138802DA0000
trusted library allocation
page read and write
183B41AC000
heap
page read and write
138802DEC000
trusted library allocation
page read and write
183B7645000
heap
page read and write
234A0000
heap
page read and write
23461000
heap
page read and write
183B7666000
heap
page read and write
183B764A000
heap
page read and write
138802980000
trusted library allocation
page read and write
138800CAC000
trusted library allocation
page read and write
7748002B8000
trusted library allocation
page read and write
FFC00624000
trusted library allocation
page read and write
23727000
heap
page read and write
138800484000
trusted library allocation
page read and write
138802B88000
trusted library allocation
page read and write
183B7660000
heap
page read and write
1388001B4000
trusted library allocation
page read and write
183B763B000
heap
page read and write
183B7634000
heap
page read and write
183B7645000
heap
page read and write
138800300000
trusted library allocation
page read and write
183B763A000
heap
page read and write
138802B4C000
trusted library allocation
page read and write
183B7645000
heap
page read and write
73000
unkown
page write copy
1D2AE000
stack
page read and write
183B7C2E000
heap
page read and write
138802FA4000
trusted library allocation
page read and write
183B763E000
heap
page read and write
1388001B4000
trusted library allocation
page read and write
13880296C000
trusted library allocation
page read and write
138800F24000
trusted library allocation
page read and write
138800294000
trusted library allocation
page read and write
30000
unkown
page readonly
23680000
trusted library allocation
page read and write
2346D000
heap
page read and write
138802B84000
trusted library allocation
page read and write
138802B44000
trusted library allocation
page read and write
FFC0040C000
trusted library allocation
page read and write
138802AA0000
trusted library allocation
page read and write
183B763B000
heap
page read and write
23490000
heap
page read and write
FFC00678000
trusted library allocation
page read and write
183B7647000
heap
page read and write
138801388000
trusted library allocation
page read and write
23472000
heap
page read and write
183B7645000
heap
page read and write
138802AA4000
trusted library allocation
page read and write
138800FD4000
trusted library allocation
page read and write
2346A000
heap
page read and write
138800A34000
trusted library allocation
page read and write
138800F48000
trusted library allocation
page read and write
13880291C000
trusted library allocation
page read and write
6D000
unkown
page write copy
138800F14000
trusted library allocation
page read and write
31000
unkown
page execute read
7748002A8000
trusted library allocation
page read and write
1388002A4000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138800FE4000
trusted library allocation
page read and write
138802F38000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
183B7635000
heap
page read and write
1D20D000
stack
page read and write
138802E68000
trusted library allocation
page read and write
138800294000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138802BE0000
trusted library allocation
page read and write
7748002A0000
trusted library allocation
page read and write
2F0E000
stack
page read and write
2347F000
heap
page read and write
183B7645000
heap
page read and write
2FE0000
heap
page read and write
67000
unkown
page readonly
1388001AC000
trusted library allocation
page read and write
183B7650000
heap
page read and write
2347F000
heap
page read and write
23470000
heap
page read and write
183B7C7C000
heap
page read and write
183B7636000
heap
page read and write
183B763E000
heap
page read and write
138802D78000
trusted library allocation
page read and write
7748002A8000
trusted library allocation
page read and write
23485000
heap
page read and write
138802F18000
trusted library allocation
page read and write
23473000
heap
page read and write
183B7664000
heap
page read and write
7748002C8000
trusted library allocation
page read and write
6C615000
unkown
page readonly
2347F000
heap
page read and write
183B7633000
heap
page read and write
138800BDC000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138802EC8000
trusted library allocation
page read and write
23477000
heap
page read and write
138800A34000
trusted library allocation
page read and write
2348E000
heap
page read and write
183B762A000
heap
page read and write
1388013B8000
trusted library allocation
page read and write
4CC000
remote allocation
page execute and read and write
183B7633000
heap
page read and write
183B7645000
heap
page read and write
1388012EC000
trusted library allocation
page read and write
1388029A8000
trusted library allocation
page read and write
138800484000
trusted library allocation
page read and write
138802AB4000
trusted library allocation
page read and write
183B7649000
heap
page read and write
183B7648000
heap
page read and write
183B7645000
heap
page read and write
183B7647000
heap
page read and write
183B763E000
heap
page read and write
183B7634000
heap
page read and write
1388022F0000
trusted library allocation
page read and write
138802D54000
trusted library allocation
page read and write
1CA30000
heap
page read and write
138802D38000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
61E01000
direct allocation
page execute read
183B7C56000
heap
page read and write
FFC006CC000
trusted library allocation
page read and write
31000
unkown
page execute read
138802928000
trusted library allocation
page read and write
FFC00630000
trusted library allocation
page read and write
183B763F000
heap
page read and write
138800FB0000
trusted library allocation
page read and write
2FF0000
heap
page read and write
138803038000
trusted library allocation
page read and write
183B7625000
heap
page read and write
138801300000
trusted library allocation
page read and write
23470000
heap
page read and write
138800F6C000
trusted library allocation
page read and write
13880307C000
trusted library allocation
page read and write
1388030A8000
trusted library allocation
page read and write
183B7666000
heap
page read and write
6F891000
unkown
page execute read
2A1D0000
heap
page read and write
138802A58000
trusted library allocation
page read and write
183B7645000
heap
page read and write
183B7666000
heap
page read and write
138802EA4000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138803064000
trusted library allocation
page read and write
138803090000
trusted library allocation
page read and write
183B7BE7000
heap
page read and write
183B763B000
heap
page read and write
138802AE0000
trusted library allocation
page read and write
183B764F000
heap
page read and write
23477000
heap
page read and write
FFC00700000
trusted library allocation
page read and write
138800F24000
trusted library allocation
page read and write
138800234000
trusted library allocation
page read and write
183B763B000
heap
page read and write
138802930000
trusted library allocation
page read and write
183B763B000
heap
page read and write
138802964000
trusted library allocation
page read and write
138802AC8000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138800298000
trusted library allocation
page read and write
13880037C000
trusted library allocation
page read and write
13880101C000
trusted library allocation
page read and write
138800294000
trusted library allocation
page read and write
183B7C30000
heap
page read and write
13880306C000
trusted library allocation
page read and write
138801048000
trusted library allocation
page read and write
2FF9000
heap
page read and write
2FB1000
heap
page read and write
2346E000
heap
page read and write
138802AB0000
trusted library allocation
page read and write
183B7636000
heap
page read and write
183B7645000
heap
page read and write
138802FA4000
trusted library allocation
page read and write
138800BE0000
trusted library allocation
page read and write
138802BE8000
trusted library allocation
page read and write
23485000
heap
page read and write
138802D78000
trusted library allocation
page read and write
13880029A000
trusted library allocation
page read and write
138802E58000
trusted library allocation
page read and write
183B7645000
heap
page read and write
FFC00714000
trusted library allocation
page read and write
183B763F000
heap
page read and write
183BBDBC000
heap
page read and write
1388030A0000
trusted library allocation
page read and write
183B7C2E000
heap
page read and write
13880034C000
trusted library allocation
page read and write
138802A20000
trusted library allocation
page read and write
2D7B000
stack
page read and write
183B7645000
heap
page read and write
183B763F000
heap
page read and write
138802A50000
trusted library allocation
page read and write
23490000
heap
page read and write
2DE0000
heap
page readonly
138802D08000
trusted library allocation
page read and write
23472000
heap
page read and write
183B764F000
heap
page read and write
183B763B000
heap
page read and write
2346E000
heap
page read and write
138802B40000
trusted library allocation
page read and write
23485000
heap
page read and write
183B7635000
heap
page read and write
138802ACC000
trusted library allocation
page read and write
183B763F000
heap
page read and write
13880122C000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138802E64000
trusted library allocation
page read and write
6C60F000
unkown
page write copy
183B763E000
heap
page read and write
183B7647000
heap
page read and write
7748002C4000
trusted library allocation
page read and write
2349B000
heap
page read and write
183B763E000
heap
page read and write
13880032C000
trusted library allocation
page read and write
1388026E0000
trusted library allocation
page read and write
138802A24000
trusted library allocation
page read and write
183B763E000
heap
page read and write
61ED3000
direct allocation
page read and write
23467000
heap
page read and write
183B7C30000
heap
page read and write
138802DF4000
trusted library allocation
page read and write
183B7635000
heap
page read and write
183B763B000
heap
page read and write
31000
unkown
page execute read
2347F000
heap
page read and write
183B764F000
heap
page read and write
138800F24000
trusted library allocation
page read and write
1388028C8000
trusted library allocation
page read and write
138802B48000
trusted library allocation
page read and write
138800BDC000
trusted library allocation
page read and write
138802AA8000
trusted library allocation
page read and write
138802788000
trusted library allocation
page read and write
138802EB0000
trusted library allocation
page read and write
138800BDC000
trusted library allocation
page read and write
183B7C32000
heap
page read and write
138800A34000
trusted library allocation
page read and write
138802B98000
trusted library allocation
page read and write
3306000
heap
page read and write
4B5000
remote allocation
page execute and read and write
23470000
heap
page read and write
183B7635000
heap
page read and write
13880034C000
trusted library allocation
page read and write
138802770000
trusted library allocation
page read and write
138802E50000
trusted library allocation
page read and write
1388029C0000
trusted library allocation
page read and write
1388001F8000
trusted library allocation
page read and write
183B7636000
heap
page read and write
138802F3C000
trusted library allocation
page read and write
183B7649000
heap
page read and write
183B7649000
heap
page read and write
138802EB4000
trusted library allocation
page read and write
138802BAC000
trusted library allocation
page read and write
138800340000
trusted library allocation
page read and write
138801048000
trusted library allocation
page read and write
314E000
stack
page read and write
183B7C7E000
heap
page read and write
1388006AC000
trusted library allocation
page read and write
183B7661000
heap
page read and write
138802D78000
trusted library allocation
page read and write
23485000
heap
page read and write
183B763B000
heap
page read and write
138802E20000
trusted library allocation
page read and write
138802FDC000
trusted library allocation
page read and write
183B764F000
heap
page read and write
138802B8C000
trusted library allocation
page read and write
FFC0069C000
trusted library allocation
page read and write
138800294000
trusted library allocation
page read and write
138800F14000
trusted library allocation
page read and write
2D72000
stack
page read and write
183B7646000
heap
page read and write
638000
remote allocation
page execute and read and write
183B7646000
heap
page read and write
183B763B000
heap
page read and write
1388009C8000
trusted library allocation
page read and write
6F91E000
unkown
page read and write
138802A78000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138802E9C000
trusted library allocation
page read and write
23490000
heap
page read and write
138800484000
trusted library allocation
page read and write
138802934000
trusted library allocation
page read and write
138800300000
trusted library allocation
page read and write
138802A80000
trusted library allocation
page read and write
138802FCC000
trusted library allocation
page read and write
138801290000
trusted library allocation
page read and write
138802A38000
trusted library allocation
page read and write
138802938000
trusted library allocation
page read and write
138801C8F000
trusted library allocation
page read and write
FFC00788000
trusted library allocation
page read and write
13880297C000
trusted library allocation
page read and write
138800C64000
trusted library allocation
page read and write
2D78000
stack
page read and write
6C430000
unkown
page readonly
183B763E000
heap
page read and write
2A6D8000
heap
page read and write
13880034C000
trusted library allocation
page read and write
1D3E1000
heap
page read and write
1D4EC000
heap
page read and write
183B7C6F000
heap
page read and write
1CF7F000
stack
page read and write
183B7645000
heap
page read and write
183B7634000
heap
page read and write
138800FD4000
trusted library allocation
page read and write
1388001D8000
trusted library allocation
page read and write
2347F000
heap
page read and write
340E000
stack
page read and write
FFC0080C000
trusted library allocation
page read and write
138802B94000
trusted library allocation
page read and write
183B7636000
heap
page read and write
FFC00368000
trusted library allocation
page read and write
138800BDC000
trusted library allocation
page read and write
1D10E000
stack
page read and write
138802D08000
trusted library allocation
page read and write
138800218000
trusted library allocation
page read and write
138801CB0000
trusted library allocation
page read and write
13880102C000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
2346E000
heap
page read and write
138800FE4000
trusted library allocation
page read and write
FFC00734000
trusted library allocation
page read and write
183B7633000
heap
page read and write
138802E88000
trusted library allocation
page read and write
7748002B8000
trusted library allocation
page read and write
1388026FC000
trusted library allocation
page read and write
183B7647000
heap
page read and write
23470000
heap
page read and write
138802FBC000
trusted library allocation
page read and write
138802764000
trusted library allocation
page read and write
183B7661000
heap
page read and write
23472000
heap
page read and write
183B764F000
heap
page read and write
FFC006D4000
trusted library allocation
page read and write
138802EDC000
trusted library allocation
page read and write
138802D1C000
trusted library allocation
page read and write
138802A1C000
trusted library allocation
page read and write
138800BE0000
trusted library allocation
page read and write
13880107C000
trusted library allocation
page read and write
FFC00704000
trusted library allocation
page read and write
183B7C42000
heap
page read and write
183B763B000
heap
page read and write
13880034C000
trusted library allocation
page read and write
2DF7000
heap
page read and write
FFC00654000
trusted library allocation
page read and write
138801300000
trusted library allocation
page read and write
183B7647000
heap
page read and write
13880067C000
trusted library allocation
page read and write
138802F20000
trusted library allocation
page read and write
2345D000
heap
page read and write
138802E6C000
trusted library allocation
page read and write
23477000
heap
page read and write
183B7645000
heap
page read and write
FFC00380000
trusted library allocation
page read and write
183B763B000
heap
page read and write
183B7646000
heap
page read and write
1388004A8000
trusted library allocation
page read and write
183B763B000
heap
page read and write
1388029C4000
trusted library allocation
page read and write
FFC00668000
trusted library allocation
page read and write
1388002F0000
trusted library allocation
page read and write
183B7633000
heap
page read and write
138802BBC000
trusted library allocation
page read and write
138802AF8000
trusted library allocation
page read and write
2DF7000
heap
page read and write
23477000
heap
page read and write
1D3E0000
heap
page read and write
138802B90000
trusted library allocation
page read and write
1388028F4000
trusted library allocation
page read and write
138800C78000
trusted library allocation
page read and write
183B7633000
heap
page read and write
138802A28000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138800294000
trusted library allocation
page read and write
1388028DC000
trusted library allocation
page read and write
1388026EC000
trusted library allocation
page read and write
138802748000
trusted library allocation
page read and write
138800230000
trusted library allocation
page read and write
183B7666000
heap
page read and write
138800210000
trusted library allocation
page read and write
183B763F000
heap
page read and write
183B7636000
heap
page read and write
183B762B000
heap
page read and write
183B7666000
heap
page read and write
138800340000
trusted library allocation
page read and write
138802E1C000
trusted library allocation
page read and write
138802954000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138802EA8000
trusted library allocation
page read and write
183B7635000
heap
page read and write
183B764F000
heap
page read and write
183B764F000
heap
page read and write
183B7BFD000
heap
page read and write
13880043C000
trusted library allocation
page read and write
FFC002FC000
trusted library allocation
page read and write
183B7645000
heap
page read and write
2347F000
heap
page read and write
183B7649000
heap
page read and write
183B763E000
heap
page read and write
FFC006E4000
trusted library allocation
page read and write
138802ECC000
trusted library allocation
page read and write
138802E8C000
trusted library allocation
page read and write
138802E54000
trusted library allocation
page read and write
23470000
heap
page read and write
1388030B0000
trusted library allocation
page read and write
138802FCC000
trusted library allocation
page read and write
1CFCD000
stack
page read and write
1D0CD000
stack
page read and write
FFC00320000
trusted library allocation
page read and write
183B7635000
heap
page read and write
138802EF4000
trusted library allocation
page read and write
2346E000
heap
page read and write
183B764F000
heap
page read and write
183B763F000
heap
page read and write
183B764F000
heap
page read and write
7748002A8000
trusted library allocation
page read and write
138802BCC000
trusted library allocation
page read and write
183B763B000
heap
page read and write
3303000
heap
page read and write
183B7635000
heap
page read and write
183B7648000
heap
page read and write
183B7645000
heap
page read and write
138802C28000
trusted library allocation
page read and write
2FFF000
heap
page read and write
138800324000
trusted library allocation
page read and write
FFC006B8000
trusted library allocation
page read and write
183B7645000
heap
page read and write
23476000
heap
page read and write
138800294000
trusted library allocation
page read and write
23474000
heap
page read and write
1D3E1000
heap
page read and write
183B763B000
heap
page read and write
1CE7E000
stack
page read and write
138801160000
trusted library allocation
page read and write
138802AF4000
trusted library allocation
page read and write
138802AD0000
trusted library allocation
page read and write
23721000
heap
page read and write
7748002A8000
trusted library allocation
page read and write
6E000
unkown
page read and write
138802EAC000
trusted library allocation
page read and write
1D4E0000
trusted library allocation
page read and write
1388012EC000
trusted library allocation
page read and write
138802234000
trusted library allocation
page read and write
183B763B000
heap
page read and write
FFC00354000
trusted library allocation
page read and write
FFC00320000
trusted library allocation
page read and write
183B7C3C000
heap
page read and write
484000
remote allocation
page execute and read and write
2347F000
heap
page read and write
138800340000
trusted library allocation
page read and write
23485000
heap
page read and write
354F000
stack
page read and write
138802D9C000
trusted library allocation
page read and write
138801C8D000
trusted library allocation
page read and write
138800F6C000
trusted library allocation
page read and write
138801300000
trusted library allocation
page read and write
13880130C000
trusted library allocation
page read and write
2347F000
heap
page read and write
FFC00330000
trusted library allocation
page read and write
138800F14000
trusted library allocation
page read and write
138800FBC000
trusted library allocation
page read and write
64A000
remote allocation
page execute and read and write
FFC00644000
trusted library allocation
page read and write
183B7633000
heap
page read and write
FFC006D0000
trusted library allocation
page read and write
138802D54000
trusted library allocation
page read and write
138802F00000
trusted library allocation
page read and write
138802754000
trusted library allocation
page read and write
FFC00620000
trusted library allocation
page read and write
183B7623000
heap
page read and write
183B7666000
heap
page read and write
183B7647000
heap
page read and write
138802BC0000
trusted library allocation
page read and write
183B763B000
heap
page read and write
183B763E000
heap
page read and write
23485000
heap
page read and write
2DD0000
heap
page read and write
67000
unkown
page readonly
138802B50000
trusted library allocation
page read and write
FFC0033C000
trusted library allocation
page read and write
13880295C000
trusted library allocation
page read and write
2347F000
heap
page read and write
183B7C3E000
heap
page read and write
138800338000
trusted library allocation
page read and write
183B7647000
heap
page read and write
1388011F0000
trusted library allocation
page read and write
183B7645000
heap
page read and write
567000
remote allocation
page execute and read and write
FFC00614000
trusted library allocation
page read and write
23490000
heap
page read and write
183B763B000
heap
page read and write
183B764F000
heap
page read and write
1388028BC000
trusted library allocation
page read and write
6F890000
unkown
page readonly
138802C58000
trusted library allocation
page read and write
183B763B000
heap
page read and write
138802AD8000
trusted library allocation
page read and write
183B7649000
heap
page read and write
6C60E000
unkown
page read and write
1388029B0000
trusted library allocation
page read and write
183B7C7A000
heap
page read and write
183B764F000
heap
page read and write
774800248000
trusted library allocation
page read and write
74B800234000
direct allocation
page read and write
FFC00310000
trusted library allocation
page read and write
183B7645000
heap
page read and write
1388012EC000
trusted library allocation
page read and write
13880022C000
trusted library allocation
page read and write
183B763B000
heap
page read and write
138802DC0000
trusted library allocation
page read and write
1388009C8000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138800338000
trusted library allocation
page read and write
138802E80000
trusted library allocation
page read and write
2DF5000
heap
page read and write
138801404000
trusted library allocation
page read and write
138800338000
trusted library allocation
page read and write
138802F08000
trusted library allocation
page read and write
FFC006FC000
trusted library allocation
page read and write
13880043C000
trusted library allocation
page read and write
138800F6C000
trusted library allocation
page read and write
6D000
unkown
page execute and read and write
1388028D8000
trusted library allocation
page read and write
7748002E4000
trusted library allocation
page read and write
183B7661000
heap
page read and write
73000
unkown
page write copy
1388009C8000
trusted library allocation
page read and write
138802F24000
trusted library allocation
page read and write
1388001AC000
trusted library allocation
page read and write
2A140000
heap
page read and write
23450000
trusted library allocation
page read and write
30000
unkown
page readonly
138802E90000
trusted library allocation
page read and write
1388012EC000
trusted library allocation
page read and write
183B763A000
heap
page read and write
138802A4C000
trusted library allocation
page read and write
138802BC8000
trusted library allocation
page read and write
1388001EC000
trusted library allocation
page read and write
183B7649000
heap
page read and write
3440000
heap
page read and write
2347F000
heap
page read and write
1388028E4000
trusted library allocation
page read and write
2DF0000
heap
page read and write
183B763B000
heap
page read and write
61EB4000
direct allocation
page read and write
183B7C89000
heap
page read and write
FFC0035C000
trusted library allocation
page read and write
FFC006B4000
trusted library allocation
page read and write
7748002B8000
trusted library allocation
page read and write
138802C1C000
trusted library allocation
page read and write
183B762D000
heap
page read and write
183B7664000
heap
page read and write
138800214000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138800294000
trusted library allocation
page read and write
13880300C000
trusted library allocation
page read and write
183B7633000
heap
page read and write
FFC0075C000
trusted library allocation
page read and write
183B7C34000
heap
page read and write
2345D000
heap
page read and write
7748002C4000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138801098000
trusted library allocation
page read and write
7748002A0000
trusted library allocation
page read and write
23490000
heap
page read and write
183B764F000
heap
page read and write
183B764F000
heap
page read and write
183B763B000
heap
page read and write
183B764F000
heap
page read and write
23729000
heap
page read and write
13880240C000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
183B7659000
heap
page read and write
183B764F000
heap
page read and write
183B763E000
heap
page read and write
138800A34000
trusted library allocation
page read and write
138802DB0000
trusted library allocation
page read and write
183B7647000
heap
page read and write
138802AAC000
trusted library allocation
page read and write
1388010F0000
trusted library allocation
page read and write
183B763B000
heap
page read and write
381F000
stack
page read and write
1388001D0000
trusted library allocation
page read and write
183B7649000
heap
page read and write
138801290000
trusted library allocation
page read and write
138802B54000
trusted library allocation
page read and write
183B764F000
heap
page read and write
13880034C000
trusted library allocation
page read and write
1CD0E000
stack
page read and write
183B764F000
heap
page read and write
FFC00424000
trusted library allocation
page read and write
1388029D8000
trusted library allocation
page read and write
30000
unkown
page readonly
183B764F000
heap
page read and write
FFC00684000
trusted library allocation
page read and write
2347F000
heap
page read and write
138802A68000
trusted library allocation
page read and write
183B7636000
heap
page read and write
61E00000
direct allocation
page execute and read and write
138802958000
trusted library allocation
page read and write
138802EFC000
trusted library allocation
page read and write
2347F000
heap
page read and write
138800E60000
trusted library allocation
page read and write
138800F48000
trusted library allocation
page read and write
183B7645000
heap
page read and write
183B7C21000
heap
page read and write
138800294000
trusted library allocation
page read and write
138802A64000
trusted library allocation
page read and write
358E000
stack
page read and write
183BBDC6000
heap
page read and write
183B763B000
heap
page read and write
138800CAC000
trusted library allocation
page read and write
183B7C40000
heap
page read and write
23485000
heap
page read and write
2347F000
heap
page read and write
6F90D000
unkown
page readonly
183B7C77000
heap
page read and write
183B763B000
heap
page read and write
183B7647000
heap
page read and write
183B7C82000
heap
page read and write
6C610000
unkown
page read and write
183B763B000
heap
page read and write
138802B20000
trusted library allocation
page read and write
1388026E0000
trusted library allocation
page read and write
138802ADC000
trusted library allocation
page read and write
183B7645000
heap
page read and write
1CB8F000
stack
page read and write
FFC00694000
trusted library allocation
page read and write
138800CBC000
trusted library allocation
page read and write
23470000
heap
page read and write
138802E30000
trusted library allocation
page read and write
138802AF0000
trusted library allocation
page read and write
183B7645000
heap
page read and write
2347F000
heap
page read and write
183B764F000
heap
page read and write
13880101C000
trusted library allocation
page read and write
138800338000
trusted library allocation
page read and write
2347F000
heap
page read and write
138800294000
trusted library allocation
page read and write
183B763F000
heap
page read and write
7748002A0000
trusted library allocation
page read and write
138800CAC000
trusted library allocation
page read and write
13880037C000
trusted library allocation
page read and write
183B7645000
heap
page read and write
7748002C4000
trusted library allocation
page read and write
138802F34000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
13880020C000
trusted library allocation
page read and write
13880037C000
trusted library allocation
page read and write
138800484000
trusted library allocation
page read and write
1388026F8000
trusted library allocation
page read and write
183B763B000
heap
page read and write
183B7647000
heap
page read and write
183B7647000
heap
page read and write
183B7645000
heap
page read and write
7748002C4000
trusted library allocation
page read and write
FFC00640000
trusted library allocation
page read and write
138802B80000
trusted library allocation
page read and write
183B7664000
heap
page read and write
183B7635000
heap
page read and write
138800F48000
trusted library allocation
page read and write
FFC0039C000
trusted library allocation
page read and write
183B763B000
heap
page read and write
138802A7C000
trusted library allocation
page read and write
138802C0C000
trusted library allocation
page read and write
23570000
heap
page read and write
183B7630000
heap
page read and write
183B7661000
heap
page read and write
3006000
heap
page read and write
FFC006E8000
trusted library allocation
page read and write
138802F04000
trusted library allocation
page read and write
183B7649000
heap
page read and write
183B418B000
heap
page read and write
183B764F000
heap
page read and write
183B7645000
heap
page read and write
138802B1C000
trusted library allocation
page read and write
183B764F000
heap
page read and write
183B7633000
heap
page read and write
138802994000
trusted library allocation
page read and write
6D000
unkown
page write copy
138802E7C000
trusted library allocation
page read and write
138802F1C000
trusted library allocation
page read and write
2347F000
heap
page read and write
67000
unkown
page readonly
183B7640000
heap
page read and write
1388009C8000
trusted library allocation
page read and write
183B762B000
heap
page read and write
138802EE4000
trusted library allocation
page read and write
7748002A0000
trusted library allocation
page read and write
138802990000
trusted library allocation
page read and write
138800300000
trusted library allocation
page read and write
FFC00248000
trusted library allocation
page read and write
183B763B000
heap
page read and write
FFC00330000
trusted library allocation
page read and write
2346E000
heap
page read and write
138802D9C000
trusted library allocation
page read and write
138802748000
trusted library allocation
page read and write
23454000
heap
page read and write
67000
unkown
page readonly
31000
unkown
page execute read
138803030000
trusted library allocation
page read and write
183B7633000
heap
page read and write
183B7636000
heap
page read and write
183B7631000
heap
page read and write
FFC00758000
trusted library allocation
page read and write
23490000
heap
page read and write
1388002F3000
trusted library allocation
page read and write
6C5CF000
unkown
page readonly
1388009CC000
trusted library allocation
page read and write
138802B10000
trusted library allocation
page read and write
13880280C000
trusted library allocation
page read and write
138802BE4000
trusted library allocation
page read and write
183B7C80000
heap
page read and write
138802DE8000
trusted library allocation
page read and write
1388001F4000
trusted library allocation
page read and write
1388001B4000
trusted library allocation
page read and write
138800C38000
trusted library allocation
page read and write
2348A000
heap
page read and write
138802BEC000
trusted library allocation
page read and write
183B763E000
heap
page read and write
23470000
heap
page read and write
1388012EC000
trusted library allocation
page read and write
138802D38000
trusted library allocation
page read and write
1388001DC000
trusted library allocation
page read and write
183B763B000
heap
page read and write
138802EF8000
trusted library allocation
page read and write
183B7647000
heap
page read and write
138802960000
trusted library allocation
page read and write
138802B30000
trusted library allocation
page read and write
183B763B000
heap
page read and write
FFC00320000
trusted library allocation
page read and write
23477000
heap
page read and write
183B763E000
heap
page read and write
2DF7000
heap
page read and write
138802EA0000
trusted library allocation
page read and write
1388001E4000
trusted library allocation
page read and write
FFC003EC000
trusted library allocation
page read and write
1388029CC000
trusted library allocation
page read and write
138800BDC000
trusted library allocation
page read and write
183B7C50000
heap
page read and write
138802DD4000
trusted library allocation
page read and write
23490000
heap
page read and write
1CBCE000
stack
page read and write
138802D1C000
trusted library allocation
page read and write
1388013B8000
trusted library allocation
page read and write
1388029E8000
trusted library allocation
page read and write
2348E000
heap
page read and write
23470000
heap
page read and write
1D3D0000
heap
page read and write
183B763A000
heap
page read and write
FFC00698000
trusted library allocation
page read and write
183B7647000
heap
page read and write
138802DC4000
trusted library allocation
page read and write
183B7645000
heap
page read and write
138802998000
trusted library allocation
page read and write
138800DE4000
trusted library allocation
page read and write
138802908000
trusted library allocation
page read and write
138803088000
trusted library allocation
page read and write
138802ED0000
trusted library allocation
page read and write
2346E000
heap
page read and write
183B763E000
heap
page read and write
183B7649000
heap
page read and write
31000
unkown
page execute read
138802D54000
trusted library allocation
page read and write
183B7647000
heap
page read and write
138802DD0000
trusted library allocation
page read and write
FFC00320000
trusted library allocation
page read and write
2349B000
heap
page read and write
2347F000
heap
page read and write
138802904000
trusted library allocation
page read and write
138802AB8000
trusted library allocation
page read and write
1388029C8000
trusted library allocation
page read and write
138800C74000
trusted library allocation
page read and write
23474000
heap
page read and write
183B7649000
heap
page read and write
183B7633000
heap
page read and write
FFC0033C000
trusted library allocation
page read and write
138800CAC000
trusted library allocation
page read and write
23485000
heap
page read and write
2346E000
heap
page read and write
183B762E000
heap
page read and write
7748002C4000
trusted library allocation
page read and write
2345E000
heap
page read and write
183B7C34000
heap
page read and write
23550000
heap
page read and write
138802C48000
trusted library allocation
page read and write
There are 1026 hidden memdumps, click here to show them.