IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_a37c8abe5fa88b74d7c9bce1b01c77a59b85d3b_ccf28a54_c7bf8410-398f-4fda-93fd-f50c98236c3c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\CBFIJEGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\ECFCBFBGDBKJKECAAKKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2CDE.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Nov 1 11:13:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E56.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E86.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3f5b0e24-1654-4de7-ac79-aad26cb9173e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\47a641ab-28bf-4244-8491-6f8dcb9e6e0c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\743c89ff-7079-4e24-876b-cdbf896767d9.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6724B7D0-580.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37b9a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37c55.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37ce2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37d01.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\cff01bda-3f45-4bc4-bd3f-1f5007e72b11.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ee18caac-c678-473e-9323-b4e69bb9a296.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 1 10:13:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 102
Unicode text, UTF-8 text, with very long lines (5443)
downloaded
Chrome Cache Entry: 103
ASCII text
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 106
SVG Scalable Vector Graphics image
downloaded
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 --field-trial-handle=2300,i,12253254969016483560,8201346727917572469,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2636 --field-trial-handle=2468,i,18208122850511008875,358630292499300278,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=2004,i,11058758626753817860,2067604702649362784,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 2064

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dllR
unknown
https://google-ohttp-relay-join.fastly-edge.com/C
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dllX
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://google-ohttp-relay-join.fastly-edge.com/F
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/I
unknown
https://google-ohttp-relay-join.fastly-edge.com/N
unknown
https://google-ohttp-relay-join.fastly-edge.com/M
unknown
https://google-ohttp-relay-join.fastly-edge.com/L
unknown
https://google-ohttp-relay-join.fastly-edge.com/S
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/P
unknown
https://google-ohttp-relay-join.fastly-edge.com/W
unknown
https://google-ohttp-relay-join.fastly-edge.com/V
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/X
unknown
https://google-ohttp-relay-join.fastly-edge.com/_
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://google-ohttp-relay-join.fastly-edge.com/g
unknown
http://185.215.113.206/#H
unknown
https://issuetracker.google.com/255411748
unknown
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
http://185.215.113.206/6c4adf523b719729.phprI2e
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://plus.google.com
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.74.206
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dllx
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://msn.com/
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
https://policies.google.com/
unknown
https://apis.google.com
unknown
http://185.215.113.206/6c4adf523b719729.phpUser
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://domains.google.com/suggest/flow
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.74.206
play.google.com
172.217.16.206
www.google.com
142.250.185.100
206.23.85.13.in-addr.arpa
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.74.206
plus.l.google.com
United States
172.217.16.206
play.google.com
United States
142.250.185.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{649b7e7c-55b0-6184-be09-9ab8ae2c2f05}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B61000
unkown
page execute and read and write
malicious
5590000
direct allocation
page read and write
malicious
17AE000
heap
page read and write
malicious
1DBE6000
heap
page read and write
1DC03000
heap
page read and write
74A000FD8000
trusted library allocation
page read and write
33AC00728000
trusted library allocation
page read and write
1384000
heap
page read and write
20590D8C000
heap
page read and write
1DA857C5000
heap
page read and write
25A802580000
trusted library allocation
page read and write
7CDDFE000
stack
page read and write
74A001B54000
trusted library allocation
page read and write
5101000
heap
page read and write
74A0014A4000
trusted library allocation
page read and write
74A000234000
trusted library allocation
page read and write
74A001CCC000
trusted library allocation
page read and write
A8002D8000
direct allocation
page read and write
74A0012C0000
trusted library allocation
page read and write
5101000
heap
page read and write
46DF000
stack
page read and write
25A80261C000
trusted library allocation
page read and write
69B4002A0000
trusted library allocation
page read and write
25A802488000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
74A0001F8000
trusted library allocation
page read and write
25A802304000
trusted library allocation
page read and write
25A8025BC000
trusted library allocation
page read and write
A8002C0000
direct allocation
page read and write
A80031C000
direct allocation
page read and write
5101000
heap
page read and write
6DBC002FC000
trusted library allocation
page read and write
A800290000
direct allocation
page read and write
A800270000
direct allocation
page read and write
74A001E78000
trusted library allocation
page read and write
33AC00828000
trusted library allocation
page read and write
1DA857B6000
heap
page read and write
1DC00000
heap
page read and write
20590884000
heap
page read and write
74A001F84000
trusted library allocation
page read and write
74A00040C000
trusted library allocation
page read and write
A800250000
direct allocation
page read and write
5101000
heap
page read and write
6C8A1000
unkown
page readonly
74A001A5C000
trusted library allocation
page read and write
1DA85750000
heap
page read and write
1DA8C660000
trusted library allocation
page read and write
33AC006C8000
trusted library allocation
page read and write
4BDF000
stack
page read and write
33AC006C8000
trusted library allocation
page read and write
74A001E70000
trusted library allocation
page read and write
74A0013D0000
trusted library allocation
page read and write
A800220000
direct allocation
page read and write
2C08003A8000
trusted library allocation
page read and write
485E000
stack
page read and write
5101000
heap
page read and write
74A001B64000
trusted library allocation
page read and write
7D8DFE000
stack
page read and write
74A000ECC000
trusted library allocation
page read and write
25A800E01000
trusted library allocation
page read and write
25A8023D0000
trusted library allocation
page read and write
74A001A7C000
trusted library allocation
page read and write
1384000
heap
page read and write
74A00034C000
trusted library allocation
page read and write
471E000
stack
page read and write
74A000D74000
trusted library allocation
page read and write
74A00180C000
trusted library allocation
page read and write
A8002D0000
direct allocation
page read and write
50F0000
direct allocation
page read and write
74A001A90000
trusted library allocation
page read and write
25A802368000
trusted library allocation
page read and write
5101000
heap
page read and write
74A00038C000
trusted library allocation
page read and write
74A001B7C000
trusted library allocation
page read and write
33CE000
stack
page read and write
1DA8576C000
heap
page read and write
50F0000
direct allocation
page read and write
1DA83913000
heap
page read and write
74A001B40000
trusted library allocation
page read and write
1DA83867000
heap
page read and write
74A000ECC000
trusted library allocation
page read and write
74A001D70000
trusted library allocation
page read and write
6DBC002A8000
trusted library allocation
page read and write
74A000454000
trusted library allocation
page read and write
1288000
unkown
page execute and write copy
74A001DC0000
trusted library allocation
page read and write
1DC00000
heap
page read and write
74A000300000
trusted library allocation
page read and write
1DC03000
heap
page read and write
33AC008F4000
trusted library allocation
page read and write
7D65FE000
unkown
page readonly
74A001F34000
trusted library allocation
page read and write
74A0019E0000
trusted library allocation
page read and write
20590886000
heap
page read and write
74A000458000
trusted library allocation
page read and write
2059087F000
heap
page read and write
1DBFF000
heap
page read and write
5160000
heap
page read and write
1DA85770000
heap
page read and write
25A8022E8000
trusted library allocation
page read and write
25A802454000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
6C8E7000
unkown
page read and write
33AC00408000
trusted library allocation
page read and write
6FA400244000
direct allocation
page read and write
74A001A50000
trusted library allocation
page read and write
5101000
heap
page read and write
173E000
stack
page read and write
2C08002A4000
trusted library allocation
page read and write
1384000
heap
page read and write
74A001940000
trusted library allocation
page read and write
1B6E000
stack
page read and write
74A001AF0000
trusted library allocation
page read and write
74A001A70000
trusted library allocation
page read and write
25A8024A8000
trusted library allocation
page read and write
74A001AA4000
trusted library allocation
page read and write
33AC007AC000
trusted library allocation
page read and write
7CC5FE000
unkown
page readonly
25A80260F000
trusted library allocation
page read and write
1D55E000
stack
page read and write
33AC00850000
trusted library allocation
page read and write
33AC00868000
trusted library allocation
page read and write
25A802450000
trusted library allocation
page read and write
25A80244C000
trusted library allocation
page read and write
2C0800284000
trusted library allocation
page read and write
5101000
heap
page read and write
7D2DFE000
stack
page read and write
74A00150C000
trusted library allocation
page read and write
74A001920000
trusted library allocation
page read and write
74A000338000
trusted library allocation
page read and write
74A001E68000
trusted library allocation
page read and write
74A000F58000
trusted library allocation
page read and write
74A000CE8000
trusted library allocation
page read and write
74A0010ED000
trusted library allocation
page read and write
6DBC00238000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
25A802428000
trusted library allocation
page read and write
409F000
stack
page read and write
4C1E000
stack
page read and write
74A001DCC000
trusted library allocation
page read and write
1DA8382F000
heap
page read and write
A8002E0000
direct allocation
page read and write
5710000
direct allocation
page execute and read and write
74A001AB4000
trusted library allocation
page read and write
7C35FE000
unkown
page readonly
74A001218000
trusted library allocation
page read and write
2059088C000
heap
page read and write
74A001930000
trusted library allocation
page read and write
74A000CDC000
trusted library allocation
page read and write
16F5000
stack
page read and write
2C0800401000
trusted library allocation
page read and write
7BC5FE000
unkown
page readonly
5101000
heap
page read and write
5101000
heap
page read and write
5101000
heap
page read and write
5101000
heap
page read and write
74A001550000
trusted library allocation
page read and write
74A0018EC000
trusted library allocation
page read and write
25A8024C4000
trusted library allocation
page read and write
33AC007C0000
trusted library allocation
page read and write
20590884000
heap
page read and write
1384000
heap
page read and write
2059088C000
heap
page read and write
74A0014F5000
trusted library allocation
page read and write
74A00176C000
trusted library allocation
page read and write
1DA83AE0000
heap
page read and write
1DBF3000
heap
page read and write
1DA6D000
stack
page read and write
20590884000
heap
page read and write
74A0015AC000
trusted library allocation
page read and write
74A0010C8000
trusted library allocation
page read and write
74A001B14000
trusted library allocation
page read and write
7C3DFE000
stack
page read and write
74A000294000
trusted library allocation
page read and write
20590886000
heap
page read and write
25A802490000
trusted library allocation
page read and write
25A80246C000
trusted library allocation
page read and write
33AC008A8000
trusted library allocation
page read and write
25A80256C000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
74A001E18000
trusted library allocation
page read and write
2C080027C000
trusted library allocation
page read and write
74A0001B4000
trusted library allocation
page read and write
74A0001E4000
trusted library allocation
page read and write
20590892000
heap
page read and write
74A0014E0000
trusted library allocation
page read and write
74A000340000
trusted library allocation
page read and write
1384000
heap
page read and write
20590DE6000
heap
page read and write
33AC006AC000
trusted library allocation
page read and write
74A001BC0000
trusted library allocation
page read and write
2059087F000
heap
page read and write
1384000
heap
page read and write
74A0012DC000
trusted library allocation
page read and write
25A8023B4000
trusted library allocation
page read and write
7CCDFD000
stack
page read and write
74A0010BC000
trusted library allocation
page read and write
74A00105C000
trusted library allocation
page read and write
74A000458000
trusted library allocation
page read and write
5101000
heap
page read and write
74A0019CC000
trusted library allocation
page read and write
25A802401000
trusted library allocation
page read and write
1D79F000
stack
page read and write
7E0DFE000
stack
page read and write
3D1E000
stack
page read and write
74A001E0C000
trusted library allocation
page read and write
74A000F94000
trusted library allocation
page read and write
1DA838E9000
heap
page read and write
74A000454000
trusted library allocation
page read and write
1384000
heap
page read and write
1DBF6000
heap
page read and write
74A0018BC000
trusted library allocation
page read and write
6DBC00230000
trusted library allocation
page read and write
74A001654000
trusted library allocation
page read and write
4F9F000
stack
page read and write
74A000340000
trusted library allocation
page read and write
69B4002C0000
trusted library allocation
page read and write
74A0019C4000
trusted library allocation
page read and write
445F000
stack
page read and write
74A0001B4000
trusted library allocation
page read and write
6DBC002B8000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
2C0800238000
trusted library allocation
page read and write
1384000
heap
page read and write
74A00196C000
trusted library allocation
page read and write
74A001E74000
trusted library allocation
page read and write
25A8024F0000
trusted library allocation
page read and write
7DDDFD000
stack
page read and write
25A802438000
trusted library allocation
page read and write
74A000300000
trusted library allocation
page read and write
1DA85736000
heap
page read and write
33AC0079C000
trusted library allocation
page read and write
183D000
heap
page read and write
74A00157C000
trusted library allocation
page read and write
74A001F08000
trusted library allocation
page read and write
1D69E000
stack
page read and write
74A0010EC000
trusted library allocation
page read and write
74A001BA8000
trusted library allocation
page read and write
33AC006AC000
trusted library allocation
page read and write
4ADE000
stack
page read and write
2C0800310000
trusted library allocation
page read and write
FD4000
unkown
page execute and read and write
74A0010BC000
trusted library allocation
page read and write
74A001B84000
trusted library allocation
page read and write
74A001300000
trusted library allocation
page read and write
1DA85770000
heap
page read and write
69B4002C0000
trusted library allocation
page read and write
6C840000
unkown
page readonly
1DA837F0000
heap
page readonly
A800230000
direct allocation
page read and write
74A0013D0000
trusted library allocation
page read and write
74A001914000
trusted library allocation
page read and write
25A800601000
trusted library allocation
page read and write
7C0DFE000
stack
page read and write
25A8022F4000
trusted library allocation
page read and write
74A000415000
trusted library allocation
page read and write
6DBC00250000
trusted library allocation
page read and write
74A001A18000
trusted library allocation
page read and write
74A000C9C000
trusted library allocation
page read and write
1DA83844000
heap
page read and write
74A000469000
trusted library allocation
page read and write
74A0010EC000
trusted library allocation
page read and write
1DA85715000
heap
page read and write
25A802394000
trusted library allocation
page read and write
C46000
unkown
page execute and read and write
25A802630000
trusted library allocation
page read and write
1384000
heap
page read and write
74A001E1C000
trusted library allocation
page read and write
74A001771000
trusted library allocation
page read and write
5101000
heap
page read and write
6DBC002F0000
trusted library allocation
page read and write
1DA85770000
heap
page read and write
25A802528000
trusted library allocation
page read and write
1DA863E0000
unkown
page read and write
499E000
stack
page read and write
CDB000
unkown
page execute and read and write
10B1000
unkown
page execute and read and write
74A001964000
trusted library allocation
page read and write
25A80264C000
trusted library allocation
page read and write
74A002004000
trusted library allocation
page read and write
25A802480000
trusted library allocation
page read and write
5101000
heap
page read and write
381E000
stack
page read and write
1DA8574E000
heap
page read and write
74A000298000
trusted library allocation
page read and write
74A001B6C000
trusted library allocation
page read and write
25A802464000
trusted library allocation
page read and write
25A802424000
trusted library allocation
page read and write
69B4002A0000
trusted library allocation
page read and write
74A000454000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA8576C000
heap
page read and write
6DBC00201000
trusted library allocation
page read and write
55BB000
direct allocation
page read and write
1DA8572C000
heap
page read and write
7D75FE000
unkown
page readonly
74A001D30000
trusted library allocation
page read and write
33AC002FC000
trusted library allocation
page read and write
5700000
direct allocation
page execute and read and write
74A00177C000
trusted library allocation
page read and write
74A001FF1000
trusted library allocation
page read and write
25A802460000
trusted library allocation
page read and write
74A00100C000
trusted library allocation
page read and write
74A001974000
trusted library allocation
page read and write
5101000
heap
page read and write
74A0018FC000
trusted library allocation
page read and write
6DBC002E4000
trusted library allocation
page read and write
74A0011DC000
trusted library allocation
page read and write
25A802440000
trusted library allocation
page read and write
74A000294000
trusted library allocation
page read and write
25A800001000
trusted library allocation
page read and write
6DBC002B4000
trusted library allocation
page read and write
74A0001E0000
trusted library allocation
page read and write
23DCC000
heap
page read and write
25A8024B0000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA85738000
heap
page read and write
5101000
heap
page read and write
2C08003A0000
trusted library allocation
page read and write
2C0800220000
trusted library allocation
page read and write
74A001AD8000
trusted library allocation
page read and write
74A001484000
trusted library allocation
page read and write
74A00038C000
trusted library allocation
page read and write
1DA8576C000
heap
page read and write
74A001E4C000
trusted library allocation
page read and write
74A001D64000
trusted library allocation
page read and write
391F000
stack
page read and write
1DA85770000
heap
page read and write
25A80233C000
trusted library allocation
page read and write
33AC0039C000
trusted library allocation
page read and write
1DA8395A000
heap
page read and write
25A8023DC000
trusted library allocation
page read and write
1384000
heap
page read and write
74A001B28000
trusted library allocation
page read and write
74A001780000
trusted library allocation
page read and write
33AC0078C000
trusted library allocation
page read and write
7D6DFE000
stack
page read and write
431F000
stack
page read and write
25A80232C000
trusted library allocation
page read and write
74A0015B0000
trusted library allocation
page read and write
25A8022A8000
trusted library allocation
page read and write
74A000214000
trusted library allocation
page read and write
1DA83960000
heap
page read and write
74A001B30000
trusted library allocation
page read and write
74A001E6C000
trusted library allocation
page read and write
74A0002A8000
trusted library allocation
page read and write
33AC0039C000
trusted library allocation
page read and write
2C0800288000
trusted library allocation
page read and write
1DA838A0000
heap
page read and write
74A000E18000
trusted library allocation
page read and write
20590D93000
heap
page read and write
1DA83931000
heap
page read and write
74A000220000
trusted library allocation
page read and write
25A8024C8000
trusted library allocation
page read and write
395E000
stack
page read and write
74A000224000
trusted library allocation
page read and write
74A001D28000
trusted library allocation
page read and write
7BADFE000
unkown
page read and write
7E2DFE000
stack
page read and write
74A001790000
trusted library allocation
page read and write
6DBC00270000
trusted library allocation
page read and write
74A000300000
trusted library allocation
page read and write
74A001568000
trusted library allocation
page read and write
20590D74000
heap
page read and write
74A000124000
trusted library allocation
page read and write
74A001A6C000
trusted library allocation
page read and write
74A000318000
trusted library allocation
page read and write
74A001AD0000
trusted library allocation
page read and write
74A000F8C000
trusted library allocation
page read and write
1384000
heap
page read and write
74A000458000
trusted library allocation
page read and write
33AC0087C000
trusted library allocation
page read and write
33AC00424000
trusted library allocation
page read and write
74A000469000
trusted library allocation
page read and write
25A8023F4000
trusted library allocation
page read and write
1DA85770000
heap
page read and write
74A000469000
trusted library allocation
page read and write
5101000
heap
page read and write
20590E16000
heap
page read and write
45DE000
stack
page read and write
1DC00000
heap
page read and write
1DBF6000
heap
page read and write
4E5F000
stack
page read and write
E4A000
unkown
page execute and read and write
74A000458000
trusted library allocation
page read and write
25A8024FC000
trusted library allocation
page read and write
74A001AC4000
trusted library allocation
page read and write
25A8025AC000
trusted library allocation
page read and write
74A000BEC000
trusted library allocation
page read and write
74A000BEC000
trusted library allocation
page read and write
25A8024E4000
trusted library allocation
page read and write
74A0016B4000
trusted library allocation
page read and write
25A8023A8000
trusted library allocation
page read and write
1DBE6000
heap
page read and write
6DBC00288000
trusted library allocation
page read and write
2C0800430000
trusted library allocation
page read and write
1384000
heap
page read and write
74A000F89000
trusted library allocation
page read and write
74A0010BC000
trusted library allocation
page read and write
74A000D00000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
5590000
direct allocation
page read and write
74A001C1C000
trusted library allocation
page read and write
459F000
stack
page read and write
20590884000
heap
page read and write
74A0014A4000
trusted library allocation
page read and write
1384000
heap
page read and write
25A802444000
trusted library allocation
page read and write
1D7DE000
stack
page read and write
74A001214000
trusted library allocation
page read and write
74A0001F4000
trusted library allocation
page read and write
74A001224000
trusted library allocation
page read and write
5101000
heap
page read and write
74A001675000
trusted library allocation
page read and write
1DA857B8000
heap
page read and write
6DBC002A8000
trusted library allocation
page read and write
5590000
direct allocation
page read and write
33AC00898000
trusted library allocation
page read and write
7DB5FE000
unkown
page readonly
23DEC000
heap
page read and write
1D65F000
stack
page read and write
74A001D9C000
trusted library allocation
page read and write
1DA83929000
heap
page read and write
74A00143B000
trusted library allocation
page read and write
6DBC00294000
trusted library allocation
page read and write
25A8022D5000
trusted library allocation
page read and write
69B4002A0000
trusted library allocation
page read and write
74A0019F8000
trusted library allocation
page read and write
69B4002A4000
trusted library allocation
page read and write
33AC00890000
trusted library allocation
page read and write
74A000338000
trusted library allocation
page read and write
74A0012F4000
trusted library allocation
page read and write
7DFDFE000
stack
page read and write
17F3000
heap
page read and write
25A8024FC000
trusted library allocation
page read and write
74A001300000
trusted library allocation
page read and write
1384000
heap
page read and write
25A8023F8000
trusted library allocation
page read and write
25A802514000
trusted library allocation
page read and write
74A001CFC000
trusted library allocation
page read and write
20590884000
heap
page read and write
33AC00878000
trusted library allocation
page read and write
2059087F000
heap
page read and write
2C0800250000
trusted library allocation
page read and write
2059088C000
heap
page read and write
74A001430000
trusted library allocation
page read and write
6DBC002D8000
trusted library allocation
page read and write
74A000BEC000
trusted library allocation
page read and write
7DD5FE000
unkown
page readonly
74A001D88000
trusted library allocation
page read and write
2C08002F1000
trusted library allocation
page read and write
74A000469000
trusted library allocation
page read and write
20590DCE000
heap
page read and write
74A001768000
trusted library allocation
page read and write
1DA857C7000
heap
page read and write
5100000
heap
page read and write
74A001EFC000
trusted library allocation
page read and write
74A001434000
trusted library allocation
page read and write
74A00038C000
trusted library allocation
page read and write
25A802280000
trusted library allocation
page read and write
74A001D3C000
trusted library allocation
page read and write
74A0019B0000
trusted library allocation
page read and write
74A001A2C000
trusted library allocation
page read and write
74A001CCC000
trusted library allocation
page read and write
1DC00000
heap
page read and write
6DBC00264000
trusted library allocation
page read and write
55CB000
stack
page read and write
74A001310000
trusted library allocation
page read and write
74A001DD0000
trusted library allocation
page read and write
25A802414000
trusted library allocation
page read and write
1DA838BB000
heap
page read and write
7DBDFC000
stack
page read and write
74A001FC4000
trusted library allocation
page read and write
1DA85770000
heap
page read and write
74A001D44000
trusted library allocation
page read and write
74A001EA4000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
1384000
heap
page read and write
25A8024BC000
trusted library allocation
page read and write
7C6DFD000
stack
page read and write
74A001370000
trusted library allocation
page read and write
6DBC002A8000
trusted library allocation
page read and write
1DA2E000
stack
page read and write
25A8024FC000
trusted library allocation
page read and write
1DA838C5000
heap
page read and write
74A001D00000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
5101000
heap
page read and write
5101000
heap
page read and write
74A001998000
trusted library allocation
page read and write
7CEDFE000
stack
page read and write
74A002A18000
trusted library allocation
page read and write
4D5E000
stack
page read and write
6DBC00220000
trusted library allocation
page read and write
74A001064000
trusted library allocation
page read and write
33AC00248000
trusted library allocation
page read and write
1DA85700000
heap
page read and write
17AA000
heap
page read and write
74A001A94000
trusted library allocation
page read and write
2C08002B0000
trusted library allocation
page read and write
74A0014C1000
trusted library allocation
page read and write
74A000340000
trusted library allocation
page read and write
74A001DF8000
trusted library allocation
page read and write
74A001E50000
trusted library allocation
page read and write
74A0012CC000
trusted library allocation
page read and write
3E1F000
stack
page read and write
3A5F000
stack
page read and write
6DBC002F8000
trusted library allocation
page read and write
1DBFE000
heap
page read and write
74A000338000
trusted library allocation
page read and write
69B4002E4000
trusted library allocation
page read and write
41DF000
stack
page read and write
25A802508000
trusted library allocation
page read and write
2C0800308000
trusted library allocation
page read and write
1DA83863000
heap
page read and write
74A000F94000
trusted library allocation
page read and write
7C45FE000
unkown
page readonly
2C080020C000
trusted library allocation
page read and write
10EB000
unkown
page execute and write copy
74A0012F4000
trusted library allocation
page read and write
74A000E2C000
trusted library allocation
page read and write
1384000
heap
page read and write
74A0012B4000
trusted library allocation
page read and write
74A001560000
trusted library allocation
page read and write
69B4002A4000
trusted library allocation
page read and write
5710000
direct allocation
page execute and read and write
1DA8571D000
heap
page read and write
25A80220C000
trusted library allocation
page read and write
74A00032C000
trusted library allocation
page read and write
5101000
heap
page read and write
74A001DC4000
trusted library allocation
page read and write
2C08002F4000
trusted library allocation
page read and write
74A001ADC000
trusted library allocation
page read and write
74A00140C000
trusted library allocation
page read and write
2C0800350000
trusted library allocation
page read and write
17ED000
heap
page read and write
2C08003BC000
trusted library allocation
page read and write
74A0018F8000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
74A001E3C000
trusted library allocation
page read and write
69B4002A0000
trusted library allocation
page read and write
33AC00864000
trusted library allocation
page read and write
74A001DF0000
trusted library allocation
page read and write
1384000
heap
page read and write
74A001D94000
trusted library allocation
page read and write
2C080040C000
trusted library allocation
page read and write
25A80260C000
trusted library allocation
page read and write
74A001B08000
trusted library allocation
page read and write
334C000
stack
page read and write
A800201000
direct allocation
page read and write
69B4002C0000
trusted library allocation
page read and write
74A001BBC000
trusted library allocation
page read and write
74A002004000
trusted library allocation
page read and write
7DE5FE000
unkown
page readonly
25A80245C000
trusted library allocation
page read and write
25A80225C000
trusted library allocation
page read and write
7BE5FE000
unkown
page readonly
338E000
stack
page read and write
74A0018E4000
trusted library allocation
page read and write
25A8022C4000
trusted library allocation
page read and write
20590886000
heap
page read and write
74A0010EC000
trusted library allocation
page read and write
25A8024C8000
trusted library allocation
page read and write
74A000F30000
trusted library allocation
page read and write
74A001CF8000
trusted library allocation
page read and write
74A00038C000
trusted library allocation
page read and write
74A001330000
trusted library allocation
page read and write
25A80254C000
trusted library allocation
page read and write
74A00199C000
trusted library allocation
page read and write
74A001330000
trusted library allocation
page read and write
1287000
unkown
page execute and read and write
A800294000
direct allocation
page read and write
74A000708000
trusted library allocation
page read and write
74A0029DC000
trusted library allocation
page read and write
74A00194C000
trusted library allocation
page read and write
1384000
heap
page read and write
74A000BEC000
trusted library allocation
page read and write
1DA83931000
heap
page read and write
6DBC00294000
trusted library allocation
page read and write
1384000
heap
page read and write
1DA85732000
heap
page read and write
25A8024B4000
trusted library allocation
page read and write
2C0800300000
trusted library allocation
page read and write
74A0010EC000
trusted library allocation
page read and write
7DCDFE000
stack
page read and write
1DA838FD000
heap
page read and write
25A802314000
trusted library allocation
page read and write
74A0019D0000
trusted library allocation
page read and write
20590891000
heap
page read and write
74A0014C1000
trusted library allocation
page read and write
74A0010F8000
trusted library allocation
page read and write
74A001430000
trusted library allocation
page read and write
25A80260C000
trusted library allocation
page read and write
1384000
heap
page read and write
33AC008F0000
trusted library allocation
page read and write
2C08003C4000
trusted library allocation
page read and write
25A8023E4000
trusted library allocation
page read and write
74A001BC8000
trusted library allocation
page read and write
7DADFE000
stack
page read and write
74A001FF1000
trusted library allocation
page read and write
74A001D54000
trusted library allocation
page read and write
7C7DFE000
stack
page read and write
74A0016B4000
trusted library allocation
page read and write
5101000
heap
page read and write
74A0010BC000
trusted library allocation
page read and write
74A000228000
trusted library allocation
page read and write
74A000300000
trusted library allocation
page read and write
74A0018CC000
trusted library allocation
page read and write
74A000210000
trusted library allocation
page read and write
1DA838A5000
heap
page read and write
2C08003AC000
trusted library allocation
page read and write
74A000E2C000
trusted library allocation
page read and write
B61000
unkown
page execute and write copy
1384000
heap
page read and write
25A802418000
trusted library allocation
page read and write
33AC00830000
trusted library allocation
page read and write
25A802298000
trusted library allocation
page read and write
33AC0091C000
trusted library allocation
page read and write
A8002D8000
direct allocation
page read and write
74A001434000
trusted library allocation
page read and write
1DA85770000
heap
page read and write
25A802430000
trusted library allocation
page read and write
33AC00418000
trusted library allocation
page read and write
33AC007E0000
trusted library allocation
page read and write
6DBC00294000
trusted library allocation
page read and write
74A000D00000
trusted library allocation
page read and write
74A001AB8000
trusted library allocation
page read and write
5101000
heap
page read and write
25A802358000
trusted library allocation
page read and write
1DBE0000
heap
page read and write
2059087A000
heap
page read and write
74A000CE8000
trusted library allocation
page read and write
33AC008E4000
trusted library allocation
page read and write
74A001218000
trusted library allocation
page read and write
CA9000
unkown
page execute and read and write
25A80248C000
trusted library allocation
page read and write
74A000294000
trusted library allocation
page read and write
25A802434000
trusted library allocation
page read and write
A800308000
direct allocation
page read and write
25A802458000
trusted library allocation
page read and write
74A001984000
trusted library allocation
page read and write
1384000
heap
page read and write
25A802270000
trusted library allocation
page read and write
5101000
heap
page read and write
74A001A40000
trusted library allocation
page read and write
25A802410000
trusted library allocation
page read and write
5101000
heap
page read and write
74A000294000
trusted library allocation
page read and write
74A000F64000
trusted library allocation
page read and write
74A001538000
trusted library allocation
page read and write
20594EB1000
heap
page read and write
4FDE000
stack
page read and write
74A0001D8000
trusted library allocation
page read and write
25A802601000
trusted library allocation
page read and write
74A001924000
trusted library allocation
page read and write
74A0019E4000
trusted library allocation
page read and write
74A001B60000
trusted library allocation
page read and write
74A001E90000
trusted library allocation
page read and write
1DA8578C000
heap
page read and write
20590DEF000
heap
page read and write
1DA838AD000
heap
page read and write
74A001A68000
trusted library allocation
page read and write
7DA5FE000
unkown
page readonly
2C0800230000
trusted library allocation
page read and write
33AC00778000
trusted library allocation
page read and write
A80024C000
direct allocation
page read and write
A800210000
direct allocation
page read and write
74A001768000
trusted library allocation
page read and write
74A000458000
trusted library allocation
page read and write
1DA8579F000
heap
page read and write
A800284000
direct allocation
page read and write
74A000C38000
trusted library allocation
page read and write
74A0018C0000
trusted library allocation
page read and write
33AC007D4000
trusted library allocation
page read and write
1DA8574E000
heap
page read and write
74A00040C000
trusted library allocation
page read and write
1DA8387C000
heap
page read and write
7BB5FE000
unkown
page readonly
5101000
heap
page read and write
74A0012C0000
trusted library allocation
page read and write
74A001028000
trusted library allocation
page read and write
74A001988000
trusted library allocation
page read and write
74A001330000
trusted library allocation
page read and write
2C08002D8000
trusted library allocation
page read and write
74A0001B4000
trusted library allocation
page read and write
74A00150C000
trusted library allocation
page read and write
6DBC002B8000
trusted library allocation
page read and write
74A001994000
trusted library allocation
page read and write
5101000
heap
page read and write
74A001F48000
trusted library allocation
page read and write
20590D85000
heap
page read and write
1DC00000
heap
page read and write
74A000294000
trusted library allocation
page read and write
74A0010BC000
trusted library allocation
page read and write
74A001D6C000
trusted library allocation
page read and write
25A8025A8000
trusted library allocation
page read and write
74A000340000
trusted library allocation
page read and write
74A001D0C000
trusted library allocation
page read and write
74A001EA0000
trusted library allocation
page read and write
33AC0081C000
trusted library allocation
page read and write
5101000
heap
page read and write
1380000
heap
page read and write
25A8024D8000
trusted library allocation
page read and write
74A00148E000
trusted library allocation
page read and write
1DA8385B000
heap
page read and write
74A001300000
trusted library allocation
page read and write
74A001E34000
trusted library allocation
page read and write
25A802478000
trusted library allocation
page read and write
33AC006E0000
trusted library allocation
page read and write
6DBC00294000
trusted library allocation
page read and write
1DA85734000
heap
page read and write
61ECC000
direct allocation
page read and write
74A002AD4000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
74A001440000
trusted library allocation
page read and write
74A0010BC000
trusted library allocation
page read and write
25A802320000
trusted library allocation
page read and write
6DBC00278000
trusted library allocation
page read and write
7C8DFC000
stack
page read and write
74A0010EC000
trusted library allocation
page read and write
56F0000
direct allocation
page execute and read and write
74A00140C000
trusted library allocation
page read and write
7B9DF4000
stack
page read and write
1DA838B5000
heap
page read and write
74A001310000
trusted library allocation
page read and write
5101000
heap
page read and write
4A9F000
stack
page read and write
23EA0000
trusted library allocation
page read and write
1DA83800000
heap
page read and write
74A0013D0000
trusted library allocation
page read and write
20590E0E000
heap
page read and write
A800311000
direct allocation
page read and write
6DBC00274000
trusted library allocation
page read and write
2C0800364000
trusted library allocation
page read and write
74A001B88000
trusted library allocation
page read and write
74A001434000
trusted library allocation
page read and write
74A000ECC000
trusted library allocation
page read and write
74A0015AC000
trusted library allocation
page read and write
74A001E8C000
trusted library allocation
page read and write
33AC007BC000
trusted library allocation
page read and write
74A001DF4000
trusted library allocation
page read and write
74A0012C7000
trusted library allocation
page read and write
5101000
heap
page read and write
6DBC002B4000
trusted library allocation
page read and write
1DCF0000
trusted library allocation
page read and write
6DBC00260000
trusted library allocation
page read and write
25A802448000
trusted library allocation
page read and write
33AC008C4000
trusted library allocation
page read and write
74A0012F8000
trusted library allocation
page read and write
1DA8576C000
heap
page read and write
20590D7E000
heap
page read and write
74A001D68000
trusted library allocation
page read and write
1384000
heap
page read and write
1821000
heap
page read and write
74A0019C8000
trusted library allocation
page read and write
1DA8570B000
heap
page read and write
5105000
heap
page read and write
25A8024A4000
trusted library allocation
page read and write
1DA8575A000
heap
page read and write
23C6B000
heap
page read and write
25A802594000
trusted library allocation
page read and write
7CE5FE000
unkown
page readonly
74A001D80000
trusted library allocation
page read and write
2C08002C4000
trusted library allocation
page read and write
74A000D00000
trusted library allocation
page read and write
25A802698000
trusted library allocation
page read and write
1DA85800000
trusted library allocation
page read and write
74A001330000
trusted library allocation
page read and write
A8002EC000
direct allocation
page read and write
74A00100C000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
74A001BAC000
trusted library allocation
page read and write
69B400248000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
37DF000
stack
page read and write
20590DE7000
heap
page read and write
25A8024F0000
trusted library allocation
page read and write
74A0002F3000
trusted library allocation
page read and write
74A000EF4000
trusted library allocation
page read and write
74A000CF8000
trusted library allocation
page read and write
1A6E000
stack
page read and write
25A802508000
trusted library allocation
page read and write
74A001530000
trusted library allocation
page read and write
2C0800404000
trusted library allocation
page read and write
1DBF3000
heap
page read and write
1DA838AB000
heap
page read and write
25A80240C000
trusted library allocation
page read and write
33AC007E4000
trusted library allocation
page read and write
74A000ECC000
trusted library allocation
page read and write
16FD000
stack
page read and write
2059087F000
heap
page read and write
7BDDFE000
stack
page read and write
2C080039C000
trusted library allocation
page read and write
74A000CE8000
trusted library allocation
page read and write
1D92E000
stack
page read and write
74A000D00000
trusted library allocation
page read and write
7C65FE000
unkown
page readonly
6DBC002A8000
trusted library allocation
page read and write
A800260000
direct allocation
page read and write
1DBFD000
heap
page read and write
74A001DD8000
trusted library allocation
page read and write
7CD5FE000
unkown
page readonly
74A000F88000
trusted library allocation
page read and write
74A001B98000
trusted library allocation
page read and write
7C1DFE000
stack
page read and write
6DBC00235000
trusted library allocation
page read and write
74A000C38000
trusted library allocation
page read and write
D07000
unkown
page execute and read and write
7C15FE000
unkown
page readonly
25A800201000
trusted library allocation
page read and write
74A001D1C000
trusted library allocation
page read and write
7C5DFE000
stack
page read and write
74A001773000
trusted library allocation
page read and write
1DC00000
heap
page read and write
74A000CE8000
trusted library allocation
page read and write
74A0010EC000
trusted library allocation
page read and write
74A001928000
trusted library allocation
page read and write
20590E0B000
heap
page read and write
74A000458000
trusted library allocation
page read and write
33DE000
heap
page read and write
5570000
heap
page read and write
33AC00790000
trusted library allocation
page read and write
74A000338000
trusted library allocation
page read and write
7E15FE000
unkown
page readonly
A800303000
direct allocation
page read and write
74A001DC8000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA838A0000
heap
page read and write
6C841000
unkown
page execute read
A8002AC000
direct allocation
page read and write
1DA8DA00000
heap
page read and write
74A00143E000
trusted library allocation
page read and write
1DA886E0000
trusted library section
page readonly
74A000338000
trusted library allocation
page read and write
74A00073C000
trusted library allocation
page read and write
1DA85736000
heap
page read and write
74A00037C000
trusted library allocation
page read and write
74A001722000
trusted library allocation
page read and write
A800316000
direct allocation
page read and write
481F000
stack
page read and write
4E9E000
stack
page read and write
5101000
heap
page read and write
131C000
stack
page read and write
6DBC002B4000
trusted library allocation
page read and write
25A80254C000
trusted library allocation
page read and write
74A001790000
trusted library allocation
page read and write
74A0017C8000
trusted library allocation
page read and write
2058D385000
heap
page read and write
50E0000
heap
page read and write
7BBDFF000
stack
page read and write
25A80228C000
trusted library allocation
page read and write
10EA000
unkown
page execute and read and write
69B4002A0000
trusted library allocation
page read and write
1806000
heap
page read and write
33AC00974000
trusted library allocation
page read and write
20590DC9000
heap
page read and write
5101000
heap
page read and write
25A80222C000
trusted library allocation
page read and write
1DA85730000
heap
page read and write
74A001E38000
trusted library allocation
page read and write
74A001448000
trusted library allocation
page read and write
1384000
heap
page read and write
20594E81000
heap
page read and write
25A8024C0000
trusted library allocation
page read and write
74A001EFC000
trusted library allocation
page read and write
1DA857D7000
heap
page read and write
1DCF1000
heap
page read and write
33AC006F4000
trusted library allocation
page read and write
1384000
heap
page read and write
2C0800424000
trusted library allocation
page read and write
74A00073C000
trusted library allocation
page read and write
74A00192C000
trusted library allocation
page read and write
25A802384000
trusted library allocation
page read and write
25A801001000
trusted library allocation
page read and write
6DBC002B4000
trusted library allocation
page read and write
25A8024B8000
trusted library allocation
page read and write
1384000
heap
page read and write
74A001714000
trusted library allocation
page read and write
74A001B70000
trusted library allocation
page read and write
6DBC00210000
trusted library allocation
page read and write
69B4002D8000
trusted library allocation
page read and write
A800328000
direct allocation
page read and write
5101000
heap
page read and write
23DE0000
heap
page read and write
1DA8572D000
heap
page read and write
1DA8392D000
heap
page read and write
25A80241C000
trusted library allocation
page read and write
1DA85728000
heap
page read and write
74A001A4C000
trusted library allocation
page read and write
2C0800358000
trusted library allocation
page read and write
DC8000
unkown
page execute and read and write
74A0019AC000
trusted library allocation
page read and write
7C05FE000
unkown
page readonly
74A0014F6000
trusted library allocation
page read and write
74A00073C000
trusted library allocation
page read and write
2C08003C0000
trusted library allocation
page read and write
1DA855E0000
heap
page read and write
74A000FC0000
trusted library allocation
page read and write
74A001660000
trusted library allocation
page read and write
1384000
heap
page read and write
5110000
heap
page read and write
74A00020C000
trusted library allocation
page read and write
33AC00844000
trusted library allocation
page read and write
13FE000
stack
page read and write
25A8022D0000
trusted library allocation
page read and write
25A80252C000
trusted library allocation
page read and write
74A0014E0000
trusted library allocation
page read and write
74A001A78000
trusted library allocation
page read and write
2C0800201000
trusted library allocation
page read and write
1DA8578E000
heap
page read and write
495F000
stack
page read and write
7E05FE000
unkown
page readonly
7D85FE000
unkown
page readonly
74A001CE8000
trusted library allocation
page read and write
74A0017BB000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
33AC008C8000
trusted library allocation
page read and write
1DBFE000
heap
page read and write
74A000218000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
1DA837C0000
heap
page read and write
25A802640000
trusted library allocation
page read and write
25A802594000
trusted library allocation
page read and write
1DA8576C000
heap
page read and write
7CADFE000
stack
page read and write
1DA85721000
heap
page read and write
74A001504000
trusted library allocation
page read and write
25A8024F0000
trusted library allocation
page read and write
25A8024E4000
trusted library allocation
page read and write
74A001A74000
trusted library allocation
page read and write
74A00149C000
trusted library allocation
page read and write
20590D90000
heap
page read and write
33AC00894000
trusted library allocation
page read and write
74A000E2C000
trusted library allocation
page read and write
69B4002B0000
trusted library allocation
page read and write
74A0016C0000
trusted library allocation
page read and write
74A000469000
trusted library allocation
page read and write
5101000
heap
page read and write
74A000EF4000
trusted library allocation
page read and write
6DBC00210000
trusted library allocation
page read and write
74A000338000
trusted library allocation
page read and write
5101000
heap
page read and write
33AC00788000
trusted library allocation
page read and write
74A001A48000
trusted library allocation
page read and write
74A001655000
trusted library allocation
page read and write
74A000338000
trusted library allocation
page read and write
74A001B80000
trusted library allocation
page read and write
25A8023F0000
trusted library allocation
page read and write
CFB000
unkown
page execute and read and write
1384000
heap
page read and write
20590886000
heap
page read and write
20590887000
heap
page read and write
1D51F000
stack
page read and write
1DA8392D000
heap
page read and write
74A000CF8000
trusted library allocation
page read and write
2C0800418000
trusted library allocation
page read and write
33AC0085C000
trusted library allocation
page read and write
2C0800290000
trusted library allocation
page read and write
25A8022B8000
trusted library allocation
page read and write
74A000124000
trusted library allocation
page read and write
69B4002C0000
trusted library allocation
page read and write
23DA0000
heap
page read and write
74A001DAC000
trusted library allocation
page read and write
25A802474000
trusted library allocation
page read and write
25A802580000
trusted library allocation
page read and write
6DBC002A8000
trusted library allocation
page read and write
74A001DC8000
trusted library allocation
page read and write
69B4002C0000
trusted library allocation
page read and write
74A000338000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
25A800C01000
trusted library allocation
page read and write
74A0010EC000
trusted library allocation
page read and write
74A001968000
trusted library allocation
page read and write
25A80234C000
trusted library allocation
page read and write
74A000454000
trusted library allocation
page read and write
33AC0060C000
trusted library allocation
page read and write
25A8026A4000
trusted library allocation
page read and write
7D35FE000
unkown
page readonly
74A001B50000
trusted library allocation
page read and write
74A00040C000
trusted library allocation
page read and write
3F9E000
stack
page read and write
74A000300000
trusted library allocation
page read and write
74A002AE4000
trusted library allocation
page read and write
74A000BEC000
trusted library allocation
page read and write
25A802458000
trusted library allocation
page read and write
33D7000
heap
page read and write
40DE000
stack
page read and write
74A001300000
trusted library allocation
page read and write
74A001078000
trusted library allocation
page read and write
74A001DD4000
trusted library allocation
page read and write
5101000
heap
page read and write
20590D6A000
heap
page read and write
74A0004C4000
trusted library allocation
page read and write
74A00158C000
trusted library allocation
page read and write
5710000
direct allocation
page execute and read and write
74A0001E8000
trusted library allocation
page read and write
25A802598000
trusted library allocation
page read and write
6DBC00294000
trusted library allocation
page read and write
7E35FE000
unkown
page readonly
74A001AEC000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA857DE000
heap
page read and write
2C0800320000
trusted library allocation
page read and write
74A001430000
trusted library allocation
page read and write
74A001D2C000
trusted library allocation
page read and write
2C080032C000
trusted library allocation
page read and write
4D1F000
stack
page read and write
74A0002F0000
trusted library allocation
page read and write
1DBF9000
heap
page read and write
74A001310000
trusted library allocation
page read and write
A800280000
direct allocation
page read and write
74A00100C000
trusted library allocation
page read and write
1DBF6000
heap
page read and write
74A00148D000
trusted library allocation
page read and write
74A0013AC000
trusted library allocation
page read and write
74A0001F0000
trusted library allocation
page read and write
25A800801000
trusted library allocation
page read and write
1DBD2000
heap
page read and write
449E000
stack
page read and write
25A802374000
trusted library allocation
page read and write
1384000
heap
page read and write
B60000
unkown
page readonly
50DF000
stack
page read and write
74A001448000
trusted library allocation
page read and write
33AC008E8000
trusted library allocation
page read and write
74A0012B4000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA85729000
heap
page read and write
74A001548000
trusted library allocation
page read and write
20590885000
heap
page read and write
74A0013D0000
trusted library allocation
page read and write
5101000
heap
page read and write
2C080031C000
trusted library allocation
page read and write
20590E0F000
heap
page read and write
2C0800374000
trusted library allocation
page read and write
74A001768000
trusted library allocation
page read and write
33AC007D0000
trusted library allocation
page read and write
74A001524000
trusted library allocation
page read and write
25A800A01000
trusted library allocation
page read and write
74A001DB4000
trusted library allocation
page read and write
7C95FE000
unkown
page readonly
74A001D40000
trusted library allocation
page read and write
1DA85732000
heap
page read and write
74A000294000
trusted library allocation
page read and write
23DC0000
heap
page read and write
74A00150C000
trusted library allocation
page read and write
74A000CE8000
trusted library allocation
page read and write
33DB000
heap
page read and write
74A00021C000
trusted library allocation
page read and write
5740000
direct allocation
page execute and read and write
7CF5FE000
unkown
page readonly
74A0019D4000
trusted library allocation
page read and write
A800318000
direct allocation
page read and write
7D55FE000
unkown
page readonly
25A802558000
trusted library allocation
page read and write
74A0010EC000
trusted library allocation
page read and write
435E000
stack
page read and write
74A000E2C000
trusted library allocation
page read and write
6DBC00248000
trusted library allocation
page read and write
7C2DFE000
stack
page read and write
74A000338000
trusted library allocation
page read and write
33AC006E8000
trusted library allocation
page read and write
74A00038C000
trusted library allocation
page read and write
25A80243C000
trusted library allocation
page read and write
2059087F000
heap
page read and write
7D4DFE000
stack
page read and write
A80021C000
direct allocation
page read and write
6DBC002B8000
trusted library allocation
page read and write
5101000
heap
page read and write
25A8022CA000
trusted library allocation
page read and write
33AC0040C000
trusted library allocation
page read and write
10D2000
unkown
page execute and read and write
74A00177C000
trusted library allocation
page read and write
74A002A18000
trusted library allocation
page read and write
25A8025D4000
trusted library allocation
page read and write
74A00148D000
trusted library allocation
page read and write
1384000
heap
page read and write
2C0800304000
trusted library allocation
page read and write
33AC00860000
trusted library allocation
page read and write
74A00160E000
trusted library allocation
page read and write
6DBC002A8000
trusted library allocation
page read and write
1DA85734000
heap
page read and write
23DA0000
trusted library allocation
page read and write
2C08002D0000
trusted library allocation
page read and write
33AC007A0000
trusted library allocation
page read and write
74A001439000
trusted library allocation
page read and write
74A00190C000
trusted library allocation
page read and write
DCE000
unkown
page execute and read and write
3B9F000
stack
page read and write
A800217000
direct allocation
page read and write
74A001970000
trusted library allocation
page read and write
1DBE6000
heap
page read and write
CCE000
unkown
page execute and read and write
74A001478000
trusted library allocation
page read and write
20590D83000
heap
page read and write
33AC00818000
trusted library allocation
page read and write
20590DFE000
heap
page read and write
25A8024E4000
trusted library allocation
page read and write
25A802468000
trusted library allocation
page read and write
1DA857E0000
heap
page read and write
2059088C000
heap
page read and write
74A0017B8000
trusted library allocation
page read and write
10EA000
unkown
page execute and write copy
74A0017BE000
trusted library allocation
page read and write
74A002A0C000
trusted library allocation
page read and write
7C25FE000
unkown
page readonly
25A8025E8000
trusted library allocation
page read and write
74A000F88000
trusted library allocation
page read and write
2C0800284000
trusted library allocation
page read and write
74A0001DC000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
74A0001EC000
trusted library allocation
page read and write
69B4002C8000
trusted library allocation
page read and write
74A000F5D000
trusted library allocation
page read and write
5730000
direct allocation
page execute and read and write
1384000
heap
page read and write
74A0019E8000
trusted library allocation
page read and write
2C0800338000
trusted library allocation
page read and write
7BFDFE000
stack
page read and write
74A000340000
trusted library allocation
page read and write
1DA837E0000
heap
page read and write
5101000
heap
page read and write
74A00145C000
trusted library allocation
page read and write
74A0014D8000
trusted library allocation
page read and write
74A000CF8000
trusted library allocation
page read and write
74A001B8C000
trusted library allocation
page read and write
74A002A18000
trusted library allocation
page read and write
74A00034C000
trusted library allocation
page read and write
25A80252C000
trusted library allocation
page read and write
3F5F000
stack
page read and write
20590885000
heap
page read and write
74A000300000
trusted library allocation
page read and write
25A802201000
trusted library allocation
page read and write
74A001B5C000
trusted library allocation
page read and write
1DA8574E000
heap
page read and write
74A001340000
trusted library allocation
page read and write
74A001478000
trusted library allocation
page read and write
74A0013AC000
trusted library allocation
page read and write
74A001570000
trusted library allocation
page read and write
33D0000
heap
page read and write
2059087F000
heap
page read and write
25A80221C000
trusted library allocation
page read and write
1DC05000
heap
page read and write
1DC00000
heap
page read and write
2C0800380000
trusted library allocation
page read and write
25A8025C8000
trusted library allocation
page read and write
25A802508000
trusted library allocation
page read and write
1370000
heap
page read and write
35DF000
stack
page read and write
74A0004E0000
trusted library allocation
page read and write
74A000E18000
trusted library allocation
page read and write
25A802580000
trusted library allocation
page read and write
74A0018E0000
trusted library allocation
page read and write
23DA0000
trusted library allocation
page read and write
74A001A64000
trusted library allocation
page read and write
6DBC002A0000
trusted library allocation
page read and write
1DA83902000
heap
page read and write
74A001BEC000
trusted library allocation
page read and write
33AC006AC000
trusted library allocation
page read and write
2C080032C000
trusted library allocation
page read and write
179E000
stack
page read and write
7D5DFC000
stack
page read and write
25A80253C000
trusted library allocation
page read and write
74A001BC4000
trusted library allocation
page read and write
2C0800408000
trusted library allocation
page read and write
1DA83813000
heap
page read and write
2C0800360000
trusted library allocation
page read and write
74A0001D0000
trusted library allocation
page read and write
74A0019A0000
trusted library allocation
page read and write
74A0012F8000
trusted library allocation
page read and write
74A001B04000
trusted library allocation
page read and write
1384000
heap
page read and write
7CBDFB000
stack
page read and write
25A8024A0000
trusted library allocation
page read and write
74A0018E8000
trusted library allocation
page read and write
74A001EA8000
trusted library allocation
page read and write
2C0800248000
trusted library allocation
page read and write
74A0014EC000
trusted library allocation
page read and write
74A0014F5000
trusted library allocation
page read and write
3BDE000
stack
page read and write
74A000CB8000
trusted library allocation
page read and write
74A001768000
trusted library allocation
page read and write
B60000
unkown
page read and write
1DA838BA000
heap
page read and write
74A001DEC000
trusted library allocation
page read and write
1DA8382C000
heap
page read and write
74A001D84000
trusted library allocation
page read and write
25A802474000
trusted library allocation
page read and write
74A000454000
trusted library allocation
page read and write
74A00022C000
trusted library allocation
page read and write
69B4002A0000
trusted library allocation
page read and write
74A000ECC000
trusted library allocation
page read and write
5101000
heap
page read and write
74A00157C000
trusted library allocation
page read and write
25A802484000
trusted library allocation
page read and write
25A8024D8000
trusted library allocation
page read and write
25A8022D8000
trusted library allocation
page read and write
74A001A28000
trusted library allocation
page read and write
33AC0071C000
trusted library allocation
page read and write
74A000EF4000
trusted library allocation
page read and write
5101000
heap
page read and write
25A800401000
trusted library allocation
page read and write
74A000C38000
trusted library allocation
page read and write
20590DD6000
heap
page read and write
1384000
heap
page read and write
74A00037C000
trusted library allocation
page read and write
74A000F58000
trusted library allocation
page read and write
74A000CF8000
trusted library allocation
page read and write
1DA85730000
heap
page read and write
74A000454000
trusted library allocation
page read and write
1390000
heap
page read and write
1DBF3000
heap
page read and write
A800212000
direct allocation
page read and write
74A0018D0000
trusted library allocation
page read and write
74A001910000
trusted library allocation
page read and write
74A001F60000
trusted library allocation
page read and write
2059088C000
heap
page read and write
20590DFF000
heap
page read and write
3CDF000
stack
page read and write
74A001950000
trusted library allocation
page read and write
6DBC002B4000
trusted library allocation
page read and write
1DA8DA02000
heap
page read and write
74A001A1C000
trusted library allocation
page read and write
5101000
heap
page read and write
A800274000
direct allocation
page read and write
74A001AD4000
trusted library allocation
page read and write
74A0002A8000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
1DBE6000
heap
page read and write
2059088D000
heap
page read and write
25A8026A8000
trusted library allocation
page read and write
A8002A8000
direct allocation
page read and write
6DBC002B4000
trusted library allocation
page read and write
5101000
heap
page read and write
61ED4000
direct allocation
page readonly
74A001350000
trusted library allocation
page read and write
7CB5FE000
unkown
page readonly
74A00073C000
trusted library allocation
page read and write
74A0002B4000
trusted library allocation
page read and write
74A001D04000
trusted library allocation
page read and write
7C85FE000
unkown
page readonly
74A000300000
trusted library allocation
page read and write
1DBD0000
heap
page read and write
74A001EAC000
trusted library allocation
page read and write
20594E97000
heap
page read and write
6DBC002A8000
trusted library allocation
page read and write
7D95FE000
unkown
page readonly
25A80242C000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
1384000
heap
page read and write
74A000BEC000
trusted library allocation
page read and write
33AC0070C000
trusted library allocation
page read and write
1DBDB000
heap
page read and write
1DA8388C000
heap
page read and write
74A001064000
trusted library allocation
page read and write
74A0018BC000
trusted library allocation
page read and write
6DBC002A8000
trusted library allocation
page read and write
1DA83967000
heap
page read and write
1DA8C580000
trusted library allocation
page read and write
74A000F30000
trusted library allocation
page read and write
1DA8573A000
heap
page read and write
A80030A000
direct allocation
page read and write
74A000294000
trusted library allocation
page read and write
5101000
heap
page read and write
50F0000
direct allocation
page read and write
34DF000
stack
page read and write
74A00038C000
trusted library allocation
page read and write
74A001A30000
trusted library allocation
page read and write
25A8025D8000
trusted library allocation
page read and write
74A0016CE000
trusted library allocation
page read and write
33AC008EC000
trusted library allocation
page read and write
74A0014C0000
trusted library allocation
page read and write
2C080031C000
trusted library allocation
page read and write
74A001028000
trusted library allocation
page read and write
74A00038D000
trusted library allocation
page read and write
74A00158C000
trusted library allocation
page read and write
74A0013AC000
trusted library allocation
page read and write
25A8026A8000
trusted library allocation
page read and write
25A802420000
trusted library allocation
page read and write
74A0012B4000
trusted library allocation
page read and write
74A0012F8000
trusted library allocation
page read and write
1DA8573A000
heap
page read and write
A800244000
direct allocation
page read and write
25A8024F0000
trusted library allocation
page read and write
74A0019C0000
trusted library allocation
page read and write
74A0002B4000
trusted library allocation
page read and write
1DA85785000
heap
page read and write
74A0001D4000
trusted library allocation
page read and write
5101000
heap
page read and write
10DC000
unkown
page execute and read and write
1DB6C000
stack
page read and write
1D8DF000
stack
page read and write
25A8023C0000
trusted library allocation
page read and write
74A000230000
trusted library allocation
page read and write
74A001184000
trusted library allocation
page read and write
20590885000
heap
page read and write
7D9DFE000
stack
page read and write
74A001224000
trusted library allocation
page read and write
5101000
heap
page read and write
74A0014C0000
trusted library allocation
page read and write
20590884000
heap
page read and write
1DA85783000
heap
page read and write
1DA857BA000
heap
page read and write
5101000
heap
page read and write
74A001438000
trusted library allocation
page read and write
74A000298000
trusted library allocation
page read and write
1DA857B4000
heap
page read and write
74A001E24000
trusted library allocation
page read and write
1D41E000
stack
page read and write
6DBC002C8000
trusted library allocation
page read and write
5720000
direct allocation
page execute and read and write
A800215000
direct allocation
page read and write
17A0000
heap
page read and write
1DA85613000
heap
page read and write
74A000324000
trusted library allocation
page read and write
2C080025C000
trusted library allocation
page read and write
1DA838A5000
heap
page read and write
25A802624000
trusted library allocation
page read and write
25A8024AC000
trusted library allocation
page read and write
1DBF4000
heap
page read and write
20590D7B000
heap
page read and write
74A0011E0000
trusted library allocation
page read and write
2059087F000
heap
page read and write
74A000F64000
trusted library allocation
page read and write
7C75FE000
unkown
page readonly
36DF000
stack
page read and write
5101000
heap
page read and write
56E0000
direct allocation
page execute and read and write
74A000C38000
trusted library allocation
page read and write
6C8E9000
unkown
page readonly
421E000
stack
page read and write
1DA85602000
heap
page read and write
74A001B58000
trusted library allocation
page read and write
74A001A60000
trusted library allocation
page read and write
6DBC002B4000
trusted library allocation
page read and write
25A802470000
trusted library allocation
page read and write
74A001FC4000
trusted library allocation
page read and write
2059088C000
heap
page read and write
74A00030C000
trusted library allocation
page read and write
25A80256C000
trusted library allocation
page read and write
1DA8576C000
heap
page read and write
74A001BD8000
trusted library allocation
page read and write
5101000
heap
page read and write
5120000
heap
page read and write
74A001B2C000
trusted library allocation
page read and write
50F0000
direct allocation
page read and write
6DBC002B4000
trusted library allocation
page read and write
74A001310000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA85794000
heap
page read and write
74A000469000
trusted library allocation
page read and write
2C0800210000
trusted library allocation
page read and write
74A0015AC000
trusted library allocation
page read and write
1384000
heap
page read and write
33AC0080C000
trusted library allocation
page read and write
74A001D98000
trusted library allocation
page read and write
74A001E88000
trusted library allocation
page read and write
33AC00884000
trusted library allocation
page read and write
74A001330000
trusted library allocation
page read and write
5101000
heap
page read and write
20594EA9000
heap
page read and write
A800234000
direct allocation
page read and write
56CF000
stack
page read and write
74A001B68000
trusted library allocation
page read and write
3A9E000
stack
page read and write
74A001714000
trusted library allocation
page read and write
7DC5FE000
unkown
page readonly
74A001064000
trusted library allocation
page read and write
20594E8F000
heap
page read and write
25A80247C000
trusted library allocation
page read and write
2C0800344000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA857C9000
heap
page read and write
74A001310000
trusted library allocation
page read and write
20590884000
heap
page read and write
74A000294000
trusted library allocation
page read and write
DA8000
unkown
page execute and read and write
3E5E000
stack
page read and write
74A001D08000
trusted library allocation
page read and write
7D7DFD000
stack
page read and write
2C0800390000
trusted library allocation
page read and write
74A001A44000
trusted library allocation
page read and write
B8C000
unkown
page execute and read and write
74A0012C0000
trusted library allocation
page read and write
5101000
heap
page read and write
1DA8571C000
heap
page read and write
50F0000
direct allocation
page read and write
74A000338000
trusted library allocation
page read and write
C74000
unkown
page execute and read and write
74A001B18000
trusted library allocation
page read and write
5101000
heap
page read and write
74A001E20000
trusted library allocation
page read and write
74A000338000
trusted library allocation
page read and write
23D07000
heap
page read and write
A8002D0000
direct allocation
page read and write
74A001B24000
trusted library allocation
page read and write
1DA838A5000
heap
page read and write
33AC00848000
trusted library allocation
page read and write
74A00140C000
trusted library allocation
page read and write
74A000FD8000
trusted library allocation
page read and write
74A001330000
trusted library allocation
page read and write
1DA8578A000
heap
page read and write
33AC0082C000
trusted library allocation
page read and write
74A000340000
trusted library allocation
page read and write
74A00073C000
trusted library allocation
page read and write
74A001224000
trusted library allocation
page read and write
There are 1397 hidden memdumps, click here to show them.