IOC Report
I43xo3KKfS.exe

loading gif

Files

File Path
Type
Category
Malicious
I43xo3KKfS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_I43xo3KKfS.exe_28bc6b3603f5f8d941a5aba9cef8425f2a398_64f2822e_66db753d-6df9-4199-9577-860096641214\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\FBAFIIJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDGHIIJKEBGIDHIDBKJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8540.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 31 08:07:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER866A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER869A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8b6d5c38-7013-4935-b302-a38391baefe8.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\946f95c7-b468-4ea4-8fc5-c980224918a7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9b7e0c63-8a8f-4c13-826a-79e2e534c269.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67233AB9-1F04.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38c14.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38d8b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38d9b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38dba.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a0592f6d-518e-43c4-b6c0-7165d2616047.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e19c6e1c-b08f-4fbe-97b7-037000527258.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 81
Unicode text, UTF-8 text, with very long lines (5438)
downloaded
Chrome Cache Entry: 82
ASCII text
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 85
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\I43xo3KKfS.exe
"C:\Users\user\Desktop\I43xo3KKfS.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2824 --field-trial-handle=2580,i,9160805204216496030,1290202691667560686,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=2096,i,1110173691356344578,8625308391343283424,262144 /prefetch:3
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=2236,i,12728769652571103709,16681002183324042487,262144 /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1888

URLs

Name
IP
Malicious
http://45.88.105.105/caf2400fcdb97982/sqlite3.dll
45.88.105.105
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
http://anglebug.com/6439r
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
http://anglebug.com/5881C999
unknown
https://anglebug.com/7382
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.phpApplication
unknown
https://issuetracker.google.com/284462263
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.php~
unknown
http://anglebug.com/7488N
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.phpininit.exe
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.phpb
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.phpf
unknown
https://issuetracker.google.com/255411748
unknown
https://csp.withgoogle.com/csp/gws/cdt1rj
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
https://m.google.com/devicemanagement/data/apiaD
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.php=LAX
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=baD
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://permanently-removed.invalid/o/oauth2/revoke8
unknown
https://issuetracker.google.com/161903006
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.phpI
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.phpF
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://plus.google.com
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.php1
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.php2
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
172.217.18.110
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.php8
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/3862v
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://45.88.105.105/e88e05dfd1bdeeb9.phpsL
unknown
http://anglebug.com/4836
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
apis.google.com
unknown
malicious
plus.l.google.com
172.217.18.110
play.google.com
172.217.18.110
www.google.com
142.250.184.228

IPs

IP
Domain
Country
Malicious
45.88.105.105
unknown
Netherlands
malicious
192.168.2.6
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
142.250.184.228
www.google.com
United States
172.217.18.110
plus.l.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
ProgramId
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
FileId
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
LowerCaseLongPath
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
LongPathHash
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
Name
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
OriginalFileName
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
Publisher
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
Version
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
BinFileVersion
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
BinaryType
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
ProductName
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
ProductVersion
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
LinkDate
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
BinProductVersion
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
AppxPackageFullName
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
AppxPackageRelativeId
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
Size
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
Language
\REGISTRY\A\{b426b44e-3747-415d-a870-33f646f3f68a}\Root\InventoryApplicationFile\i43xo3kkfs.exe|6908f82ba138a7f8
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2490000
direct allocation
page read and write
malicious
89E000
heap
page read and write
malicious
23B0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
614400A14000
trusted library allocation
page read and write
7DC000318000
direct allocation
page read and write
20EED000
heap
page read and write
614400984000
trusted library allocation
page read and write
2888002F4000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
6144002E0000
trusted library allocation
page read and write
6144004EC000
trusted library allocation
page read and write
2EE800288000
trusted library allocation
page read and write
614401B28000
trusted library allocation
page read and write
2EE800230000
trusted library allocation
page read and write
1F50A2E3000
heap
page read and write
7DC000234000
direct allocation
page read and write
5D3800334000
trusted library allocation
page read and write
5D38002F8000
trusted library allocation
page read and write
25B7CF7B000
heap
page read and write
675EBFD000
stack
page read and write
7DC000328000
direct allocation
page read and write
614400EB8000
trusted library allocation
page read and write
61440009F000
trusted library allocation
page read and write
5D3800020000
trusted library allocation
page read and write
6144016E0000
trusted library allocation
page read and write
2EE8002A8000
trusted library allocation
page read and write
614401BD0000
trusted library allocation
page read and write
61440120C000
trusted library allocation
page read and write
288800300000
trusted library allocation
page read and write
7DC000316000
direct allocation
page read and write
6144016F0000
trusted library allocation
page read and write
614400C18000
trusted library allocation
page read and write
25B0371C000
heap
page read and write
61440150C000
trusted library allocation
page read and write
2888002D0000
trusted library allocation
page read and write
25B03698000
heap
page read and write
614401AC8000
trusted library allocation
page read and write
614400C18000
trusted library allocation
page read and write
1F50A2F8000
heap
page read and write
614401858000
trusted library allocation
page read and write
6144019D8000
trusted library allocation
page read and write
61440031C000
trusted library allocation
page read and write
61440133C000
trusted library allocation
page read and write
28880039C000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
614401650000
trusted library allocation
page read and write
5D380041C000
trusted library allocation
page read and write
6144016CC000
trusted library allocation
page read and write
28880031C000
trusted library allocation
page read and write
6144005C4000
trusted library allocation
page read and write
6144010DC000
trusted library allocation
page read and write
614401B08000
trusted library allocation
page read and write
288800320000
trusted library allocation
page read and write
20FD0000
heap
page read and write
5D38002C0000
trusted library allocation
page read and write
5D3800104000
trusted library allocation
page read and write
288800401000
trusted library allocation
page read and write
25B7D155000
heap
page read and write
614400FE0000
trusted library allocation
page read and write
61440027C000
trusted library allocation
page read and write
614401B9C000
trusted library allocation
page read and write
2888003C0000
trusted library allocation
page read and write
6144012EC000
trusted library allocation
page read and write
2B140020C000
trusted library allocation
page read and write
668000
unkown
page execute and read and write
1F50A2C1000
heap
page read and write
614400480000
trusted library allocation
page read and write
6754BFE000
stack
page read and write
614400474000
trusted library allocation
page read and write
61440140C000
trusted library allocation
page read and write
614401B30000
trusted library allocation
page read and write
7808002B0000
trusted library allocation
page read and write
5D3800244000
trusted library allocation
page read and write
1AF66000
heap
page read and write
614400ED8000
trusted library allocation
page read and write
2B1400320000
trusted library allocation
page read and write
614400C84000
trusted library allocation
page read and write
614401B14000
trusted library allocation
page read and write
6144007CC000
trusted library allocation
page read and write
2EE8002C8000
trusted library allocation
page read and write
2EE8002A8000
trusted library allocation
page read and write
7DC0002A8000
direct allocation
page read and write
6749BFC000
stack
page read and write
61440066F000
trusted library allocation
page read and write
614400ECD000
trusted library allocation
page read and write
614401550000
trusted library allocation
page read and write
61440156C000
trusted library allocation
page read and write
614400D50000
trusted library allocation
page read and write
2EE800270000
trusted library allocation
page read and write
89A000
heap
page read and write
6144019C4000
trusted library allocation
page read and write
AC687FE000
unkown
page readonly
6144017D8000
trusted library allocation
page read and write
2B1400624000
trusted library allocation
page read and write
614400FE0000
trusted library allocation
page read and write
6144011BC000
trusted library allocation
page read and write
61440186C000
trusted library allocation
page read and write
7DC000290000
direct allocation
page read and write
6144002E0000
trusted library allocation
page read and write
5D380022C000
trusted library allocation
page read and write
614400294000
trusted library allocation
page read and write
6144001DC000
trusted library allocation
page read and write
614400FE0000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
2B14006E8000
trusted library allocation
page read and write
20ED0000
heap
page read and write
674DBFE000
stack
page read and write
1F50A2C7000
heap
page read and write
614401024000
trusted library allocation
page read and write
6144017A8000
trusted library allocation
page read and write
6144000E0000
trusted library allocation
page read and write
67693FE000
unkown
page readonly
1F50A2E3000
heap
page read and write
61440045C000
trusted library allocation
page read and write
288800408000
trusted library allocation
page read and write
67643FE000
unkown
page readonly
6144012D0000
trusted library allocation
page read and write
614400384000
trusted library allocation
page read and write
6144001E4000
trusted library allocation
page read and write
AC5EFFC000
stack
page read and write
25B03790000
trusted library allocation
page read and write
5D38001D4000
trusted library allocation
page read and write
61440171C000
trusted library allocation
page read and write
1F50A180000
heap
page read and write
6144009AB000
trusted library allocation
page read and write
2EE8002F8000
trusted library allocation
page read and write
2EE800210000
trusted library allocation
page read and write
614401974000
trusted library allocation
page read and write
614401040000
trusted library allocation
page read and write
25B036BC000
heap
page read and write
1F50A160000
heap
page readonly
614401640000
trusted library allocation
page read and write
6144015F4000
trusted library allocation
page read and write
614400480000
trusted library allocation
page read and write
5D38002F8000
trusted library allocation
page read and write
1F50C14A000
heap
page read and write
614401A54000
trusted library allocation
page read and write
6144004F3000
trusted library allocation
page read and write
5D38001B8000
trusted library allocation
page read and write
7808002D8000
trusted library allocation
page read and write
61440153C000
trusted library allocation
page read and write
614400469000
trusted library allocation
page read and write
614400C94000
trusted library allocation
page read and write
614401A0C000
trusted library allocation
page read and write
AC64FFE000
stack
page read and write
6144010D4000
trusted library allocation
page read and write
25B030AB000
heap
page read and write
6763BFC000
stack
page read and write
614400394000
trusted library allocation
page read and write
25B03080000
heap
page read and write
6144001E0000
trusted library allocation
page read and write
2B1400724000
trusted library allocation
page read and write
6144013A8000
trusted library allocation
page read and write
7DC000230000
direct allocation
page read and write
1F50A2AB000
heap
page read and write
6755BFE000
stack
page read and write
AC677FE000
unkown
page readonly
795800215000
direct allocation
page read and write
61440166C000
trusted library allocation
page read and write
2EE8002A8000
trusted library allocation
page read and write
5D38002E0000
trusted library allocation
page read and write
5D3800230000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
6144019E0000
trusted library allocation
page read and write
AC4D7FE000
unkown
page readonly
61440078E000
trusted library allocation
page read and write
79580025C000
direct allocation
page read and write
5D3800088000
trusted library allocation
page read and write
288800284000
trusted library allocation
page read and write
747000
heap
page read and write
614401978000
trusted library allocation
page read and write
6144000A8000
trusted library allocation
page read and write
25B036A2000
heap
page read and write
780800278000
trusted library allocation
page read and write
2EE800260000
trusted library allocation
page read and write
2B14006FC000
trusted library allocation
page read and write
288800310000
trusted library allocation
page read and write
6144001E8000
trusted library allocation
page read and write
614401944000
trusted library allocation
page read and write
6144016F8000
trusted library allocation
page read and write
2EE8002A8000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
614400DC8000
trusted library allocation
page read and write
AC43FFE000
unkown
page read and write
1F50C1BF000
heap
page read and write
1AB4E000
stack
page read and write
614400A14000
trusted library allocation
page read and write
5D38002EC000
trusted library allocation
page read and write
795800270000
direct allocation
page read and write
6144003DC000
trusted library allocation
page read and write
25B06C40000
trusted library allocation
page read and write
675F3FE000
unkown
page readonly
5D3800344000
trusted library allocation
page read and write
25B036E6000
heap
page read and write
614401838000
trusted library allocation
page read and write
2EE8002F0000
trusted library allocation
page read and write
1F50A29E000
heap
page read and write
25B09BB7000
unclassified section
page read and write
1F50A200000
heap
page read and write
6144013D4000
trusted library allocation
page read and write
AC62FFE000
stack
page read and write
614400480000
trusted library allocation
page read and write
2EE800294000
trusted library allocation
page read and write
5D3800298000
trusted library allocation
page read and write
614400230000
trusted library allocation
page read and write
2B1400320000
trusted library allocation
page read and write
6144012F4000
trusted library allocation
page read and write
61440141C000
trusted library allocation
page read and write
6F0000
heap
page read and write
AC647FE000
unkown
page readonly
1F50A2EE000
heap
page read and write
614401740000
trusted library allocation
page read and write
1AA4E000
stack
page read and write
1F50A2C6000
heap
page read and write
AC54FFD000
stack
page read and write
7808002A0000
trusted library allocation
page read and write
61440150C000
trusted library allocation
page read and write
1F50C1A7000
heap
page read and write
614400C18000
trusted library allocation
page read and write
5D380029C000
trusted library allocation
page read and write
7808002A1000
trusted library allocation
page read and write
2B14006D4000
trusted library allocation
page read and write
6144001F0000
trusted library allocation
page read and write
67473FE000
unkown
page readonly
2B140069C000
trusted library allocation
page read and write
614401A8C000
trusted library allocation
page read and write
7808002C8000
trusted library allocation
page read and write
AC507FE000
unkown
page readonly
614401594000
trusted library allocation
page read and write
25B7D04F000
heap
page read and write
614401A01000
trusted library allocation
page read and write
25B07F20000
heap
page read and write
614400210000
trusted library allocation
page read and write
61440044C000
trusted library allocation
page read and write
41D000
unkown
page execute read
614400CEC000
trusted library allocation
page read and write
5D38002B4000
trusted library allocation
page read and write
2B1400704000
trusted library allocation
page read and write
614400F70000
trusted library allocation
page read and write
614400674000
trusted library allocation
page read and write
614400A01000
trusted library allocation
page read and write
1F50C180000
heap
page read and write
288800338000
trusted library allocation
page read and write
614401AD0000
trusted library allocation
page read and write
1F50C100000
heap
page read and write
AC477FE000
unkown
page readonly
676B3FE000
unkown
page readonly
61440160C000
trusted library allocation
page read and write
67483FE000
unkown
page readonly
1A66E000
stack
page read and write
2888002F1000
trusted library allocation
page read and write
2B1400368000
trusted library allocation
page read and write
614400DE4000
trusted library allocation
page read and write
67583FE000
unkown
page readonly
5D3800270000
trusted library allocation
page read and write
2B14002ED000
trusted library allocation
page read and write
614400CF8000
trusted library allocation
page read and write
780800235000
trusted library allocation
page read and write
6144019A4000
trusted library allocation
page read and write
61440035C000
trusted library allocation
page read and write
28880040C000
trusted library allocation
page read and write
5D3800240000
trusted library allocation
page read and write
20EF2000
heap
page read and write
614401A48000
trusted library allocation
page read and write
1F50C14C000
heap
page read and write
61440076C000
trusted library allocation
page read and write
6144001B4000
trusted library allocation
page read and write
614401201000
trusted library allocation
page read and write
25B0377B000
heap
page read and write
7DC0002AC000
direct allocation
page read and write
61440031C000
trusted library allocation
page read and write
6144019A0000
trusted library allocation
page read and write
67723FE000
unkown
page readonly
5D38002C0000
trusted library allocation
page read and write
67443FE000
unkown
page readonly
1F50A2BC000
heap
page read and write
614401AAC000
trusted library allocation
page read and write
AC657FE000
unkown
page readonly
5D38003A4000
trusted library allocation
page read and write
614400480000
trusted library allocation
page read and write
5D3800260000
trusted library allocation
page read and write
7DC000308000
direct allocation
page read and write
6766BFE000
stack
page read and write
6750BFD000
stack
page read and write
675BBFE000
unkown
page readonly
956000
heap
page read and write
20ED0000
trusted library allocation
page read and write
6144017E8000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
614400298000
trusted library allocation
page read and write
1F0000
heap
page read and write
614400EF0000
trusted library allocation
page read and write
614400D18000
trusted library allocation
page read and write
AC4FFFD000
stack
page read and write
25B030B0000
heap
page read and write
1F512FD0000
trusted library allocation
page read and write
6D470000
unkown
page readonly
614401180000
trusted library allocation
page read and write
6753BFE000
stack
page read and write
2B1400788000
trusted library allocation
page read and write
AC48FFE000
stack
page read and write
7808002A4000
trusted library allocation
page read and write
61440078C000
trusted library allocation
page read and write
25B094D0000
trusted library section
page read and write
6144002FC000
trusted library allocation
page read and write
6144015C8000
trusted library allocation
page read and write
614400E9C000
trusted library allocation
page read and write
2B1400664000
trusted library allocation
page read and write
7DC00031C000
direct allocation
page read and write
614401AB8000
trusted library allocation
page read and write
2B1400320000
trusted library allocation
page read and write
2B140035C000
trusted library allocation
page read and write
614400E68000
trusted library allocation
page read and write
614400578000
trusted library allocation
page read and write
675C3FE000
unkown
page readonly
675A3FE000
unkown
page readonly
6144017D0000
trusted library allocation
page read and write
AC55FFE000
stack
page read and write
614400330000
trusted library allocation
page read and write
1F50C170000
heap
page read and write
1F50A302000
heap
page read and write
25B07E23000
heap
page read and write
614401588000
trusted library allocation
page read and write
880000
heap
page read and write
614400E9C000
trusted library allocation
page read and write
614401B90000
trusted library allocation
page read and write
795800244000
direct allocation
page read and write
614400294000
trusted library allocation
page read and write
6758BFC000
stack
page read and write
61EB7000
direct allocation
page readonly
614401BC4000
trusted library allocation
page read and write
614400588000
trusted library allocation
page read and write
614401374000
trusted library allocation
page read and write
AC667FE000
unkown
page readonly
5D38002EC000
trusted library allocation
page read and write
2B1400248000
trusted library allocation
page read and write
614400294000
trusted library allocation
page read and write
6144010EC000
trusted library allocation
page read and write
6144002A8000
trusted library allocation
page read and write
28880031C000
trusted library allocation
page read and write
6144015D0000
trusted library allocation
page read and write
6144013B4000
trusted library allocation
page read and write
795800284000
direct allocation
page read and write
2B1400750000
trusted library allocation
page read and write
674BBFB000
stack
page read and write
614400AA0000
trusted library allocation
page read and write
614400700000
trusted library allocation
page read and write
AC67FFC000
stack
page read and write
614401584000
trusted library allocation
page read and write
25B036AC000
heap
page read and write
61440150C000
trusted library allocation
page read and write
614401850000
trusted library allocation
page read and write
5D380027C000
trusted library allocation
page read and write
614401A58000
trusted library allocation
page read and write
614400080000
trusted library allocation
page read and write
1F50A2FF000
heap
page read and write
25B03099000
heap
page read and write
AC5BFFE000
stack
page read and write
5D3800440000
trusted library allocation
page read and write
614400214000
trusted library allocation
page read and write
25B036A9000
heap
page read and write
614401801000
trusted library allocation
page read and write
614400224000
trusted library allocation
page read and write
25B036A9000
heap
page read and write
614401A64000
trusted library allocation
page read and write
614401944000
trusted library allocation
page read and write
61440021C000
trusted library allocation
page read and write
614401688000
trusted library allocation
page read and write
5D38000F4000
trusted library allocation
page read and write
25B0309E000
heap
page read and write
614401690000
trusted library allocation
page read and write
614400E9C000
trusted library allocation
page read and write
674D3FE000
unkown
page readonly
6144007BC000
trusted library allocation
page read and write
5D38003D0000
trusted library allocation
page read and write
6144002C0000
trusted library allocation
page read and write
795800280000
direct allocation
page read and write
25B0949D000
trusted library section
page read and write
20EEB000
heap
page read and write
25B03729000
heap
page read and write
AC447FE000
unkown
page readonly
25B7D0A0000
heap
page read and write
6144015C0000
trusted library allocation
page read and write
5D380024C000
trusted library allocation
page read and write
2888003A0000
trusted library allocation
page read and write
2EE8002B4000
trusted library allocation
page read and write
614400E78000
trusted library allocation
page read and write
6144010CC000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
5D38001C8000
trusted library allocation
page read and write
2888003BC000
trusted library allocation
page read and write
25B03704000
heap
page read and write
5D3800250000
trusted library allocation
page read and write
1F50A32B000
heap
page read and write
795800294000
direct allocation
page read and write
1F50A272000
heap
page read and write
614400C74000
trusted library allocation
page read and write
614400FE8000
trusted library allocation
page read and write
614400AD4000
trusted library allocation
page read and write
61440163C000
trusted library allocation
page read and write
25B0A0C3000
trusted library section
page read and write
25B7D0C0000
trusted library allocation
page read and write
1F50A2E3000
heap
page read and write
25B03600000
trusted library section
page read and write
25B09DE7000
unclassified section
page read and write
6144002B8000
trusted library allocation
page read and write
614401784000
trusted library allocation
page read and write
614401B40000
trusted library allocation
page read and write
5D38001F4000
trusted library allocation
page read and write
614401040000
trusted library allocation
page read and write
6144017B4000
trusted library allocation
page read and write
5D3800378000
trusted library allocation
page read and write
AC5F7FE000
unkown
page readonly
5D38002A0000
trusted library allocation
page read and write
25B03710000
heap
page read and write
614401528000
trusted library allocation
page read and write
61440033C000
trusted library allocation
page read and write
6740BEF000
stack
page read and write
2B14006E4000
trusted library allocation
page read and write
25B093DE000
trusted library section
page read and write
6144017F4000
trusted library allocation
page read and write
5D38000B4000
trusted library allocation
page read and write
25B7CF70000
heap
page read and write
614401958000
trusted library allocation
page read and write
AC42FF4000
stack
page read and write
614401A44000
trusted library allocation
page read and write
2B1400784000
trusted library allocation
page read and write
675FBFA000
stack
page read and write
614400DBA000
trusted library allocation
page read and write
20EDD000
heap
page read and write
6144016E4000
trusted library allocation
page read and write
2B14002B0000
trusted library allocation
page read and write
2B14006C8000
trusted library allocation
page read and write
2B1400354000
trusted library allocation
page read and write
7DC0002D0000
direct allocation
page read and write
6144008C4000
trusted library allocation
page read and write
61440066C000
trusted library allocation
page read and write
2B1400220000
trusted library allocation
page read and write
25B7D031000
heap
page read and write
2B1400678000
trusted library allocation
page read and write
5D3800150000
trusted library allocation
page read and write
1F50A302000
heap
page read and write
7DC000303000
direct allocation
page read and write
28880025C000
trusted library allocation
page read and write
2B1400424000
trusted library allocation
page read and write
2B1400418000
trusted library allocation
page read and write
795800234000
direct allocation
page read and write
1F50A2A9000
heap
page read and write
614400EF0000
trusted library allocation
page read and write
614401AEC000
trusted library allocation
page read and write
795800303000
direct allocation
page read and write
7808002E4000
trusted library allocation
page read and write
6144002DB000
trusted library allocation
page read and write
2B14006E0000
trusted library allocation
page read and write
614400F70000
trusted library allocation
page read and write
614400DA8000
trusted library allocation
page read and write
614400198000
trusted library allocation
page read and write
1F50A22C000
heap
page read and write
7808002F8000
trusted library allocation
page read and write
614401401000
trusted library allocation
page read and write
2888002AC000
trusted library allocation
page read and write
61440170C000
trusted library allocation
page read and write
1F50A32B000
heap
page read and write
1F50A130000
heap
page read and write
6E8000
unkown
page execute and read and write
288800390000
trusted library allocation
page read and write
1F50A150000
heap
page read and write
6144005E8000
trusted library allocation
page read and write
614401318000
trusted library allocation
page read and write
2B1400770000
trusted library allocation
page read and write
6144016BC000
trusted library allocation
page read and write
614401B10000
trusted library allocation
page read and write
6144013BC000
trusted library allocation
page read and write
614400C44000
trusted library allocation
page read and write
675ABFC000
stack
page read and write
676D3FE000
unkown
page readonly
25B7D00C000
heap
page read and write
25B03723000
heap
page read and write
614400D98000
trusted library allocation
page read and write
614400850000
trusted library allocation
page read and write
61440015C000
trusted library allocation
page read and write
614400480000
trusted library allocation
page read and write
614401508000
trusted library allocation
page read and write
674FBFE000
stack
page read and write
5D380020C000
trusted library allocation
page read and write
25B03732000
heap
page read and write
614400771000
trusted library allocation
page read and write
5D38004BC000
trusted library allocation
page read and write
614401ACC000
trusted library allocation
page read and write
1AA0F000
stack
page read and write
6D471000
unkown
page execute read
61440107C000
trusted library allocation
page read and write
614400801000
trusted library allocation
page read and write
2B14002CC000
trusted library allocation
page read and write
6144016B0000
trusted library allocation
page read and write
5D380016C000
trusted library allocation
page read and write
8D1000
heap
page read and write
2EE8002E4000
trusted library allocation
page read and write
962000
heap
page read and write
AC557FE000
unkown
page readonly
6144001F4000
trusted library allocation
page read and write
5D3800350000
trusted library allocation
page read and write
5D380021C000
trusted library allocation
page read and write
400000
unkown
page readonly
614400648000
trusted library allocation
page read and write
25B03990000
trusted library section
page read and write
AC4F7FE000
unkown
page readonly
780800201000
trusted library allocation
page read and write
2888002A0000
trusted library allocation
page read and write
1F50A213000
heap
page read and write
614400734000
trusted library allocation
page read and write
6144009DC000
trusted library allocation
page read and write
7DC000201000
direct allocation
page read and write
614400EE0000
trusted library allocation
page read and write
614400E01000
trusted library allocation
page read and write
5D3800390000
trusted library allocation
page read and write
2B1400644000
trusted library allocation
page read and write
67703FE000
unkown
page readonly
614401060000
trusted library allocation
page read and write
6144001D0000
trusted library allocation
page read and write
25B7D02C000
heap
page read and write
61440008C000
trusted library allocation
page read and write
21020000
heap
page read and write
6144019C8000
trusted library allocation
page read and write
6144012D4000
trusted library allocation
page read and write
614401580000
trusted library allocation
page read and write
2EE800220000
trusted library allocation
page read and write
6144002D0000
trusted library allocation
page read and write
61440106C000
trusted library allocation
page read and write
25B02340000
unkown
page read and write
61440001C000
trusted library allocation
page read and write
780800250000
trusted library allocation
page read and write
614401570000
trusted library allocation
page read and write
614401680000
trusted library allocation
page read and write
210D0000
trusted library allocation
page read and write
1AF60000
trusted library allocation
page read and write
288800230000
trusted library allocation
page read and write
780800238000
trusted library allocation
page read and write
614400BD8000
trusted library allocation
page read and write
6144002F0000
trusted library allocation
page read and write
614401100000
trusted library allocation
page read and write
2EE8002A8000
trusted library allocation
page read and write
25B03727000
heap
page read and write
5D38000C6000
trusted library allocation
page read and write
6742BFF000
stack
page read and write
674EBFE000
stack
page read and write
2EE8002D8000
trusted library allocation
page read and write
1F50C10B000
heap
page read and write
614400218000
trusted library allocation
page read and write
2EE8002B8000
trusted library allocation
page read and write
25B03590000
trusted library section
page read and write
6144014E8000
trusted library allocation
page read and write
614401438000
trusted library allocation
page read and write
614400CAC000
trusted library allocation
page read and write
614401788000
trusted library allocation
page read and write
614401780000
trusted library allocation
page read and write
5D3800118000
trusted library allocation
page read and write
614401BC4000
trusted library allocation
page read and write
25B0375B000
heap
page read and write
61440150C000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
2B140080C000
trusted library allocation
page read and write
614400F70000
trusted library allocation
page read and write
795800290000
direct allocation
page read and write
67523FE000
unkown
page readonly
5D3800294000
trusted library allocation
page read and write
7DC000220000
direct allocation
page read and write
2B1400374000
trusted library allocation
page read and write
79580026C000
direct allocation
page read and write
2B1400330000
trusted library allocation
page read and write
6144012F4000
trusted library allocation
page read and write
614400CB4000
trusted library allocation
page read and write
614401744000
trusted library allocation
page read and write
614400B74000
trusted library allocation
page read and write
780800294000
trusted library allocation
page read and write
6144013EC000
trusted library allocation
page read and write
1F50C146000
heap
page read and write
614400F94000
trusted library allocation
page read and write
2B14006B8000
trusted library allocation
page read and write
614400B58000
trusted library allocation
page read and write
5D380007C000
trusted library allocation
page read and write
5D3800238000
trusted library allocation
page read and write
1AE60000
heap
page read and write
2B14007B4000
trusted library allocation
page read and write
795800217000
direct allocation
page read and write
6144001B4000
trusted library allocation
page read and write
61440183C000
trusted library allocation
page read and write
7DC000244000
direct allocation
page read and write
25B0A2E0000
trusted library section
page read and write
614400C1C000
trusted library allocation
page read and write
61440086C000
trusted library allocation
page read and write
20EF7000
heap
page read and write
614400480000
trusted library allocation
page read and write
5D38002A4000
trusted library allocation
page read and write
493000
unkown
page write copy
5D38002A8000
trusted library allocation
page read and write
20FF0000
heap
page read and write
614401894000
trusted library allocation
page read and write
6144002B4000
trusted library allocation
page read and write
67513FE000
unkown
page readonly
61440137C000
trusted library allocation
page read and write
614401574000
trusted library allocation
page read and write
2B140078C000
trusted library allocation
page read and write
67623FE000
unkown
page readonly
614401A84000
trusted library allocation
page read and write
1F50A2FF000
heap
page read and write
61440060C000
trusted library allocation
page read and write
1F50C002000
heap
page read and write
5D38000A4000
trusted library allocation
page read and write
4E6000
unkown
page execute and read and write
6743BFE000
stack
page read and write
614400328000
trusted library allocation
page read and write
25B09492000
trusted library section
page read and write
1F50C12D000
heap
page read and write
61440176C000
trusted library allocation
page read and write
5D3800218000
trusted library allocation
page read and write
25B0309E000
heap
page read and write
25B099AC000
trusted library section
page read and write
614400294000
trusted library allocation
page read and write
6744BFE000
stack
page read and write
61440198C000
trusted library allocation
page read and write
61440177C000
trusted library allocation
page read and write
25B7D06D000
heap
page read and write
614400394000
trusted library allocation
page read and write
25B030AF000
heap
page read and write
5D3800284000
trusted library allocation
page read and write
7958002A8000
direct allocation
page read and write
648000
unkown
page execute and read and write
AC627FE000
unkown
page readonly
6144004FC000
trusted library allocation
page read and write
890000
heap
page read and write
614400E1C000
trusted library allocation
page read and write
614400401000
trusted library allocation
page read and write
6144001A0000
trusted library allocation
page read and write
614400C1C000
trusted library allocation
page read and write
2B14007C8000
trusted library allocation
page read and write
5D3800248000
trusted library allocation
page read and write
6144016F4000
trusted library allocation
page read and write
6144002A8000
trusted library allocation
page read and write
6144002A4000
trusted library allocation
page read and write
78080020C000
trusted library allocation
page read and write
614400294000
trusted library allocation
page read and write
5D38004C8000
trusted library allocation
page read and write
614401B0C000
trusted library allocation
page read and write
6144017BC000
trusted library allocation
page read and write
25B018D0000
trusted library section
page readonly
6769BFE000
stack
page read and write
5D3800424000
trusted library allocation
page read and write
614401B90000
trusted library allocation
page read and write
2B14002FC000
trusted library allocation
page read and write
AC5AFFE000
stack
page read and write
288800380000
trusted library allocation
page read and write
25B03771000
heap
page read and write
2B1400734000
trusted library allocation
page read and write
6747BFB000
stack
page read and write
61440161C000
trusted library allocation
page read and write
2B140040C000
trusted library allocation
page read and write
7808002B0000
trusted library allocation
page read and write
AC4A7FE000
unkown
page readonly
5D38003E0000
trusted library allocation
page read and write
614401718000
trusted library allocation
page read and write
5D3800214000
trusted library allocation
page read and write
614400490000
trusted library allocation
page read and write
25B07F7A000
heap
page read and write
25B030A2000
heap
page read and write
5D38002BC000
trusted library allocation
page read and write
20EF7000
heap
page read and write
2B140060C000
trusted library allocation
page read and write
61440173C000
trusted library allocation
page read and write
61440133C000
trusted library allocation
page read and write
5D380000C000
trusted library allocation
page read and write
7DC000212000
direct allocation
page read and write
1A7AE000
stack
page read and write
614400E5C000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
944000
heap
page read and write
614400F7C000
trusted library allocation
page read and write
614400AF0000
trusted library allocation
page read and write
5D38003C0000
trusted library allocation
page read and write
614400C50000
trusted library allocation
page read and write
25B03680000
heap
page read and write
85E000
stack
page read and write
614401A5C000
trusted library allocation
page read and write
6745BFE000
stack
page read and write
614400EF0000
trusted library allocation
page read and write
2B1400201000
trusted library allocation
page read and write
675B3FC000
stack
page read and write
67503FE000
unkown
page readonly
6144006D8000
trusted library allocation
page read and write
AC697FE000
unkown
page readonly
614401810000
trusted library allocation
page read and write
288800308000
trusted library allocation
page read and write
61440089C000
trusted library allocation
page read and write
61440016C000
trusted library allocation
page read and write
6748BFB000
stack
page read and write
2B140075C000
trusted library allocation
page read and write
614401034000
trusted library allocation
page read and write
614401984000
trusted library allocation
page read and write
5D3800434000
trusted library allocation
page read and write
AC63FFE000
stack
page read and write
25B0369D000
heap
page read and write
614400E9C000
trusted library allocation
page read and write
1F50C134000
heap
page read and write
2EE8002B4000
trusted library allocation
page read and write
2B1400758000
trusted library allocation
page read and write
25B030A5000
heap
page read and write
5D38002E0000
trusted library allocation
page read and write
614400D7C000
trusted library allocation
page read and write
674A3FE000
unkown
page readonly
7DC0002D0000
direct allocation
page read and write
614401BC4000
trusted library allocation
page read and write
2B140039C000
trusted library allocation
page read and write
AC6AFFE000
stack
page read and write
6144003DC000
trusted library allocation
page read and write
7808002F4000
trusted library allocation
page read and write
614401558000
trusted library allocation
page read and write
61440118C000
trusted library allocation
page read and write
AC6D7FE000
unkown
page readonly
614400370000
trusted library allocation
page read and write
2B1400760000
trusted library allocation
page read and write
95D000
heap
page read and write
5D3800094000
trusted library allocation
page read and write
2B14002E4000
trusted library allocation
page read and write
6144015AC000
trusted library allocation
page read and write
1AB9E000
stack
page read and write
1A8AF000
stack
page read and write
950000
heap
page read and write
AC6CFFE000
stack
page read and write
614400E0C000
trusted library allocation
page read and write
2B1400744000
trusted library allocation
page read and write
AC46FFE000
stack
page read and write
676CBFC000
stack
page read and write
61440110C000
trusted library allocation
page read and write
5D3800310000
trusted library allocation
page read and write
614400C74000
trusted library allocation
page read and write
614400C1C000
trusted library allocation
page read and write
2B1400238000
trusted library allocation
page read and write
614400EF0000
trusted library allocation
page read and write
6144004AC000
trusted library allocation
page read and write
614400CD4000
trusted library allocation
page read and write
5D380040C000
trusted library allocation
page read and write
1F50A2A3000
heap
page read and write
AC4BFFE000
stack
page read and write
6D519000
unkown
page readonly
614400D98000
trusted library allocation
page read and write
7DC00024C000
direct allocation
page read and write
25B03099000
heap
page read and write
AC4CFFE000
stack
page read and write
2B1400330000
trusted library allocation
page read and write
1F50C15E000
heap
page read and write
5D38000C1000
trusted library allocation
page read and write
2B14006F0000
trusted library allocation
page read and write
7958002DC000
direct allocation
page read and write
614400A20000
trusted library allocation
page read and write
1F514400000
heap
page read and write
614400001000
trusted library allocation
page read and write
614400A0C000
trusted library allocation
page read and write
1F50A245000
heap
page read and write
614400E0C000
trusted library allocation
page read and write
AC66FFE000
stack
page read and write
614400480000
trusted library allocation
page read and write
5D3800344000
trusted library allocation
page read and write
1ACEE000
stack
page read and write
614400FBC000
trusted library allocation
page read and write
614400C84000
trusted library allocation
page read and write
614401601000
trusted library allocation
page read and write
20EF4000
heap
page read and write
61440159C000
trusted library allocation
page read and write
7808002A4000
trusted library allocation
page read and write
614400F0C000
trusted library allocation
page read and write
AC547FE000
unkown
page readonly
1F50A1A0000
heap
page read and write
7DC000284000
direct allocation
page read and write
25B03779000
heap
page read and write
614401A98000
trusted library allocation
page read and write
614400C18000
trusted library allocation
page read and write
2B140027C000
trusted library allocation
page read and write
61440167C000
trusted library allocation
page read and write
614400DC4000
trusted library allocation
page read and write
2B1400401000
trusted library allocation
page read and write
7DC000215000
direct allocation
page read and write
614400994000
trusted library allocation
page read and write
614401624000
trusted library allocation
page read and write
780800264000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
61440152C000
trusted library allocation
page read and write
614400D6C000
trusted library allocation
page read and write
28880032C000
trusted library allocation
page read and write
676DBFE000
stack
page read and write
676EBFE000
stack
page read and write
2EE8002B4000
trusted library allocation
page read and write
1F50C1B3000
heap
page read and write
614400F64000
trusted library allocation
page read and write
8FA000
heap
page read and write
614401112000
trusted library allocation
page read and write
2B14007E0000
trusted library allocation
page read and write
1A62F000
stack
page read and write
675CBFD000
stack
page read and write
73E000
stack
page read and write
6144019DC000
trusted library allocation
page read and write
675DBFC000
stack
page read and write
6D517000
unkown
page read and write
6144006BC000
trusted library allocation
page read and write
7DC00026C000
direct allocation
page read and write
614401820000
trusted library allocation
page read and write
614401660000
trusted library allocation
page read and write
1F50C174000
heap
page read and write
6144002B4000
trusted library allocation
page read and write
25B03714000
heap
page read and write
57B000
unkown
page execute and read and write
288800304000
trusted library allocation
page read and write
676C3FE000
unkown
page readonly
61440199C000
trusted library allocation
page read and write
1F50A302000
heap
page read and write
614400066000
trusted library allocation
page read and write
5D3800378000
trusted library allocation
page read and write
2B14003EC000
trusted library allocation
page read and write
5D3800201000
trusted library allocation
page read and write
614401C28000
trusted library allocation
page read and write
6144001AC000
trusted library allocation
page read and write
25B076B2000
trusted library allocation
page read and write
1F50C136000
heap
page read and write
2B1400630000
trusted library allocation
page read and write
AC61FFE000
stack
page read and write
614401988000
trusted library allocation
page read and write
AC4C7FE000
unkown
page readonly
B0F000
stack
page read and write
1F50A327000
heap
page read and write
61440033C000
trusted library allocation
page read and write
614400184000
trusted library allocation
page read and write
1ADED000
stack
page read and write
1F50A2BF000
heap
page read and write
6144002F0000
trusted library allocation
page read and write
614401828000
trusted library allocation
page read and write
2EE800278000
trusted library allocation
page read and write
2B140033C000
trusted library allocation
page read and write
2B140033C000
trusted library allocation
page read and write
1AC9D000
stack
page read and write
1F50A2A9000
heap
page read and write
6144004AC000
trusted library allocation
page read and write
614400070000
trusted library allocation
page read and write
614400BBC000
trusted library allocation
page read and write
AC617FE000
unkown
page readonly
614401540000
trusted library allocation
page read and write
614400E9C000
trusted library allocation
page read and write
25B03725000
heap
page read and write
25B0A090000
trusted library section
page read and write
6144001B4000
trusted library allocation
page read and write
5D38001EC000
trusted library allocation
page read and write
6144004B8000
trusted library allocation
page read and write
614400330000
trusted library allocation
page read and write
2B1400430000
trusted library allocation
page read and write
7DC000210000
direct allocation
page read and write
5D3800460000
trusted library allocation
page read and write
7808002C0000
trusted library allocation
page read and write
67493FE000
unkown
page readonly
61E01000
direct allocation
page execute read
49E000
unkown
page readonly
614401318000
trusted library allocation
page read and write
614400370000
trusted library allocation
page read and write
614400C18000
trusted library allocation
page read and write
61440178C000
trusted library allocation
page read and write
5D3800424000
trusted library allocation
page read and write
614400294000
trusted library allocation
page read and write
675D3FE000
unkown
page readonly
8E3000
heap
page read and write
61440020C000
trusted library allocation
page read and write
25B09BEE000
trusted library section
page read and write
6144003DC000
trusted library allocation
page read and write
780800260000
trusted library allocation
page read and write
614401A80000
trusted library allocation
page read and write
25B0A0A0000
trusted library section
page read and write
614400A14000
trusted library allocation
page read and write
614401A6C000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
614400568000
trusted library allocation
page read and write
5D3800427000
trusted library allocation
page read and write
7DC000280000
direct allocation
page read and write
AC52FFD000
stack
page read and write
25B03721000
heap
page read and write
1F50A2E3000
heap
page read and write
614401170000
trusted library allocation
page read and write
7DC00030A000
direct allocation
page read and write
614400FBC000
trusted library allocation
page read and write
614401358000
trusted library allocation
page read and write
2EE800210000
trusted library allocation
page read and write
61440129C000
trusted library allocation
page read and write
6144012B8000
trusted library allocation
page read and write
6144003DC000
trusted library allocation
page read and write
614401024000
trusted library allocation
page read and write
5D3800068000
trusted library allocation
page read and write
614400F48000
trusted library allocation
page read and write
7958002EC000
direct allocation
page read and write
614401730000
trusted library allocation
page read and write
2B1400620000
trusted library allocation
page read and write
6771BFE000
stack
page read and write
614400348000
trusted library allocation
page read and write
6144002F0000
trusted library allocation
page read and write
5D38002EC000
trusted library allocation
page read and write
6144002B6000
trusted library allocation
page read and write
67423FE000
unkown
page readonly
1F50A2E3000
heap
page read and write
6144012A8000
trusted library allocation
page read and write
2B140035C000
trusted library allocation
page read and write
25B7D080000
heap
page read and write
614400A94000
trusted library allocation
page read and write
1F50C170000
heap
page read and write
614401BB9000
trusted library allocation
page read and write
2EE800274000
trusted library allocation
page read and write
614400201000
trusted library allocation
page read and write
6144016AC000
trusted library allocation
page read and write
2EE8002A0000
trusted library allocation
page read and write
56E000
unkown
page execute and read and write
6144001D4000
trusted library allocation
page read and write
2B1400640000
trusted library allocation
page read and write
6144001D8000
trusted library allocation
page read and write
288800210000
trusted library allocation
page read and write
780800230000
trusted library allocation
page read and write
2EE800294000
trusted library allocation
page read and write
676BBFA000
stack
page read and write
7958002E4000
direct allocation
page read and write
5D38001E8000
trusted library allocation
page read and write
AC6B7FE000
unkown
page readonly
614400E84000
trusted library allocation
page read and write
79580020C000
direct allocation
page read and write
19E000
stack
page read and write
1F50A29E000
heap
page read and write
AC5DFFC000
stack
page read and write
6144016E8000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
614400220000
trusted library allocation
page read and write
614401508000
trusted library allocation
page read and write
2EE8002B4000
trusted library allocation
page read and write
25B03070000
heap
page read and write
2B1400668000
trusted library allocation
page read and write
5D380038C000
trusted library allocation
page read and write
25B030A2000
heap
page read and write
2888002D8000
trusted library allocation
page read and write
5D3800144000
trusted library allocation
page read and write
1F50A2CB000
heap
page read and write
5D38003A0000
trusted library allocation
page read and write
AC4AFFE000
stack
page read and write
795800220000
direct allocation
page read and write
61440033C000
trusted library allocation
page read and write
7DC000250000
direct allocation
page read and write
1F50A2E3000
heap
page read and write
614400DC8000
trusted library allocation
page read and write
614401BDC000
trusted library allocation
page read and write
AC4B7FE000
unkown
page readonly
61440009D000
trusted library allocation
page read and write
288800350000
trusted library allocation
page read and write
614400C01000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
6144005F8000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
7808002C0000
trusted library allocation
page read and write
674B3FE000
unkown
page readonly
25B7D010000
heap
page read and write
614401BD0000
trusted library allocation
page read and write
61440155C000
trusted library allocation
page read and write
614400F80000
trusted library allocation
page read and write
795800250000
direct allocation
page read and write
614400328000
trusted library allocation
page read and write
614400FE0000
trusted library allocation
page read and write
674F3FE000
unkown
page readonly
614400294000
trusted library allocation
page read and write
61440150C000
trusted library allocation
page read and write
1F50A2E3000
heap
page read and write
288800250000
trusted library allocation
page read and write
614400A14000
trusted library allocation
page read and write
614401824000
trusted library allocation
page read and write
19C000
stack
page read and write
67573FE000
unkown
page readonly
614401B18000
trusted library allocation
page read and write
614400EC8000
trusted library allocation
page read and write
1F50C153000
heap
page read and write
614400724000
trusted library allocation
page read and write
25B0368A000
heap
page read and write
614400E9C000
trusted library allocation
page read and write
614401748000
trusted library allocation
page read and write
1F50A360000
heap
page read and write
AC517FE000
unkown
page readonly
25B099A0000
trusted library section
page read and write
7DC000294000
direct allocation
page read and write
1F514402000
heap
page read and write
6751BFE000
stack
page read and write
6144001EC000
trusted library allocation
page read and write
6144004C8000
trusted library allocation
page read and write
1F50A2BF000
heap
page read and write
28880020C000
trusted library allocation
page read and write
5D380026C000
trusted library allocation
page read and write
25B7D150000
heap
page read and write
25B018F3000
heap
page read and write
25B07F71000
heap
page read and write
905000
heap
page read and write
614400E90000
trusted library allocation
page read and write
AC5B7FE000
unkown
page readonly
25B07F27000
heap
page read and write
2B1400684000
trusted library allocation
page read and write
614401098000
trusted library allocation
page read and write
25B030A3000
heap
page read and write
614401001000
trusted library allocation
page read and write
61440110D000
trusted library allocation
page read and write
1F50C188000
heap
page read and write
5D3800278000
trusted library allocation
page read and write
288800344000
trusted library allocation
page read and write
1F50A2A3000
heap
page read and write
6144019E4000
trusted library allocation
page read and write
2EE8002B4000
trusted library allocation
page read and write
614401BD0000
trusted library allocation
page read and write
61440033C000
trusted library allocation
page read and write
1AE61000
heap
page read and write
2B1400310000
trusted library allocation
page read and write
21031000
heap
page read and write
6144001AC000
trusted library allocation
page read and write
1F50A2ED000
heap
page read and write
614401BC4000
trusted library allocation
page read and write
614400C74000
trusted library allocation
page read and write
25B08130000
heap
page read and write
6144002FC000
trusted library allocation
page read and write
7808002A0000
trusted library allocation
page read and write
614400B50000
trusted library allocation
page read and write
1F512EF0000
trusted library allocation
page read and write
614401BA8000
trusted library allocation
page read and write
288800424000
trusted library allocation
page read and write
25B03700000
heap
page read and write
2B1400730000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
2EE800235000
trusted library allocation
page read and write
6144019B4000
trusted library allocation
page read and write
20EDD000
heap
page read and write
25B0A020000
trusted library section
page read and write
6144015D4000
trusted library allocation
page read and write
7958002D0000
direct allocation
page read and write
614401AF4000
trusted library allocation
page read and write
25B03300000
heap
page read and write
25B030B0000
heap
page read and write
288800418000
trusted library allocation
page read and write
1F50C144000
heap
page read and write
6741BFE000
unkown
page read and write
288800290000
trusted library allocation
page read and write
614401798000
trusted library allocation
page read and write
5D38002B8000
trusted library allocation
page read and write
2EE8002B4000
trusted library allocation
page read and write
20ED0000
trusted library allocation
page read and write
6759BFD000
stack
page read and write
5D38001DC000
trusted library allocation
page read and write
614400601000
trusted library allocation
page read and write
5D3800470000
trusted library allocation
page read and write
614400598000
trusted library allocation
page read and write
1F50C148000
heap
page read and write
614400118000
trusted library allocation
page read and write
6144016D0000
trusted library allocation
page read and write
780800270000
trusted library allocation
page read and write
61440033C000
trusted library allocation
page read and write
6144009D0000
trusted library allocation
page read and write
2B14002B8000
trusted library allocation
page read and write
2EE800264000
trusted library allocation
page read and write
675E3FE000
unkown
page readonly
614401758000
trusted library allocation
page read and write
28880032C000
trusted library allocation
page read and write
6144008FC000
trusted library allocation
page read and write
6144012E8000
trusted library allocation
page read and write
5D3800274000
trusted library allocation
page read and write
614400E2C000
trusted library allocation
page read and write
614400924000
trusted library allocation
page read and write
5D3800304000
trusted library allocation
page read and write
2EE800248000
trusted library allocation
page read and write
5D3800134000
trusted library allocation
page read and write
2B14006AC000
trusted library allocation
page read and write
AC577FE000
unkown
page readonly
614400290000
trusted library allocation
page read and write
25B018F0000
heap
page read and write
614400789000
trusted library allocation
page read and write
5D3800044000
trusted library allocation
page read and write
2B1400601000
trusted library allocation
page read and write
25B0373D000
heap
page read and write
67533FE000
unkown
page readonly
1F50A2BF000
heap
page read and write
2B1400408000
trusted library allocation
page read and write
5D3800364000
trusted library allocation
page read and write
614400794000
trusted library allocation
page read and write
614400BE0000
trusted library allocation
page read and write
2EE8002B8000
trusted library allocation
page read and write
24FC000
heap
page read and write
549000
unkown
page execute and read and write
2B1400250000
trusted library allocation
page read and write
614400E9C000
trusted library allocation
page read and write
2B1400310000
trusted library allocation
page read and write
614400669000
trusted library allocation
page read and write
1F50C1D6000
heap
page read and write
1F50A2E3000
heap
page read and write
61EB4000
direct allocation
page read and write
25B036A2000
heap
page read and write
5D38002E0000
trusted library allocation
page read and write
5D3800124000
trusted library allocation
page read and write
614400A48000
trusted library allocation
page read and write
61440033C000
trusted library allocation
page read and write
6144017DC000
trusted library allocation
page read and write
6767BFE000
stack
page read and write
1F50C1C8000
heap
page read and write
25B0371F000
heap
page read and write
795800230000
direct allocation
page read and write
6144017E4000
trusted library allocation
page read and write
61440150C000
trusted library allocation
page read and write
7DC0002D8000
direct allocation
page read and write
6762BFD000
stack
page read and write
2888002C4000
trusted library allocation
page read and write
614400F00000
trusted library allocation
page read and write
614400D48000
trusted library allocation
page read and write
614401098000
trusted library allocation
page read and write
1AE61000
heap
page read and write
6144017C4000
trusted library allocation
page read and write
61440061C000
trusted library allocation
page read and write
288800201000
trusted library allocation
page read and write
288800220000
trusted library allocation
page read and write
6144004B0000
trusted library allocation
page read and write
614400060000
trusted library allocation
page read and write
614400294000
trusted library allocation
page read and write
67673FE000
unkown
page readonly
6D4D1000
unkown
page readonly
614400A14000
trusted library allocation
page read and write
288800248000
trusted library allocation
page read and write
614400CA4000
trusted library allocation
page read and write
614400F30000
trusted library allocation
page read and write
6144016EC000
trusted library allocation
page read and write
7DC00025C000
direct allocation
page read and write
614400B7C000
trusted library allocation
page read and write
61440014C000
trusted library allocation
page read and write
288800374000
trusted library allocation
page read and write
614400294000
trusted library allocation
page read and write
2B1400354000
trusted library allocation
page read and write
59B000
unkown
page execute and read and write
2EE8002B8000
trusted library allocation
page read and write
614400AC8000
trusted library allocation
page read and write
288800360000
trusted library allocation
page read and write
614400F58000
trusted library allocation
page read and write
614401B04000
trusted library allocation
page read and write
24FE000
heap
page read and write
5D38001F0000
trusted library allocation
page read and write
614400308000
trusted library allocation
page read and write
614400B40000
trusted library allocation
page read and write
614400B40000
trusted library allocation
page read and write
614400314000
trusted library allocation
page read and write
6144015F0000
trusted library allocation
page read and write
2B14006B0000
trusted library allocation
page read and write
288800284000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
AC53FFE000
stack
page read and write
25B07F78000
heap
page read and write
6144006A8000
trusted library allocation
page read and write
25B09E1E000
trusted library section
page read and write
6770BF9000
stack
page read and write
990000
direct allocation
page execute and read and write
614400F94000
trusted library allocation
page read and write
61440129C000
trusted library allocation
page read and write
614400858000
trusted library allocation
page read and write
61440168C000
trusted library allocation
page read and write
1AE50000
heap
page read and write
1F50A2E3000
heap
page read and write
5D38001F8000
trusted library allocation
page read and write
5D380023C000
trusted library allocation
page read and write
614401318000
trusted library allocation
page read and write
67683FE000
unkown
page readonly
61440150C000
trusted library allocation
page read and write
614401778000
trusted library allocation
page read and write
6144015C4000
trusted library allocation
page read and write
67713FE000
unkown
page readonly
288800238000
trusted library allocation
page read and write
6144005B0000
trusted library allocation
page read and write
C0F000
stack
page read and write
1F50A2A4000
heap
page read and write
614401734000
trusted library allocation
page read and write
614401840000
trusted library allocation
page read and write
1AE61000
heap
page read and write
2B1400698000
trusted library allocation
page read and write
25B097A0000
trusted library section
page read and write
614401C1C000
trusted library allocation
page read and write
2EE8002FC000
trusted library allocation
page read and write
614400F94000
trusted library allocation
page read and write
6144011AC000
trusted library allocation
page read and write
5D3800220000
trusted library allocation
page read and write
61440106C000
trusted library allocation
page read and write
25B09BE0000
trusted library section
page read and write
614400328000
trusted library allocation
page read and write
5D3800304000
trusted library allocation
page read and write
67543FE000
unkown
page readonly
67553FE000
unkown
page readonly
2B1400688000
trusted library allocation
page read and write
614400684000
trusted library allocation
page read and write
5D3800224000
trusted library allocation
page read and write
614400950000
trusted library allocation
page read and write
2B14006D0000
trusted library allocation
page read and write
674E3FE000
unkown
page readonly
61440151C000
trusted library allocation
page read and write
1F50A2FF000
heap
page read and write
25B095A7000
unclassified section
page read and write
9C000
stack
page read and write
25B036E7000
heap
page read and write
97B000
heap
page read and write
614401A70000
trusted library allocation
page read and write
614401AF0000
trusted library allocation
page read and write
5D3800264000
trusted library allocation
page read and write
AC5FFFD000
stack
page read and write
2B1400368000
trusted library allocation
page read and write
1F50A2E3000
heap
page read and write
614400E38000
trusted library allocation
page read and write
614400228000
trusted library allocation
page read and write
25B030A2000
heap
page read and write
67453FE000
unkown
page readonly
67613FE000
unkown
page readonly
7DC0002D8000
direct allocation
page read and write
5D3800324000
trusted library allocation
page read and write
614400C84000
trusted library allocation
page read and write
AC49FFE000
stack
page read and write
5D3800114000
trusted library allocation
page read and write
7958002AC000
direct allocation
page read and write
6757BFC000
stack
page read and write
AC537FE000
unkown
page readonly
61440017C000
trusted library allocation
page read and write
614400480000
trusted library allocation
page read and write
6144002F0000
trusted library allocation
page read and write
5D38001AC000
trusted library allocation
page read and write
614400714000
trusted library allocation
page read and write
1F50A2A3000
heap
page read and write
61440181C000
trusted library allocation
page read and write
67463FE000
unkown
page readonly
2B14002D4000
trusted library allocation
page read and write
61440040C000
trusted library allocation
page read and write
614401A68000
trusted library allocation
page read and write
AC50FFD000
stack
page read and write
6144001AC000
trusted library allocation
page read and write
20EE9000
heap
page read and write
614400E9C000
trusted library allocation
page read and write
614400964000
trusted library allocation
page read and write
614400FE0000
trusted library allocation
page read and write
5D380002A000
trusted library allocation
page read and write
6144016A0000
trusted library allocation
page read and write
1F50A330000
heap
page read and write
288800430000
trusted library allocation
page read and write
6765BFE000
stack
page read and write
2B14006CC000
trusted library allocation
page read and write
25B0372B000
heap
page read and write
795800201000
direct allocation
page read and write
6144009EC000
trusted library allocation
page read and write
780800274000
trusted library allocation
page read and write
795800210000
direct allocation
page read and write
614401BD0000
trusted library allocation
page read and write
5D3800250000
trusted library allocation
page read and write
6144017C0000
trusted library allocation
page read and write
61440033C000
trusted library allocation
page read and write
614401A60000
trusted library allocation
page read and write
614401A20000
trusted library allocation
page read and write
AC60FFE000
stack
page read and write
614400D08000
trusted library allocation
page read and write
61440110C000
trusted library allocation
page read and write
2B14006C4000
trusted library allocation
page read and write
6761BFB000
stack
page read and write
614400A7C000
trusted library allocation
page read and write
20ED4000
heap
page read and write
1A4D0000
heap
page read and write
5D38001A0000
trusted library allocation
page read and write
AC567FE000
unkown
page readonly
614401620000
trusted library allocation
page read and write
5D380025C000
trusted library allocation
page read and write
2B1400248000
trusted library allocation
page read and write
2EE800294000
trusted library allocation
page read and write
61440140C000
trusted library allocation
page read and write
614401118000
trusted library allocation
page read and write
61440133C000
trusted library allocation
page read and write
614400694000
trusted library allocation
page read and write
25B07D17000
unclassified section
page read and write
745000
heap
page read and write
5D3800378000
trusted library allocation
page read and write
6144003DC000
trusted library allocation
page read and write
614400330000
trusted library allocation
page read and write
614401A4C000
trusted library allocation
page read and write
7808002C0000
trusted library allocation
page read and write
5D3800304000
trusted library allocation
page read and write
5D38002EC000
trusted library allocation
page read and write
2EE800201000
trusted library allocation
page read and write
6144011C4000
trusted library allocation
page read and write
5D3800160000
trusted library allocation
page read and write
194000
stack
page read and write
28880027C000
trusted library allocation
page read and write
2EE8002B8000
trusted library allocation
page read and write
2EE800294000
trusted library allocation
page read and write
6768BFE000
stack
page read and write
24F3000
heap
page read and write
1F50A2EB000
heap
page read and write
5D38002D0000
trusted library allocation
page read and write
2EE800238000
trusted library allocation
page read and write
25B7D0D0000
trusted library allocation
page read and write
67603FE000
unkown
page readonly
2B1400404000
trusted library allocation
page read and write
5D38003CC000
trusted library allocation
page read and write
5D3800454000
trusted library allocation
page read and write
2B14007D0000
trusted library allocation
page read and write
614400350000
trusted library allocation
page read and write
6752BFA000
stack
page read and write
5D380038C000
trusted library allocation
page read and write
614401B2C000
trusted library allocation
page read and write
61440172C000
trusted library allocation
page read and write
6144015CC000
trusted library allocation
page read and write
20EED000
heap
page read and write
61440150C000
trusted library allocation
page read and write
401000
unkown
page execute read
614401638000
trusted library allocation
page read and write
288800404000
trusted library allocation
page read and write
1F50C013000
heap
page read and write
614401A90000
trusted library allocation
page read and write
6144006CC000
trusted library allocation
page read and write
6144009B4000
trusted library allocation
page read and write
614401C0C000
trusted library allocation
page read and write
2EE8002A8000
trusted library allocation
page read and write
2B1400614000
trusted library allocation
page read and write
614401834000
trusted library allocation
page read and write
66E000
unkown
page execute and read and write
614401AA8000
trusted library allocation
page read and write
67633FE000
unkown
page readonly
614401A24000
trusted library allocation
page read and write
6144017F8000
trusted library allocation
page read and write
6144019A8000
trusted library allocation
page read and write
614400E44000
trusted library allocation
page read and write
AC5C7FE000
unkown
page readonly
21011000
heap
page read and write
25B036E8000
heap
page read and write
5D3800280000
trusted library allocation
page read and write
614401868000
trusted library allocation
page read and write
780800220000
trusted library allocation
page read and write
674ABFA000
stack
page read and write
2EE8002B4000
trusted library allocation
page read and write
5D38000CC000
trusted library allocation
page read and write
1F50A1F0000
trusted library section
page readonly
614401BC4000
trusted library allocation
page read and write
614400B6C000
trusted library allocation
page read and write
614401854000
trusted library allocation
page read and write
5D3800450000
trusted library allocation
page read and write
6144008D8000
trusted library allocation
page read and write
6144007F0000
trusted library allocation
page read and write
7808002C0000
trusted library allocation
page read and write
614400B00000
trusted library allocation
page read and write
2B14006B4000
trusted library allocation
page read and write
6144000D0000
trusted library allocation
page read and write
614400D88000
trusted library allocation
page read and write
6EB000
unkown
page readonly
2888003C4000
trusted library allocation
page read and write
AC68FFD000
stack
page read and write
1F50C15E000
heap
page read and write
5D3800234000
trusted library allocation
page read and write
6144016C8000
trusted library allocation
page read and write
2B14006EC000
trusted library allocation
page read and write
614401C01000
trusted library allocation
page read and write
614401BC4000
trusted library allocation
page read and write
614401554000
trusted library allocation
page read and write
740000
heap
page read and write
61440000C000
trusted library allocation
page read and write
20EF7000
heap
page read and write
2B1400210000
trusted library allocation
page read and write
614401634000
trusted library allocation
page read and write
7DC000311000
direct allocation
page read and write
79580024C000
direct allocation
page read and write
6144013CC000
trusted library allocation
page read and write
20EEF000
heap
page read and write
614400EA8000
trusted library allocation
page read and write
AC56FFE000
stack
page read and write
614401388000
trusted library allocation
page read and write
61440120C000
trusted library allocation
page read and write
1F50A25F000
heap
page read and write
2B1400380000
trusted library allocation
page read and write
5D3800324000
trusted library allocation
page read and write
1F50A230000
heap
page read and write
67663FE000
unkown
page readonly
614401708000
trusted library allocation
page read and write
61440100C000
trusted library allocation
page read and write
6144016A8000
trusted library allocation
page read and write
614400914000
trusted library allocation
page read and write
614400298000
trusted library allocation
page read and write
5D38000DC000
trusted library allocation
page read and write
25B0A031000
trusted library section
page read and write
614400054000
trusted library allocation
page read and write
61440107C000
trusted library allocation
page read and write
614400CDC000
trusted library allocation
page read and write
7DC000217000
direct allocation
page read and write
2B140025C000
trusted library allocation
page read and write
AC65FFE000
stack
page read and write
5A7000
unkown
page execute and read and write
614401428000
trusted library allocation
page read and write
5D38002B0000
trusted library allocation
page read and write
21022000
heap
page read and write
1F50C1AA000
heap
page read and write
2B14002F4000
trusted library allocation
page read and write
61440022C000
trusted library allocation
page read and write
5D38002D4000
trusted library allocation
page read and write
5D3800001000
trusted library allocation
page read and write
6144016FC000
trusted library allocation
page read and write
1A90E000
stack
page read and write
2B140085C000
trusted library allocation
page read and write
6144012EC000
trusted library allocation
page read and write
AC457FE000
unkown
page readonly
614400DDC000
trusted library allocation
page read and write
6144015BC000
trusted library allocation
page read and write
676ABFE000
stack
page read and write
614401A94000
trusted library allocation
page read and write
5D3800210000
trusted library allocation
page read and write
614401684000
trusted library allocation
page read and write
7808002A4000
trusted library allocation
page read and write
25B09E10000
trusted library section
page read and write
6144013E4000
trusted library allocation
page read and write
6760BFE000
stack
page read and write
61440077C000
trusted library allocation
page read and write
20EF7000
heap
page read and write
1F50C13E000
heap
page read and write
6144001C8000
trusted library allocation
page read and write
2B1400714000
trusted library allocation
page read and write
2B1400230000
trusted library allocation
page read and write
25B093D2000
trusted library section
page read and write
5D38002F8000
trusted library allocation
page read and write
288800358000
trusted library allocation
page read and write
676FBFD000
stack
page read and write
614401890000
trusted library allocation
page read and write
2B1400288000
trusted library allocation
page read and write
614401518000
trusted library allocation
page read and write
2EE8002A8000
trusted library allocation
page read and write
7DC0002C0000
direct allocation
page read and write
25B0A0B1000
trusted library section
page read and write
61440080C000
trusted library allocation
page read and write
AC637FE000
unkown
page readonly
AC4EFFE000
stack
page read and write
5D3800258000
trusted library allocation
page read and write
5D38003B4000
trusted library allocation
page read and write
1F50A2BD000
heap
page read and write
614401AE0000
trusted library allocation
page read and write
61440164C000
trusted library allocation
page read and write
1F50A358000
heap
page read and write
25B07F66000
heap
page read and write
614400830000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
614400A58000
trusted library allocation
page read and write
7DC000270000
direct allocation
page read and write
2B1400320000
trusted library allocation
page read and write
614401A34000
trusted library allocation
page read and write
614401114000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
67593FE000
unkown
page readonly
25B036A2000
heap
page read and write
25B03776000
heap
page read and write
6144001F8000
trusted library allocation
page read and write
2B1400720000
trusted library allocation
page read and write
6144016A4000
trusted library allocation
page read and write
7808002F0000
trusted library allocation
page read and write
514000
unkown
page execute and read and write
5D3800268000
trusted library allocation
page read and write
614400514000
trusted library allocation
page read and write
5D3800254000
trusted library allocation
page read and write
614400774000
trusted library allocation
page read and write
61440107C000
trusted library allocation
page read and write
7808002C0000
trusted library allocation
page read and write
61440036C000
trusted library allocation
page read and write
614401054000
trusted library allocation
page read and write
1F50A2F8000
heap
page read and write
2888003A8000
trusted library allocation
page read and write
614400328000
trusted library allocation
page read and write
6144015E4000
trusted library allocation
page read and write
614400370000
trusted library allocation
page read and write
7DC0002E0000
direct allocation
page read and write
1F50A2ED000
heap
page read and write
94B000
heap
page read and write
674C3FE000
unkown
page readonly
61440154C000
trusted library allocation
page read and write
24C0000
heap
page read and write
5D3800228000
trusted library allocation
page read and write
1F50C123000
heap
page read and write
614401BD0000
trusted library allocation
page read and write
676F3FE000
unkown
page readonly
614400C74000
trusted library allocation
page read and write
7DC00021C000
direct allocation
page read and write
67563FE000
unkown
page readonly
1F50CDC0000
unkown
page read and write
2EE800250000
trusted library allocation
page read and write
AC607FE000
unkown
page readonly
614401618000
trusted library allocation
page read and write
614401318000
trusted library allocation
page read and write
AC497FE000
unkown
page readonly
6144017B8000
trusted library allocation
page read and write
614401BEC000
trusted library allocation
page read and write
2B1400390000
trusted library allocation
page read and write
614400330000
trusted library allocation
page read and write
614400EA8000
trusted library allocation
page read and write
6144007A8000
trusted library allocation
page read and write
2B1400330000
trusted library allocation
page read and write
614400C9C000
trusted library allocation
page read and write
614401A28000
trusted library allocation
page read and write
780800288000
trusted library allocation
page read and write
780800248000
trusted library allocation
page read and write
2B14007CC000
trusted library allocation
page read and write
676A3FE000
unkown
page readonly
25B036A9000
heap
page read and write
2B1400610000
trusted library allocation
page read and write
5D380026C000
trusted library allocation
page read and write
5D3800401000
trusted library allocation
page read and write
288800364000
trusted library allocation
page read and write
6756BFB000
stack
page read and write
25B09586000
trusted library section
page read and write
2888003AC000
trusted library allocation
page read and write
AC44FFF000
stack
page read and write
2B1400648000
trusted library allocation
page read and write
614400128000
trusted library allocation
page read and write
6764BFC000
stack
page read and write
614401AA4000
trusted library allocation
page read and write
614401738000
trusted library allocation
page read and write
2B1400694000
trusted library allocation
page read and write
5D380046C000
trusted library allocation
page read and write
6144000F0000
trusted library allocation
page read and write
614401A1C000
trusted library allocation
page read and write
2EE8002B4000
trusted library allocation
page read and write
6144017E0000
trusted library allocation
page read and write
614401170000
trusted library allocation
page read and write
614400FBC000
trusted library allocation
page read and write
614400330000
trusted library allocation
page read and write
1A76F000
stack
page read and write
25B07E20000
heap
page read and write
614401A88000
trusted library allocation
page read and write
1F50C141000
heap
page read and write
614400C74000
trusted library allocation
page read and write
6144002F0000
trusted library allocation
page read and write
2B1400700000
trusted library allocation
page read and write
6144002F0000
trusted library allocation
page read and write
25B07DA7000
unclassified section
page read and write
614400DC8000
trusted library allocation
page read and write
6144008B4000
trusted library allocation
page read and write
25B7CF60000
heap
page readonly
288800288000
trusted library allocation
page read and write
2B1400658000
trusted library allocation
page read and write
614400E9C000
trusted library allocation
page read and write
1A52E000
stack
page read and write
2B1400754000
trusted library allocation
page read and write
614400C0D000
trusted library allocation
page read and write
1F50A330000
heap
page read and write
614401ADC000
trusted library allocation
page read and write
25B03689000
heap
page read and write
614400CF1000
trusted library allocation
page read and write
6144017D4000
trusted library allocation
page read and write
614400D24000
trusted library allocation
page read and write
614401598000
trusted library allocation
page read and write
614401390000
trusted library allocation
page read and write
614400134000
trusted library allocation
page read and write
25B030AB000
heap
page read and write
67653FE000
unkown
page readonly
6746BFD000
stack
page read and write
614401768000
trusted library allocation
page read and write
6144012EF000
trusted library allocation
page read and write
24F0000
heap
page read and write
61440165C000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
747000
heap
page read and write
5D380017C000
trusted library allocation
page read and write
5D380018C000
trusted library allocation
page read and write
6144001C4000
trusted library allocation
page read and write
2B1400348000
trusted library allocation
page read and write
6144001AC000
trusted library allocation
page read and write
614400904000
trusted library allocation
page read and write
AC5E7FE000
unkown
page readonly
676E3FE000
unkown
page readonly
614400DC8000
trusted library allocation
page read and write
747000
heap
page read and write
674CBFC000
stack
page read and write
61440180C000
trusted library allocation
page read and write
614400FBC000
trusted library allocation
page read and write
2B14002F0000
trusted library allocation
page read and write
1F50A2F8000
heap
page read and write
1F50A313000
heap
page read and write
2B1400364000
trusted library allocation
page read and write
5D38002AC000
trusted library allocation
page read and write
1F50A1C0000
trusted library allocation
page read and write
25B7CE80000
heap
page read and write
61ECD000
direct allocation
page readonly
614400308000
trusted library allocation
page read and write
7DC0002EC000
direct allocation
page read and write
61440020C000
trusted library allocation
page read and write
There are 1571 hidden memdumps, click here to show them.