IOC Report
5BQwrSLxIZ.exe

loading gif

Files

File Path
Type
Category
Malicious
5BQwrSLxIZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_5BQwrSLxIZ.exe_a9ba49c7245ad8289743d6dec860987f3a8b130_f5687a89_bb96e053-6649-426c-a59c-48c3ef7832e6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\CAKKKFBFIDGDBFHJJEHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBAKFCBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A09.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:42:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BA1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BC1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5b62db7d-4de8-4b33-bf9b-d525046a5cba.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7dd6364e-2921-4813-987c-5a2f1566d216.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\92d6f07d-334c-45d6-9e98-84e692c2dfa2.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67211E82-1EDC.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37ea7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37fd0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3800e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c28823ba-998f-427f-959e-c9972e3c59de.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\da546ba8-3058-4122-88e2-49033be096ca.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 16:42:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (798)
downloaded
Chrome Cache Entry: 96
ASCII text
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 99
SVG Scalable Vector Graphics image
downloaded
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5BQwrSLxIZ.exe
"C:\Users\user\Desktop\5BQwrSLxIZ.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2788 --field-trial-handle=2428,i,8417053299692469591,16795964137482112875,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=952 --field-trial-handle=2052,i,5172159360179937622,2345701733477799989,262144 /prefetch:3
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 --field-trial-handle=2124,i,623430963547524201,12155014114524219740,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 1876

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://google-ohttp-relay-join.fastly-edge.com/(
unknown
https://duckduckgo.com/ac/?q=
unknown
https://google-ohttp-relay-join.fastly-edge.com//
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
https://google-ohttp-relay-join.fastly-edge.com/1
unknown
https://google-ohttp-relay-join.fastly-edge.com/7
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://google-ohttp-relay-join.fastly-edge.com/5
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/:
unknown
https://google-ohttp-relay-join.fastly-edge.com/8
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/3586&
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/G
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/J
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/H
unknown
https://google-ohttp-relay-join.fastly-edge.com/O
unknown
https://docs.google.com/presentation/ogl
unknown
https://google-ohttp-relay-join.fastly-edge.com/M
unknown
http://anglebug.com/3862il
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/Q
unknown
https://google-ohttp-relay-join.fastly-edge.com/P
unknown
https://www.google.com/chrome/tips/
unknown
https://google-ohttp-relay-join.fastly-edge.com/V
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://google-ohttp-relay-join.fastly-edge.com/T
unknown
https://drive.google.com/?lfhs=2ation.Result
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/Y
unknown
https://www.google.com/async/ddljson?async=ntp:2erValidator
unknown
http://anglebug.com/6929
unknown
https://google-ohttp-relay-join.fastly-edge.com/c
unknown
http://anglebug.com/3832k
unknown
http://anglebug.com/3965l
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://google-ohttp-relay-join.fastly-edge.com/f
unknown
https://google-ohttp-relay-join.fastly-edge.com/e
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
https://chrome.google.com/webstore?hl=enE
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
http://45.88.76.238/3b55d279dd60140c.phpwininit.exe
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://anglebug.com/8229i
unknown
http://45.88.76.238/3b55d279dd60140c.phpuiX
unknown
https://issuetracker.google.com/161903006
unknown
http://45.88.76.238/3b55d279dd60140c.phpdge
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://plus.google.com
unknown
https://docs.google.com/spreadsheets/
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://45.88.76.238/3b55d279dd60140c.php8~
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmllt
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.74.206
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmlP
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
apis.google.com
unknown
malicious
plus.l.google.com
142.250.74.206
play.google.com
142.250.186.142
www.google.com
142.250.185.228

IPs

IP
Domain
Country
Malicious
45.88.76.238
unknown
Ukraine
malicious
192.168.2.5
unknown
unknown
malicious
142.250.185.228
www.google.com
United States
142.250.74.206
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
142.250.186.142
play.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
ProgramId
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
FileId
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
LowerCaseLongPath
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
LongPathHash
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
Name
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
OriginalFileName
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
Publisher
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
Version
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
BinFileVersion
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
BinaryType
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
ProductName
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
ProductVersion
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
LinkDate
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
BinProductVersion
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
AppxPackageFullName
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
AppxPackageRelativeId
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
Size
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
Language
\REGISTRY\A\{d9e42252-cc44-a996-df66-ff1405a9f246}\Root\InventoryApplicationFile\5bqwrslxiz.exe|41bb4107d1ade296
Usn
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4920000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
4840000
direct allocation
page execute and read and write
malicious
2CBF000
heap
page read and write
malicious
279002220000
trusted library allocation
page read and write
2790031B4000
trusted library allocation
page read and write
457A5FC000
stack
page read and write
279002500000
trusted library allocation
page read and write
179E8D50000
trusted library section
page read and write
1F6C002B4000
trusted library allocation
page read and write
179E21C3000
heap
page read and write
279003984000
trusted library allocation
page read and write
3A6C002E4000
trusted library allocation
page read and write
1F6C00270000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
73E80030A000
direct allocation
page read and write
450D7FE000
stack
page read and write
CC4024E4000
trusted library allocation
page read and write
279002D58000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
CC4023D8000
trusted library allocation
page read and write
279003F48000
trusted library allocation
page read and write
279003B60000
trusted library allocation
page read and write
2344C000
heap
page read and write
279002418000
trusted library allocation
page read and write
279004258000
trusted library allocation
page read and write
2790036BC000
trusted library allocation
page read and write
CC402460000
trusted library allocation
page read and write
2790031C4000
trusted library allocation
page read and write
473CBFE000
unkown
page readonly
CC402580000
trusted library allocation
page read and write
279002440000
trusted library allocation
page read and write
12C400280000
direct allocation
page read and write
179E21C7000
heap
page read and write
279002E50000
trusted library allocation
page read and write
179E21BF000
heap
page read and write
279002500000
trusted library allocation
page read and write
3A6C009C4000
trusted library allocation
page read and write
3A6C00920000
trusted library allocation
page read and write
CC400A01000
trusted library allocation
page read and write
279002C0D000
trusted library allocation
page read and write
3A6C00904000
trusted library allocation
page read and write
CC4025E0000
trusted library allocation
page read and write
CC402498000
trusted library allocation
page read and write
12C40020C000
direct allocation
page read and write
279003FCC000
trusted library allocation
page read and write
3A6C00868000
trusted library allocation
page read and write
279002E4C000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
1A4B6D2F000
heap
page read and write
179DEC90000
heap
page read and write
279002374000
trusted library allocation
page read and write
179E2758000
heap
page read and write
12C400290000
direct allocation
page read and write
1A4B6D31000
heap
page read and write
4509FFE000
unkown
page readonly
279002D44000
trusted library allocation
page read and write
179E4810000
heap
page read and write
279003230000
trusted library allocation
page read and write
73E800284000
direct allocation
page read and write
2790039A4000
trusted library allocation
page read and write
23567000
heap
page read and write
279003540000
trusted library allocation
page read and write
279003A34000
trusted library allocation
page read and write
23640000
trusted library allocation
page read and write
49B000288000
trusted library allocation
page read and write
CC4022F8000
trusted library allocation
page read and write
279003A3C000
trusted library allocation
page read and write
3AA000364000
trusted library allocation
page read and write
CC4025A4000
trusted library allocation
page read and write
279002E4C000
trusted library allocation
page read and write
179E47D0000
heap
page read and write
CC4022A8000
trusted library allocation
page read and write
40E000
unkown
page execute read
279002C44000
trusted library allocation
page read and write
73E800260000
direct allocation
page read and write
279003CE0000
trusted library allocation
page read and write
49B000238000
trusted library allocation
page read and write
1F6C00294000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
73E800210000
direct allocation
page read and write
279002428000
trusted library allocation
page read and write
CC402334000
trusted library allocation
page read and write
49B0002A4000
trusted library allocation
page read and write
47423FC000
stack
page read and write
49B000278000
trusted library allocation
page read and write
3A6C00890000
trusted library allocation
page read and write
279003710000
trusted library allocation
page read and write
279003FE0000
trusted library allocation
page read and write
179E4627000
unclassified section
page read and write
279002F70000
trusted library allocation
page read and write
2790039A4000
trusted library allocation
page read and write
279004228000
trusted library allocation
page read and write
4740BFE000
unkown
page readonly
279003E78000
trusted library allocation
page read and write
27900308C000
trusted library allocation
page read and write
2790031A9000
trusted library allocation
page read and write
CC4024CC000
trusted library allocation
page read and write
4739BFE000
unkown
page readonly
3A6C00894000
trusted library allocation
page read and write
2790042E7000
trusted library allocation
page read and write
3AA000220000
trusted library allocation
page read and write
2790028C0000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
CC4023EC000
trusted library allocation
page read and write
279003180000
trusted library allocation
page read and write
3A6C00601000
trusted library allocation
page read and write
27900396C000
trusted library allocation
page read and write
27900254C000
trusted library allocation
page read and write
279003C01000
trusted library allocation
page read and write
279003E88000
trusted library allocation
page read and write
3A6C00230000
trusted library allocation
page read and write
45655FE000
stack
page read and write
1F6C002A8000
trusted library allocation
page read and write
279002F18000
trusted library allocation
page read and write
27900308C000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
2D13000
heap
page read and write
179DEC40000
heap
page read and write
279003B88000
trusted library allocation
page read and write
4573DFE000
unkown
page readonly
45765FE000
stack
page read and write
279002EFC000
trusted library allocation
page read and write
1F6C00238000
trusted library allocation
page read and write
CC402438000
trusted library allocation
page read and write
279004A15000
trusted library allocation
page read and write
CC4024B0000
trusted library allocation
page read and write
279003A18000
trusted library allocation
page read and write
73E8002D0000
direct allocation
page read and write
279004308000
trusted library allocation
page read and write
279003C84000
trusted library allocation
page read and write
279003568000
trusted library allocation
page read and write
1F6C00220000
trusted library allocation
page read and write
179E21C9000
heap
page read and write
279003C58000
trusted library allocation
page read and write
3A6C00948000
trusted library allocation
page read and write
279004170000
trusted library allocation
page read and write
3A6C007AC000
trusted library allocation
page read and write
179E69DA000
heap
page read and write
279003B2C000
trusted library allocation
page read and write
47EF000
stack
page read and write
179E21C3000
heap
page read and write
23440000
heap
page read and write
1A4B4EB4000
heap
page read and write
4576DFE000
unkown
page readonly
CC4024D8000
trusted library allocation
page read and write
2D37000
heap
page read and write
4501FFE000
unkown
page readonly
1CD8E000
stack
page read and write
2790024A4000
trusted library allocation
page read and write
3A6C0027C000
trusted library allocation
page read and write
1A4B4E53000
heap
page read and write
456A5F8000
stack
page read and write
279002EC4000
trusted library allocation
page read and write
2790024C4000
trusted library allocation
page read and write
2790031C4000
trusted library allocation
page read and write
2790036B4000
trusted library allocation
page read and write
27900438A000
trusted library allocation
page read and write
27900425C000
trusted library allocation
page read and write
27900252C000
trusted library allocation
page read and write
47393FE000
stack
page read and write
73E800274000
direct allocation
page read and write
472BBFE000
unkown
page readonly
2790031B4000
trusted library allocation
page read and write
CC40226C000
trusted library allocation
page read and write
474BBFE000
unkown
page readonly
2790026FC000
trusted library allocation
page read and write
3AA000304000
trusted library allocation
page read and write
279003EAC000
trusted library allocation
page read and write
3A6C002D4000
trusted library allocation
page read and write
279004ADE000
trusted library allocation
page read and write
27900422C000
trusted library allocation
page read and write
3A6C0080C000
trusted library allocation
page read and write
279003C68000
trusted library allocation
page read and write
3A6C0070C000
trusted library allocation
page read and write
3AA000320000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
279003BF8000
trusted library allocation
page read and write
1CC4F000
stack
page read and write
279003C60000
trusted library allocation
page read and write
1CE8F000
stack
page read and write
1A4B6D2D000
heap
page read and write
2790033C4000
trusted library allocation
page read and write
2790042C5000
trusted library allocation
page read and write
279002890000
trusted library allocation
page read and write
CC402220000
trusted library allocation
page read and write
279003E68000
trusted library allocation
page read and write
CC4023C4000
trusted library allocation
page read and write
1A4B4EB7000
heap
page read and write
CC40242C000
trusted library allocation
page read and write
279002B0C000
trusted library allocation
page read and write
12C400284000
direct allocation
page read and write
CC402470000
trusted library allocation
page read and write
CC4024AC000
trusted library allocation
page read and write
279003E64000
trusted library allocation
page read and write
1A4B6D2F000
heap
page read and write
27900260C000
trusted library allocation
page read and write
279002244000
trusted library allocation
page read and write
279003ABC000
trusted library allocation
page read and write
2790029C8000
trusted library allocation
page read and write
279004C1C000
trusted library allocation
page read and write
CC402490000
trusted library allocation
page read and write
279002FB0000
trusted library allocation
page read and write
27900297C000
trusted library allocation
page read and write
279002B0C000
trusted library allocation
page read and write
4510FFE000
unkown
page readonly
279003679000
trusted library allocation
page read and write
279003B7C000
trusted library allocation
page read and write
279002C74000
trusted library allocation
page read and write
279004A50000
trusted library allocation
page read and write
234B0000
heap
page read and write
279003F9C000
trusted library allocation
page read and write
179DED2D000
heap
page read and write
179DED82000
heap
page read and write
3A6C007A0000
trusted library allocation
page read and write
23447000
heap
page read and write
2790031A8000
trusted library allocation
page read and write
279002FF0000
trusted library allocation
page read and write
279003801000
trusted library allocation
page read and write
279003EF8000
trusted library allocation
page read and write
279002540000
trusted library allocation
page read and write
279003524000
trusted library allocation
page read and write
45007FC000
stack
page read and write
2790042E0000
trusted library allocation
page read and write
6C8A1000
unkown
page execute read
279003B28000
trusted library allocation
page read and write
47453FE000
stack
page read and write
279002D44000
trusted library allocation
page read and write
4514FFE000
unkown
page readonly
56E000
unkown
page execute and read and write
279002D44000
trusted library allocation
page read and write
179DEC70000
heap
page read and write
3A6C00430000
trusted library allocation
page read and write
3AA00020C000
trusted library allocation
page read and write
45735FE000
stack
page read and write
CC4023F8000
trusted library allocation
page read and write
CC402664000
trusted library allocation
page read and write
279003E38000
trusted library allocation
page read and write
279002DA0000
trusted library allocation
page read and write
1F6C002F8000
trusted library allocation
page read and write
279000C01000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
1F6C002B4000
trusted library allocation
page read and write
49B0002B0000
trusted library allocation
page read and write
49B0002C0000
trusted library allocation
page read and write
279003B14000
trusted library allocation
page read and write
2790030D8000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
2790024D0000
trusted library allocation
page read and write
279004360000
trusted library allocation
page read and write
CC402428000
trusted library allocation
page read and write
279003180000
trusted library allocation
page read and write
CC402448000
trusted library allocation
page read and write
2C49000
heap
page execute and read and write
279003F18000
trusted library allocation
page read and write
4746BFE000
unkown
page readonly
279004A28000
trusted library allocation
page read and write
2790041F0000
trusted library allocation
page read and write
179E21D1000
heap
page read and write
73E800220000
direct allocation
page read and write
279002AD0000
trusted library allocation
page read and write
279003662000
trusted library allocation
page read and write
179E21C9000
heap
page read and write
279004ADC000
trusted library allocation
page read and write
CC402468000
trusted library allocation
page read and write
279002DAC000
trusted library allocation
page read and write
3A6C00401000
trusted library allocation
page read and write
2790024A8000
trusted library allocation
page read and write
456FDFE000
unkown
page readonly
CC4024FC000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
2790035F0000
trusted library allocation
page read and write
279002B0C000
trusted library allocation
page read and write
CC402230000
trusted library allocation
page read and write
45027FD000
stack
page read and write
279003868000
trusted library allocation
page read and write
2790026D8000
trusted library allocation
page read and write
CC4022E8000
trusted library allocation
page read and write
279003A88000
trusted library allocation
page read and write
3A6C00788000
trusted library allocation
page read and write
2790024A4000
trusted library allocation
page read and write
179E7326000
trusted library section
page read and write
2790032A4000
trusted library allocation
page read and write
1D14E000
stack
page read and write
27900258E000
trusted library allocation
page read and write
279000B1A000
trusted library allocation
page read and write
279002EDC000
trusted library allocation
page read and write
3AA00031C000
trusted library allocation
page read and write
279003BB8000
trusted library allocation
page read and write
47433FE000
unkown
page readonly
1A4B6D55000
heap
page read and write
3A6C0079C000
trusted library allocation
page read and write
450C7FD000
stack
page read and write
179E272D000
heap
page read and write
2790029B0000
trusted library allocation
page read and write
279002E4C000
trusted library allocation
page read and write
279003ECC000
trusted library allocation
page read and write
279002CB8000
trusted library allocation
page read and write
279003A64000
trusted library allocation
page read and write
45775FE000
stack
page read and write
279004201000
trusted library allocation
page read and write
279002794000
trusted library allocation
page read and write
CC40249C000
trusted library allocation
page read and write
279003F5C000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
1A4B4EBA000
heap
page read and write
179DEC30000
heap
page readonly
27900243C000
trusted library allocation
page read and write
179E92B2000
trusted library section
page read and write
279004CA8000
trusted library allocation
page read and write
27900254C000
trusted library allocation
page read and write
12C4002EC000
direct allocation
page read and write
279002540000
trusted library allocation
page read and write
279002654000
trusted library allocation
page read and write
73E800303000
direct allocation
page read and write
1A4B6D3D000
heap
page read and write
279000A18000
trusted library allocation
page read and write
279002540000
trusted library allocation
page read and write
279004A92000
trusted library allocation
page read and write
4511FFE000
unkown
page readonly
279003B78000
trusted library allocation
page read and write
279003A78000
trusted library allocation
page read and write
27900364C000
trusted library allocation
page read and write
2790030A8000
trusted library allocation
page read and write
279003588000
trusted library allocation
page read and write
27900362B000
trusted library allocation
page read and write
279002D60000
trusted library allocation
page read and write
279003970000
trusted library allocation
page read and write
CC402488000
trusted library allocation
page read and write
2790037D4000
trusted library allocation
page read and write
CC402254000
trusted library allocation
page read and write
279003249000
trusted library allocation
page read and write
279003F64000
trusted library allocation
page read and write
2790024A4000
trusted library allocation
page read and write
45047FE000
stack
page read and write
1F0000
heap
page read and write
27900320C000
trusted library allocation
page read and write
27900241C000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
1A4B4F26000
heap
page read and write
279003E9C000
trusted library allocation
page read and write
4A3E000
stack
page read and write
2790026CC000
trusted library allocation
page read and write
279004A3D000
trusted library allocation
page read and write
1F6C002FC000
trusted library allocation
page read and write
CC402474000
trusted library allocation
page read and write
CC402260000
trusted library allocation
page read and write
279003018000
trusted library allocation
page read and write
CC40237C000
trusted library allocation
page read and write
279003CA4000
trusted library allocation
page read and write
279003F94000
trusted library allocation
page read and write
279003998000
trusted library allocation
page read and write
CC4023E4000
trusted library allocation
page read and write
3A6C00220000
trusted library allocation
page read and write
279000F1C000
trusted library allocation
page read and write
CC4025BC000
trusted library allocation
page read and write
3A6C00860000
trusted library allocation
page read and write
279003A30000
trusted library allocation
page read and write
279002DA0000
trusted library allocation
page read and write
279002540000
trusted library allocation
page read and write
450FFFE000
unkown
page readonly
1D2A1000
heap
page read and write
279002269000
trusted library allocation
page read and write
4504FFE000
unkown
page readonly
279003C90000
trusted library allocation
page read and write
2790043E0000
trusted library allocation
page read and write
4507FFE000
unkown
page readonly
1A4B4E5D000
heap
page read and write
279003950000
trusted library allocation
page read and write
279003078000
trusted library allocation
page read and write
3A6C00898000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
3A6C007E4000
trusted library allocation
page read and write
279002354000
trusted library allocation
page read and write
CC40246C000
trusted library allocation
page read and write
CC402420000
trusted library allocation
page read and write
279003B80000
trusted library allocation
page read and write
73E8002EC000
direct allocation
page read and write
CC4025E0000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
279002D4F000
trusted library allocation
page read and write
279003D90000
trusted library allocation
page read and write
4505FFE000
unkown
page readonly
279003960000
trusted library allocation
page read and write
279002430000
trusted library allocation
page read and write
2790024C0000
trusted library allocation
page read and write
2790026CC000
trusted library allocation
page read and write
179E21D3000
heap
page read and write
2BFE000
stack
page read and write
1A4B6D35000
heap
page read and write
27900231C000
trusted library allocation
page read and write
2790024A0000
trusted library allocation
page read and write
279003588000
trusted library allocation
page read and write
279004194000
trusted library allocation
page read and write
279002D48000
trusted library allocation
page read and write
4506FFE000
unkown
page readonly
45795FC000
stack
page read and write
3AA00031C000
trusted library allocation
page read and write
CC40240C000
trusted library allocation
page read and write
179E2A27000
unclassified section
page read and write
3A6C002CC000
trusted library allocation
page read and write
279002394000
trusted library allocation
page read and write
1A4B4E9E000
heap
page read and write
279003C34000
trusted library allocation
page read and write
3AA000418000
trusted library allocation
page read and write
3A6C00884000
trusted library allocation
page read and write
1F6C002A8000
trusted library allocation
page read and write
CC402464000
trusted library allocation
page read and write
27900260C000
trusted library allocation
page read and write
12C4002E4000
direct allocation
page read and write
45147F9000
stack
page read and write
2790024A4000
trusted library allocation
page read and write
27900258C000
trusted library allocation
page read and write
279002EDC000
trusted library allocation
page read and write
CC402494000
trusted library allocation
page read and write
49B000264000
trusted library allocation
page read and write
179DED31000
heap
page read and write
4742BFD000
stack
page read and write
457E5FB000
stack
page read and write
2790027B4000
trusted library allocation
page read and write
1F6C002E4000
trusted library allocation
page read and write
279003C88000
trusted library allocation
page read and write
1A4B4E42000
heap
page read and write
1A4B4E67000
heap
page read and write
279003068000
trusted library allocation
page read and write
2790005D6000
trusted library allocation
page read and write
CC4023DC000
trusted library allocation
page read and write
279002B0C000
trusted library allocation
page read and write
27900405C000
trusted library allocation
page read and write
1A4B6D3D000
heap
page read and write
45695FD000
stack
page read and write
2790023AC000
trusted library allocation
page read and write
2790024C7000
trusted library allocation
page read and write
279002F78000
trusted library allocation
page read and write
279004362000
trusted library allocation
page read and write
12C4002A8000
direct allocation
page read and write
1A4B4D40000
heap
page read and write
CC400401000
trusted library allocation
page read and write
1A4B4E13000
heap
page read and write
1F6C002D8000
trusted library allocation
page read and write
279003A9C000
trusted library allocation
page read and write
2790027F0000
trusted library allocation
page read and write
279002654000
trusted library allocation
page read and write
279004CC4000
trusted library allocation
page read and write
3A6C00840000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
3AA00025C000
trusted library allocation
page read and write
179E2630000
trusted library section
page read and write
2790028D0000
trusted library allocation
page read and write
3AA0002B0000
trusted library allocation
page read and write
279002654000
trusted library allocation
page read and write
3AA000290000
trusted library allocation
page read and write
3AA00027C000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
3A6C0081C000
trusted library allocation
page read and write
2790030CF000
trusted library allocation
page read and write
279003568000
trusted library allocation
page read and write
279002EC4000
trusted library allocation
page read and write
1A4B6D32000
heap
page read and write
279003E74000
trusted library allocation
page read and write
456B5FB000
stack
page read and write
279004BE0000
trusted library allocation
page read and write
49B0002A4000
trusted library allocation
page read and write
279002948000
trusted library allocation
page read and write
27900232C000
trusted library allocation
page read and write
2790043A4000
trusted library allocation
page read and write
279002D4D000
trusted library allocation
page read and write
279004A5C000
trusted library allocation
page read and write
CC4023E0000
trusted library allocation
page read and write
2790024F7000
trusted library allocation
page read and write
45127FE000
stack
page read and write
1A4B4DB0000
trusted library allocation
page read and write
2790032BC000
trusted library allocation
page read and write
3AA0002A4000
trusted library allocation
page read and write
47443FD000
stack
page read and write
179E21C3000
heap
page read and write
3AA000284000
trusted library allocation
page read and write
279003F7C000
trusted library allocation
page read and write
279003488000
trusted library allocation
page read and write
CC402684000
trusted library allocation
page read and write
2790042B1000
trusted library allocation
page read and write
3A6C00210000
trusted library allocation
page read and write
3A6C0084C000
trusted library allocation
page read and write
1F6C002B4000
trusted library allocation
page read and write
279003638000
trusted library allocation
page read and write
4745BFE000
unkown
page readonly
279002A01000
trusted library allocation
page read and write
2790006C2000
trusted library allocation
page read and write
279003FA0000
trusted library allocation
page read and write
27900405C000
trusted library allocation
page read and write
1A4B4F2A000
heap
page read and write
279002C88000
trusted library allocation
page read and write
27900317C000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
1A4B4E6B000
heap
page read and write
1A4B4EB2000
heap
page read and write
279003A58000
trusted library allocation
page read and write
2790035C0000
trusted library allocation
page read and write
474A3FC000
stack
page read and write
279003388000
trusted library allocation
page read and write
279003C70000
trusted library allocation
page read and write
279003A50000
trusted library allocation
page read and write
279002654000
trusted library allocation
page read and write
279003C3C000
trusted library allocation
page read and write
279004B2B000
trusted library allocation
page read and write
CC4025F0000
trusted library allocation
page read and write
279002B84000
trusted library allocation
page read and write
1F6C002F0000
trusted library allocation
page read and write
279002908000
trusted library allocation
page read and write
279002504000
trusted library allocation
page read and write
4515FFE000
unkown
page readonly
3AA000238000
trusted library allocation
page read and write
3A6C006D4000
trusted library allocation
page read and write
279003BA8000
trusted library allocation
page read and write
1A4B4E2C000
heap
page read and write
179E0AD0000
heap
page read and write
279002354000
trusted library allocation
page read and write
23544000
heap
page read and write
2D35000
heap
page read and write
279002F0C000
trusted library allocation
page read and write
450B7FC000
stack
page read and write
456BDFE000
unkown
page readonly
1A4B4E00000
heap
page read and write
3A6C007D0000
trusted library allocation
page read and write
279003524000
trusted library allocation
page read and write
279002E50000
trusted library allocation
page read and write
4570DFE000
unkown
page readonly
CC4024A0000
trusted library allocation
page read and write
2354D000
heap
page read and write
279004118000
trusted library allocation
page read and write
279003661000
trusted library allocation
page read and write
49B0002F0000
trusted library allocation
page read and write
2790029A0000
trusted library allocation
page read and write
CC4024FC000
trusted library allocation
page read and write
279002C9C000
trusted library allocation
page read and write
279002E4C000
trusted library allocation
page read and write
3AA000390000
trusted library allocation
page read and write
279003338000
trusted library allocation
page read and write
49B0002C0000
trusted library allocation
page read and write
73E80024C000
direct allocation
page read and write
279003A8C000
trusted library allocation
page read and write
2790035A8000
trusted library allocation
page read and write
3A6C007D4000
trusted library allocation
page read and write
279003AA4000
trusted library allocation
page read and write
279003ACC000
trusted library allocation
page read and write
4743BFE000
unkown
page readonly
2790039CC000
trusted library allocation
page read and write
3A6C006AC000
trusted library allocation
page read and write
279002934000
trusted library allocation
page read and write
179E69B0000
heap
page read and write
279004B47000
trusted library allocation
page read and write
3A6C00850000
trusted library allocation
page read and write
279002EC4000
trusted library allocation
page read and write
279002438000
trusted library allocation
page read and write
179E1520000
unkown
page read and write
179E21BF000
heap
page read and write
3A6C002B0000
trusted library allocation
page read and write
279004071000
trusted library allocation
page read and write
279003EA8000
trusted library allocation
page read and write
CC4024F0000
trusted library allocation
page read and write
3A6C00974000
trusted library allocation
page read and write
CC402444000
trusted library allocation
page read and write
45077FC000
stack
page read and write
279002F24000
trusted library allocation
page read and write
27900340C000
trusted library allocation
page read and write
279003D90000
trusted library allocation
page read and write
3A6C007E0000
trusted library allocation
page read and write
2BB0000
heap
page read and write
279003CD8000
trusted library allocation
page read and write
279002B38000
trusted library allocation
page read and write
27900283C000
trusted library allocation
page read and write
1A4B6D9E000
heap
page read and write
CC40260C000
trusted library allocation
page read and write
CC402224000
trusted library allocation
page read and write
279003710000
trusted library allocation
page read and write
12C400244000
direct allocation
page read and write
73E800217000
direct allocation
page read and write
2790027A4000
trusted library allocation
page read and write
CC402658000
trusted library allocation
page read and write
45675FE000
stack
page read and write
2790023F4000
trusted library allocation
page read and write
279003BC8000
trusted library allocation
page read and write
279003A4C000
trusted library allocation
page read and write
279002F80000
trusted library allocation
page read and write
279003EF4000
trusted library allocation
page read and write
45755FA000
stack
page read and write
CC402224000
trusted library allocation
page read and write
1A4B4EE7000
heap
page read and write
2790031D0000
trusted library allocation
page read and write
2790022A0000
trusted library allocation
page read and write
2790024C4000
trusted library allocation
page read and write
3A6C007C0000
trusted library allocation
page read and write
1F6C002B4000
trusted library allocation
page read and write
27900408C000
trusted library allocation
page read and write
4744BFE000
unkown
page readonly
3AA000250000
trusted library allocation
page read and write
2790031C4000
trusted library allocation
page read and write
179E21BA000
heap
page read and write
27900250C000
trusted library allocation
page read and write
1A4B4E81000
heap
page read and write
279002DC8000
trusted library allocation
page read and write
179E26E7000
heap
page read and write
27900419C000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
179E4813000
heap
page read and write
3A6C008F0000
trusted library allocation
page read and write
279003E34000
trusted library allocation
page read and write
23540000
heap
page read and write
2790039CC000
trusted library allocation
page read and write
2790023C4000
trusted library allocation
page read and write
CC402240000
trusted library allocation
page read and write
2790023DC000
trusted library allocation
page read and write
279003770000
trusted library allocation
page read and write
400000
unkown
page readonly
279003780000
trusted library allocation
page read and write
1F6C00250000
trusted library allocation
page read and write
179DED7D000
heap
page read and write
3A6C0060C000
trusted library allocation
page read and write
279003C8C000
trusted library allocation
page read and write
279003180000
trusted library allocation
page read and write
279002D45000
trusted library allocation
page read and write
73E800316000
direct allocation
page read and write
279004CB8000
trusted library allocation
page read and write
279003974000
trusted library allocation
page read and write
2790024A4000
trusted library allocation
page read and write
279002201000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
279003994000
trusted library allocation
page read and write
279004AB4000
trusted library allocation
page read and write
3A6C002FC000
trusted library allocation
page read and write
27900256C000
trusted library allocation
page read and write
2790031A9000
trusted library allocation
page read and write
279003B38000
trusted library allocation
page read and write
CC4023F4000
trusted library allocation
page read and write
73E800234000
direct allocation
page read and write
CC402350000
trusted library allocation
page read and write
27900305C000
trusted library allocation
page read and write
3AA000300000
trusted library allocation
page read and write
279004168000
trusted library allocation
page read and write
1F6C002A8000
trusted library allocation
page read and write
279003494000
trusted library allocation
page read and write
3A6C006F0000
trusted library allocation
page read and write
279002C18000
trusted library allocation
page read and write
279002354000
trusted library allocation
page read and write
23562000
heap
page read and write
279004B94000
trusted library allocation
page read and write
279003980000
trusted library allocation
page read and write
27900308C000
trusted library allocation
page read and write
457EDFE000
unkown
page readonly
61ECD000
direct allocation
page readonly
3A6C002B8000
trusted library allocation
page read and write
12C400303000
direct allocation
page read and write
279003558000
trusted library allocation
page read and write
279003F60000
trusted library allocation
page read and write
279003CC4000
trusted library allocation
page read and write
179E21D3000
heap
page read and write
279003488000
trusted library allocation
page read and write
3AA00032C000
trusted library allocation
page read and write
27900318C000
trusted library allocation
page read and write
1A4B4EBA000
heap
page read and write
279000601000
trusted library allocation
page read and write
1F6C002B8000
trusted library allocation
page read and write
1A4B4EE7000
heap
page read and write
279002B68000
trusted library allocation
page read and write
279002E50000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
1A4B4EE7000
heap
page read and write
279004AD0000
trusted library allocation
page read and write
179E2749000
heap
page read and write
49B000235000
trusted library allocation
page read and write
234C0000
heap
page read and write
472A3FE000
stack
page read and write
233AA000
heap
page read and write
45157FE000
stack
page read and write
49B0002A0000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
2790023C4000
trusted library allocation
page read and write
279004C70000
trusted library allocation
page read and write
279004244000
trusted library allocation
page read and write
179DEDD0000
trusted library section
page readonly
1A4B4EC6000
heap
page read and write
27900369C000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
279004068000
trusted library allocation
page read and write
1F6C002A8000
trusted library allocation
page read and write
2790035E8000
trusted library allocation
page read and write
12C400215000
direct allocation
page read and write
279004BCE000
trusted library allocation
page read and write
1A4B6D1A000
heap
page read and write
1D10D000
stack
page read and write
45057FE000
stack
page read and write
2790025A0000
trusted library allocation
page read and write
2790030B8000
trusted library allocation
page read and write
2790036CA000
trusted library allocation
page read and write
27900308C000
trusted library allocation
page read and write
1A4B4EE7000
heap
page read and write
1F6C00288000
trusted library allocation
page read and write
279002420000
trusted library allocation
page read and write
279003F40000
trusted library allocation
page read and write
2790033B4000
trusted library allocation
page read and write
12C400220000
direct allocation
page read and write
CC402601000
trusted library allocation
page read and write
279002EDA000
trusted library allocation
page read and write
1F6C002B8000
trusted library allocation
page read and write
1F6C00274000
trusted library allocation
page read and write
279003550000
trusted library allocation
page read and write
279003530000
trusted library allocation
page read and write
279002558000
trusted library allocation
page read and write
279002D44000
trusted library allocation
page read and write
279003588000
trusted library allocation
page read and write
279003314000
trusted library allocation
page read and write
2790039A4000
trusted library allocation
page read and write
279003354000
trusted library allocation
page read and write
2790026E8000
trusted library allocation
page read and write
47283F3000
stack
page read and write
49F0000
heap
page read and write
279002BE4000
trusted library allocation
page read and write
549000
unkown
page execute and read and write
3AA0002D0000
trusted library allocation
page read and write
2355B000
heap
page read and write
279003B48000
trusted library allocation
page read and write
4747BFE000
unkown
page readonly
179E21D3000
heap
page read and write
279003928000
trusted library allocation
page read and write
1F6C002A8000
trusted library allocation
page read and write
2790027DC000
trusted library allocation
page read and write
279003F8C000
trusted library allocation
page read and write
279003180000
trusted library allocation
page read and write
49B000230000
trusted library allocation
page read and write
27900421A000
trusted library allocation
page read and write
179E21C7000
heap
page read and write
3A6C00801000
trusted library allocation
page read and write
6C949000
unkown
page readonly
2790031C4000
trusted library allocation
page read and write
279004B2F000
trusted library allocation
page read and write
279003328000
trusted library allocation
page read and write
179E69C3000
heap
page read and write
279002524000
trusted library allocation
page read and write
279002384000
trusted library allocation
page read and write
2F0F000
stack
page read and write
27900391C000
trusted library allocation
page read and write
27900250C000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
279004060000
trusted library allocation
page read and write
3A6C00830000
trusted library allocation
page read and write
3AA000248000
trusted library allocation
page read and write
CC40239C000
trusted library allocation
page read and write
279002884000
trusted library allocation
page read and write
3A6C00418000
trusted library allocation
page read and write
3A6C0087C000
trusted library allocation
page read and write
73E800270000
direct allocation
page read and write
3A6C00864000
trusted library allocation
page read and write
279002AF4000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
279003EE4000
trusted library allocation
page read and write
CC402554000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
179E2749000
heap
page read and write
279004228000
trusted library allocation
page read and write
279003F0C000
trusted library allocation
page read and write
179E279F000
heap
page read and write
3A6C0078C000
trusted library allocation
page read and write
279002EDC000
trusted library allocation
page read and write
3A6C008EC000
trusted library allocation
page read and write
27900364C000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
CC402201000
trusted library allocation
page read and write
CC402440000
trusted library allocation
page read and write
279003314000
trusted library allocation
page read and write
27900315C000
trusted library allocation
page read and write
179E2749000
heap
page read and write
1A4B6D35000
heap
page read and write
61ECC000
direct allocation
page read and write
CC402590000
trusted library allocation
page read and write
279003054000
trusted library allocation
page read and write
279002E74000
trusted library allocation
page read and write
279002B9C000
trusted library allocation
page read and write
279002F30000
trusted library allocation
page read and write
1F6C002A8000
trusted library allocation
page read and write
2790036A6000
trusted library allocation
page read and write
CC4024B0000
trusted library allocation
page read and write
179E21C7000
heap
page read and write
2790024A4000
trusted library allocation
page read and write
279003F30000
trusted library allocation
page read and write
66E000
unkown
page execute and read and write
179E46D0000
trusted library allocation
page read and write
279002254000
trusted library allocation
page read and write
4A70000
heap
page read and write
27900315C000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
1A4B4E99000
heap
page read and write
279004188000
trusted library allocation
page read and write
1A4B4F60000
heap
page read and write
279004404000
trusted library allocation
page read and write
456E5FB000
stack
page read and write
23567000
heap
page read and write
3AA000401000
trusted library allocation
page read and write
279003EA4000
trusted library allocation
page read and write
279002434000
trusted library allocation
page read and write
456F5FC000
stack
page read and write
2790028A4000
trusted library allocation
page read and write
2355F000
heap
page read and write
1F6C00278000
trusted library allocation
page read and write
179E2190000
heap
page read and write
279003B18000
trusted library allocation
page read and write
2790031B4000
trusted library allocation
page read and write
CC40244C000
trusted library allocation
page read and write
2790041B4000
trusted library allocation
page read and write
1A4B4D70000
heap
page read and write
279003314000
trusted library allocation
page read and write
3A6C0039C000
trusted library allocation
page read and write
279003690000
trusted library allocation
page read and write
45785FE000
stack
page read and write
2790035E4000
trusted library allocation
page read and write
2790041E0000
trusted library allocation
page read and write
CC4024CC000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
4736BFE000
unkown
page readonly
1A4B4E35000
heap
page read and write
279000201000
trusted library allocation
page read and write
279002ED4000
trusted library allocation
page read and write
279004B81000
trusted library allocation
page read and write
3A6C008B8000
trusted library allocation
page read and write
279003230000
trusted library allocation
page read and write
CC4024D8000
trusted library allocation
page read and write
179E21C3000
heap
page read and write
1D2A1000
heap
page read and write
3AA00060C000
trusted library allocation
page read and write
450CFFE000
unkown
page readonly
27900405C000
trusted library allocation
page read and write
CC4023A8000
trusted library allocation
page read and write
CC40257C000
trusted library allocation
page read and write
27900433D000
trusted library allocation
page read and write
279003AFC000
trusted library allocation
page read and write
179E272E000
heap
page read and write
27900415C000
trusted library allocation
page read and write
279002744000
trusted library allocation
page read and write
27900226B000
trusted library allocation
page read and write
279003390000
trusted library allocation
page read and write
279003618000
trusted library allocation
page read and write
279003196000
trusted library allocation
page read and write
279003E01000
trusted library allocation
page read and write
279002560000
trusted library allocation
page read and write
45107FE000
stack
page read and write
12C400294000
direct allocation
page read and write
2790029D4000
trusted library allocation
page read and write
279003430000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
73E800294000
direct allocation
page read and write
CC4022A2000
trusted library allocation
page read and write
279003CB0000
trusted library allocation
page read and write
279002414000
trusted library allocation
page read and write
279003EFC000
trusted library allocation
page read and write
27900240C000
trusted library allocation
page read and write
1A4B6D90000
heap
page read and write
CC402670000
trusted library allocation
page read and write
179E9161000
trusted library section
page read and write
3A6C006BC000
trusted library allocation
page read and write
27900282C000
trusted library allocation
page read and write
279002A80000
trusted library allocation
page read and write
472EBFE000
unkown
page readonly
27900364C000
trusted library allocation
page read and write
73E8002AC000
direct allocation
page read and write
1A4B6D93000
heap
page read and write
CC4024E4000
trusted library allocation
page read and write
2790042AC000
trusted library allocation
page read and write
457ADFE000
unkown
page readonly
CC402430000
trusted library allocation
page read and write
279002F38000
trusted library allocation
page read and write
73E800244000
direct allocation
page read and write
49B000270000
trusted library allocation
page read and write
179E21C3000
heap
page read and write
2790039CC000
trusted library allocation
page read and write
4567DFE000
unkown
page readonly
49B000201000
trusted library allocation
page read and write
CC402690000
trusted library allocation
page read and write
12C400230000
direct allocation
page read and write
279002E4C000
trusted library allocation
page read and write
CC402594000
trusted library allocation
page read and write
279003AF8000
trusted library allocation
page read and write
6C947000
unkown
page read and write
279003630000
trusted library allocation
page read and write
279003A98000
trusted library allocation
page read and write
4569DFE000
unkown
page readonly
179E21BC000
heap
page read and write
279003BA4000
trusted library allocation
page read and write
73E800230000
direct allocation
page read and write
2790041F0000
trusted library allocation
page read and write
279002A1C000
trusted library allocation
page read and write
179E21D3000
heap
page read and write
279002954000
trusted library allocation
page read and write
1A4B6DD6000
heap
page read and write
1A4B6D10000
heap
page read and write
49B000274000
trusted library allocation
page read and write
3A6C006AC000
trusted library allocation
page read and write
2D37000
heap
page read and write
279003AE8000
trusted library allocation
page read and write
279003A54000
trusted library allocation
page read and write
450A7FE000
stack
page read and write
47353FB000
stack
page read and write
456ADFE000
unkown
page readonly
279003C64000
trusted library allocation
page read and write
279003420000
trusted library allocation
page read and write
279003731000
trusted library allocation
page read and write
2790032E8000
trusted library allocation
page read and write
27900400C000
trusted library allocation
page read and write
279002C28000
trusted library allocation
page read and write
1F6C002B4000
trusted library allocation
page read and write
1A4B4F57000
heap
page read and write
179E91C0000
trusted library section
page read and write
1A4B6D3B000
heap
page read and write
279003BCC000
trusted library allocation
page read and write
279002A98000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
179E21C9000
heap
page read and write
279003309000
trusted library allocation
page read and write
27900300C000
trusted library allocation
page read and write
1A4B4E9E000
heap
page read and write
179E6A0D000
heap
page read and write
2790023E8000
trusted library allocation
page read and write
3A6C00778000
trusted library allocation
page read and write
27900380C000
trusted library allocation
page read and write
73E8002E0000
direct allocation
page read and write
2790040A6000
trusted library allocation
page read and write
279002540000
trusted library allocation
page read and write
279003F98000
trusted library allocation
page read and write
279003E8C000
trusted library allocation
page read and write
CC400601000
trusted library allocation
page read and write
279003C20000
trusted library allocation
page read and write
179E6E57000
unclassified section
page read and write
279003BA0000
trusted library allocation
page read and write
45715FE000
stack
page read and write
279002E50000
trusted library allocation
page read and write
2790024B4000
trusted library allocation
page read and write
279003F14000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
279002EC4000
trusted library allocation
page read and write
4502FFE000
unkown
page readonly
27900257C000
trusted library allocation
page read and write
179E278C000
heap
page read and write
27900258C000
trusted library allocation
page read and write
279003024000
trusted library allocation
page read and write
1F6C00260000
trusted library allocation
page read and write
45017FB000
stack
page read and write
2790023F0000
trusted library allocation
page read and write
1A4B4E2E000
heap
page read and write
2790039B8000
trusted library allocation
page read and write
279004073000
trusted library allocation
page read and write
3A6C00424000
trusted library allocation
page read and write
179E26D0000
heap
page read and write
279003A2C000
trusted library allocation
page read and write
2790024B4000
trusted library allocation
page read and write
1CFCD000
stack
page read and write
CC40248C000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
CC400801000
trusted library allocation
page read and write
279003B84000
trusted library allocation
page read and write
279003BEC000
trusted library allocation
page read and write
279003E30000
trusted library allocation
page read and write
279004C44000
trusted library allocation
page read and write
279003BE0000
trusted library allocation
page read and write
1A4B6DAD000
heap
page read and write
2790030E4000
trusted library allocation
page read and write
179E27BC000
heap
page read and write
279003128000
trusted library allocation
page read and write
CC402454000
trusted library allocation
page read and write
457CDFE000
unkown
page readonly
179E92BD000
trusted library section
page read and write
45037FA000
stack
page read and write
279002E9C000
trusted library allocation
page read and write
45645FE000
unkown
page read and write
456C5FC000
stack
page read and write
179E91E1000
trusted library section
page read and write
CC40220C000
trusted library allocation
page read and write
CC402324000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
12C4002D0000
direct allocation
page read and write
179E21BF000
heap
page read and write
279002E50000
trusted library allocation
page read and write
1F6C002A8000
trusted library allocation
page read and write
1A4B4E6A000
heap
page read and write
279002310000
trusted library allocation
page read and write
457DDFE000
unkown
page readonly
1A4B4EA4000
heap
page read and write
CC4024A8000
trusted library allocation
page read and write
279004C53000
trusted library allocation
page read and write
279003FAC000
trusted library allocation
page read and write
4572DFE000
unkown
page readonly
279003C30000
trusted library allocation
page read and write
279000E01000
trusted library allocation
page read and write
4A7E000
heap
page read and write
73E800318000
direct allocation
page read and write
3A6C008A8000
trusted library allocation
page read and write
179E6A24000
heap
page read and write
279002928000
trusted library allocation
page read and write
279002FA8000
trusted library allocation
page read and write
49B0002A4000
trusted library allocation
page read and write
457B5FC000
stack
page read and write
61ED4000
direct allocation
page readonly
179E8D5E000
trusted library section
page read and write
279001001000
trusted library allocation
page read and write
279004169000
trusted library allocation
page read and write
279002F94000
trusted library allocation
page read and write
27900408C000
trusted library allocation
page read and write
279003AD8000
trusted library allocation
page read and write
279002C10000
trusted library allocation
page read and write
279003770000
trusted library allocation
page read and write
CC40227C000
trusted library allocation
page read and write
3AA0003C4000
trusted library allocation
page read and write
279003E0C000
trusted library allocation
page read and write
27900406C000
trusted library allocation
page read and write
279004124000
trusted library allocation
page read and write
4737BFE000
unkown
page readonly
472ABFE000
unkown
page readonly
4574DFE000
unkown
page readonly
2790040B4000
trusted library allocation
page read and write
279002B48000
trusted library allocation
page read and write
3AA000201000
trusted library allocation
page read and write
3AA0002F4000
trusted library allocation
page read and write
279002A54000
trusted library allocation
page read and write
279003558000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
279002D44000
trusted library allocation
page read and write
49BE000
stack
page read and write
73E800280000
direct allocation
page read and write
73E800250000
direct allocation
page read and write
472E3FE000
stack
page read and write
279003B24000
trusted library allocation
page read and write
401000
unkown
page execute read
CC402534000
trusted library allocation
page read and write
279003626000
trusted library allocation
page read and write
4729BFE000
unkown
page readonly
CC40241C000
trusted library allocation
page read and write
2790033A0000
trusted library allocation
page read and write
279004065000
trusted library allocation
page read and write
279002D4D000
trusted library allocation
page read and write
179E21C7000
heap
page read and write
CC402414000
trusted library allocation
page read and write
473B3FE000
stack
page read and write
3AA000310000
trusted library allocation
page read and write
179E2785000
heap
page read and write
179E21BF000
heap
page read and write
27900320C000
trusted library allocation
page read and write
279003EC0000
trusted library allocation
page read and write
1A4B6D00000
heap
page read and write
2790035A9000
trusted library allocation
page read and write
279002918000
trusted library allocation
page read and write
12C400274000
direct allocation
page read and write
1A4B6D21000
heap
page read and write
49B0002B0000
trusted library allocation
page read and write
3A6C006E8000
trusted library allocation
page read and write
279002B77000
trusted library allocation
page read and write
279003588000
trusted library allocation
page read and write
2790031DC000
trusted library allocation
page read and write
1CD4F000
stack
page read and write
2790039CC000
trusted library allocation
page read and write
279004067000
trusted library allocation
page read and write
279002BC9000
trusted library allocation
page read and write
279002B0C000
trusted library allocation
page read and write
2790031C4000
trusted library allocation
page read and write
CC402540000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
2790024A4000
trusted library allocation
page read and write
45137FD000
stack
page read and write
3A6C00288000
trusted library allocation
page read and write
2790025C0000
trusted library allocation
page read and write
279003629000
trusted library allocation
page read and write
47483FE000
stack
page read and write
CC400E01000
trusted library allocation
page read and write
279002EB8000
trusted library allocation
page read and write
279003338000
trusted library allocation
page read and write
279000001000
trusted library allocation
page read and write
27900272C000
trusted library allocation
page read and write
4A73000
heap
page read and write
1A4B6DB3000
heap
page read and write
179E21C8000
heap
page read and write
279003568000
trusted library allocation
page read and write
472FBFE000
unkown
page readonly
3AA000408000
trusted library allocation
page read and write
279002B1D000
trusted library allocation
page read and write
279002654000
trusted library allocation
page read and write
CC4022AD000
trusted library allocation
page read and write
2790030C0000
trusted library allocation
page read and write
279002E4C000
trusted library allocation
page read and write
279003128000
trusted library allocation
page read and write
279002E58000
trusted library allocation
page read and write
457D5FC000
stack
page read and write
2790030CD000
trusted library allocation
page read and write
2790041E0000
trusted library allocation
page read and write
1A4B4EBB000
heap
page read and write
12C4002AC000
direct allocation
page read and write
2790022E4000
trusted library allocation
page read and write
2790035B5000
trusted library allocation
page read and write
CC402524000
trusted library allocation
page read and write
3A6C00250000
trusted library allocation
page read and write
27900224C000
trusted library allocation
page read and write
179E9150000
trusted library section
page read and write
1F6C00210000
trusted library allocation
page read and write
179E21CB000
heap
page read and write
279003C24000
trusted library allocation
page read and write
2790027C8000
trusted library allocation
page read and write
3A6C0091C000
trusted library allocation
page read and write
CC4022FC000
trusted library allocation
page read and write
279003F4C000
trusted library allocation
page read and write
27900307C000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
279003EBC000
trusted library allocation
page read and write
CC402308000
trusted library allocation
page read and write
4566DFE000
unkown
page readonly
2790037D9000
trusted library allocation
page read and write
27900409C000
trusted library allocation
page read and write
456D5FB000
stack
page read and write
3A6C0025C000
trusted library allocation
page read and write
1F6C00294000
trusted library allocation
page read and write
CC402410000
trusted library allocation
page read and write
2355D000
heap
page read and write
279003934000
trusted library allocation
page read and write
CC40235C000
trusted library allocation
page read and write
179E7650000
trusted library section
page read and write
279003134000
trusted library allocation
page read and write
279003A68000
trusted library allocation
page read and write
2790032E0000
trusted library allocation
page read and write
179E21D1000
heap
page read and write
3A6C006E0000
trusted library allocation
page read and write
179E7850000
trusted library section
page read and write
279003230000
trusted library allocation
page read and write
2790035C0000
trusted library allocation
page read and write
1F6C002C8000
trusted library allocation
page read and write
3A6C00828000
trusted library allocation
page read and write
179E8F5E000
trusted library section
page read and write
27900220C000
trusted library allocation
page read and write
27900240C000
trusted library allocation
page read and write
279003F44000
trusted library allocation
page read and write
CC402450000
trusted library allocation
page read and write
279004118000
trusted library allocation
page read and write
4735BFE000
unkown
page readonly
2790039A0000
trusted library allocation
page read and write
279002EDC000
trusted library allocation
page read and write
279003F28000
trusted library allocation
page read and write
279002601000
trusted library allocation
page read and write
3AA000424000
trusted library allocation
page read and write
279003A01000
trusted library allocation
page read and write
279004090000
trusted library allocation
page read and write
73E800215000
direct allocation
page read and write
3AA000338000
trusted library allocation
page read and write
279003678000
trusted library allocation
page read and write
9C000
stack
page read and write
27900248C000
trusted library allocation
page read and write
279003558000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
279002EC4000
trusted library allocation
page read and write
279003A6C000
trusted library allocation
page read and write
4512FFE000
unkown
page readonly
4577DFE000
unkown
page readonly
3AA000230000
trusted library allocation
page read and write
179E6A30000
heap
page read and write
279003684000
trusted library allocation
page read and write
1D3A0000
trusted library allocation
page read and write
4830000
heap
page read and write
CC4025D0000
trusted library allocation
page read and write
279004B6C000
trusted library allocation
page read and write
279003294000
trusted library allocation
page read and write
279002E3C000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
27900437C000
trusted library allocation
page read and write
2354D000
heap
page read and write
4500FFE000
unkown
page readonly
3A6C006C8000
trusted library allocation
page read and write
3AA0003AC000
trusted library allocation
page read and write
279002CE5000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
6E8000
unkown
page execute and read and write
57B000
unkown
page execute and read and write
2790043F3000
trusted library allocation
page read and write
CC4024C0000
trusted library allocation
page read and write
179E21C8000
heap
page read and write
CC4025B0000
trusted library allocation
page read and write
279003918000
trusted library allocation
page read and write
46EE000
stack
page read and write
279002424000
trusted library allocation
page read and write
279003C0C000
trusted library allocation
page read and write
279003588000
trusted library allocation
page read and write
3AA00032C000
trusted library allocation
page read and write
2790035E0000
trusted library allocation
page read and write
2790024AC000
trusted library allocation
page read and write
279003948000
trusted library allocation
page read and write
19D000
stack
page read and write
73E80021C000
direct allocation
page read and write
473C3FE000
stack
page read and write
45745FE000
stack
page read and write
456CDFE000
unkown
page readonly
179E21D2000
heap
page read and write
2790042C7000
trusted library allocation
page read and write
450AFFE000
unkown
page readonly
279003AD4000
trusted library allocation
page read and write
279002FA1000
trusted library allocation
page read and write
2790023B8000
trusted library allocation
page read and write
279004B34000
trusted library allocation
page read and write
279003588000
trusted library allocation
page read and write
179E21C3000
heap
page read and write
279003AA0000
trusted library allocation
page read and write
12C400210000
direct allocation
page read and write
457F5FD000
stack
page read and write
1A4BDC80000
trusted library allocation
page read and write
450F7FC000
stack
page read and write
279003B1C000
trusted library allocation
page read and write
3A6C00404000
trusted library allocation
page read and write
73E80031C000
direct allocation
page read and write
5A7000
unkown
page execute and read and write
279004C28000
trusted library allocation
page read and write
1F6C00230000
trusted library allocation
page read and write
179E7410000
trusted library section
page read and write
179E92F0000
trusted library section
page read and write
2790041CC000
trusted library allocation
page read and write
3AA000210000
trusted library allocation
page read and write
279002354000
trusted library allocation
page read and write
CC4023B8000
trusted library allocation
page read and write
3A6C008C8000
trusted library allocation
page read and write
CC40229E000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
3AA000284000
trusted library allocation
page read and write
2790041C4000
trusted library allocation
page read and write
279004228000
trusted library allocation
page read and write
1A4BF000000
heap
page read and write
1A4B6D75000
heap
page read and write
279003AC0000
trusted library allocation
page read and write
279003180000
trusted library allocation
page read and write
CC402680000
trusted library allocation
page read and write
279002860000
trusted library allocation
page read and write
27900308C000
trusted library allocation
page read and write
179E21C7000
heap
page read and write
279003494000
trusted library allocation
page read and write
CC4024CC000
trusted library allocation
page read and write
279003C10000
trusted library allocation
page read and write
279004C64000
trusted library allocation
page read and write
279000801000
trusted library allocation
page read and write
279002F58000
trusted library allocation
page read and write
2D37000
heap
page read and write
279002E4C000
trusted library allocation
page read and write
279003AF4000
trusted library allocation
page read and write
279003678000
trusted library allocation
page read and write
279002720000
trusted library allocation
page read and write
279003550000
trusted library allocation
page read and write
73E800201000
direct allocation
page read and write
450EFFE000
unkown
page readonly
2790024A8000
trusted library allocation
page read and write
179DEC98000
heap
page read and write
CC4024D8000
trusted library allocation
page read and write
488000
unkown
page readonly
CC402568000
trusted library allocation
page read and write
2790032BC000
trusted library allocation
page read and write
1A4B6D39000
heap
page read and write
279002538000
trusted library allocation
page read and write
279003CC0000
trusted library allocation
page read and write
279003930000
trusted library allocation
page read and write
279003328000
trusted library allocation
page read and write
279004D54000
trusted library allocation
page read and write
23440000
trusted library allocation
page read and write
2790032C8000
trusted library allocation
page read and write
2790040B8000
trusted library allocation
page read and write
179DEE00000
heap
page read and write
1A4B6D8E000
heap
page read and write
279004344000
trusted library allocation
page read and write
179E73B7000
unclassified section
page read and write
179E9182000
trusted library section
page read and write
279002B28000
trusted library allocation
page read and write
179E21C5000
heap
page read and write
2790024A4000
trusted library allocation
page read and write
279004140000
trusted library allocation
page read and write
1A4B6C13000
heap
page read and write
2790026D4000
trusted library allocation
page read and write
3AA000358000
trusted library allocation
page read and write
450E7FA000
stack
page read and write
2790022B8000
trusted library allocation
page read and write
73E8002D8000
direct allocation
page read and write
179E72E3000
trusted library section
page read and write
2790031C4000
trusted library allocation
page read and write
2790039D0000
trusted library allocation
page read and write
3AA0002D8000
trusted library allocation
page read and write
279002500000
trusted library allocation
page read and write
45705FB000
stack
page read and write
27900254C000
trusted library allocation
page read and write
279003588000
trusted library allocation
page read and write
1A4B4D20000
heap
page read and write
279003288000
trusted library allocation
page read and write
CC400001000
trusted library allocation
page read and write
456DDFE000
unkown
page readonly
279003B74000
trusted library allocation
page read and write
27900308C000
trusted library allocation
page read and write
3A6C00201000
trusted library allocation
page read and write
49B0002D8000
trusted library allocation
page read and write
6C8A0000
unkown
page readonly
279002654000
trusted library allocation
page read and write
47463FE000
stack
page read and write
2790039B8000
trusted library allocation
page read and write
279003679000
trusted library allocation
page read and write
CC4023E8000
trusted library allocation
page read and write
279003201000
trusted library allocation
page read and write
279002ED4000
trusted library allocation
page read and write
23459000
heap
page read and write
1D24E000
stack
page read and write
27900394C000
trusted library allocation
page read and write
279003F00000
trusted library allocation
page read and write
2B91000
unkown
page readonly
CC4022D8000
trusted library allocation
page read and write
3A6C008D8000
trusted library allocation
page read and write
1A4B4F02000
heap
page read and write
279003601000
trusted library allocation
page read and write
27900315C000
trusted library allocation
page read and write
27900408C000
trusted library allocation
page read and write
1A4B4D90000
heap
page read and write
CC4024E4000
trusted library allocation
page read and write
47323FE000
stack
page read and write
279003F44000
trusted library allocation
page read and write
279003F30000
trusted library allocation
page read and write
45117FE000
stack
page read and write
279003354000
trusted library allocation
page read and write
1A4B6D71000
heap
page read and write
279003150000
trusted library allocation
page read and write
279003F90000
trusted library allocation
page read and write
27900242C000
trusted library allocation
page read and write
450BFFE000
unkown
page readonly
279003F68000
trusted library allocation
page read and write
3AA000374000
trusted library allocation
page read and write
279003FBC000
trusted library allocation
page read and write
279002401000
trusted library allocation
page read and write
27900258C000
trusted library allocation
page read and write
1A4B4D50000
heap
page readonly
279002F48000
trusted library allocation
page read and write
2790029C4000
trusted library allocation
page read and write
12C400201000
direct allocation
page read and write
3AA0003A8000
trusted library allocation
page read and write
279003BDC000
trusted library allocation
page read and write
279002900000
trusted library allocation
page read and write
179DED8A000
heap
page read and write
279004B59000
trusted library allocation
page read and write
473A3FD000
stack
page read and write
279004090000
trusted library allocation
page read and write
1F6C002A0000
trusted library allocation
page read and write
CC4025E3000
trusted library allocation
page read and write
3A6C002ED000
trusted library allocation
page read and write
1A4B4E9E000
heap
page read and write
279002304000
trusted library allocation
page read and write
47363FC000
stack
page read and write
474E3FE000
stack
page read and write
1A4BEEF0000
trusted library allocation
page read and write
279002F64000
trusted library allocation
page read and write
3A6C006F4000
trusted library allocation
page read and write
279003288000
trusted library allocation
page read and write
179E2774000
heap
page read and write
2790041D4000
trusted library allocation
page read and write
279004AF8000
trusted library allocation
page read and write
279003B90000
trusted library allocation
page read and write
2790039E0000
trusted library allocation
page read and write
3A6C00238000
trusted library allocation
page read and write
45725FE000
stack
page read and write
CC4023F0000
trusted library allocation
page read and write
2790023C4000
trusted library allocation
page read and write
27900309C000
trusted library allocation
page read and write
279003C5C000
trusted library allocation
page read and write
3AA000350000
trusted library allocation
page read and write
45665FE000
stack
page read and write
279002BC8000
trusted library allocation
page read and write
279004118000
trusted library allocation
page read and write
1F6C002B8000
trusted library allocation
page read and write
279003C80000
trusted library allocation
page read and write
2790023D4000
trusted library allocation
page read and write
2790029EC000
trusted library allocation
page read and write
279003670000
trusted library allocation
page read and write
279002DA0000
trusted library allocation
page read and write
CC400C01000
trusted library allocation
page read and write
3A6C0039C000
trusted library allocation
page read and write
279003C48000
trusted library allocation
page read and write
1A4B6D37000
heap
page read and write
2790037E0000
trusted library allocation
page read and write
3A6C00700000
trusted library allocation
page read and write
3A6C0040C000
trusted library allocation
page read and write
234B4000
heap
page read and write
2790039B8000
trusted library allocation
page read and write
279004AB6000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
3AA000380000
trusted library allocation
page read and write
3A6C00818000
trusted library allocation
page read and write
1A4B6DD4000
heap
page read and write
2790043D7000
trusted library allocation
page read and write
279003B58000
trusted library allocation
page read and write
12C400270000
direct allocation
page read and write
CC402458000
trusted library allocation
page read and write
1F6C002B4000
trusted library allocation
page read and write
45067FD000
stack
page read and write
3A6C0095C000
trusted library allocation
page read and write
3A6C00248000
trusted library allocation
page read and write
279004001000
trusted library allocation
page read and write
23567000
heap
page read and write
4571DFE000
unkown
page readonly
CC40243C000
trusted library allocation
page read and write
279003F08000
trusted library allocation
page read and write
279003918000
trusted library allocation
page read and write
1A4B79C0000
unkown
page read and write
3A6C007BC000
trusted library allocation
page read and write
CC402484000
trusted library allocation
page read and write
2790039CE000
trusted library allocation
page read and write
3A6C00728000
trusted library allocation
page read and write
179E2789000
heap
page read and write
CC402340000
trusted library allocation
page read and write
474EBFE000
unkown
page readonly
27900280C000
trusted library allocation
page read and write
279002E01000
trusted library allocation
page read and write
27900257C000
trusted library allocation
page read and write
3A6C00964000
trusted library allocation
page read and write
3AA000344000
trusted library allocation
page read and write
179DED7D000
heap
page read and write
2790024F0000
trusted library allocation
page read and write
279002EEC000
trusted library allocation
page read and write
3A6C00408000
trusted library allocation
page read and write
279002FE4000
trusted library allocation
page read and write
27900399C000
trusted library allocation
page read and write
179E69EA000
heap
page read and write
2790026B0000
trusted library allocation
page read and write
279002410000
trusted library allocation
page read and write
2790035A8000
trusted library allocation
page read and write
279003BF0000
trusted library allocation
page read and write
1A4B4F2A000
heap
page read and write
27900362E000
trusted library allocation
page read and write
179DED66000
heap
page read and write
CC402534000
trusted library allocation
page read and write
1F6C00264000
trusted library allocation
page read and write
4503FFE000
unkown
page readonly
279002D48000
trusted library allocation
page read and write
279002B7B000
trusted library allocation
page read and write
279002ED4000
trusted library allocation
page read and write
179DEE05000
heap
page read and write
2790023A4000
trusted library allocation
page read and write
179E21D5000
heap
page read and write
2790037D4000
trusted library allocation
page read and write
279003E48000
trusted library allocation
page read and write
279002DD0000
trusted library allocation
page read and write
3AA000308000
trusted library allocation
page read and write
2790022D4000
trusted library allocation
page read and write
2790028F0000
trusted library allocation
page read and write
2C3A000
heap
page read and write
2C30000
heap
page read and write
CC4022B0000
trusted library allocation
page read and write
279003F78000
trusted library allocation
page read and write
279003598000
trusted library allocation
page read and write
27900307C000
trusted library allocation
page read and write
1D3A0000
heap
page read and write
473ABFE000
unkown
page readonly
279004C50000
trusted library allocation
page read and write
1CB4F000
stack
page read and write
2790033E4000
trusted library allocation
page read and write
CC402314000
trusted library allocation
page read and write
45635EF000
stack
page read and write
179E21BF000
heap
page read and write
1F6C00294000
trusted library allocation
page read and write
3A6C006E8000
trusted library allocation
page read and write
CC4024A4000
trusted library allocation
page read and write
CC4022C0000
trusted library allocation
page read and write
27900392C000
trusted library allocation
page read and write
1A4B6DBB000
heap
page read and write
179E21BF000
heap
page read and write
279003C54000
trusted library allocation
page read and write
279003338000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
279003F58000
trusted library allocation
page read and write
CC402424000
trusted library allocation
page read and write
179DEB50000
heap
page read and write
73E800290000
direct allocation
page read and write
4508FFE000
unkown
page readonly
279003822000
trusted library allocation
page read and write
279002CBB000
trusted library allocation
page read and write
279004388000
trusted library allocation
page read and write
CC4024F0000
trusted library allocation
page read and write
179E2400000
heap
page read and write
27900252C000
trusted library allocation
page read and write
179E8F50000
trusted library section
page read and write
179DED7A000
heap
page read and write
1F6C00210000
trusted library allocation
page read and write
1A4B4E99000
heap
page read and write
279003401000
trusted library allocation
page read and write
4E6000
unkown
page execute and read and write
73E8002C0000
direct allocation
page read and write
279004A01000
trusted library allocation
page read and write
279004604000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
279003428000
trusted library allocation
page read and write
279000458000
trusted library allocation
page read and write
1A4B6D42000
heap
page read and write
CC40238C000
trusted library allocation
page read and write
279002EFC000
trusted library allocation
page read and write
279002BBE000
trusted library allocation
page read and write
CC402514000
trusted library allocation
page read and write
279003B00000
trusted library allocation
page read and write
2790024A4000
trusted library allocation
page read and write
1F6C00201000
trusted library allocation
page read and write
457FDFE000
unkown
page readonly
179E91D0000
trusted library section
page read and write
179E2734000
heap
page read and write
1A4B6D39000
heap
page read and write
3A6C0020C000
trusted library allocation
page read and write
279003F10000
trusted library allocation
page read and write
3A6C00874000
trusted library allocation
page read and write
279003001000
trusted library allocation
page read and write
3A6C00880000
trusted library allocation
page read and write
179E2758000
heap
page read and write
23303000
heap
page read and write
279003AA8000
trusted library allocation
page read and write
279002BF0000
trusted library allocation
page read and write
1F6C002B4000
trusted library allocation
page read and write
179E21A0000
heap
page read and write
27900254C000
trusted library allocation
page read and write
279003690000
trusted library allocation
page read and write
1A4BF002000
heap
page read and write
2790031C4000
trusted library allocation
page read and write
1F6C00294000
trusted library allocation
page read and write
73E800311000
direct allocation
page read and write
279002B0C000
trusted library allocation
page read and write
279002CBE000
trusted library allocation
page read and write
3A6C0071C000
trusted library allocation
page read and write
279002BD4000
trusted library allocation
page read and write
2790033D8000
trusted library allocation
page read and write
179E2990000
trusted library section
page read and write
279003DD0000
trusted library allocation
page read and write
279002EA8000
trusted library allocation
page read and write
1A4B6D26000
heap
page read and write
279002EC4000
trusted library allocation
page read and write
4568DFE000
unkown
page readonly
2790031A8000
trusted library allocation
page read and write
279003F74000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
2790041F4000
trusted library allocation
page read and write
2790026BC000
trusted library allocation
page read and write
279002D44000
trusted library allocation
page read and write
279003679000
trusted library allocation
page read and write
279003CA0000
trusted library allocation
page read and write
3A6C00844000
trusted library allocation
page read and write
CC402440000
trusted library allocation
page read and write
279003A38000
trusted library allocation
page read and write
279004090000
trusted library allocation
page read and write
279000A01000
trusted library allocation
page read and write
2790041C4000
trusted library allocation
page read and write
73E800212000
direct allocation
page read and write
1F6C00294000
trusted library allocation
page read and write
179DED90000
trusted library allocation
page read and write
27900427D000
trusted library allocation
page read and write
2790025B0000
trusted library allocation
page read and write
179E21BF000
heap
page read and write
2790024CC000
trusted library allocation
page read and write
279003A20000
trusted library allocation
page read and write
279002D38000
trusted library allocation
page read and write
1F6C00248000
trusted library allocation
page read and write
179E26FF000
heap
page read and write
3AA0003BC000
trusted library allocation
page read and write
279002540000
trusted library allocation
page read and write
4A7C000
heap
page read and write
279003B20000
trusted library allocation
page read and write
47403FE000
stack
page read and write
279002FC0000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
179E21D3000
heap
page read and write
279003DAC000
trusted library allocation
page read and write
73E8002D0000
direct allocation
page read and write
279004118000
trusted library allocation
page read and write
179E21C3000
heap
page read and write
2790041F0000
trusted library allocation
page read and write
2790043DA000
trusted library allocation
page read and write
49B0002F8000
trusted library allocation
page read and write
279003C6C000
trusted library allocation
page read and write
279003C7C000
trusted library allocation
page read and write
279003624000
trusted library allocation
page read and write
279004C01000
trusted library allocation
page read and write
45097FD000
stack
page read and write
279002CC4000
trusted library allocation
page read and write
279003678000
trusted library allocation
page read and write
1D290000
heap
page read and write
3A6C002F4000
trusted library allocation
page read and write
23567000
heap
page read and write
279002610000
trusted library allocation
page read and write
279002E84000
trusted library allocation
page read and write
3AA00039C000
trusted library allocation
page read and write
450DFFE000
unkown
page readonly
2790032FE000
trusted library allocation
page read and write
CC402290000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
179E4800000
trusted library allocation
page read and write
49B0002C0000
trusted library allocation
page read and write
474B3FD000
stack
page read and write
27900235C000
trusted library allocation
page read and write
73E800308000
direct allocation
page read and write
3AA0003C0000
trusted library allocation
page read and write
279002EC4000
trusted library allocation
page read and write
27900371D000
trusted library allocation
page read and write
CC402510000
trusted library allocation
page read and write
27900311D000
trusted library allocation
page read and write
4749BFE000
unkown
page readonly
279003A1C000
trusted library allocation
page read and write
73E8002A8000
direct allocation
page read and write
27900360D000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
279003FDC000
trusted library allocation
page read and write
1F6C002B4000
trusted library allocation
page read and write
179E21C7000
heap
page read and write
279002654000
trusted library allocation
page read and write
279003C38000
trusted library allocation
page read and write
1A4B4EFF000
heap
page read and write
3AA0002C4000
trusted library allocation
page read and write
668000
unkown
page execute and read and write
12C400250000
direct allocation
page read and write
4732BFE000
unkown
page readonly
3A6C009C4000
trusted library allocation
page read and write
1F6C002A8000
trusted library allocation
page read and write
279003F2C000
trusted library allocation
page read and write
48B000
unkown
page write copy
2790036BC000
trusted library allocation
page read and write
279002518000
trusted library allocation
page read and write
279003B70000
trusted library allocation
page read and write
CC4024D8000
trusted library allocation
page read and write
4920000
heap
page read and write
179E0AD3000
heap
page read and write
3AA00040C000
trusted library allocation
page read and write
3AA000360000
trusted library allocation
page read and write
279003308000
trusted library allocation
page read and write
474ABFE000
unkown
page readonly
3A6C006C8000
trusted library allocation
page read and write
179E6E92000
trusted library allocation
page read and write
2790040F4000
trusted library allocation
page read and write
457BDFE000
unkown
page readonly
514000
unkown
page execute and read and write
2790032D4000
trusted library allocation
page read and write
472B3FE000
stack
page read and write
CC40236C000
trusted library allocation
page read and write
279002538000
trusted library allocation
page read and write
279003658000
trusted library allocation
page read and write
CC40257C000
trusted library allocation
page read and write
279004238000
trusted library allocation
page read and write
27900254C000
trusted library allocation
page read and write
49B000220000
trusted library allocation
page read and write
1D2A0000
heap
page read and write
279003BAC000
trusted library allocation
page read and write
3AA000288000
trusted library allocation
page read and write
2CF6000
heap
page read and write
49B000294000
trusted library allocation
page read and write
456EDFE000
unkown
page readonly
279002D08000
trusted library allocation
page read and write
2790024B4000
trusted library allocation
page read and write
1A4B4F13000
heap
page read and write
279003180000
trusted library allocation
page read and write
3A6C00878000
trusted library allocation
page read and write
47293FE000
unkown
page read and write
279004274000
trusted library allocation
page read and write
59B000
unkown
page execute and read and write
279002E88000
trusted library allocation
page read and write
2790023D8000
trusted library allocation
page read and write
49B0002E4000
trusted library allocation
page read and write
1D2A1000
heap
page read and write
279002E0C000
trusted library allocation
page read and write
179DED4B000
heap
page read and write
279002CD4000
trusted library allocation
page read and write
3A6C00790000
trusted library allocation
page read and write
279002CF8000
trusted library allocation
page read and write
279002F30000
trusted library allocation
page read and write
279003638000
trusted library allocation
page read and write
279002F9C000
trusted library allocation
page read and write
2790023E0000
trusted library allocation
page read and write
1A4B4E34000
heap
page read and write
279003F04000
trusted library allocation
page read and write
179E4657000
unclassified section
page read and write
2790022F4000
trusted library allocation
page read and write
1A4B4F2F000
heap
page read and write
279000401000
trusted library allocation
page read and write
279002B18000
trusted library allocation
page read and write
49B0002C8000
trusted library allocation
page read and write
3A6C008E4000
trusted library allocation
page read and write
279002D44000
trusted library allocation
page read and write
2790031A4000
trusted library allocation
page read and write
279003BF4000
trusted library allocation
page read and write
2790024A4000
trusted library allocation
page read and write
2790025C5000
trusted library allocation
page read and write
3A6C00848000
trusted library allocation
page read and write
27900316C000
trusted library allocation
page read and write
279004BC7000
trusted library allocation
page read and write
45685FE000
stack
page read and write
23452000
heap
page read and write
279003040000
trusted library allocation
page read and write
279003DD0000
trusted library allocation
page read and write
CC402418000
trusted library allocation
page read and write
279003524000
trusted library allocation
page read and write
279003B5C000
trusted library allocation
page read and write
279004084000
trusted library allocation
page read and write
279002801000
trusted library allocation
page read and write
1A4B6D91000
heap
page read and write
CC402390000
trusted library allocation
page read and write
49B000248000
trusted library allocation
page read and write
279003FC0000
trusted library allocation
page read and write
4564DFE000
unkown
page readonly
179E21C8000
heap
page read and write
3A6C00918000
trusted library allocation
page read and write
73E8002D8000
direct allocation
page read and write
279004BEE000
trusted library allocation
page read and write
279003BBC000
trusted library allocation
page read and write
179E918E000
trusted library section
page read and write
279004CA4000
trusted library allocation
page read and write
279003ED4000
trusted library allocation
page read and write
3AA0002F1000
trusted library allocation
page read and write
279003EA0000
trusted library allocation
page read and write
179E27D0000
trusted library section
page read and write
12C40024C000
direct allocation
page read and write
279003B4C000
trusted library allocation
page read and write
2790024A8000
trusted library allocation
page read and write
73E800328000
direct allocation
page read and write
27900320C000
trusted library allocation
page read and write
2790023EC000
trusted library allocation
page read and write
3A6C0082C000
trusted library allocation
page read and write
CC4025C0000
trusted library allocation
page read and write
2790041AC000
trusted library allocation
page read and write
4513FFE000
unkown
page readonly
6C901000
unkown
page readonly
45087FD000
stack
page read and write
279003AD0000
trusted library allocation
page read and write
CC402514000
trusted library allocation
page read and write
1A4B6DAC000
heap
page read and write
2790039B8000
trusted library allocation
page read and write
27900258C000
trusted library allocation
page read and write
CC402434000
trusted library allocation
page read and write
2790031A8000
trusted library allocation
page read and write
279004224000
trusted library allocation
page read and write
1A4B6D37000
heap
page read and write
49B00020C000
trusted library allocation
page read and write
279003288000
trusted library allocation
page read and write
3AA0003A0000
trusted library allocation
page read and write
279002DB4000
trusted library allocation
page read and write
279003494000
trusted library allocation
page read and write
2790022C8000
trusted library allocation
page read and write
497E000
stack
page read and write
1F6C00235000
trusted library allocation
page read and write
179E21CC000
heap
page read and write
1A4B6D4F000
heap
page read and write
472F3FE000
stack
page read and write
3A6C00960000
trusted library allocation
page read and write
179E6A2A000
heap
page read and write
CC4025F9000
trusted library allocation
page read and write
2B91000
unkown
page readonly
279002EDC000
trusted library allocation
page read and write
1CECE000
stack
page read and write
CC402401000
trusted library allocation
page read and write
47473FE000
stack
page read and write
49B0002C0000
trusted library allocation
page read and write
CC4024F0000
trusted library allocation
page read and write
179E26F1000
heap
page read and write
2790037D9000
trusted library allocation
page read and write
3A6C0085C000
trusted library allocation
page read and write
279002C01000
trusted library allocation
page read and write
49B0002F4000
trusted library allocation
page read and write
4578DFE000
unkown
page readonly
CC402458000
trusted library allocation
page read and write
279003B8C000
trusted library allocation
page read and write
279003E58000
trusted library allocation
page read and write
3AA000404000
trusted library allocation
page read and write
279002960000
trusted library allocation
page read and write
3AA000430000
trusted library allocation
page read and write
2790023F8000
trusted library allocation
page read and write
2355D000
heap
page read and write
12C400234000
direct allocation
page read and write
279003FBC000
trusted library allocation
page read and write
3A6C008E8000
trusted library allocation
page read and write
3A6C008AC000
trusted library allocation
page read and write
1D00E000
stack
page read and write
23540000
trusted library allocation
page read and write
CC401001000
trusted library allocation
page read and write
1A4B4F2F000
heap
page read and write
179DEDA0000
trusted library allocation
page read and write
CC40267C000
trusted library allocation
page read and write
648000
unkown
page execute and read and write
2D30000
heap
page read and write
49B0002C0000
trusted library allocation
page read and write
1A4B6D3B000
heap
page read and write
279002D48000
trusted library allocation
page read and write
49B000250000
trusted library allocation
page read and write
279002ED4000
trusted library allocation
page read and write
CC400201000
trusted library allocation
page read and write
279004280000
trusted library allocation
page read and write
CC4023CC000
trusted library allocation
page read and write
1A4B4EB8000
heap
page read and write
279002C28000
trusted library allocation
page read and write
47493FE000
stack
page read and write
2790035E4000
trusted library allocation
page read and write
279002DD8000
trusted library allocation
page read and write
4748BFE000
unkown
page readonly
23559000
heap
page read and write
2790036A5000
trusted library allocation
page read and write
47373FE000
stack
page read and write
279002A78000
trusted library allocation
page read and write
279002ADC000
trusted library allocation
page read and write
27900254C000
trusted library allocation
page read and write
2790039E4000
trusted library allocation
page read and write
3A6C006AC000
trusted library allocation
page read and write
3A6C008F4000
trusted library allocation
page read and write
2790040F4000
trusted library allocation
page read and write
279003AB8000
trusted library allocation
page read and write
279002298000
trusted library allocation
page read and write
12C4002DC000
direct allocation
page read and write
1A4B4E9F000
heap
page read and write
279002AC8000
trusted library allocation
page read and write
279002A0C000
trusted library allocation
page read and write
279003EF0000
trusted library allocation
page read and write
CC4024C0000
trusted library allocation
page read and write
179E27A4000
heap
page read and write
2C3E000
heap
page read and write
279004090000
trusted library allocation
page read and write
457C5FA000
stack
page read and write
2790039E8000
trusted library allocation
page read and write
279002A90000
trusted library allocation
page read and write
2790036BC000
trusted library allocation
page read and write
279003A0C000
trusted library allocation
page read and write
279004A98000
trusted library allocation
page read and write
12C400260000
direct allocation
page read and write
49B000260000
trusted library allocation
page read and write
12C400217000
direct allocation
page read and write
279003938000
trusted library allocation
page read and write
27900257C000
trusted library allocation
page read and write
CC402230000
trusted library allocation
page read and write
279003ED0000
trusted library allocation
page read and write
27900378E000
trusted library allocation
page read and write
179E21CF000
heap
page read and write
49B0002C0000
trusted library allocation
page read and write
1A4B4DE0000
trusted library section
page readonly
279003B04000
trusted library allocation
page read and write
473BBFE000
unkown
page readonly
2345E000
heap
page read and write
61E00000
direct allocation
page execute and read and write
195000
stack
page read and write
179E2734000
heap
page read and write
1A4B4EA6000
heap
page read and write
1A4B6D42000
heap
page read and write
1A4B6C02000
heap
page read and write
3A6C00248000
trusted library allocation
page read and write
179E21B9000
heap
page read and write
1A4B4EBD000
heap
page read and write
279003DAC000
trusted library allocation
page read and write
279003E3C000
trusted library allocation
page read and write
23564000
heap
page read and write
4579DFE000
unkown
page readonly
3A6C008C4000
trusted library allocation
page read and write
4575DFE000
unkown
page readonly
179E2795000
heap
page read and write
179E27C7000
heap
page read and write
There are 1836 hidden memdumps, click here to show them.