IOC Report
download.exe

loading gif

Files

File Path
Type
Category
Malicious
download.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4695b114-5fda-44a1-9773-d08fbc742b2c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6b4c8ad6-ab1e-43d7-940d-bb24915bdfc6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7333e8b7-4117-465f-a68f-102206554fe9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-674511B3-68C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\099b4b2e-5b45-415e-94ee-a8c0ce68ab5a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\17fa4106-fb1a-411e-a14d-46326b9b234c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\19a951a7-6991-468b-ab8c-9a7a4e8a6bd8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\51402cbd-73b6-42ac-bc58-835c728aa1e4.tmp
MS Windows icon resource - 8 icons, 16x16, 32 bits/pixel, 20x20, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6441994c-4645-4008-9baf-33cffbaf3730.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6b9b5939-ea0c-465a-b14d-27bb246cde6c.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7841789f-b65c-4521-a27f-f11ffa9f01d1.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\850cb293-d11f-4ba2-882d-31f35fba9ae3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cookies
SQLite 3.x database, last written using SQLite version 3036000, file counter 11, database pages 7, 1st free page 5, free pages 2, cookie 0x9, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico (copy)
MS Windows icon resource - 8 icons, 16x16, 32 bits/pixel, 20x20, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3036000, file counter 5, database pages 35, cookie 0x1e, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History Provider Cache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RFdd11ee.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RFdd1317.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RFdd11fe.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RFdd1308.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13377053363756224
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Tabs_13377053363765091
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\a15f679b-8cd7-4525-b2df-8f1410f83577.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 8, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b9e1f674-ecd2-4d85-9b42-f4693899a383.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db
SQLite 3.x database, last written using SQLite version 3035005, writer version 2, read version 2, file counter 8, database pages 11, cookie 0x7, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RFdd128b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RFdd12aa.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RFdd1308.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\edge_shutdown_ms.txt
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ef497808-2de1-48ff-ad04-2baa39b9b9a0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\086819ab-60d6-4f1c-b52f-3fa82cd4fb55.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\300eb076-182c-45e6-af4f-6c6dcc419a4d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\BrowserMetrics\BrowserMetrics-674511B1-1500.pma
data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\data_3
data
modified
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\GrShaderCache\GPUCache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\Local State~RFdd0f9d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\ShaderCache\GPUCache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\SmartScreen\local\cache
COM executable for DOS
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\SmartScreen\local\download_cache
COM executable for DOS
dropped
C:\Users\user\AppData\Local\Temp\chrE53C.tmp\SmartScreen\local\warnStateCache
data
dropped
There are 94 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\download.exe
"C:\Users\user\Desktop\download.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Windows\System32\fontdrvhost.exe
"C:\Windows\System32\fontdrvhost.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
--user-data-dir="C:\Users\user\AppData\Local\Temp\chrDCBF.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/f4698726/75fae57d"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=2488,i,6324837096866850942,9732983909897042519,262144 --variations-seed-version --mojo-platform-channel-handle=2612 /prefetch:3
malicious
C:\Program Files\Windows Media Player\wmlaunch.exe
"C:\Program Files\Windows Media Player\wmlaunch.exe"
malicious
C:\Windows\System32\dllhost.exe
"C:\Windows\system32\dllhost.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\94.0.992.31\elevation_service.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\94.0.992.31\elevation_service.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5152 -s 592
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
--user-data-dir="C:\Users\user\AppData\Local\Temp\chrE53C.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/f4698726/6e5a1ad9"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15793817240475235178,5851487067123892181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --explicitly-allowed-ports=8000 --disable-gpu --new-window --flag-switches-begin --flag-switches-end --do-not-de-elevate http://127.0.0.1:8000/f4698726/6e5a1ad9
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15667601441087912000,15476632491186070827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2592 /prefetch:3
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
unknown
https://secure.eicar.org/eicar.co
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
http://anglebug.com/4633
unknown
https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-na-us-chrome-bubble&utm_
unknown
http://anglebug.com/4995
unknown
https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXE
unknown
https://permanently-removed.invalid/v1/events
unknown
https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/
unknown
https://shop.advanceautoparts.com/web/OrderItemDisplay
unknown
http://anglebug.com/42262161
unknown
https://anglebug.com/42265794
unknown
http://anglebug.com/42263010
unknown
https://anglebug.com/42265792
unknown
http://anglebug.com/42262286
unknown
http://anglebug.com/42262166
unknown
http://anglebug.com/42262287
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://www.zappos.com/cart
unknown
http://127.0.0.1:8000/f4698726/6e5a1ad9User
unknown
https://www.guitarcenter.com/cart
unknown
http://127.0.0.1:8000/f4698726/6e5a1ad9P
unknown
http://unisolated.invalid/
unknown
https://www.altardstate.com/cart/
unknown
https://www.adorama.com/als.mvc/cartview
unknown
https://anglebug.com/42265782
unknown
https://www.bestbuy.com/cart
unknown
http://anglebug.com/42266652
unknown
https://discord.com
unknown
https://www.williams-sonoma.com/shoppingcart/
unknown
http://127.0.0.1:8000/f4698726/6e5a1ad9/
unknown
https://secure.eicar.org/eicar.com.txtXka
unknown
http://127.0.0.1:8000/f4698726/75fae57d
unknown
http://anglebug.com/42263031
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ae.com/us/en/cart
unknown
https://www.llbean.com/webapp/wcs/stores/servlet/LLBShoppingCartDisplay
unknown
https://95.182.97.106:5980/363881569c00eea8aaf3/pmgoamua.jpbdqkernelbasentdllkernel32GetProcessMitig
unknown
https://www.ecosia.org/newtab/
unknown
http://anglebug.com/42266666
unknown
https://cart.ebay.com/
unknown
http://anglebug.com/42263158
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://www.gamestop.com/cart/
unknown
https://www.boostmobile.com/cart.html
unknown
https://www.samsclub.com/cart
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://www.overstock.com/cart
unknown
https://permanently-removed.invalid/embedded/setup/chrome/usermenu
unknown
https://www.bloomingdales.com/my-bag
unknown
https://gemini.google.com/app?q=
unknown
http://anglebug.com/345244067
unknown
http://anglebug.com/42263049
unknown
http://anglebug.com/40644663
unknown
https://secure.newegg.com/shop/cart
unknown
https://secure.eicar.org/eicar.com.txt
unknown
http://anglebug.com/42262249
unknown
http://anglebug.com/42264669
unknown
http://anglebug.com/42265516
unknown
https://gemini.google.com/app?q=searchTerms
unknown
https://www.jcrew.com/checkout/cart
unknown
https://uk.search.yahoo.com/search
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://anglebug.com/42265636
unknown
https://anglebug.com/42265637
unknown
https://www.officedepot.com/cart/shoppingCart.do
unknown
https://issuetracker.google.com/347601787
unknown
https://anglebug.com/42266842
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://www.weightwatchers.com/us/shop/checkout/cart
unknown
http://anglebug.com/42266842
unknown
http://anglebug.com/42264422
unknown
http://anglebug.com/42266725
unknown
http://anglebug.com/42262247
unknown
http://anglebug.com/42265878
unknown
http://anglebug.com/42266602
unknown
http://anglebug.com/42265407
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://issuetracker.google.com/309028728
unknown
http://anglebug.com/3970
unknown
http://anglebug.com/42263580
unknown
https://www.eicar.org/download-anti-malware-testfile/Xka
unknown
https://www.talbots.com/cart
unknown
https://unitedstates4.ss.wd.microsoft.us
unknown
http://anglebug.com/42262258
unknown
http://anglebug.com/42265647
unknown
https://unitedstates2.ss.wd.microsoft.us
unknown
http://anglebug.com/42266976
unknown
https://unitedstates1.ss.wd.microsoft.us
unknown
http://anglebug.com/42263239
unknown
http://anglebug.com/2514
unknown
http://anglebug.com/3965
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
time.cloudflare.com
162.159.200.1
ntp.nict.jp
133.243.238.243
gbg1.ntp.netnod.se
194.58.203.20
ntp.time.nl
94.198.159.10
ntp.time.in.ua
62.149.0.30
ntp1.hetzner.de
213.239.239.164
gbg1.ntp.se
unknown
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
95.182.97.106
unknown
Russian Federation
malicious
162.159.200.1
time.cloudflare.com
United States
94.198.159.10
ntp.time.nl
Netherlands
213.239.239.164
ntp1.hetzner.de
Germany
194.58.203.20
gbg1.ntp.netnod.se
Sweden
62.149.0.30
ntp.time.in.ua
Ukraine
133.243.238.243
ntp.nict.jp
Japan
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
metricsid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
metricsid_installdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 49 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
32C0000
direct allocation
page execute and read and write
malicious
E20000
direct allocation
page execute and read and write
malicious
6D0000
direct allocation
page read and write
malicious
2DF0000
direct allocation
page read and write
malicious
2DF128E0000
heap
page read and write
48DC008C8000
trusted library allocation
page read and write
48DC0106C000
trusted library allocation
page read and write
2DF128C8000
heap
page read and write
48DC0006C000
trusted library allocation
page read and write
1818000DC000
trusted library allocation
page read and write
48DC002F3000
trusted library allocation
page read and write
48DC00E98000
trusted library allocation
page read and write
2DF128CC000
heap
page read and write
2DF126BA000
heap
page read and write
2DF128CD000
heap
page read and write
3142000
heap
page read and write
50C00047C000
trusted library allocation
page read and write
3132000
heap
page read and write
5900000
heap
page read and write
CA433ED000
stack
page read and write
2DF128E5000
heap
page read and write
48D80003C000
trusted library allocation
page read and write
2DF12634000
heap
page read and write
18A546E7000
heap
page read and write
18A5296A000
unkown
page read and write
818000B8000
direct allocation
page read and write
3142000
heap
page read and write
7A00003C000
trusted library allocation
page read and write
790000
heap
page read and write
2DF10610000
heap
page read and write
3132000
heap
page read and write
2DF106AD000
heap
page read and write
2DF12624000
heap
page read and write
73D40001C000
direct allocation
page read and write
2DF128AE000
heap
page read and write
2DF105F0000
heap
page read and write
2DF128A5000
heap
page read and write
2DF128B9000
heap
page read and write
2DF128E5000
heap
page read and write
2DF106D6000
heap
page read and write
48DC0003D000
trusted library allocation
page read and write
48D800150000
trusted library allocation
page read and write
2DF12654000
heap
page read and write
2DF12080000
heap
page read and write
2DF12655000
heap
page read and write
2DF10615000
heap
page read and write
2DF125AC000
heap
page read and write
48DC00014000
trusted library allocation
page read and write
216E00058000
direct allocation
page read and write
1CFEBD39000
heap
page read and write
48DC00C04000
trusted library allocation
page read and write
1CFF2173000
heap
page read and write
1CFF1EF0000
trusted library section
page read and write
7DDE00041000
trusted library allocation
page read and write
79497FE000
stack
page read and write
E68607C000
stack
page read and write
2DF105D5000
heap
page read and write
2DF10612000
heap
page read and write
2164ECF2000
heap
page read and write
48D800068000
trusted library allocation
page read and write
2DF12675000
heap
page read and write
2DF128D5000
heap
page read and write
2DF12638000
heap
page read and write
2DF10629000
heap
page read and write
2DF12670000
heap
page read and write
48DC01001000
trusted library allocation
page read and write
3110000
heap
page read and write
2DF12648000
heap
page read and write
2DF106C5000
heap
page read and write
3142000
heap
page read and write
2DF10694000
heap
page read and write
48DC001F0000
trusted library allocation
page read and write
2DF128C5000
heap
page read and write
48DC007B4000
trusted library allocation
page read and write
2DF128AE000
heap
page read and write
50C00041C000
trusted library allocation
page read and write
1CFEBD2F000
heap
page read and write
2DF128A5000
heap
page read and write
1CFF19C0000
unkown
page readonly
B24000
heap
page read and write
48DC00428000
trusted library allocation
page read and write
2DF12695000
heap
page read and write
2DF106DC000
heap
page read and write
48DC00790000
trusted library allocation
page read and write
7957FFF000
trusted library allocation
page read and write
2DF12670000
heap
page read and write
18A54BC1000
heap
page read and write
7DF40F851000
unkown
page readonly
48DC00804000
trusted library allocation
page read and write
21650A13000
heap
page read and write
1AFE8630000
remote allocation
page execute and read and write
48DC00784000
trusted library allocation
page read and write
CA58BFB000
stack
page read and write
2DF10629000
heap
page read and write
2DF106D1000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12664000
heap
page read and write
2DF106C1000
heap
page read and write
48DC00234000
trusted library allocation
page read and write
50C000454000
trusted library allocation
page read and write
2DF106C5000
heap
page read and write
2DF128CD000
heap
page read and write
2C3C000
stack
page read and write
2DF128E5000
heap
page read and write
2DF128BD000
heap
page read and write
18A528B0000
heap
page read and write
3142000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128A5000
heap
page read and write
2DF12670000
heap
page read and write
795CFFF000
stack
page read and write
2DF12662000
heap
page read and write
D20000
heap
page read and write
2DF12634000
heap
page read and write
48DC007E4000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
2DF106A0000
heap
page read and write
795D7FE000
stack
page read and write
2DF106F0000
trusted library allocation
page read and write
48DC00338000
trusted library allocation
page read and write
2DF128DD000
heap
page read and write
2DF12615000
heap
page read and write
1CFEBD24000
heap
page read and write
79567FF000
trusted library allocation
page read and write
73D40003C000
direct allocation
page read and write
3132000
heap
page read and write
2DF106C1000
heap
page read and write
3142000
heap
page read and write
48DC00344000
trusted library allocation
page read and write
2DF1062A000
heap
page read and write
2DF12895000
heap
page read and write
2DF12638000
heap
page read and write
2DF1266D000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
2DF12685000
heap
page read and write
2DF12180000
heap
page read and write
2DF12093000
heap
page read and write
2DF12083000
heap
page read and write
2DF106DD000
heap
page read and write
48DC00E6C000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
48DC0048C000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF12675000
heap
page read and write
2DF1263C000
heap
page read and write
2FAE000
heap
page read and write
1CFF15AA000
heap
page read and write
2DF128C9000
heap
page read and write
2DF106D2000
heap
page read and write
54AC000
stack
page read and write
48DC004DC000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
313D000
heap
page read and write
2DF1267D000
heap
page read and write
48DC00224000
trusted library allocation
page read and write
2DF105F9000
heap
page read and write
2DF106AF000
heap
page read and write
216E0007C000
direct allocation
page read and write
2DF12654000
heap
page read and write
21650B4C000
heap
page read and write
1CFF19C5000
unkown
page readonly
7949FFE000
stack
page read and write
48DC00B84000
trusted library allocation
page read and write
18A54BFE000
heap
page read and write
3142000
heap
page read and write
1CFEB1E3000
heap
page read and write
2DF12634000
heap
page read and write
2DF128E2000
heap
page read and write
3142000
heap
page read and write
1818000B0000
trusted library allocation
page read and write
48DC0023C000
trusted library allocation
page read and write
2DF106D6000
heap
page read and write
2DF128CC000
heap
page read and write
2DF12624000
heap
page read and write
2DF126C1000
heap
page read and write
7A0000B4000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
2DF128BD000
heap
page read and write
48DC00727000
trusted library allocation
page read and write
48D8000F4000
trusted library allocation
page read and write
48DC00D70000
trusted library allocation
page read and write
48DC00C01000
trusted library allocation
page read and write
18A54689000
heap
page read and write
216E00054000
direct allocation
page read and write
2DF106D5000
heap
page read and write
7DDE00108000
trusted library allocation
page read and write
1CFEC2B8000
heap
page read and write
2DF128E5000
heap
page read and write
2DF126CD000
heap
page read and write
18A54680000
heap
page read and write
2DF128B6000
heap
page read and write
1AFE89CF000
heap
page read and write
2DF105F0000
heap
page read and write
181800034000
trusted library allocation
page read and write
2DF12695000
heap
page read and write
3132000
heap
page read and write
50C000110000
trusted library allocation
page read and write
2DF128C6000
heap
page read and write
48DC00330000
trusted library allocation
page read and write
48DC01210000
trusted library allocation
page read and write
2DF125AE000
heap
page read and write
53EF000
stack
page read and write
18A5468F000
heap
page read and write
2DF12664000
heap
page read and write
2164EC85000
heap
page read and write
2DF12670000
heap
page read and write
48DC00238000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
3142000
heap
page read and write
2DF128B4000
heap
page read and write
2DF128DD000
heap
page read and write
48DC00678000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF12664000
heap
page read and write
2DF128D5000
heap
page read and write
3132000
heap
page read and write
48DC00480000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
7A00007C000
trusted library allocation
page read and write
3142000
heap
page read and write
48D800224000
trusted library allocation
page read and write
3132000
heap
page read and write
216509A0000
trusted library section
page readonly
1E605420000
heap
page read and write
48DC00504000
trusted library allocation
page read and write
1AFE8850000
heap
page read and write
CA493FC000
stack
page read and write
E685FFC000
stack
page read and write
2DF12664000
heap
page read and write
50C000080000
trusted library allocation
page read and write
2DF103F7000
heap
page read and write
8180000D000
direct allocation
page read and write
2DF105D7000
heap
page read and write
48DC000A0000
trusted library allocation
page read and write
73D4000E8000
direct allocation
page read and write
2DF128D5000
heap
page read and write
546F000
stack
page read and write
5270000
unkown
page read and write
5539000
unkown
page read and write
73D4000D8000
direct allocation
page read and write
2DF106D2000
heap
page read and write
33435FC000
stack
page read and write
48DC003F4000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
21650B00000
heap
page read and write
2DF125BA000
heap
page read and write
2DF128D8000
heap
page read and write
2DF12618000
heap
page read and write
50C000224000
trusted library allocation
page read and write
2DF12654000
heap
page read and write
2DF128C6000
heap
page read and write
2DF12634000
heap
page read and write
3000000
heap
page read and write
3100000
heap
page read and write
2DF1263C000
heap
page read and write
2DF106B3000
heap
page read and write
7DDE0003C000
trusted library allocation
page read and write
2DF106DC000
heap
page read and write
2DF106AD000
heap
page read and write
CA4EBFE000
stack
page read and write
2DF128C5000
heap
page read and write
36E0000
direct allocation
page read and write
2DF10270000
unkown
page execute and read and write
53C0000
unkown
page read and write
25AD122D000
heap
page read and write
2DF10260000
heap
page read and write
2DF108ED000
heap
page read and write
2DF128CD000
heap
page read and write
3132000
heap
page read and write
2DF128D4000
heap
page read and write
CA46BFD000
stack
page read and write
1CFEB1C0000
trusted library section
page readonly
48DC004F4000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
2DF106CA000
heap
page read and write
48DC003BD000
trusted library allocation
page read and write
2DF12624000
heap
page read and write
2DF12655000
heap
page read and write
48DC0089C000
trusted library allocation
page read and write
CA4BBFF000
stack
page read and write
2DF128E5000
heap
page read and write
2DF128C4000
heap
page read and write
1E605110000
heap
page read and write
2DF12760000
heap
page read and write
2DF128D5000
heap
page read and write
1AFE89DE000
heap
page read and write
2164ED02000
heap
page read and write
2DF128BD000
heap
page read and write
2DF126C1000
heap
page read and write
2DF12662000
heap
page read and write
2DF128D5000
heap
page read and write
50C0004C4000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
2DF12624000
heap
page read and write
2DF106D4000
heap
page read and write
50C000454000
trusted library allocation
page read and write
7DDE000E4000
trusted library allocation
page read and write
73D40004C000
direct allocation
page read and write
2164ECE1000
heap
page read and write
2DF12675000
heap
page read and write
B24000
heap
page read and write
2DF128BD000
heap
page read and write
48DC00E30000
trusted library allocation
page read and write
18A54670000
heap
page read and write
2DF1263C000
heap
page read and write
2DF128BD000
heap
page read and write
2DF12654000
heap
page read and write
2DF12869000
heap
page read and write
1CFE8658000
heap
page read and write
2DF128BD000
heap
page read and write
2DF12624000
heap
page read and write
21650B02000
heap
page read and write
2E13000
heap
page read and write
48DC001BC000
trusted library allocation
page read and write
CA4CBFA000
stack
page read and write
3142000
heap
page read and write
2DF12664000
heap
page read and write
50C0001B8000
trusted library allocation
page read and write
48DC0108C000
trusted library allocation
page read and write
50C0004A5000
trusted library allocation
page read and write
F99B8FD000
stack
page read and write
1AFE8840000
heap
page read and write
2DF128CD000
heap
page read and write
2DF106DB000
heap
page read and write
2DF128E5000
heap
page read and write
2DF1267D000
heap
page read and write
8180000F000
direct allocation
page read and write
2DF128B2000
heap
page read and write
2DF128DD000
heap
page read and write
2DF128E5000
heap
page read and write
553D000
unkown
page read and write
CA473FA000
stack
page read and write
2DF1067D000
heap
page read and write
2DF106C1000
heap
page read and write
2DF105EA000
heap
page read and write
2DF1264C000
heap
page read and write
2DF128CD000
heap
page read and write
2DF128DD000
heap
page read and write
794A7FB000
stack
page read and write
2DF10449000
heap
page read and write
1E605152000
heap
page read and write
7A000098000
trusted library allocation
page read and write
48DC00880000
trusted library allocation
page read and write
48DC00434000
trusted library allocation
page read and write
2DF106CC000
heap
page read and write
48DC00168000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
818000AC000
direct allocation
page read and write
18A52B90000
heap
page read and write
2DF128DD000
heap
page read and write
1CFEBD37000
heap
page read and write
48DC01244000
trusted library allocation
page read and write
2DF12654000
heap
page read and write
18A52CDC000
unkown
page read and write
2DF128BD000
heap
page read and write
2DF10445000
heap
page read and write
1CFEBD32000
heap
page read and write
2DF12654000
heap
page read and write
CA56BFB000
stack
page read and write
2DF12871000
heap
page read and write
2DF10612000
heap
page read and write
2DF128C5000
heap
page read and write
48DC00FAC000
trusted library allocation
page read and write
5310000
unkown
page read and write
81800044000
direct allocation
page read and write
2DF128B5000
heap
page read and write
73D400040000
direct allocation
page read and write
2DF128E5000
heap
page read and write
2DF1060A000
heap
page read and write
2DF106CA000
heap
page read and write
2DF128B3000
heap
page read and write
50C000060000
trusted library allocation
page read and write
701000
unkown
page execute read
2DF128AE000
heap
page read and write
2DF128D5000
heap
page read and write
2DF12638000
heap
page read and write
1CFEBD37000
heap
page read and write
3142000
heap
page read and write
1CFF2170000
heap
page read and write
48DC011C8000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
795B7FE000
stack
page read and write
2DF106CA000
heap
page read and write
2DF128D5000
heap
page read and write
48DC01201000
trusted library allocation
page read and write
2DF10613000
heap
page read and write
18A546E7000
heap
page read and write
48D800140000
trusted library allocation
page read and write
319F000
heap
page read and write
2C70000
unkown
page execute and read and write
2DF126C5000
heap
page read and write
1CFE864B000
heap
page read and write
33CD000
unkown
page read and write
2DF128CD000
heap
page read and write
2DF128DD000
heap
page read and write
7DDE0004C000
trusted library allocation
page read and write
327E000
stack
page read and write
2DF1060A000
heap
page read and write
2DF106DE000
heap
page read and write
3142000
heap
page read and write
21650920000
trusted library allocation
page read and write
18180005C000
trusted library allocation
page read and write
81800064000
direct allocation
page read and write
2DF128E5000
heap
page read and write
2DF128D5000
heap
page read and write
2DF128C6000
heap
page read and write
1CFEC300000
heap
page read and write
2DF1266D000
heap
page read and write
2DF106A2000
heap
page read and write
2164EC4B000
heap
page read and write
3142000
heap
page read and write
1CFEBD30000
heap
page read and write
CA573FE000
stack
page read and write
2DF106DE000
heap
page read and write
2DF10610000
heap
page read and write
2DF1061E000
heap
page read and write
216E0003C000
direct allocation
page read and write
48DC00F14000
trusted library allocation
page read and write
48DC003B0000
trusted library allocation
page read and write
2DF12670000
heap
page read and write
216E00098000
direct allocation
page read and write
2DF10690000
heap
page read and write
48DC00E01000
trusted library allocation
page read and write
50C00020C000
trusted library allocation
page read and write
7DF4C6861000
unkown
page execute read
2F6F000
heap
page read and write
79507FE000
stack
page read and write
7DDE0000C000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF10610000
heap
page read and write
2DF12685000
heap
page read and write
CA483FE000
stack
page read and write
7DDE00060000
trusted library allocation
page read and write
181800064000
trusted library allocation
page read and write
2DF12761000
heap
page read and write
7DDE00104000
trusted library allocation
page read and write
3142000
heap
page read and write
18A52C90000
trusted library allocation
page read and write
8E56FFD000
unkown
page read and write
2DF1061E000
heap
page read and write
2DF1267D000
heap
page read and write
48DC01108000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF12654000
heap
page read and write
2164ED58000
heap
page read and write
2DF126CD000
heap
page read and write
2DF1061B000
heap
page read and write
48DC011D8000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
53E0000
unkown
page read and write
2DF128E5000
heap
page read and write
50C000098000
trusted library allocation
page read and write
48D8000D8000
trusted library allocation
page read and write
48D8000E0000
trusted library allocation
page read and write
2DF128C7000
heap
page read and write
2DF128C6000
heap
page read and write
1E605119000
heap
page read and write
48D800058000
trusted library allocation
page read and write
2DF1269D000
heap
page read and write
B24000
heap
page read and write
2DF128A8000
heap
page read and write
2DF106B5000
heap
page read and write
2DF10624000
heap
page read and write
2DF1262E000
heap
page read and write
CA463FF000
stack
page read and write
1CFEAD50000
unkown
page read and write
1818000D0000
trusted library allocation
page read and write
CA533FF000
stack
page read and write
48D800100000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF125AE000
heap
page read and write
CA53BFC000
stack
page read and write
48DC00664000
trusted library allocation
page read and write
48DC005A0000
trusted library allocation
page read and write
33C9000
unkown
page read and write
2DF1266D000
heap
page read and write
2DF1263B000
heap
page read and write
2DF1264C000
heap
page read and write
48DC00CD4000
trusted library allocation
page read and write
2DF12634000
heap
page read and write
CA49BFD000
stack
page read and write
48DC00330000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
50C00048C000
trusted library allocation
page read and write
778000
unkown
page write copy
3132000
heap
page read and write
2DF128B5000
heap
page read and write
3132000
heap
page read and write
3100000
unkown
page read and write
2DF128B2000
heap
page read and write
2DF105E1000
heap
page read and write
2DF128AE000
heap
page read and write
48DC00B08000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
7DDE00098000
trusted library allocation
page read and write
48DC003C1000
trusted library allocation
page read and write
2DF106D6000
heap
page read and write
2DF125AC000
heap
page read and write
81800078000
direct allocation
page read and write
2DF12655000
heap
page read and write
2DF1264B000
heap
page read and write
2DF106AF000
heap
page read and write
48DC00F04000
trusted library allocation
page read and write
48DC001B0000
trusted library allocation
page read and write
1E604E90000
heap
page read and write
216E0004C000
direct allocation
page read and write
3132000
heap
page read and write
1818000B0000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF10604000
heap
page read and write
48DC00858000
trusted library allocation
page read and write
3132000
heap
page read and write
CA453FE000
stack
page read and write
2DF12636000
heap
page read and write
2DF128A5000
heap
page read and write
2164ED5E000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128D5000
heap
page read and write
48DC001C4000
trusted library allocation
page read and write
C33000
heap
page read and write
2DF10698000
heap
page read and write
794CFFC000
stack
page read and write
2DF12695000
heap
page read and write
2DF128E5000
heap
page read and write
2DF106A2000
heap
page read and write
2DF1267E000
heap
page read and write
2DF106D1000
heap
page read and write
2DF126B5000
heap
page read and write
48DC0021C000
trusted library allocation
page read and write
1CFEC273000
heap
page read and write
2DF126B4000
heap
page read and write
2DF106CF000
heap
page read and write
2DF1266D000
heap
page read and write
3132000
heap
page read and write
2DF10624000
heap
page read and write
2DF128BD000
heap
page read and write
2DF12634000
heap
page read and write
48DC00C24000
trusted library allocation
page read and write
2DF106A2000
heap
page read and write
CA51BFC000
stack
page read and write
48DC00095000
trusted library allocation
page read and write
3142000
heap
page read and write
2DF128CD000
heap
page read and write
48DC00458000
trusted library allocation
page read and write
1CFF2187000
unclassified section
page read and write
2DF1068D000
heap
page read and write
73D400001000
direct allocation
page read and write
2DF128B5000
heap
page read and write
48DC00468000
trusted library allocation
page read and write
307F000
heap
page read and write
2DF12685000
heap
page read and write
2DF128D5000
heap
page read and write
2DF12655000
heap
page read and write
2DF128AE000
heap
page read and write
3132000
heap
page read and write
48DC0013C000
trusted library allocation
page read and write
2DF104F0000
heap
page read and write
2DF106BD000
heap
page read and write
3132000
heap
page read and write
48DC0022C000
trusted library allocation
page read and write
2DF106D5000
heap
page read and write
48DC01228000
trusted library allocation
page read and write
50C0000B4000
trusted library allocation
page read and write
2DF12190000
trusted library allocation
page read and write
530000
heap
page read and write
2DF12879000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128B3000
heap
page read and write
3132000
heap
page read and write
2DF1289F000
heap
page read and write
48DC00574000
trusted library allocation
page read and write
1CFEBD2C000
heap
page read and write
2DF12655000
heap
page read and write
25AD1200000
heap
page read and write
48DC00940000
trusted library allocation
page read and write
2DF12655000
heap
page read and write
1AFE884E000
heap
page read and write
B20000
heap
page read and write
2DF12685000
heap
page read and write
7A000054000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF128E5000
heap
page read and write
1E607087000
unkown
page read and write
2DF106DE000
heap
page read and write
2DF128C6000
heap
page read and write
48DC00210000
trusted library allocation
page read and write
2DF10627000
heap
page read and write
7955FFF000
trusted library allocation
page read and write
3132000
heap
page read and write
3142000
heap
page read and write
3132000
heap
page read and write
1CFE8825000
heap
page read and write
48DC001B6000
trusted library allocation
page read and write
2DF128A5000
heap
page read and write
2DF128E5000
heap
page read and write
69D000
stack
page read and write
3132000
heap
page read and write
2DF12670000
heap
page read and write
1E605426000
heap
page read and write
2DF128D5000
heap
page read and write
2DF125B9000
heap
page read and write
2DF128D8000
heap
page read and write
3132000
heap
page read and write
48DC00334000
trusted library allocation
page read and write
2DF125B9000
heap
page read and write
3132000
heap
page read and write
2DF1267D000
heap
page read and write
48D80023C000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
181800060000
trusted library allocation
page read and write
2DF10627000
heap
page read and write
1CFE8630000
heap
page readonly
48DC00875000
trusted library allocation
page read and write
216E000CC000
direct allocation
page read and write
1CFE86D2000
heap
page read and write
48DC01134000
trusted library allocation
page read and write
2DF1263E000
heap
page read and write
2DF128AE000
heap
page read and write
2DF128E5000
heap
page read and write
1AFE8950000
heap
page read and write
2DF128BD000
heap
page read and write
5393000
unkown
page read and write
2DF106D2000
heap
page read and write
2DF10627000
heap
page read and write
2DF128E5000
heap
page read and write
3132000
heap
page read and write
795AFFE000
stack
page read and write
2DF128DA000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128BD000
heap
page read and write
D75000
heap
page read and write
2DF128B9000
heap
page read and write
2DF106CA000
heap
page read and write
1CFE84C0000
heap
page read and write
48DC005B0000
trusted library allocation
page read and write
3142000
heap
page read and write
3132000
heap
page read and write
2DF125BA000
heap
page read and write
48DC00458000
trusted library allocation
page read and write
48D800090000
trusted library allocation
page read and write
18A5469E000
heap
page read and write
50C0000FC000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
2DF126AD000
heap
page read and write
2DF12615000
heap
page read and write
1CFF157A000
heap
page read and write
2DF106C1000
heap
page read and write
2DF12624000
heap
page read and write
2DF105DA000
heap
page read and write
7DDE000D4000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
3132000
heap
page read and write
2DF128C7000
heap
page read and write
2DF128B6000
heap
page read and write
2DF1266D000
heap
page read and write
31A0000
unkown
page read and write
2DF1266D000
heap
page read and write
CA433F2000
stack
page read and write
2DF105F0000
heap
page read and write
2DF1263C000
heap
page read and write
542E000
stack
page read and write
2DF10629000
heap
page read and write
18A52C90000
unkown
page read and write
48DC00E58000
trusted library allocation
page read and write
18A546E8000
heap
page read and write
3132000
heap
page read and write
48DC01004000
trusted library allocation
page read and write
1CFE8640000
heap
page read and write
5270000
unclassified section
page readonly
3142000
heap
page read and write
18A5469F000
heap
page read and write
2164EA80000
heap
page read and write
48DC00088000
trusted library allocation
page read and write
48D80013D000
trusted library allocation
page read and write
1E607270000
unkown
page read and write
2DF10698000
heap
page read and write
21650B20000
heap
page read and write
2DF128C6000
heap
page read and write
2DF128CD000
heap
page read and write
2DF105D7000
heap
page read and write
2DF12664000
heap
page read and write
1CFF1770000
unkown
page readonly
3132000
heap
page read and write
181800090000
trusted library allocation
page read and write
2164EC26000
heap
page read and write
1CFF1550000
heap
page read and write
73D40008C000
direct allocation
page read and write
2DF12560000
heap
page read and write
25AD122F000
heap
page read and write
2DF1266D000
heap
page read and write
2DF128B6000
heap
page read and write
1CFF1780000
trusted library section
page read and write
2DF12670000
heap
page read and write
3142000
heap
page read and write
2164EC89000
heap
page read and write
48DC002F0000
trusted library allocation
page read and write
3112000
heap
page read and write
8E58FFF000
stack
page read and write
48DC009D0000
trusted library allocation
page read and write
1818000E8000
trusted library allocation
page read and write
48D800004000
trusted library allocation
page read and write
50C000120000
trusted library allocation
page read and write
2164EC99000
heap
page read and write
2DF128B6000
heap
page read and write
2DF1266D000
heap
page read and write
2DF128CD000
heap
page read and write
3132000
heap
page read and write
2DF128BD000
heap
page read and write
48DC0121C000
trusted library allocation
page read and write
2164ECCC000
heap
page read and write
48DC0019C000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
2DF128D5000
heap
page read and write
2DF106DE000
heap
page read and write
18A52C90000
trusted library allocation
page read and write
E685C7E000
stack
page read and write
739000
unkown
page execute and read and write
181800084000
trusted library allocation
page read and write
2DF1267E000
heap
page read and write
2DF1263A000
heap
page read and write
2DF128D4000
heap
page read and write
2DF1285D000
heap
page read and write
2DF128AE000
heap
page read and write
2DF105F4000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128C5000
heap
page read and write
300F000
heap
page read and write
2DF1062E000
heap
page read and write
48DC00EDC000
trusted library allocation
page read and write
2DF12685000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12655000
heap
page read and write
2DF10562000
heap
page read and write
2DF12685000
heap
page read and write
2DF128A7000
heap
page read and write
2DF128E5000
heap
page read and write
2DF105D9000
heap
page read and write
1CFEBD3D000
heap
page read and write
48DC003E4000
trusted library allocation
page read and write
2DF10609000
heap
page read and write
50C000448000
trusted library allocation
page read and write
3132000
heap
page read and write
7A000001000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
1CFF1557000
heap
page read and write
2DF10560000
heap
page read and write
2DF128E0000
heap
page read and write
F99B9FF000
stack
page read and write
2DF128E5000
heap
page read and write
2DF128D5000
heap
page read and write
48DC00FD8000
trusted library allocation
page read and write
2DF12644000
heap
page read and write
2DF1263C000
heap
page read and write
2DF10698000
heap
page read and write
7944FFE000
unkown
page read and write
2DF10612000
heap
page read and write
2DF12625000
heap
page read and write
48DC002B0000
trusted library allocation
page read and write
3132000
heap
page read and write
29FB000
stack
page read and write
2DF128BD000
heap
page read and write
2DF1240E000
heap
page read and write
3132000
heap
page read and write
48DC00904000
trusted library allocation
page read and write
48DC00BC4000
trusted library allocation
page read and write
2DF128E0000
heap
page read and write
32C0000
direct allocation
page read and write
48D800201000
trusted library allocation
page read and write
50C000494000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF106B0000
heap
page read and write
2DF10436000
heap
page read and write
48DC00914000
trusted library allocation
page read and write
2DF12615000
heap
page read and write
3068000
heap
page read and write
50C000401000
trusted library allocation
page read and write
2DF10615000
heap
page read and write
2DF106B3000
heap
page read and write
50C000430000
trusted library allocation
page read and write
2DF10680000
heap
page read and write
2DF128D4000
heap
page read and write
2DF128CD000
heap
page read and write
2DF12654000
heap
page read and write
3132000
heap
page read and write
794EFFC000
stack
page read and write
48DC011B4000
trusted library allocation
page read and write
48DC001B1000
trusted library allocation
page read and write
3142000
heap
page read and write
48DC010F4000
trusted library allocation
page read and write
2DF12642000
heap
page read and write
2DF105F0000
heap
page read and write
216E00088000
direct allocation
page read and write
2DF12685000
heap
page read and write
2DF1263C000
heap
page read and write
2DF12624000
heap
page read and write
2DF106AA000
heap
page read and write
3142000
heap
page read and write
1CFE86A4000
heap
page read and write
48DC0075C000
trusted library allocation
page read and write
2DF126A4000
heap
page read and write
18A5297D000
unkown
page read and write
2DF106C2000
heap
page read and write
48DC00294000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
48DC002B0000
trusted library allocation
page read and write
2DF1269D000
heap
page read and write
50C00049C000
trusted library allocation
page read and write
216E000C0000
direct allocation
page read and write
1AFE884A000
heap
page read and write
2DF106AD000
heap
page read and write
1CFF19D0000
unkown
page readonly
2DF1289D000
heap
page read and write
50C000018000
trusted library allocation
page read and write
2DF10612000
heap
page read and write
2DF10625000
heap
page read and write
48DC0038C000
trusted library allocation
page read and write
48DC00220000
trusted library allocation
page read and write
5270000
unkown
page read and write
48D8000EC000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
7DDE0002C000
trusted library allocation
page read and write
2DF128A0000
heap
page read and write
CA48BF9000
stack
page read and write
2DF128E5000
heap
page read and write
2DF12695000
heap
page read and write
48DC00590000
trusted library allocation
page read and write
2DF1061E000
heap
page read and write
48DC00704000
trusted library allocation
page read and write
48DC001EC000
trusted library allocation
page read and write
25AD1202000
heap
page read and write
2DF128A0000
heap
page read and write
2DF128D5000
heap
page read and write
818000D4000
direct allocation
page read and write
2DF1062C000
heap
page read and write
2DF126AD000
heap
page read and write
2DF106C4000
heap
page read and write
2DF128E5000
heap
page read and write
F99BAFE000
stack
page read and write
2DF12654000
heap
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
2DF12634000
heap
page read and write
18180004C000
trusted library allocation
page read and write
1E607100000
unkown
page read and write
2DF128D5000
heap
page read and write
3132000
heap
page read and write
2DF128C1000
heap
page read and write
2DF128E5000
heap
page read and write
2DF1262C000
heap
page read and write
2DF128CD000
heap
page read and write
377F000
stack
page read and write
2DF106CA000
heap
page read and write
D9E000
heap
page read and write
48DC00D34000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
E685F7B000
stack
page read and write
2DF128E5000
heap
page read and write
32A0000
unkown
page read and write
CA45BFF000
stack
page read and write
2DF12897000
heap
page read and write
2DF128D5000
heap
page read and write
1AFE885A000
heap
page read and write
E685E7B000
stack
page read and write
7DDE000F0000
trusted library allocation
page read and write
18A52CA0000
direct allocation
page execute and read and write
3474000
unkown
page read and write
2DF126B5000
heap
page read and write
50C000518000
trusted library allocation
page read and write
8E567FC000
stack
page read and write
3142000
heap
page read and write
2DF12670000
heap
page read and write
2DF106C2000
heap
page read and write
2DF12655000
heap
page read and write
319F000
heap
page read and write
2DF105D7000
heap
page read and write
2DF128B2000
heap
page read and write
2DF12634000
heap
page read and write
48D800084000
trusted library allocation
page read and write
216508E0000
heap
page read and write
2DF106B3000
heap
page read and write
48DC00BBC000
trusted library allocation
page read and write
48DC00FBC000
trusted library allocation
page read and write
2DF10601000
heap
page read and write
CA52BFE000
stack
page read and write
48DC003A0000
trusted library allocation
page read and write
2DF12674000
heap
page read and write
216E0013C000
direct allocation
page read and write
2DF128D5000
heap
page read and write
3142000
heap
page read and write
323F000
stack
page read and write
2DF128B2000
heap
page read and write
55E4000
unkown
page read and write
3142000
heap
page read and write
1E605042000
system
page execute and read and write
3142000
heap
page read and write
1818000A0000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
2DF12624000
heap
page read and write
48D800110000
trusted library allocation
page read and write
CA4ABFE000
stack
page read and write
7A0000B8000
trusted library allocation
page read and write
7DF40F751000
unkown
page execute read
6E0000
direct allocation
page read and write
2DF128AD000
heap
page read and write
48DC00A04000
trusted library allocation
page read and write
48DC010E8000
trusted library allocation
page read and write
48DC00E04000
trusted library allocation
page read and write
48DC00801000
trusted library allocation
page read and write
2DF1262B000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12664000
heap
page read and write
2DF12654000
heap
page read and write
2DF128D8000
heap
page read and write
2DF1262E000
heap
page read and write
2DF128A0000
heap
page read and write
48DC00FCC000
trusted library allocation
page read and write
7DDE00064000
trusted library allocation
page read and write
48DC00504000
trusted library allocation
page read and write
2DF1060A000
heap
page read and write
48D800148000
trusted library allocation
page read and write
CA563FD000
stack
page read and write
2DF12654000
heap
page read and write
2DF10690000
heap
page read and write
2DF12654000
heap
page read and write
2DF1266D000
heap
page read and write
48DC002E5000
trusted library allocation
page read and write
B24000
heap
page read and write
2DF128C5000
heap
page read and write
2DF103FE000
heap
page read and write
5550000
direct allocation
page read and write
2DF1263C000
heap
page read and write
2164ECFF000
heap
page read and write
18A54C3F000
heap
page read and write
2DF128E5000
heap
page read and write
E685CFB000
stack
page read and write
48D800218000
trusted library allocation
page read and write
48DC004CC000
trusted library allocation
page read and write
2DF12665000
heap
page read and write
48DC01124000
trusted library allocation
page read and write
18A5471E000
heap
page read and write
48D800094000
trusted library allocation
page read and write
81800038000
direct allocation
page read and write
81800098000
direct allocation
page read and write
7DDE000B4000
trusted library allocation
page read and write
2DF10683000
heap
page read and write
2DF12636000
heap
page read and write
794D7FD000
stack
page read and write
2DF128E5000
heap
page read and write
2DF128C5000
heap
page read and write
2DF128B5000
heap
page read and write
CA43BFE000
unkown
page read and write
48DC00514000
trusted library allocation
page read and write
2DF12670000
heap
page read and write
2164EC62000
heap
page read and write
2DF1263C000
heap
page read and write
2DF10680000
heap
page read and write
1AFE85D0000
heap
page read and write
3132000
heap
page read and write
1E606F10000
unkown
page read and write
181800058000
trusted library allocation
page read and write
1AFE89ED000
heap
page read and write
2DF126AD000
heap
page read and write
18A52CA0000
direct allocation
page execute and read and write
2DF106DD000
heap
page read and write
48DC00300000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF12654000
heap
page read and write
73D40000C000
direct allocation
page read and write
3132000
heap
page read and write
2DF12615000
heap
page read and write
2DF126B5000
heap
page read and write
2DF105E8000
heap
page read and write
2DF128E5000
heap
page read and write
2DF1285E000
heap
page read and write
3132000
heap
page read and write
2DF12664000
heap
page read and write
48DC0004C000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
2DF128A5000
heap
page read and write
25AD10A0000
heap
page read and write
73D400090000
direct allocation
page read and write
48DC0014C000
trusted library allocation
page read and write
B24000
heap
page read and write
18A52921000
unkown
page execute read
48DC00F78000
trusted library allocation
page read and write
2DF1266D000
heap
page read and write
48DC00410000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF128E5000
heap
page read and write
2CC0000
heap
page read and write
2DF12636000
heap
page read and write
3132000
heap
page read and write
48DC0012C000
trusted library allocation
page read and write
3132000
heap
page read and write
48DC00370000
trusted library allocation
page read and write
2DF1263C000
heap
page read and write
2DF1267D000
heap
page read and write
2DF128E5000
heap
page read and write
7A000018000
trusted library allocation
page read and write
CA4DBFE000
stack
page read and write
2DF128A3000
heap
page read and write
48DC0084C000
trusted library allocation
page read and write
CA47BFC000
stack
page read and write
48DC00604000
trusted library allocation
page read and write
48DC00958000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF128CD000
heap
page read and write
D2D000
heap
page read and write
2DF1266D000
heap
page read and write
2DF12080000
trusted library allocation
page read and write
2DF12654000
heap
page read and write
2DF1269D000
heap
page read and write
2DF106CF000
heap
page read and write
3142000
heap
page read and write
307E000
heap
page read and write
2DF106DE000
heap
page read and write
2DF1266D000
heap
page read and write
2DF128DD000
heap
page read and write
216E000AC000
direct allocation
page read and write
1AFE89CF000
heap
page read and write
48DC00201000
trusted library allocation
page read and write
216E00100000
direct allocation
page read and write
3142000
heap
page read and write
CA4FBFF000
stack
page read and write
E6860FE000
stack
page read and write
77C000
unkown
page readonly
32F0000
unkown
page read and write
2DF128E5000
heap
page read and write
3100000
unkown
page read and write
2DF128E5000
heap
page read and write
CA5ABFF000
stack
page read and write
3153000
heap
page read and write
2DF128A5000
heap
page read and write
7DDE0011C000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
48DC0049C000
trusted library allocation
page read and write
2DF1286D000
heap
page read and write
18A54C3F000
heap
page read and write
2DF10697000
heap
page read and write
48DC00EC0000
trusted library allocation
page read and write
2DF1263C000
heap
page read and write
2DF126B3000
heap
page read and write
2DF1263C000
heap
page read and write
7DF4C685A000
unkown
page read and write
2DF126A4000
heap
page read and write
2DF12685000
heap
page read and write
3142000
heap
page read and write
3142000
heap
page read and write
818000E4000
direct allocation
page read and write
3132000
heap
page read and write
2DF12634000
heap
page read and write
2DF128B2000
heap
page read and write
48D80002C000
trusted library allocation
page read and write
2DF12664000
heap
page read and write
794E7FE000
stack
page read and write
216E0001C000
direct allocation
page read and write
2DF12685000
heap
page read and write
2DF12624000
heap
page read and write
2DF106D5000
heap
page read and write
3142000
heap
page read and write
7DF4C6856000
unkown
page read and write
7A0000A4000
trusted library allocation
page read and write
2DF10625000
heap
page read and write
2DF1263C000
heap
page read and write
3142000
heap
page read and write
2164ECC0000
heap
page read and write
2DF12879000
heap
page read and write
7A000088000
trusted library allocation
page read and write
2DF12654000
heap
page read and write
2DF126AD000
heap
page read and write
2DF128D5000
heap
page read and write
2DF1062E000
heap
page read and write
18A54AC0000
heap
page read and write
50C000130000
trusted library allocation
page read and write
48DC008F0000
trusted library allocation
page read and write
48DC00B2C000
trusted library allocation
page read and write
2DF10617000
heap
page read and write
CA503FA000
stack
page read and write
2DF128E5000
heap
page read and write
48D800114000
trusted library allocation
page read and write
E68590E000
stack
page read and write
2DF1269D000
heap
page read and write
2DF106B1000
heap
page read and write
2DF128DD000
heap
page read and write
3142000
heap
page read and write
79547FF000
trusted library allocation
page read and write
3132000
heap
page read and write
81800054000
direct allocation
page read and write
2DF128AD000
heap
page read and write
216E00040000
direct allocation
page read and write
2DF1267D000
heap
page read and write
1CFEFC94000
trusted library allocation
page read and write
2DF12615000
heap
page read and write
1AFE87E0000
heap
page readonly
2DF12665000
heap
page read and write
2DF12654000
heap
page read and write
181800048000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
3100000
unkown
page read and write
CA583FE000
stack
page read and write
3132000
heap
page read and write
1CFEBD2F000
heap
page read and write
2DF106CE000
heap
page read and write
2DF1061B000
heap
page read and write
2DF128DD000
heap
page read and write
2DF106B3000
heap
page read and write
48DC00928000
trusted library allocation
page read and write
48DC001E8000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
3132000
heap
page read and write
2DF1263C000
heap
page read and write
48DC0018C000
trusted library allocation
page read and write
48DC0041C000
trusted library allocation
page read and write
2DF128C5000
heap
page read and write
48DC00208000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
73D40007C000
direct allocation
page read and write
CA523FB000
stack
page read and write
2DF128B2000
heap
page read and write
2DF128D4000
heap
page read and write
48DC0124C000
trusted library allocation
page read and write
2DF106DC000
heap
page read and write
373E000
stack
page read and write
1CFEBD38000
heap
page read and write
2DF1267D000
heap
page read and write
3142000
heap
page read and write
2DF12670000
heap
page read and write
3132000
heap
page read and write
2DF106D6000
heap
page read and write
2DF10612000
heap
page read and write
48D800108000
trusted library allocation
page read and write
2DF12670000
heap
page read and write
2DF103D0000
unclassified section
page readonly
1AFE89DA000
heap
page read and write
2DF12638000
heap
page read and write
48DC00BD0000
trusted library allocation
page read and write
3142000
heap
page read and write
50C000498000
trusted library allocation
page read and write
216E00078000
direct allocation
page read and write
2DF12654000
heap
page read and write
48DC009D8000
trusted library allocation
page read and write
48DC001F8000
trusted library allocation
page read and write
25AD1040000
heap
page readonly
48DC00214000
trusted library allocation
page read and write
2DF128E2000
heap
page read and write
2DF10451000
heap
page read and write
79587FF000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
50C0001D0000
trusted library allocation
page read and write
2DF105E0000
heap
page read and write
2DF128D5000
heap
page read and write
2DF128E5000
heap
page read and write
1CFF20F7000
unclassified section
page read and write
3132000
heap
page read and write
5601000
heap
page read and write
73D40006C000
direct allocation
page read and write
3142000
heap
page read and write
81800028000
direct allocation
page read and write
3142000
heap
page read and write
48DC00974000
trusted library allocation
page read and write
2F6E000
heap
page read and write
2DF12616000
heap
page read and write
2DF12625000
heap
page read and write
3132000
heap
page read and write
749000
unkown
page readonly
2DF10625000
heap
page read and write
1CFE86B5000
heap
page read and write
50C00017C000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
CA5A3FF000
stack
page read and write
50C0001C4000
trusted library allocation
page read and write
48DC00C88000
trusted library allocation
page read and write
D9E000
heap
page read and write
2DF106C1000
heap
page read and write
E68599F000
stack
page read and write
795BFFC000
stack
page read and write
2DF126B4000
heap
page read and write
21650B54000
heap
page read and write
7953FFF000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
1CFEBF70000
heap
page read and write
2DF12561000
heap
page read and write
48D800048000
trusted library allocation
page read and write
1CFE8687000
heap
page read and write
2164EC78000
heap
page read and write
3142000
heap
page read and write
3132000
heap
page read and write
3142000
heap
page read and write
48D800208000
trusted library allocation
page read and write
48D80014C000
trusted library allocation
page read and write
21650B3B000
heap
page read and write
2DF128DD000
heap
page read and write
1CFE8712000
heap
page read and write
2DF128E5000
heap
page read and write
50C0000E9000
trusted library allocation
page read and write
2DF106AA000
heap
page read and write
2DF128E5000
heap
page read and write
1CFEE390000
trusted library allocation
page read and write
CA513FC000
stack
page read and write
1CFEC29D000
heap
page read and write
2DF128B2000
heap
page read and write
2DF12648000
heap
page read and write
1AFE89E9000
heap
page read and write
2DF106AD000
heap
page read and write
2DF1267D000
heap
page read and write
2DF10698000
heap
page read and write
3132000
heap
page read and write
1CFF1999000
unkown
page readonly
79537FE000
stack
page read and write
48D8000F4000
trusted library allocation
page read and write
2DF106D6000
heap
page read and write
3132000
heap
page read and write
48DC003F4000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
1CFF0270000
trusted library section
page read and write
3142000
heap
page read and write
7A000050000
trusted library allocation
page read and write
2DF12615000
heap
page read and write
7DDE00100000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
3142000
heap
page read and write
2DF106AD000
heap
page read and write
2DF106AD000
heap
page read and write
48D800108000
trusted library allocation
page read and write
2DF12655000
heap
page read and write
2DF1263C000
heap
page read and write
1CFEC291000
heap
page read and write
2DF128DD000
heap
page read and write
C7E000
stack
page read and write
2DF12634000
heap
page read and write
2DF128B9000
heap
page read and write
7948FFE000
stack
page read and write
21650B2B000
heap
page read and write
2DF126B4000
heap
page read and write
2DF12654000
heap
page read and write
2DF1067E000
heap
page read and write
1818000AC000
trusted library allocation
page read and write
2DF1267D000
heap
page read and write
2DF12664000
heap
page read and write
216531E0000
trusted library allocation
page read and write
48DC00180000
trusted library allocation
page read and write
48DC003D8000
trusted library allocation
page read and write
48DC00CEC000
trusted library allocation
page read and write
3142000
heap
page read and write
3142000
heap
page read and write
2DF128D5000
heap
page read and write
1CFE870C000
heap
page read and write
2DF128CD000
heap
page read and write
2DF128E2000
heap
page read and write
3220000
unkown
page read and write
48DC00574000
trusted library allocation
page read and write
48DC00D48000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF12655000
heap
page read and write
2DF128B2000
heap
page read and write
3132000
heap
page read and write
2DF12878000
heap
page read and write
2DF128E5000
heap
page read and write
3132000
heap
page read and write
50C00018C000
trusted library allocation
page read and write
31A1000
heap
page read and write
2DF106C1000
heap
page read and write
700000
unkown
page readonly
3142000
heap
page read and write
2DF125B4000
heap
page read and write
2DF128E5000
heap
page read and write
2DF1266D000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
2DF12634000
heap
page read and write
2DF1061E000
heap
page read and write
2DF128CF000
heap
page read and write
7A0000C0000
trusted library allocation
page read and write
48DC01284000
trusted library allocation
page read and write
2DF106D8000
heap
page read and write
2DF10626000
heap
page read and write
216E000F8000
direct allocation
page read and write
2DF126C5000
heap
page read and write
2DF12685000
heap
page read and write
2DF106CA000
heap
page read and write
48DC00B48000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
2DF12869000
heap
page read and write
21651790000
unkown
page read and write
3142000
heap
page read and write
CA57BFD000
stack
page read and write
48DC00240000
trusted library allocation
page read and write
1E60503E000
system
page execute and read and write
2DF106D2000
heap
page read and write
2DF1269D000
heap
page read and write
2DF128DD000
heap
page read and write
1E605100000
heap
page readonly
1CFF19D5000
unkown
page readonly
3142000
heap
page read and write
48DC002E0000
trusted library allocation
page read and write
2DF126B4000
heap
page read and write
CA54BFF000
stack
page read and write
1CFE8740000
heap
page read and write
2DF128CD000
heap
page read and write
2DF106AD000
heap
page read and write
2DF12615000
heap
page read and write
216531E0000
trusted library allocation
page read and write
5320000
unkown
page read and write
794C7FD000
stack
page read and write
73D4000B0000
direct allocation
page read and write
2DF12664000
heap
page read and write
3132000
heap
page read and write
2DF12656000
heap
page read and write
2DF128E5000
heap
page read and write
5701000
heap
page read and write
2DF1061E000
heap
page read and write
2990000
heap
page read and write
2DF12640000
heap
page read and write
5390000
unkown
page read and write
1CFF2800000
trusted library section
page read and write
2DF10629000
heap
page read and write
2DF128B3000
heap
page read and write
3142000
heap
page read and write
2DF10698000
heap
page read and write
2DF128A0000
heap
page read and write
2E13000
heap
page read and write
2DF106DA000
heap
page read and write
2DF106D1000
heap
page read and write
48DC00664000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF12624000
heap
page read and write
2DF128B3000
heap
page read and write
7DF40F892000
unkown
page read and write
53F0000
unkown
page read and write
3142000
heap
page read and write
2DF128AE000
heap
page read and write
2DF106E0000
trusted library allocation
page read and write
50C00046A000
trusted library allocation
page read and write
73D4000AC000
direct allocation
page read and write
2DF106D1000
heap
page read and write
2DF106CA000
heap
page read and write
2DF106AF000
heap
page read and write
1CFEFCB2000
trusted library allocation
page read and write
5A00000
heap
page read and write
1CFE87B0000
heap
page read and write
2DF128D5000
heap
page read and write
50C000438000
trusted library allocation
page read and write
2DF12655000
heap
page read and write
2DF12624000
heap
page read and write
2DF10627000
heap
page read and write
3142000
heap
page read and write
48D8000C4000
trusted library allocation
page read and write
7945FFD000
stack
page read and write
2DF1061E000
heap
page read and write
B24000
heap
page read and write
3132000
heap
page read and write
48DC00A74000
trusted library allocation
page read and write
34FC000
unkown
page read and write
3142000
heap
page read and write
2DF12670000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12642000
heap
page read and write
79597FB000
unkown
page read and write
2DF128D5000
heap
page read and write
2DF126B4000
heap
page read and write
2DF12654000
heap
page read and write
2DF1061F000
heap
page read and write
2DF128D5000
heap
page read and write
2DF1264C000
heap
page read and write
48DC0070C000
trusted library allocation
page read and write
48DC0079C000
trusted library allocation
page read and write
2DF106A3000
heap
page read and write
181800018000
trusted library allocation
page read and write
2DF106C1000
heap
page read and write
2DF128A5000
heap
page read and write
79527FE000
stack
page read and write
2DF128B6000
heap
page read and write
2DF12695000
heap
page read and write
2DF128D5000
heap
page read and write
2DF105EA000
heap
page read and write
2DF10607000
heap
page read and write
52EE000
stack
page read and write
3250000
unkown
page read and write
2DF1060F000
heap
page read and write
18A52980000
unkown
page execute and read and write
2DF1062C000
heap
page read and write
2DF128CD000
heap
page read and write
2DF12695000
heap
page read and write
CA4A3FE000
stack
page read and write
2DF1264B000
heap
page read and write
2DF106AD000
heap
page read and write
2DF12615000
heap
page read and write
2DF128A5000
heap
page read and write
CBE000
stack
page read and write
2DF1062B000
heap
page read and write
48D800070000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
2DF106B5000
heap
page read and write
50C000140000
trusted library allocation
page read and write
2DF10455000
heap
page read and write
1CFEB1E0000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128D5000
heap
page read and write
5520000
heap
page read and write
48D800018000
trusted library allocation
page read and write
2DF105F1000
heap
page read and write
2DF126A5000
heap
page read and write
2DF128B1000
heap
page read and write
2DF12656000
heap
page read and write
2DF128D5000
heap
page read and write
79557FF000
trusted library allocation
page read and write
18A52920000
unkown
page read and write
1E605080000
heap
page read and write
2DF128E5000
heap
page read and write
18A529CA000
heap
page read and write
2DF1267D000
heap
page read and write
CA553FD000
stack
page read and write
2DF128E5000
heap
page read and write
48D800074000
trusted library allocation
page read and write
3142000
heap
page read and write
50C000450000
trusted library allocation
page read and write
2DF1267D000
heap
page read and write
50C0000EC000
trusted library allocation
page read and write
48DC003F8000
trusted library allocation
page read and write
2DF1264C000
heap
page read and write
2DF128E5000
heap
page read and write
2DF128C5000
heap
page read and write
7A00006C000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
2DF128CD000
heap
page read and write
2DF12634000
heap
page read and write
21650B0F000
heap
page read and write
2DF128E5000
heap
page read and write
31A1000
heap
page read and write
48DC002B4000
trusted library allocation
page read and write
18180002C000
trusted library allocation
page read and write
2DF12624000
heap
page read and write
48DC00158000
trusted library allocation
page read and write
48DC009E0000
trusted library allocation
page read and write
48D800034000
trusted library allocation
page read and write
2DF1267D000
heap
page read and write
2DF106B3000
heap
page read and write
3132000
heap
page read and write
2DF125AA000
heap
page read and write
3132000
heap
page read and write
2DF1263E000
heap
page read and write
3320000
unkown
page read and write
7DF4C6860000
unkown
page read and write
50C00040C000
trusted library allocation
page read and write
7DF4C6864000
unkown
page read and write
2DF12648000
heap
page read and write
2DF128BD000
heap
page read and write
D29000
heap
page read and write
48DC00004000
trusted library allocation
page read and write
48DC00038000
trusted library allocation
page read and write
48DC00601000
trusted library allocation
page read and write
48DC000B1000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
1CFF27D7000
unclassified section
page read and write
7954FFF000
trusted library allocation
page read and write
2DF1062E000
heap
page read and write
181800001000
trusted library allocation
page read and write
2DF12654000
heap
page read and write
2DF128CD000
heap
page read and write
50C00004C000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
48DC0041C000
trusted library allocation
page read and write
D75000
heap
page read and write
36734FC000
stack
page read and write
2DF1061E000
heap
page read and write
48DC00730000
trusted library allocation
page read and write
216E00105000
direct allocation
page read and write
2DF1264B000
heap
page read and write
181800090000
trusted library allocation
page read and write
2DF12664000
heap
page read and write
2DF128E5000
heap
page read and write
1CFEC2CA000
heap
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
50C00010C000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
2DF1267D000
heap
page read and write
2DF12895000
heap
page read and write
D76000
heap
page read and write
73D400058000
direct allocation
page read and write
7956FFF000
trusted library allocation
page read and write
48DC00218000
trusted library allocation
page read and write
2DF106D8000
heap
page read and write
48DC010D8000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF10615000
heap
page read and write
7A0000B4000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12624000
heap
page read and write
181800004000
trusted library allocation
page read and write
2DF106C2000
heap
page read and write
1AFE89D8000
heap
page read and write
5460000
unkown
page read and write
77A000
unkown
page read and write
2DF128B5000
heap
page read and write
3142000
heap
page read and write
1CFF1CF0000
trusted library section
page read and write
7A0000A4000
trusted library allocation
page read and write
2DF1264C000
heap
page read and write
48DC00C3C000
trusted library allocation
page read and write
2DF10610000
heap
page read and write
3142000
heap
page read and write
C30000
heap
page read and write
2DF128E5000
heap
page read and write
50C000480000
trusted library allocation
page read and write
2DF10617000
heap
page read and write
B24000
heap
page read and write
48DC011C0000
trusted library allocation
page read and write
7A000064000
trusted library allocation
page read and write
E685DFB000
stack
page read and write
181800074000
trusted library allocation
page read and write
3132000
heap
page read and write
2C80000
heap
page read and write
2DF128C5000
heap
page read and write
2DF128CD000
heap
page read and write
2DF12655000
heap
page read and write
B24000
heap
page read and write
3132000
heap
page read and write
48DC00C9C000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
2DF128CD000
heap
page read and write
2DF128E5000
heap
page read and write
1CFEC31B000
heap
page read and write
2E13000
heap
page read and write
2DF12761000
heap
page read and write
2DF106CE000
heap
page read and write
2DF128A5000
heap
page read and write
2DF128DD000
heap
page read and write
2DF128CD000
heap
page read and write
2DF106C1000
heap
page read and write
48DC01204000
trusted library allocation
page read and write
2DF12654000
heap
page read and write
2DF128BD000
heap
page read and write
5280000
unclassified section
page readonly
48DC00B14000
trusted library allocation
page read and write
2DF128DD000
heap
page read and write
2DF128E5000
heap
page read and write
7DF4C6866000
unkown
page read and write
48DC003C8000
trusted library allocation
page read and write
48DC00410000
trusted library allocation
page read and write
D9E000
heap
page read and write
48DC00DCC000
trusted library allocation
page read and write
131F000
stack
page read and write
2DF128AF000
heap
page read and write
73D4000C4000
direct allocation
page read and write
CA4E3FE000
stack
page read and write
3142000
heap
page read and write
2164ECE8000
heap
page read and write
2DF12634000
heap
page read and write
2DF106A3000
heap
page read and write
CA4F3FE000
stack
page read and write
2164EC11000
heap
page read and write
3132000
heap
page read and write
2DF1056A000
heap
page read and write
3132000
heap
page read and write
2164EC00000
heap
page read and write
21650B49000
heap
page read and write
3132000
heap
page read and write
1AFE8750000
heap
page read and write
2E02000
heap
page read and write
3132000
heap
page read and write
2DF128C5000
heap
page read and write
2DF106AD000
heap
page read and write
7959FFC000
stack
page read and write
1CFF2340000
trusted library section
page read and write
2DF12615000
heap
page read and write
48DC00230000
trusted library allocation
page read and write
81800018000
direct allocation
page read and write
2DF106CA000
heap
page read and write
18A52D40000
heap
page read and write
3191000
unkown
page read and write
48DC0005C000
trusted library allocation
page read and write
48DC00404000
trusted library allocation
page read and write
2DF103A0000
heap
page readonly
48DC0101C000
trusted library allocation
page read and write
7DDE00078000
trusted library allocation
page read and write
2DF10624000
heap
page read and write
2DF1267D000
heap
page read and write
48DC004F4000
trusted library allocation
page read and write
3132000
heap
page read and write
48DC003C8000
trusted library allocation
page read and write
2DF128DA000
heap
page read and write
21650B43000
heap
page read and write
795C7FE000
stack
page read and write
794B7FE000
stack
page read and write
3132000
heap
page read and write
2DF128C5000
heap
page read and write
3132000
heap
page read and write
48DC00204000
trusted library allocation
page read and write
77C000
unkown
page readonly
1CFF1CD0000
unkown
page readonly
2DF12865000
heap
page read and write
2DF10627000
heap
page read and write
2DF1061F000
heap
page read and write
1CFEC278000
heap
page read and write
2DF1062C000
heap
page read and write
2DF106CA000
heap
page read and write
48DC00228000
trusted library allocation
page read and write
7DDE000A4000
trusted library allocation
page read and write
48DC00C90000
trusted library allocation
page read and write
50C00003C000
trusted library allocation
page read and write
2164ECFB000
heap
page read and write
2DF1060A000
heap
page read and write
2DF128D6000
heap
page read and write
2DF128B3000
heap
page read and write
2DF12615000
heap
page read and write
3142000
heap
page read and write
2DF128BD000
heap
page read and write
48DC01178000
trusted library allocation
page read and write
50C00046C000
trusted library allocation
page read and write
48D8000E9000
trusted library allocation
page read and write
2DF128B2000
heap
page read and write
2164EB90000
heap
page read and write
2DF128BD000
heap
page read and write
73D400068000
direct allocation
page read and write
31A0000
heap
page read and write
2DF12615000
heap
page read and write
E685EFB000
stack
page read and write
3132000
heap
page read and write
2DF128D5000
heap
page read and write
3142000
heap
page read and write
2DF1067D000
heap
page read and write
2DF12648000
heap
page read and write
3142000
heap
page read and write
2DF12685000
heap
page read and write
2DF128B2000
heap
page read and write
2DF126DD000
heap
page read and write
2DF12685000
heap
page read and write
2DF1269D000
heap
page read and write
36C0000
heap
page read and write
334314C000
stack
page read and write
2DF12624000
heap
page read and write
2DF106A3000
heap
page read and write
7A0000B4000
trusted library allocation
page read and write
1CFF1837000
unclassified section
page read and write
2DF128C5000
heap
page read and write
2DF128E5000
heap
page read and write
3132000
heap
page read and write
3132000
heap
page read and write
2DF1285E000
heap
page read and write
CA4D3FE000
stack
page read and write
81800068000
direct allocation
page read and write
2DF128E5000
heap
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
3132000
heap
page read and write
50C0000D4000
trusted library allocation
page read and write
48DC000CC000
trusted library allocation
page read and write
2DF105DE000
heap
page read and write
2DF1060A000
heap
page read and write
8E577FF000
stack
page read and write
1CFF01A0000
trusted library section
page read and write
2164EA10000
heap
page read and write
2DF128BD000
heap
page read and write
2DF106C3000
heap
page read and write
21653197000
unclassified section
page read and write
7958FFF000
trusted library allocation
page read and write
2DF128D8000
heap
page read and write
48DC00330000
trusted library allocation
page read and write
566C000
unkown
page read and write
2DF12670000
heap
page read and write
54EC000
stack
page read and write
2DF128E5000
heap
page read and write
2DF12648000
heap
page read and write
1CFE866B000
heap
page read and write
2DF10624000
heap
page read and write
48D800001000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF10624000
heap
page read and write
1CFEC27E000
heap
page read and write
1CFEBD10000
heap
page read and write
2DF128D5000
heap
page read and write
2DF12654000
heap
page read and write
48DC000DC000
trusted library allocation
page read and write
1818000AD000
trusted library allocation
page read and write
48D800114000
trusted library allocation
page read and write
7DDE00044000
trusted library allocation
page read and write
2DF12615000
heap
page read and write
50C00002C000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF10625000
heap
page read and write
2DF128DA000
heap
page read and write
2DF12625000
heap
page read and write
2DF106B3000
heap
page read and write
25AD1213000
heap
page read and write
2DF128B4000
heap
page read and write
48DC01274000
trusted library allocation
page read and write
2DF1064D000
heap
page read and write
3142000
heap
page read and write
3132000
heap
page read and write
48DC003A0000
trusted library allocation
page read and write
2DF106C5000
heap
page read and write
3142000
heap
page read and write
48DC00D5C000
trusted library allocation
page read and write
2DF128DA000
heap
page read and write
48DC001AC000
trusted library allocation
page read and write
48DC00AE0000
trusted library allocation
page read and write
50C0004B4000
trusted library allocation
page read and write
2DF12624000
heap
page read and write
18A545C0000
heap
page read and write
48DC002C0000
trusted library allocation
page read and write
2DF1062C000
heap
page read and write
2DF1061F000
heap
page read and write
2DF128E5000
heap
page read and write
48DC00814000
trusted library allocation
page read and write
48DC00100000
trusted library allocation
page read and write
2DF12685000
heap
page read and write
3142000
heap
page read and write
B0E000
stack
page read and write
2DF128BD000
heap
page read and write
2DF12615000
heap
page read and write
2DF128E5000
heap
page read and write
48DC008B8000
trusted library allocation
page read and write
2DF12685000
heap
page read and write
48DC000F0000
trusted library allocation
page read and write
48DC00888000
trusted library allocation
page read and write
50C000470000
trusted library allocation
page read and write
B24000
heap
page read and write
2DF10604000
heap
page read and write
2DF1061E000
heap
page read and write
2DF12662000
heap
page read and write
2DF128D5000
heap
page read and write
25AD11A0000
heap
page read and write
2DF128CD000
heap
page read and write
3132000
heap
page read and write
2DF12655000
heap
page read and write
2DF128BD000
heap
page read and write
7DDE000C0000
trusted library allocation
page read and write
79447F6000
stack
page read and write
2DF128CD000
heap
page read and write
2164ECBA000
heap
page read and write
50C000218000
trusted library allocation
page read and write
3142000
heap
page read and write
2DF12664000
heap
page read and write
2164EA20000
heap
page readonly
2DF106C1000
heap
page read and write
2DF1060A000
heap
page read and write
2164ECF6000
heap
page read and write
2DF12086000
heap
page read and write
3132000
heap
page read and write
7DF4C6851000
unkown
page execute read
2DF103F0000
heap
page read and write
7946FFE000
stack
page read and write
8E587FE000
stack
page read and write
2DF128E5000
heap
page read and write
48DC008E0000
trusted library allocation
page read and write
3142000
heap
page read and write
216E00068000
direct allocation
page read and write
81800040000
direct allocation
page read and write
2DF12664000
heap
page read and write
1CFE86D6000
heap
page read and write
7951FFE000
stack
page read and write
48DC00B68000
trusted library allocation
page read and write
2DF12674000
heap
page read and write
2DF105E1000
heap
page read and write
7DF40F853000
unkown
page read and write
2DF126A6000
heap
page read and write
50C00016C000
trusted library allocation
page read and write
79467FE000
stack
page read and write
3142000
heap
page read and write
3460000
unkown
page read and write
3000000
heap
page read and write
2DF12634000
heap
page read and write
48DC00EB0000
trusted library allocation
page read and write
48D800248000
trusted library allocation
page read and write
48DC00110000
trusted library allocation
page read and write
1CFEBD2C000
heap
page read and write
2DF12655000
heap
page read and write
1CFF21B0000
heap
page read and write
2DF128B2000
heap
page read and write
2DF126BA000
heap
page read and write
7DDE00001000
trusted library allocation
page read and write
3142000
heap
page read and write
1CFE86C4000
heap
page read and write
2DF128D5000
heap
page read and write
3142000
heap
page read and write
2DF128E5000
heap
page read and write
2DF1069F000
heap
page read and write
3223000
unkown
page read and write
2DF12616000
heap
page read and write
794FFFE000
stack
page read and write
2DF105DB000
heap
page read and write
2DF106B0000
heap
page read and write
3142000
heap
page read and write
2DF128BD000
heap
page read and write
3142000
heap
page read and write
21653192000
unclassified section
page read and write
2DF128AD000
heap
page read and write
2DF128BD000
heap
page read and write
F99B4FD000
stack
page read and write
2DF128B6000
heap
page read and write
2DF12665000
heap
page read and write
2DF12634000
heap
page read and write
2DF12624000
heap
page read and write
31A1000
heap
page read and write
48DC0068C000
trusted library allocation
page read and write
2DF128A0000
heap
page read and write
2DF1061E000
heap
page read and write
2DF128E5000
heap
page read and write
1CFF1981000
unkown
page readonly
2DF128A5000
heap
page read and write
48DC00704000
trusted library allocation
page read and write
2DF128CC000
heap
page read and write
2DF106CA000
heap
page read and write
3142000
heap
page read and write
73D4000C0000
direct allocation
page read and write
48DC010B4000
trusted library allocation
page read and write
48DC00024000
trusted library allocation
page read and write
1CFF1997000
unkown
page readonly
3142000
heap
page read and write
2DF128E5000
heap
page read and write
3001000
heap
page read and write
3142000
heap
page read and write
2DF1264C000
heap
page read and write
2DF10722000
heap
page read and write
3132000
heap
page read and write
2DF12664000
heap
page read and write
2DF128A5000
heap
page read and write
2DF1263C000
heap
page read and write
3132000
heap
page read and write
2DF126B5000
heap
page read and write
2DF128E5000
heap
page read and write
3132000
heap
page read and write
2DF106C1000
heap
page read and write
7DDE00088000
trusted library allocation
page read and write
81800084000
direct allocation
page read and write
2DF105E9000
heap
page read and write
3142000
heap
page read and write
1CFEBD2C000
heap
page read and write
48DC00CF8000
trusted library allocation
page read and write
48DC00E42000
trusted library allocation
page read and write
3142000
heap
page read and write
79457FF000
stack
page read and write
2DF128B5000
heap
page read and write
48DC00584000
trusted library allocation
page read and write
2DF1263E000
heap
page read and write
2DF12664000
heap
page read and write
3132000
heap
page read and write
2DF128E5000
heap
page read and write
48DC00A28000
trusted library allocation
page read and write
794AFFE000
stack
page read and write
48D80020C000
trusted library allocation
page read and write
18A546A7000
heap
page read and write
1CFEBD30000
heap
page read and write
2DF128D5000
heap
page read and write
2DF12871000
heap
page read and write
55D0000
unkown
page read and write
216E0000C000
direct allocation
page read and write
2DF128E5000
heap
page read and write
81800001000
direct allocation
page read and write
48DC0102C000
trusted library allocation
page read and write
79487FE000
stack
page read and write
2DF1286D000
heap
page read and write
E685D7B000
stack
page read and write
48DC01014000
trusted library allocation
page read and write
2DF128A5000
heap
page read and write
31B0000
unkown
page read and write
2DF1060A000
heap
page read and write
50C000054000
trusted library allocation
page read and write
216E0008C000
direct allocation
page read and write
3012000
heap
page read and write
2DF105D0000
heap
page read and write
2DF12665000
heap
page read and write
2DF128E5000
heap
page read and write
48DC007D9000
trusted library allocation
page read and write
25AD11F0000
unclassified section
page readonly
2DF106B0000
heap
page read and write
48DC004ED000
trusted library allocation
page read and write
2DF12685000
heap
page read and write
2DF105F2000
heap
page read and write
32BE000
stack
page read and write
310C000
heap
page read and write
48DC004E8000
trusted library allocation
page read and write
216E0002C000
direct allocation
page read and write
1CFEC2C2000
heap
page read and write
319F000
heap
page read and write
1CFEC2AC000
heap
page read and write
2DF12634000
heap
page read and write
2DF128E5000
heap
page read and write
2DF10604000
heap
page read and write
5590000
heap
page read and write
48DC00001000
trusted library allocation
page read and write
3142000
heap
page read and write
50C000201000
trusted library allocation
page read and write
2DF106AD000
heap
page read and write
18A529C0000
heap
page read and write
7DDE00070000
trusted library allocation
page read and write
2DF106CA000
heap
page read and write
1E6052E0000
heap
page read and write
48DC01144000
trusted library allocation
page read and write
3270000
unkown
page read and write
48DC01098000
trusted library allocation
page read and write
1CFEBD3E000
heap
page read and write
48DC0020C000
trusted library allocation
page read and write
7A000008000
trusted library allocation
page read and write
48D8000B0000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
2DF106B5000
heap
page read and write
1818000AC000
trusted library allocation
page read and write
48DC004DC000
trusted library allocation
page read and write
2DF1263C000
heap
page read and write
7DDE00054000
trusted library allocation
page read and write
48DC004CC000
trusted library allocation
page read and write
48DC005A0000
trusted library allocation
page read and write
2DF106CA000
heap
page read and write
48DC009C3000
trusted library allocation
page read and write
5490000
unkown
page read and write
25AD1030000
heap
page read and write
18A52C00000
heap
page read and write
2DF12624000
heap
page read and write
48DC0044C000
trusted library allocation
page read and write
2DF102C0000
unkown
page execute and read and write
2164EC2D000
heap
page read and write
3142000
heap
page read and write
48DC01258000
trusted library allocation
page read and write
2DF12664000
heap
page read and write
48DC00A01000
trusted library allocation
page read and write
2DF128D5000
heap
page read and write
3142000
heap
page read and write
48DC00980000
trusted library allocation
page read and write
48DC01260000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
18180003C000
trusted library allocation
page read and write
2DF1067C000
heap
page read and write
2DF128E0000
heap
page read and write
50C00045C000
trusted library allocation
page read and write
2DF128C5000
heap
page read and write
50C0000A4000
trusted library allocation
page read and write
48D8000A4000
trusted library allocation
page read and write
2DF125AF000
heap
page read and write
2DF1266D000
heap
page read and write
73D40009C000
direct allocation
page read and write
1CFEBD22000
heap
page read and write
2DF1267D000
heap
page read and write
48D800124000
trusted library allocation
page read and write
48DC00E7C000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
2DF128CD000
heap
page read and write
E68591C000
stack
page read and write
2DF128BD000
heap
page read and write
48DC001F4000
trusted library allocation
page read and write
25AD123C000
heap
page read and write
1CFE8672000
heap
page read and write
2DF106D8000
heap
page read and write
2DF1263C000
heap
page read and write
2DF12230000
heap
page read and write
48D800100000
trusted library allocation
page read and write
2F00000
heap
page read and write
5270000
unkown
page read and write
1CFEC28D000
heap
page read and write
2DF105E9000
heap
page read and write
7FFAF9740000
direct allocation
page execute and read and write
2DF128AE000
heap
page read and write
2DF128D5000
heap
page read and write
3132000
heap
page read and write
48DC00F78000
trusted library allocation
page read and write
48D800152000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
794F7FC000
stack
page read and write
2DF125B3000
heap
page read and write
48DC0011C000
trusted library allocation
page read and write
700000
unkown
page readonly
18A54681000
heap
page read and write
48D800094000
trusted library allocation
page read and write
48DC00204000
trusted library allocation
page read and write
2DF1266D000
heap
page read and write
2DF128BE000
heap
page read and write
2DF12635000
heap
page read and write
2DF12664000
heap
page read and write
D36000
heap
page read and write
3142000
heap
page read and write
5F00000
heap
page read and write
2DF105E9000
heap
page read and write
48DC00D10000
trusted library allocation
page read and write
2DF126B3000
heap
page read and write
749000
unkown
page readonly
818000D4000
direct allocation
page read and write
3132000
heap
page read and write
48DC008AC000
trusted library allocation
page read and write
2DF126B4000
heap
page read and write
2DF12624000
heap
page read and write
3001000
heap
page read and write
1AFE8671000
remote allocation
page execute and read and write
2DF106BD000
heap
page read and write
2DF12624000
heap
page read and write
50C000194000
trusted library allocation
page read and write
1CFF156D000
heap
page read and write
2DF128D5000
heap
page read and write
2DF128C5000
heap
page read and write
3142000
heap
page read and write
2DF12654000
heap
page read and write
3132000
heap
page read and write
5C00000
heap
page read and write
216E000DC000
direct allocation
page read and write
2DF106C5000
heap
page read and write
2DF128CD000
heap
page read and write
48DC01160000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
1E604F00000
system
page execute and read and write
2DF12615000
heap
page read and write
1CFF1567000
heap
page read and write
305D000
heap
page read and write
2DF128D5000
heap
page read and write
2DF12642000
heap
page read and write
F99BBFA000
stack
page read and write
2DF125B9000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12634000
heap
page read and write
7950FFE000
stack
page read and write
50C000044000
trusted library allocation
page read and write
3132000
heap
page read and write
3132000
heap
page read and write
5A00000
heap
page read and write
2DF128D5000
heap
page read and write
2E00000
heap
page read and write
2DF128C6000
heap
page read and write
3142000
heap
page read and write
5301000
unkown
page read and write
2DF12654000
heap
page read and write
48DC005B0000
trusted library allocation
page read and write
7FFAF9740000
direct allocation
page execute and read and write
3280000
unkown
page read and write
1CFEBD27000
heap
page read and write
2DF106CA000
heap
page read and write
2DF1266D000
heap
page read and write
2DF12634000
heap
page read and write
59C000
stack
page read and write
18A54BC0000
heap
page read and write
2DF128CD000
heap
page read and write
2DF128D5000
heap
page read and write
2DF106AD000
heap
page read and write
2164ED13000
heap
page read and write
2DF128DD000
heap
page read and write
2DF106C1000
heap
page read and write
2DF1062F000
heap
page read and write
3142000
heap
page read and write
2DF105EA000
heap
page read and write
3142000
heap
page read and write
3100000
unkown
page read and write
2DF106D1000
heap
page read and write
48DC00A5C000
trusted library allocation
page read and write
2DF106C1000
heap
page read and write
2DF106DA000
heap
page read and write
7959FFE000
stack
page read and write
48DC00DA4000
trusted library allocation
page read and write
2DF125B4000
heap
page read and write
2DF12634000
heap
page read and write
2DF128D8000
heap
page read and write
2DF10610000
heap
page read and write
50C0004C0000
trusted library allocation
page read and write
48DC01080000
trusted library allocation
page read and write
3142000
heap
page read and write
2DF128AE000
heap
page read and write
3132000
heap
page read and write
2DF128D5000
heap
page read and write
3142000
heap
page read and write
2DF128E5000
heap
page read and write
18A52CCF000
unkown
page read and write
48DC00018000
trusted library allocation
page read and write
2DF106B3000
heap
page read and write
2DF10629000
heap
page read and write
3132000
heap
page read and write
2DF12655000
heap
page read and write
2DF106AD000
heap
page read and write
2DF12614000
heap
page read and write
7A000068000
trusted library allocation
page read and write
2DF128E5000
heap
page read and write
CA55BFB000
stack
page read and write
2DF128A5000
heap
page read and write
2DF128BD000
heap
page read and write
3132000
heap
page read and write
2DF128CC000
heap
page read and write
2DF128E5000
heap
page read and write
18A5469E000
heap
page read and write
2DF128D5000
heap
page read and write
2DF10613000
heap
page read and write
2DF10629000
heap
page read and write
2DF12665000
heap
page read and write
48DC010C4000
trusted library allocation
page read and write
48DC01058000
trusted library allocation
page read and write
2DF10697000
heap
page read and write
18A529C7000
heap
page read and write
7A00002C000
trusted library allocation
page read and write
3142000
heap
page read and write
79517FF000
stack
page read and write
2DF128A0000
heap
page read and write
2DF128D5000
heap
page read and write
2DF1288D000
heap
page read and write
50C000128000
trusted library allocation
page read and write
1818000C0000
trusted library allocation
page read and write
48DC00354000
trusted library allocation
page read and write
2DF12885000
heap
page read and write
7A000004000
trusted library allocation
page read and write
8180002C000
direct allocation
page read and write
1CFE86E5000
heap
page read and write
2DF12664000
heap
page read and write
2DF128BD000
heap
page read and write
18A52C80000
heap
page readonly
2DF12665000
heap
page read and write
2DF128D5000
heap
page read and write
2DF128BD000
heap
page read and write
2DF128BD000
heap
page read and write
50C000001000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
2DF106AD000
heap
page read and write
2DF128B2000
heap
page read and write
2DF128D5000
heap
page read and write
3132000
heap
page read and write
3142000
heap
page read and write
48D800130000
trusted library allocation
page read and write
48DC00718000
trusted library allocation
page read and write
1AFE89C7000
heap
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
2DF12654000
heap
page read and write
216E00001000
direct allocation
page read and write
1CFE86AE000
heap
page read and write
3132000
heap
page read and write
2DF128CD000
heap
page read and write
319F000
heap
page read and write
7A0000A4000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
2DF12642000
heap
page read and write
7A000044000
trusted library allocation
page read and write
2DF12670000
heap
page read and write
8E57FFE000
stack
page read and write
2DF106E0000
unkown
page read and write
3142000
heap
page read and write
25AD1241000
heap
page read and write
2DF128D5000
heap
page read and write
818000F7000
direct allocation
page read and write
2DF106AD000
heap
page read and write
48DC00364000
trusted library allocation
page read and write
2DF128BD000
heap
page read and write
81800074000
direct allocation
page read and write
3142000
heap
page read and write
CA543FD000
stack
page read and write
81800114000
direct allocation
page read and write
2DF12624000
heap
page read and write
7DDE00018000
trusted library allocation
page read and write
334357D000
stack
page read and write
2DF10612000
heap
page read and write
48DC00FE4000
trusted library allocation
page read and write
3142000
heap
page read and write
18A52CC0000
unkown
page read and write
2DF128A5000
heap
page read and write
2DF1267D000
heap
page read and write
7A000060000
trusted library allocation
page read and write
818000DC000
direct allocation
page read and write
48DC00777000
trusted library allocation
page read and write
1E607284000
unkown
page read and write
2DF128B5000
heap
page read and write
2DF12615000
heap
page read and write
2DF128E5000
heap
page read and write
18A52D47000
heap
page read and write
794BFFD000
stack
page read and write
1CFE86B1000
heap
page read and write
1818000AC000
trusted library allocation
page read and write
2DF10438000
heap
page read and write
2DF12654000
heap
page read and write
2DF1266D000
heap
page read and write
2DF12655000
heap
page read and write
48DC00480000
trusted library allocation
page read and write
3132000
heap
page read and write
1CFE8B70000
trusted library allocation
page read and write
1CFE8B80000
trusted library allocation
page read and write
CA44BFE000
stack
page read and write
48DC01288000
trusted library allocation
page read and write
2DF106A2000
heap
page read and write
2DF128BD000
heap
page read and write
2DF128E5000
heap
page read and write
50C00045C000
trusted library allocation
page read and write
5270000
unkown
page read and write
2DF12561000
heap
page read and write
2DF128CD000
heap
page read and write
3132000
heap
page read and write
CA593FE000
stack
page read and write
2DF126A5000
heap
page read and write
2DF128CE000
heap
page read and write
2DF12634000
heap
page read and write
48D8000F0000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF128D5000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12655000
heap
page read and write
3132000
heap
page read and write
48DC001B8000
trusted library allocation
page read and write
1CFEC2A4000
heap
page read and write
2DF126B5000
heap
page read and write
2DF1045E000
heap
page read and write
2DF128BD000
heap
page read and write
48DC00CC4000
trusted library allocation
page read and write
2DF128B5000
heap
page read and write
79477FE000
stack
page read and write
50C000208000
trusted library allocation
page read and write
2DF128CA000
heap
page read and write
778000
unkown
page write copy
3132000
heap
page read and write
2DF128CD000
heap
page read and write
50C0004A8000
trusted library allocation
page read and write
2DF128CD000
heap
page read and write
7952FFE000
stack
page read and write
1CFEBD21000
heap
page read and write
2DF128E5000
heap
page read and write
2DF106CF000
heap
page read and write
3142000
heap
page read and write
2DF128B5000
heap
page read and write
2DF128BD000
heap
page read and write
216E0009C000
direct allocation
page read and write
2DF12655000
heap
page read and write
CA59BFB000
stack
page read and write
2DF10440000
heap
page read and write
1AFE8846000
heap
page read and write
CA443FE000
stack
page read and write
21650A02000
heap
page read and write
181800090000
trusted library allocation
page read and write
1AFE89D8000
heap
page read and write
3132000
heap
page read and write
141F000
stack
page read and write
3142000
heap
page read and write
48DC00401000
trusted library allocation
page read and write
2DF128B7000
heap
page read and write
48DC00310000
trusted library allocation
page read and write
1CFEBD00000
heap
page read and write
53E7000
unkown
page read and write
2DF1264C000
heap
page read and write
CA4B3FE000
stack
page read and write
1AFE89C0000
heap
page read and write
2DEE000
stack
page read and write
48DC0048C000
trusted library allocation
page read and write
48D800204000
trusted library allocation
page read and write
50C00000C000
trusted library allocation
page read and write
81800088000
direct allocation
page read and write
48DC005C0000
trusted library allocation
page read and write
25AD1302000
heap
page read and write
1E60514A000
heap
page read and write
7DF4C6850000
unkown
page read and write
50C0001A0000
trusted library allocation
page read and write
2DF128AD000
heap
page read and write
5410000
unkown
page read and write
701000
unkown
page execute read
48DC001D0000
trusted library allocation
page read and write
2DF128E2000
heap
page read and write
2DF106D6000
heap
page read and write
2DF128BD000
heap
page read and write
2DF105F0000
heap
page read and write
2DF128D5000
heap
page read and write
1CFEC286000
heap
page read and write
1CFF1970000
unkown
page readonly
2DF128BD000
heap
page read and write
21650B1B000
heap
page read and write
3277000
unkown
page read and write
2DF128B5000
heap
page read and write
1CFE8820000
heap
page read and write
2DF103C0000
unclassified section
page readonly
3142000
heap
page read and write
CA50BFD000
stack
page read and write
2DF12655000
heap
page read and write
2DF128CD000
heap
page read and write
48DC00751000
trusted library allocation
page read and write
2DF10683000
heap
page read and write
1818000A0000
trusted library allocation
page read and write
48D8000F4000
trusted library allocation
page read and write
2DF12655000
heap
page read and write
25AD11E0000
unclassified section
page readonly
48DC00590000
trusted library allocation
page read and write
3132000
heap
page read and write
2DF128E5000
heap
page read and write
3142000
heap
page read and write
794DFFD000
stack
page read and write
18A546E7000
heap
page read and write
1CFEC240000
heap
page read and write
C2E000
stack
page read and write
48DC00244000
trusted library allocation
page read and write
2DF128B6000
heap
page read and write
2DF106B0000
heap
page read and write
73D40002C000
direct allocation
page read and write
1CFEC2B6000
heap
page read and write
2164EC13000
heap
page read and write
2DF1267E000
heap
page read and write
2DF12865000
heap
page read and write
48DC0073C000
trusted library allocation
page read and write
2DF1045E000
heap
page read and write
2DF106CE000
heap
page read and write
2DF12634000
heap
page read and write
3132000
heap
page read and write
7DF40F750000
unkown
page read and write
2DF12670000
heap
page read and write
2DF128D5000
heap
page read and write
2DF1062C000
heap
page read and write
50C000204000
trusted library allocation
page read and write
2DF128A5000
heap
page read and write
2DF128B5000
heap
page read and write
18A546A7000
heap
page read and write
48DC004E8000
trusted library allocation
page read and write
739000
unkown
page execute and read and write
2DF128BD000
heap
page read and write
2DF12648000
heap
page read and write
1CFF19B0000
unkown
page readonly
CA4C3FD000
stack
page read and write
2DF1263C000
heap
page read and write
2DF12247000
heap
page read and write
81800108000
direct allocation
page read and write
2DF128E5000
heap
page read and write
1CFEC294000
heap
page read and write
3132000
heap
page read and write
2DF126AD000
heap
page read and write
2DF12695000
heap
page read and write
50C000458000
trusted library allocation
page read and write
2DF1264C000
heap
page read and write
2DF128E5000
heap
page read and write
2DF12623000
heap
page read and write
7947FFE000
stack
page read and write
2DF1285D000
heap
page read and write
48DC00E4C000
trusted library allocation
page read and write
81800008000
direct allocation
page read and write
2DF1061F000
heap
page read and write
3132000
heap
page read and write
79577FF000
trusted library allocation
page read and write
2DF12634000
heap
page read and write
3132000
heap
page read and write
1818000AC000
trusted library allocation
page read and write
There are 2320 hidden memdumps, click here to show them.