IOC Report
SecuriteInfo.com.W32.AIDetect.malware2.20966.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.AIDetect.malware2.20966.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bolson210.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Efterkommelserne.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\GooCanvas-3.0.typelib
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Lib.Platform.Windows.Native.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\NMDllHost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Nonarguable.JAP
data
dropped
C:\Users\user\AppData\Local\Temp\SourceCodePro-Medium.otf
OpenType font data
dropped
C:\Users\user\AppData\Local\Temp\System.Net.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\athcfg20U.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\audio-volume-high.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\battery-level-10-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\directory\filename.exe
data
dropped
C:\Users\user\AppData\Local\Temp\edit-clear-rtl.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\farme.Fej5
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\network-wireless-hotspot-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsiAE0F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vmmemctl.inf
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\catalog.dat
data
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.20966.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.20966.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.20966.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://cdn.discordapp.com/attachments/963535165500588126/979323922124263434/NANO_uyUuDnXlo102.bin9
unknown
https://sectigo.com/CPS0
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://www.symauth.com/rpa00
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://ocsp.thawte.com0
unknown
http://www.nero.com
unknown
https://sectigo.com/CPS0D
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://cdn.discordapp.com/
unknown
http://scripts.sil.org/OFLSource
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://cdn.discordapp.com/attachments/963535165500588126/979323922124263434/NANO_uyUuDnXlo102.bin
162.159.129.233
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://www.symauth.com/cps0(
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ratagain.gleeze.com
23.105.131.186
malicious
cdn.discordapp.com
162.159.129.233

IPs

IP
Domain
Country
Malicious
23.105.131.186
ratagain.gleeze.com
United States
malicious
162.159.129.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Indianerhvding
flbes
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ESPOUSES\Blehavers
Verdea209
HKEY_LOCAL_MACHINE\SOFTWARE\ESPOUSES\Blehavers
Verdea209
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
E10000
remote allocation
page execute and read and write
malicious
2B10000
direct allocation
page execute and read and write
malicious
1EA5E000
trusted library allocation
page read and write
400000
unkown
page readonly
1FDC0000
trusted library allocation
page read and write
2450000
heap
page read and write
1E94F000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1F9DB000
trusted library allocation
page read and write
1367000
heap
page read and write
1C391000
heap
page read and write
1EBC1000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C392000
heap
page read and write
1EC33000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1C391000
heap
page read and write
B0576DB000
stack
page read and write
212A48A0000
heap
page read and write
22BC7729000
heap
page read and write
1EB2C000
trusted library allocation
page read and write
1C391000
heap
page read and write
D8CF3FF000
stack
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA26000
trusted library allocation
page read and write
1F9E4000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1EB9C000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC6CBA000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA28000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EA5F000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
524000
heap
page read and write
209F9000
trusted library allocation
page read and write
22BC6C96000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1E94F000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC2E000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
1EC63000
trusted library allocation
page read and write
1EC62000
trusted library allocation
page read and write
524000
heap
page read and write
1EAFD000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
20710000
trusted library allocation
page read and write
1FDB0000
unkown
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FC60000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
22BC772F000
heap
page read and write
1EB17000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1363000
heap
page read and write
13B9000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FC34000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EAF4000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EA17000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
134D000
heap
page read and write
1EAC4000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
400000
unkown
page readonly
22BC6C90000
heap
page read and write
22BC7741000
heap
page read and write
20290000
trusted library allocation
page read and write
1D1B0000
remote allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E9AE000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EB3C000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1E9A7000
trusted library allocation
page read and write
1FC30000
trusted library allocation
page read and write
1C391000
heap
page read and write
212A49C0000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1EB54000
trusted library allocation
page read and write
1EB4D000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
134D000
heap
page read and write
1FA29000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1E9EE000
trusted library allocation
page read and write
1EC84000
trusted library allocation
page read and write
1FC7C000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EB22000
trusted library allocation
page read and write
22BC6CA8000
heap
page read and write
2380000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC6D29000
heap
page read and write
22BC6C00000
heap
page read and write
1EAB4000
trusted library allocation
page read and write
20280000
unkown
page read and write
1FC50000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1E920000
trusted library allocation
page read and write
1EB42000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1E973000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC6C83000
heap
page read and write
23E0000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FC80000
trusted library allocation
page read and write
1EAA6000
trusted library allocation
page read and write
638000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EA7A000
trusted library allocation
page read and write
98000
stack
page read and write
203F0000
trusted library allocation
page read and write
22BC772C000
heap
page read and write
1C391000
heap
page read and write
212A4A4B000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1EB4C000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EB39000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
212A4A3F000
heap
page read and write
1C391000
heap
page read and write
1340000
heap
page read and write
1FA28000
trusted library allocation
page read and write
22BC772C000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C392000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1EA2C000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EB4D000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EA4A000
trusted library allocation
page read and write
1E9E8000
trusted library allocation
page read and write
1C391000
heap
page read and write
20290000
trusted library allocation
page read and write
1C392000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1EA2E000
trusted library allocation
page read and write
136B000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC6C61000
heap
page read and write
1C391000
heap
page read and write
1EBBC000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C3C8000
heap
page read and write
1C391000
heap
page read and write
1EC5A000
trusted library allocation
page read and write
1EB42000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1C3BC000
heap
page read and write
1C391000
heap
page read and write
1EB69000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC772D000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1335000
heap
page read and write
1C391000
heap
page read and write
1FDD0000
trusted library allocation
page read and write
22BC6C55000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1EC22000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EB90000
trusted library allocation
page read and write
343B000
stack
page read and write
2DA1000
heap
page read and write
22BC777C000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
40A000
unkown
page read and write
1C391000
heap
page read and write
1C3C9000
heap
page read and write
1EC36000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
134D000
heap
page read and write
B057D7E000
stack
page read and write
1D0000
unclassified section
page readonly
22BC775B000
heap
page read and write
1EA38000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
E00000
remote allocation
page read and write
1FA29000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC6D02000
heap
page read and write
1EB79000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EAA3000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FAB0000
trusted library allocation
page read and write
E00000
remote allocation
page read and write
20525000
trusted library allocation
page read and write
1EBCA000
trusted library allocation
page read and write
1EBEC000
trusted library allocation
page read and write
1EC4A000
trusted library allocation
page read and write
1EBC8000
trusted library allocation
page read and write
1EB7B000
trusted library allocation
page read and write
1EBDE000
trusted library allocation
page read and write
1EAE5000
trusted library allocation
page read and write
1EBA4000
trusted library allocation
page read and write
202A0000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1EC4C000
trusted library allocation
page read and write
1F9E3000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
212A4A65000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
520000
heap
page read and write
401000
unkown
page execute read
665000
heap
page read and write
1EB8D000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1EB85000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
22BC7776000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1E9F8000
trusted library allocation
page read and write
1EA9E000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
20520000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E920000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
202B0000
trusted library allocation
page read and write
1EADC000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA28000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FC76000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC7774000
heap
page read and write
1C391000
heap
page read and write
1C392000
heap
page read and write
1C3C7000
heap
page read and write
1FC76000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC66000
trusted library allocation
page read and write
1FA27000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1E9AE000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1F9E4000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1EC8B000
trusted library allocation
page read and write
1E920000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1EBDB000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
22BC6C2A000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
136B000
heap
page read and write
1FA29000
trusted library allocation
page read and write
22BC6C7E000
heap
page read and write
2A90000
trusted library allocation
page read and write
669000
heap
page read and write
1FC76000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1EB79000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC770E000
heap
page read and write
1C391000
heap
page read and write
299F000
stack
page read and write
22BC6C8D000
heap
page read and write
22BC776D000
heap
page read and write
1E94D000
trusted library allocation
page read and write
20527000
trusted library allocation
page read and write
1EBBE000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1FDD7000
trusted library allocation
page read and write
1C391000
heap
page read and write
19A000
stack
page read and write
1EC4F000
trusted library allocation
page read and write
1EA6E000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E920000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC772C000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
20B30000
trusted library allocation
page read and write
212A49B0000
unclassified section
page readonly
23D0000
heap
page read and write
203E8000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E9C8000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1ECA9000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1E920000
trusted library allocation
page read and write
22BC7602000
heap
page read and write
1C391000
heap
page read and write
1E956000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
22BC777C000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1367000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
70056000
unkown
page readonly
1EB84000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
70054000
unkown
page readonly
1E99B000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
22BC7615000
heap
page read and write
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
630000
heap
page read and write
1E99E000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EB19000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
22BC7732000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1E9EC000
trusted library allocation
page read and write
B057C7E000
stack
page read and write
202A0000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1EB73000
trusted library allocation
page read and write
1367000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC6CAE000
heap
page read and write
1C391000
heap
page read and write
1EAAD000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC0F000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FDB5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EAA6000
trusted library allocation
page read and write
22BC6CCA000
heap
page read and write
524000
heap
page read and write
71D000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC770E000
heap
page read and write
6B2000
heap
page read and write
22BC6CCA000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1EBFB000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC6CB6000
heap
page read and write
1EC2C000
trusted library allocation
page read and write
22BC6C27000
heap
page read and write
202A8000
trusted library allocation
page read and write
22BC6CAA000
heap
page read and write
1F9D8000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1EB2A000
trusted library allocation
page read and write
212A4A3C000
heap
page read and write
1C391000
heap
page read and write
1EB42000
trusted library allocation
page read and write
67C000
heap
page read and write
1E997000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC6C51000
heap
page read and write
1EA21000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1330000
heap
page read and write
42C000
unkown
page read and write
1FC30000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
212A4A57000
heap
page read and write
1C391000
heap
page read and write
1EB70000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC3B000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EBDB000
trusted library allocation
page read and write
1FDC5000
trusted library allocation
page read and write
22BC6CBA000
heap
page read and write
22BC7756000
heap
page read and write
1E9FC000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
22BC6C3A000
heap
page read and write
1340000
heap
page read and write
1FC88000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA90000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1EA3D000
trusted library allocation
page read and write
22BC6CB8000
heap
page read and write
1C391000
heap
page read and write
1EAAD000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EB6C000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1F9D3000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC777C000
heap
page read and write
209F0000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1EA58000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC4F000
trusted library allocation
page read and write
1E99D000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC69000
trusted library allocation
page read and write
1E9BD000
trusted library allocation
page read and write
22BC6BB0000
heap
page read and write
20B30000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EA27000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
45D000
unkown
page read and write
1EC33000
trusted library allocation
page read and write
1F9E1000
trusted library allocation
page read and write
1C391000
heap
page read and write
431000
unkown
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E920000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EA3C000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EB65000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1EA57000
trusted library allocation
page read and write
22BC6BF0000
unclassified section
page readonly
1EADA000
trusted library allocation
page read and write
22BC772C000
heap
page read and write
E00000
remote allocation
page read and write
13B9000
heap
page read and write
22BC7710000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1EB9F000
trusted library allocation
page read and write
524000
heap
page read and write
1C391000
heap
page read and write
1EBBE000
trusted library allocation
page read and write
1E9FB000
trusted library allocation
page read and write
1C392000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EBDD000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
524000
heap
page read and write
1EC02000
trusted library allocation
page read and write
40A000
unkown
page write copy
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA28000
trusted library allocation
page read and write
22BC6C84000
heap
page read and write
1EA77000
trusted library allocation
page read and write
1F9B0000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC6C7B000
heap
page read and write
1EA8B000
trusted library allocation
page read and write
1F9E4000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1E9EE000
trusted library allocation
page read and write
22BC7770000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1E94D000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC9C000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
C80000
heap
page read and write
1EC0C000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EAD4000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
22BC7729000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1E920000
trusted library allocation
page read and write
1C391000
heap
page read and write
D8CF379000
stack
page read and write
1FC70000
trusted library allocation
page read and write
1367000
heap
page read and write
1FA29000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1EBEC000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
212A4B02000
heap
page read and write
1C391000
heap
page read and write
1EC47000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
676000
heap
page read and write
1C391000
heap
page read and write
22BC6C8D000
heap
page read and write
1E94E000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1EA86000
trusted library allocation
page read and write
1EBC6000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1F9E4000
trusted library allocation
page read and write
401000
unkown
page execute read
1C391000
heap
page read and write
1C391000
heap
page read and write
1367000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EAC9000
trusted library allocation
page read and write
1C391000
heap
page read and write
289F000
stack
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC6C6D000
heap
page read and write
1E99B000
trusted library allocation
page read and write
22BC776B000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1EA1E000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
460000
unkown
page readonly
30000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
22BC6C97000
heap
page read and write
1EC84000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
22BC6ED0000
heap
page read and write
212A4A13000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1C392000
heap
page read and write
1EAF4000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E9EE000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
930000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1331000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1EA1B000
trusted library allocation
page read and write
212A4A6E000
heap
page read and write
22BC74C0000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
D8CF6FE000
stack
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
20280000
trusted library allocation
page read and write
1C391000
heap
page read and write
D8CEF6F000
stack
page read and write
1EA91000
trusted library allocation
page read and write
1FA21000
trusted library allocation
page read and write
20295000
trusted library allocation
page read and write
1EC1B000
trusted library allocation
page read and write
1E953000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC50000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F992000
trusted library allocation
page read and write
1ECA6000
trusted library allocation
page read and write
1FDB0000
unkown
page read and write
1C391000
heap
page read and write
1335000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EA1C000
trusted library allocation
page read and write
1FDB0000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
22BC6C41000
heap
page read and write
22BC6D13000
heap
page read and write
1E9E9000
trusted library allocation
page read and write
1EA4F000
trusted library allocation
page read and write
1EC1A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EC0D000
trusted library allocation
page read and write
231E000
stack
page read and write
1C391000
heap
page read and write
1EA09000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1FC77000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
2DA1000
heap
page read and write
1FA90000
trusted library allocation
page read and write
1FA90000
trusted library allocation
page read and write
22BC6B40000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1FC76000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1EC3B000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FDB0000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
524000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FC80000
trusted library allocation
page read and write
1C3C8000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
22BC773B000
heap
page read and write
1E9ED000
trusted library allocation
page read and write
20520000
trusted library allocation
page read and write
22BC7737000
heap
page read and write
212A5202000
trusted library allocation
page read and write
1C391000
heap
page read and write
1D1B0000
remote allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1335000
heap
page read and write
13B9000
heap
page read and write
70050000
unkown
page readonly
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EBFC000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
408000
unkown
page readonly
1C391000
heap
page read and write
1C391000
heap
page read and write
20720000
trusted library allocation
page read and write
524000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FDB6000
trusted library allocation
page read and write
1EA70000
trusted library allocation
page read and write
1EBFF000
trusted library allocation
page read and write
B057E7A000
stack
page read and write
1FC76000
trusted library allocation
page read and write
1E993000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
E00000
remote allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
22DE000
stack
page read and write
1ECA3000
trusted library allocation
page read and write
408000
unkown
page readonly
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1340000
heap
page read and write
22BC6C94000
heap
page read and write
22BC6C93000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1EA05000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1EB0C000
trusted library allocation
page read and write
1C391000
heap
page read and write
20B30000
trusted library allocation
page read and write
203E0000
trusted library allocation
page read and write
1E96D000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC6F000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC15000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
212A4A34000
heap
page read and write
1C391000
heap
page read and write
1E975000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
22BC6C13000
heap
page read and write
22BC7770000
heap
page read and write
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC7713000
heap
page read and write
20520000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
2CA0000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
20A00000
trusted library allocation
page read and write
1EC54000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA95000
trusted library allocation
page read and write
1C391000
heap
page read and write
203E0000
trusted library allocation
page read and write
1EB32000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C392000
heap
page read and write
1EACD000
trusted library allocation
page read and write
524000
heap
page read and write
1EC7A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
1F9E4000
trusted library allocation
page read and write
1EB15000
trusted library allocation
page read and write
1EB9C000
trusted library allocation
page read and write
1EA8D000
trusted library allocation
page read and write
1367000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EC3A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
22BC7776000
heap
page read and write
1EC32000
trusted library allocation
page read and write
1FC76000
trusted library allocation
page read and write
212A51B0000
trusted library allocation
page read and write
22BC7700000
heap
page read and write
1FA29000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA29000
trusted library allocation
page read and write
202B0000
trusted library allocation
page read and write
1E93F000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1EBB3000
trusted library allocation
page read and write
13B1000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
22BC6CAC000
heap
page read and write
1331000
heap
page read and write
20B50000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
2C11000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
22BC772A000
heap
page read and write
22BC6C90000
heap
page read and write
1F9E4000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA28000
trusted library allocation
page read and write
1FA90000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E99E000
trusted library allocation
page read and write
1EB44000
trusted library allocation
page read and write
1C391000
heap
page read and write
1E9E9000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FC30000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC6CB8000
heap
page read and write
70051000
unkown
page execute read
202A0000
trusted library allocation
page read and write
440000
unkown
page read and write
1C391000
heap
page read and write
13B9000
heap
page read and write
22BC7774000
heap
page read and write
22BC6C7D000
heap
page read and write
1EB52000
trusted library allocation
page read and write
2DA0000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
46E9000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
212A4A5C000
heap
page read and write
1FA28000
trusted library allocation
page read and write
1EA3C000
trusted library allocation
page read and write
22BC6C95000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EC4F000
trusted library allocation
page read and write
1EBDE000
trusted library allocation
page read and write
1EAC1000
trusted library allocation
page read and write
1EA46000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
E00000
remote allocation
page read and write
1C391000
heap
page read and write
1FC30000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
722000
heap
page read and write
135B000
heap
page read and write
1335000
heap
page read and write
1E952000
trusted library allocation
page read and write
1E9CB000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1EB23000
trusted library allocation
page read and write
333C000
stack
page read and write
C85000
heap
page read and write
1C391000
heap
page read and write
22BC7600000
heap
page read and write
1FC36000
trusted library allocation
page read and write
1E920000
trusted library allocation
page read and write
1D1B0000
remote allocation
page read and write
1E9BB000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C3C5000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1FA20000
trusted library allocation
page read and write
212A4A2A000
heap
page read and write
1C392000
heap
page read and write
1FC40000
trusted library allocation
page read and write
1FC70000
trusted library allocation
page read and write
1E963000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
1F9E4000
trusted library allocation
page read and write
1EB90000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EBF3000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
22BC6D00000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
13B9000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA90000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1340000
heap
page read and write
1EB19000
trusted library allocation
page read and write
1E9A5000
trusted library allocation
page read and write
1EC69000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C3BC000
heap
page read and write
20298000
trusted library allocation
page read and write
1FC75000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1FC77000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EA5D000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EAFD000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA2A000
trusted library allocation
page read and write
22BC6C83000
heap
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
460000
unkown
page readonly
1C391000
heap
page read and write
1EC2C000
trusted library allocation
page read and write
1EC8B000
trusted library allocation
page read and write
1EAF5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA90000
trusted library allocation
page read and write
1FC75000
trusted library allocation
page read and write
20526000
trusted library allocation
page read and write
1C391000
heap
page read and write
1FA20000
trusted library allocation
page read and write
13B9000
heap
page read and write
1EB8D000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1EC63000
trusted library allocation
page read and write
1C391000
heap
page read and write
22BC7702000
heap
page read and write
71A000
heap
page read and write
22BC7740000
heap
page read and write
1C391000
heap
page read and write
1FA28000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
212A4840000
heap
page read and write
1F9D8000
trusted library allocation
page read and write
1EC17000
trusted library allocation
page read and write
23D4000
heap
page read and write
1C391000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1EBA6000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
212A4A02000
heap
page read and write
1E953000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
212A4A41000
heap
page read and write
134D000
heap
page read and write
209F0000
trusted library allocation
page read and write
1E977000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C392000
heap
page read and write
212A4A00000
heap
page read and write
1C391000
heap
page read and write
1FA28000
trusted library allocation
page read and write
1EAEC000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1F9F5000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1EBE2000
trusted library allocation
page read and write
1FA2A000
trusted library allocation
page read and write
10E4000
heap
page read and write
1FA29000
trusted library allocation
page read and write
1E920000
trusted library allocation
page read and write
1EB4B000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
1F9AD000
trusted library allocation
page read and write
1FA28000
trusted library allocation
page read and write
1EA9B000
trusted library allocation
page read and write
1C391000
heap
page read and write
1C391000
heap
page read and write
1EAF7000
trusted library allocation
page read and write
1FA29000
trusted library allocation
page read and write
D8CF4FD000
stack
page read and write
1C391000
heap
page read and write
1331000
heap
page read and write
1C391000
heap
page read and write
1E96E000
trusted library allocation
page read and write
1F9F5000
trusted library allocation
page read and write
1C391000
heap
page read and write
1EBCE000
trusted library allocation
page read and write
D8CEEEB000
stack
page read and write
1FC70000
trusted library allocation
page read and write
There are 1121 hidden memdumps, click here to show them.