IOC Report
S1NrYNOYhZ.exe

loading gif

Files

File Path
Type
Category
Malicious
S1NrYNOYhZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_S1NrYNOYhZ.exe_b6773b4095aa95333fb98e7199e678983a515ba3_bfe82725_5e7caafc-f524-41de-8fd5-b659f8e6b711\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\DAEHJJECAEGCAAAAEGIE
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\ECGDHIDAAFHIIDGDBFIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EHJDGHJDBFIJKECAECAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FCBFBGDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDBAKKKFBGDHJKFHJJJJDGCBKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJEBGHIEBFIJKECBKFHDHDAKKJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJJJKEHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8628.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Dec 8 08:04:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8975.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8995.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6e13f66a-7040-4137-8c51-51c383d74d4d.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\82868294-533c-4cb8-b137-0827bfc46690.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\84f5ee26-0be6-42b4-a48f-dd096eba0fbc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67555303-1F34.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF36746.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF367a4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3735c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\af3ac40a-91a7-4e3f-bbf4-e62d35bf7b05.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ebe2c1f3-787e-4eb6-8680-9a58b9d4d5b6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 07:04:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 07:04:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 07:04:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 07:04:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 07:04:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 101
ASCII text, with very long lines (4485)
downloaded
Chrome Cache Entry: 102
ASCII text
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\S1NrYNOYhZ.exe
"C:\Users\user\Desktop\S1NrYNOYhZ.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1892 --field-trial-handle=2032,i,7215201683638474142,10822564904043220576,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2764 --field-trial-handle=2404,i,3454473567009619333,5722211160522911704,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=2044,i,7414350993396097854,14191711719460293657,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 2332

URLs

Name
IP
Malicious
http://92.255.57.88/7550b1c08332241a/vcruntime140.dll
92.255.57.88
malicious
http://92.255.57.88/7550b1c08332241a/vcruntime140.dll1
unknown
malicious
http://92.255.57.88/7550b1c08332241a/nss3.dll
92.255.57.88
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://issuetracker.google.com/284462263
unknown
https://crbug.com/368855.)
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://issuetracker.google.com/255411748
unknown
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.phpwBt
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmllt
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://anglebug.com/7556
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://92.255.57.88/7550b1c08332241a/sqlite3.dllD
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://92.255.57.88/7550b1c08332241a/nss3.dllave-Browser
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.phpd
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.php
92.255.57.88
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://msn.com/
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
https://permanently-removed.invalid/MergeSession
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
https://anglebug.com/7847
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68

IPs

IP
Domain
Country
Malicious
92.255.57.88
unknown
Russian Federation
malicious
192.168.2.5
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
ProgramId
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
FileId
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
LowerCaseLongPath
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
LongPathHash
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
Name
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
OriginalFileName
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
Publisher
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
Version
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
BinFileVersion
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
BinaryType
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
ProductName
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
ProductVersion
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
LinkDate
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
BinProductVersion
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
AppxPackageFullName
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
AppxPackageRelativeId
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
Size
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
Language
\REGISTRY\A\{6bba50a5-8b56-61ec-11f9-a9491904cad7}\Root\InventoryApplicationFile\s1nrynoyhz.exe|d23814a659a183d3
Usn
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22A0000
direct allocation
page execute and read and write
malicious
22E0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
88E000
heap
page read and write
malicious
2D40002E0000
direct allocation
page read and write
35B0002A8000
trusted library allocation
page read and write
32B8002C4000
trusted library allocation
page read and write
22989B7D000
heap
page read and write
20ED2000
heap
page read and write
20EB8000
heap
page read and write
60A4003C0000
trusted library allocation
page read and write
790003FB0000
trusted library allocation
page read and write
538000220000
trusted library allocation
page read and write
60A400401000
trusted library allocation
page read and write
20EAE000
heap
page read and write
790003B40000
trusted library allocation
page read and write
35B000278000
trusted library allocation
page read and write
7900023C8000
trusted library allocation
page read and write
ABF000
stack
page read and write
60A400290000
trusted library allocation
page read and write
239E000
stack
page read and write
53800007C000
trusted library allocation
page read and write
60A4002A4000
trusted library allocation
page read and write
790003768000
trusted library allocation
page read and write
1D8000818000
trusted library allocation
page read and write
5380000A0000
trusted library allocation
page read and write
60A400424000
trusted library allocation
page read and write
7900039BC000
trusted library allocation
page read and write
7900024C4000
trusted library allocation
page read and write
20FE6000
heap
page read and write
7900023D8000
trusted library allocation
page read and write
6C7AF000
unkown
page write copy
22987D30000
heap
page read and write
42A000
unkown
page execute read
20EB4000
heap
page read and write
35B000294000
trusted library allocation
page read and write
35B0002FC000
trusted library allocation
page read and write
96D000
heap
page read and write
1D8000890000
trusted library allocation
page read and write
32B8002D8000
trusted library allocation
page read and write
79000352C000
trusted library allocation
page read and write
1D800081C000
trusted library allocation
page read and write
22989BCD000
heap
page read and write
790003A20000
trusted library allocation
page read and write
20ED0000
heap
page read and write
790003AA8000
trusted library allocation
page read and write
20EB0000
heap
page read and write
1A76E000
stack
page read and write
7900039E0000
trusted library allocation
page read and write
790002424000
trusted library allocation
page read and write
22987D2B000
heap
page read and write
1AB9E000
stack
page read and write
790003B08000
trusted library allocation
page read and write
20EB0000
heap
page read and write
35B0002B4000
trusted library allocation
page read and write
20EC3000
heap
page read and write
2B8BFBB4000
heap
page read and write
20E9D000
heap
page read and write
538000030000
trusted library allocation
page read and write
1ACD1000
heap
page read and write
2B8BD1CB000
heap
page read and write
7900024A4000
trusted library allocation
page read and write
790002554000
trusted library allocation
page read and write
9C000
stack
page read and write
22989BC4000
heap
page read and write
790003B34000
trusted library allocation
page read and write
538000254000
trusted library allocation
page read and write
20FD3000
heap
page read and write
5380003B0000
trusted library allocation
page read and write
22987CF0000
heap
page read and write
790003570000
trusted library allocation
page read and write
7900039D0000
trusted library allocation
page read and write
538000354000
trusted library allocation
page read and write
2B8BFB93000
heap
page read and write
2B8BCB34000
heap
page read and write
1D80008E8000
trusted library allocation
page read and write
79000241C000
trusted library allocation
page read and write
2B8BD218000
heap
page read and write
35B000250000
trusted library allocation
page read and write
8D1000
heap
page read and write
2B8BD14F000
heap
page read and write
212AA000
heap
page read and write
35B0002B4000
trusted library allocation
page read and write
20ED0000
heap
page read and write
7900024AE000
trusted library allocation
page read and write
79000392C000
trusted library allocation
page read and write
790003EA0000
trusted library allocation
page read and write
7900025B6000
trusted library allocation
page read and write
F7CD3FE000
unkown
page readonly
790002560000
trusted library allocation
page read and write
79000327C000
trusted library allocation
page read and write
790003954000
trusted library allocation
page read and write
790003978000
trusted library allocation
page read and write
790003188000
trusted library allocation
page read and write
7900025B8000
trusted library allocation
page read and write
35B0002F0000
trusted library allocation
page read and write
F7AE3FE000
unkown
page readonly
32B8002A0000
trusted library allocation
page read and write
790003AF4000
trusted library allocation
page read and write
2B8BD1C7000
heap
page read and write
790002F7C000
trusted library allocation
page read and write
60A400250000
trusted library allocation
page read and write
7900023D4000
trusted library allocation
page read and write
790003EB4000
trusted library allocation
page read and write
790003960000
trusted library allocation
page read and write
1D800039C000
trusted library allocation
page read and write
538000294000
trusted library allocation
page read and write
7900039C8000
trusted library allocation
page read and write
5380002E4000
trusted library allocation
page read and write
21032000
heap
page read and write
1D8000418000
trusted library allocation
page read and write
2B8BCB34000
heap
page read and write
20EAE000
heap
page read and write
790002E0C000
trusted library allocation
page read and write
53800048C000
trusted library allocation
page read and write
5380002F0000
trusted library allocation
page read and write
5380001A8000
trusted library allocation
page read and write
1AA0E000
stack
page read and write
790003AE8000
trusted library allocation
page read and write
20F90000
heap
page read and write
790003B8C000
trusted library allocation
page read and write
2B8BCB2B000
heap
page read and write
79000254C000
trusted library allocation
page read and write
20EC3000
heap
page read and write
60A400374000
trusted library allocation
page read and write
79000352C000
trusted library allocation
page read and write
60A400248000
trusted library allocation
page read and write
79000394C000
trusted library allocation
page read and write
790002E50000
trusted library allocation
page read and write
538000368000
trusted library allocation
page read and write
790003E6C000
trusted library allocation
page read and write
22989BD1000
heap
page read and write
20DEE000
heap
page read and write
790003A0C000
trusted library allocation
page read and write
22987CB3000
heap
page read and write
6C5D0000
unkown
page readonly
2D4000318000
direct allocation
page read and write
22989B4B000
heap
page read and write
20EBA000
heap
page read and write
790003B90000
trusted library allocation
page read and write
F7C6BFE000
stack
page read and write
790003140000
trusted library allocation
page read and write
7900031B4000
trusted library allocation
page read and write
1D80006AC000
trusted library allocation
page read and write
7900031D0000
trusted library allocation
page read and write
22989B37000
heap
page read and write
79000349C000
trusted library allocation
page read and write
22989B72000
heap
page read and write
20ECF000
heap
page read and write
20EB8000
heap
page read and write
1D8000788000
trusted library allocation
page read and write
32B8002C8000
trusted library allocation
page read and write
F7BF3FE000
unkown
page readonly
790002514000
trusted library allocation
page read and write
2D4000210000
direct allocation
page read and write
22989B3A000
heap
page read and write
F7C43FE000
unkown
page readonly
79000361C000
trusted library allocation
page read and write
60A400288000
trusted library allocation
page read and write
1D80008E4000
trusted library allocation
page read and write
22989A13000
heap
page read and write
790002E68000
trusted library allocation
page read and write
790003BB8000
trusted library allocation
page read and write
20EC8000
heap
page read and write
22987B90000
heap
page read and write
790003BEC000
trusted library allocation
page read and write
20ED9000
heap
page read and write
790003A90000
trusted library allocation
page read and write
790003D88000
trusted library allocation
page read and write
22987D02000
heap
page read and write
538000030000
trusted library allocation
page read and write
1D80007AC000
trusted library allocation
page read and write
60A40032C000
trusted library allocation
page read and write
538000284000
trusted library allocation
page read and write
790003F10000
trusted library allocation
page read and write
21012000
heap
page read and write
61EB4000
direct allocation
page read and write
60A400238000
trusted library allocation
page read and write
790003DB0000
trusted library allocation
page read and write
F7BA3FE000
unkown
page readonly
5380002A0000
trusted library allocation
page read and write
22E0000
heap
page read and write
22989B7F000
heap
page read and write
22987A50000
heap
page read and write
6C530000
unkown
page readonly
20EAE000
heap
page read and write
5380002D8000
trusted library allocation
page read and write
35B000238000
trusted library allocation
page read and write
53800025C000
trusted library allocation
page read and write
F7B53FE000
unkown
page readonly
20EB7000
heap
page read and write
79000359C000
trusted library allocation
page read and write
F7C0BFE000
stack
page read and write
F7B43FE000
unkown
page readonly
790003928000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
790003AAC000
trusted library allocation
page read and write
790003228000
trusted library allocation
page read and write
7900036D0000
trusted library allocation
page read and write
22987C71000
heap
page read and write
790003AEC000
trusted library allocation
page read and write
F7BABFE000
stack
page read and write
32B8002A0000
trusted library allocation
page read and write
35B0002E0000
trusted library allocation
page read and write
2B8BCB1C000
heap
page read and write
79000254C000
trusted library allocation
page read and write
20EC3000
heap
page read and write
20FE9000
heap
page read and write
790003C74000
trusted library allocation
page read and write
538000020000
trusted library allocation
page read and write
79000367C000
trusted library allocation
page read and write
790002430000
trusted library allocation
page read and write
F7C8BFD000
stack
page read and write
60A40020C000
trusted library allocation
page read and write
790003744000
trusted library allocation
page read and write
F7C33FE000
unkown
page readonly
790003AB8000
trusted library allocation
page read and write
2D400030A000
direct allocation
page read and write
2D40002C0000
direct allocation
page read and write
5380002CC000
trusted library allocation
page read and write
35B000201000
trusted library allocation
page read and write
F7A6BF3000
stack
page read and write
20EB0000
heap
page read and write
538000201000
trusted library allocation
page read and write
790003EEC000
trusted library allocation
page read and write
23B0000
heap
page read and write
5380001B8000
trusted library allocation
page read and write
790003744000
trusted library allocation
page read and write
F7B9BFD000
stack
page read and write
790002F34000
trusted library allocation
page read and write
7900031D0000
trusted library allocation
page read and write
538000140000
trusted library allocation
page read and write
20EB7000
heap
page read and write
35B000270000
trusted library allocation
page read and write
5380000E8000
trusted library allocation
page read and write
790003F30000
trusted library allocation
page read and write
79000350B000
trusted library allocation
page read and write
790002514000
trusted library allocation
page read and write
790003934000
trusted library allocation
page read and write
790002E38000
trusted library allocation
page read and write
790003080000
trusted library allocation
page read and write
7900038D4000
trusted library allocation
page read and write
20EBA000
heap
page read and write
1A71F000
stack
page read and write
790003558000
trusted library allocation
page read and write
1D8000828000
trusted library allocation
page read and write
20E9C000
heap
page read and write
60A400408000
trusted library allocation
page read and write
790002E50000
trusted library allocation
page read and write
22987C98000
heap
page read and write
538000390000
trusted library allocation
page read and write
53800037C000
trusted library allocation
page read and write
2B8BCB2D000
heap
page read and write
F7CE3FE000
unkown
page readonly
7900038CC000
trusted library allocation
page read and write
1D8000878000
trusted library allocation
page read and write
790003EF0000
trusted library allocation
page read and write
790003DD8000
trusted library allocation
page read and write
2D4000294000
direct allocation
page read and write
1D8000830000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
790003E98000
trusted library allocation
page read and write
7900039B8000
trusted library allocation
page read and write
32B8002C4000
trusted library allocation
page read and write
35B000294000
trusted library allocation
page read and write
2B8BCB28000
heap
page read and write
790003B58000
trusted library allocation
page read and write
79000360C000
trusted library allocation
page read and write
2B8BCB34000
heap
page read and write
7900038C0000
trusted library allocation
page read and write
22989BA2000
heap
page read and write
790003A3C000
trusted library allocation
page read and write
2B8BCB2C000
heap
page read and write
79000360C000
trusted library allocation
page read and write
20EB0000
heap
page read and write
2D4000328000
direct allocation
page read and write
7900024A4000
trusted library allocation
page read and write
790003A1C000
trusted library allocation
page read and write
79000367C000
trusted library allocation
page read and write
790002E28000
trusted library allocation
page read and write
7900038D0000
trusted library allocation
page read and write
20EB0000
heap
page read and write
5380000F8000
trusted library allocation
page read and write
538000334000
trusted library allocation
page read and write
790002DB8000
trusted library allocation
page read and write
790003518000
trusted library allocation
page read and write
7900031B8000
trusted library allocation
page read and write
60A4002F4000
trusted library allocation
page read and write
F7BB3FE000
unkown
page readonly
790002FB8000
trusted library allocation
page read and write
790003564000
trusted library allocation
page read and write
790003F00000
trusted library allocation
page read and write
538000274000
trusted library allocation
page read and write
20EC3000
heap
page read and write
790003E7C000
trusted library allocation
page read and write
2D4000215000
direct allocation
page read and write
2D40002A8000
direct allocation
page read and write
79000340C000
trusted library allocation
page read and write
20ED0000
heap
page read and write
2B8BCB1E000
heap
page read and write
2D40002D8000
direct allocation
page read and write
F7CDBFE000
stack
page read and write
6C7B0000
unkown
page read and write
79000327C000
trusted library allocation
page read and write
790002690000
trusted library allocation
page read and write
790003F0C000
trusted library allocation
page read and write
7900031D4000
trusted library allocation
page read and write
8BF000
heap
page read and write
790003FE8000
trusted library allocation
page read and write
790003914000
trusted library allocation
page read and write
20EB0000
heap
page read and write
22989BA6000
heap
page read and write
35B0002A0000
trusted library allocation
page read and write
20EB6000
heap
page read and write
22987D27000
heap
page read and write
1A4DE000
stack
page read and write
790003FA4000
trusted library allocation
page read and write
20ED2000
heap
page read and write
60A400364000
trusted library allocation
page read and write
22E3000
heap
page read and write
20E90000
trusted library allocation
page read and write
1D800080C000
trusted library allocation
page read and write
7900025A0000
trusted library allocation
page read and write
7900025A0000
trusted library allocation
page read and write
5380002C0000
trusted library allocation
page read and write
7900031D0000
trusted library allocation
page read and write
7900038BC000
trusted library allocation
page read and write
32B8002A0000
trusted library allocation
page read and write
538000086000
trusted library allocation
page read and write
538000114000
trusted library allocation
page read and write
5380000B0000
trusted library allocation
page read and write
538000210000
trusted library allocation
page read and write
790003134000
trusted library allocation
page read and write
790003DC8000
trusted library allocation
page read and write
5380003D0000
trusted library allocation
page read and write
538000108000
trusted library allocation
page read and write
790003B64000
trusted library allocation
page read and write
6C76F000
unkown
page readonly
F7B83FE000
unkown
page readonly
22989A02000
heap
page read and write
5380002A8000
trusted library allocation
page read and write
20E9C000
heap
page read and write
790003579000
trusted library allocation
page read and write
790003744000
trusted library allocation
page read and write
79000367C000
trusted library allocation
page read and write
790003A88000
trusted library allocation
page read and write
538000470000
trusted library allocation
page read and write
1D800087C000
trusted library allocation
page read and write
790003C34000
trusted library allocation
page read and write
790002E68000
trusted library allocation
page read and write
2B8BD12E000
heap
page read and write
790003C1C000
trusted library allocation
page read and write
1D80007A0000
trusted library allocation
page read and write
790003AC8000
trusted library allocation
page read and write
1D80006E8000
trusted library allocation
page read and write
2D4000274000
direct allocation
page read and write
22989BB2000
heap
page read and write
5380002D8000
trusted library allocation
page read and write
538000218000
trusted library allocation
page read and write
790003098000
trusted library allocation
page read and write
2B8BFBB8000
heap
page read and write
790002554000
trusted library allocation
page read and write
790002BCC000
trusted library allocation
page read and write
20EBC000
heap
page read and write
20EAE000
heap
page read and write
2270000
direct allocation
page execute and read and write
88A000
heap
page read and write
60A400304000
trusted library allocation
page read and write
35B000235000
trusted library allocation
page read and write
20ED0000
heap
page read and write
20EC3000
heap
page read and write
790003114000
trusted library allocation
page read and write
7900023B4000
trusted library allocation
page read and write
20EB4000
heap
page read and write
22E6000
heap
page read and write
2D4000250000
direct allocation
page read and write
2D4000290000
direct allocation
page read and write
790003F20000
trusted library allocation
page read and write
6C7AE000
unkown
page read and write
1D8000778000
trusted library allocation
page read and write
9BE000
stack
page read and write
35B0002B8000
trusted library allocation
page read and write
F7B93FE000
unkown
page readonly
538000248000
trusted library allocation
page read and write
7900038BC000
trusted library allocation
page read and write
5380001F4000
trusted library allocation
page read and write
2298A7C0000
unkown
page read and write
1A61E000
stack
page read and write
7900039AC000
trusted library allocation
page read and write
7900031D0000
trusted library allocation
page read and write
5380000FC000
trusted library allocation
page read and write
20EB0000
heap
page read and write
790003080000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
790003C20000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
790003724000
trusted library allocation
page read and write
35B000248000
trusted library allocation
page read and write
790003F08000
trusted library allocation
page read and write
2129C000
heap
page read and write
790003AD4000
trusted library allocation
page read and write
538000124000
trusted library allocation
page read and write
790003628000
trusted library allocation
page read and write
7900025A0000
trusted library allocation
page read and write
458000
unkown
page write copy
2B8BCB30000
heap
page read and write
61ECD000
direct allocation
page readonly
79000254C000
trusted library allocation
page read and write
F7A8BFE000
stack
page read and write
7900024A4000
trusted library allocation
page read and write
79000288C000
trusted library allocation
page read and write
79000359C000
trusted library allocation
page read and write
790003794000
trusted library allocation
page read and write
5380002E4000
trusted library allocation
page read and write
F7C1BFE000
stack
page read and write
7900038EC000
trusted library allocation
page read and write
790003E9C000
trusted library allocation
page read and write
22989BCB000
heap
page read and write
790003542000
trusted library allocation
page read and write
22989B27000
heap
page read and write
F7C23FE000
unkown
page readonly
61E01000
direct allocation
page execute read
2B8BD1A2000
heap
page read and write
22987C00000
heap
page read and write
2D4000280000
direct allocation
page read and write
79000254C000
trusted library allocation
page read and write
1D8000864000
trusted library allocation
page read and write
790003DAC000
trusted library allocation
page read and write
F7A93FE000
unkown
page readonly
32B8002E4000
trusted library allocation
page read and write
22EC000
heap
page read and write
20ED0000
heap
page read and write
790002514000
trusted library allocation
page read and write
6C5AD000
unkown
page readonly
919000
heap
page read and write
60A400404000
trusted library allocation
page read and write
1D8000898000
trusted library allocation
page read and write
790003B54000
trusted library allocation
page read and write
7900038F8000
trusted library allocation
page read and write
53800024C000
trusted library allocation
page read and write
790003B2C000
trusted library allocation
page read and write
538000150000
trusted library allocation
page read and write
35B0002A8000
trusted library allocation
page read and write
2D400031C000
direct allocation
page read and write
193000
stack
page read and write
484000
unkown
page execute and read and write
790003AB4000
trusted library allocation
page read and write
20EB0000
heap
page read and write
790003C0C000
trusted library allocation
page read and write
7900030F4000
trusted library allocation
page read and write
79000254C000
trusted library allocation
page read and write
538000458000
trusted library allocation
page read and write
22987CBE000
heap
page read and write
790003950000
trusted library allocation
page read and write
53800037C000
trusted library allocation
page read and write
790003B20000
trusted library allocation
page read and write
790002DB8000
trusted library allocation
page read and write
60A400350000
trusted library allocation
page read and write
790003590000
trusted library allocation
page read and write
727000
heap
page read and write
2B8BCB24000
heap
page read and write
790002560000
trusted library allocation
page read and write
5380001F8000
trusted library allocation
page read and write
5380003E0000
trusted library allocation
page read and write
2D400024C000
direct allocation
page read and write
20EA2000
heap
page read and write
79000375A000
trusted library allocation
page read and write
790002554000
trusted library allocation
page read and write
2D4000270000
direct allocation
page read and write
1D80006AC000
trusted library allocation
page read and write
538000060000
trusted library allocation
page read and write
1D80008C8000
trusted library allocation
page read and write
790002FB4000
trusted library allocation
page read and write
790002434000
trusted library allocation
page read and write
20EAE000
heap
page read and write
638000
unkown
page execute and read and write
790003DF8000
trusted library allocation
page read and write
952000
heap
page read and write
790003F44000
trusted library allocation
page read and write
35B0002D8000
trusted library allocation
page read and write
7900023EC000
trusted library allocation
page read and write
2B8BD20C000
heap
page read and write
1D8000884000
trusted library allocation
page read and write
F7A6BFE000
stack
page read and write
22989B56000
heap
page read and write
20EB7000
heap
page read and write
790003636000
trusted library allocation
page read and write
7900024A8000
trusted library allocation
page read and write
7900025B4000
trusted library allocation
page read and write
20EB2000
heap
page read and write
790003098000
trusted library allocation
page read and write
5380002FC000
trusted library allocation
page read and write
790002F34000
trusted library allocation
page read and write
2B8BCB20000
heap
page read and write
F7BFBFD000
stack
page read and write
5380002AC000
trusted library allocation
page read and write
915000
heap
page read and write
538000380000
trusted library allocation
page read and write
790003E30000
trusted library allocation
page read and write
1D8000850000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
20E97000
heap
page read and write
790002554000
trusted library allocation
page read and write
790003080000
trusted library allocation
page read and write
790003559000
trusted library allocation
page read and write
790003E40000
trusted library allocation
page read and write
F7CCBFE000
stack
page read and write
79000254C000
trusted library allocation
page read and write
20FEF000
heap
page read and write
790003EB0000
trusted library allocation
page read and write
7900036D0000
trusted library allocation
page read and write
790003188000
trusted library allocation
page read and write
20ED1000
heap
page read and write
19D000
stack
page read and write
790003AA4000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
790002E50000
trusted library allocation
page read and write
20ED0000
heap
page read and write
5380001E4000
trusted library allocation
page read and write
790002BCC000
trusted library allocation
page read and write
2B8BD1D3000
heap
page read and write
790003BC0000
trusted library allocation
page read and write
60A400308000
trusted library allocation
page read and write
790003080000
trusted library allocation
page read and write
790002514000
trusted library allocation
page read and write
790002420000
trusted library allocation
page read and write
35B0002B8000
trusted library allocation
page read and write
79000349C000
trusted library allocation
page read and write
22987D2B000
heap
page read and write
2D4000303000
direct allocation
page read and write
790002FB4000
trusted library allocation
page read and write
2D4000217000
direct allocation
page read and write
727000
heap
page read and write
790003018000
trusted library allocation
page read and write
790002F1C000
trusted library allocation
page read and write
790003E2C000
trusted library allocation
page read and write
1D8000894000
trusted library allocation
page read and write
53800021C000
trusted library allocation
page read and write
790003EB8000
trusted library allocation
page read and write
79000254C000
trusted library allocation
page read and write
790002538000
trusted library allocation
page read and write
790003018000
trusted library allocation
page read and write
2D400021C000
direct allocation
page read and write
20ED0000
heap
page read and write
53800016C000
trusted library allocation
page read and write
20EC3000
heap
page read and write
79000254C000
trusted library allocation
page read and write
1ADD0000
trusted library allocation
page read and write
7900023E4000
trusted library allocation
page read and write
32B8002B8000
trusted library allocation
page read and write
20ED1000
heap
page read and write
1A86F000
stack
page read and write
22987C2F000
heap
page read and write
790003730000
trusted library allocation
page read and write
790003098000
trusted library allocation
page read and write
790003E54000
trusted library allocation
page read and write
1D8000868000
trusted library allocation
page read and write
60A4003BC000
trusted library allocation
page read and write
7900031D0000
trusted library allocation
page read and write
20EB1000
heap
page read and write
7900038D8000
trusted library allocation
page read and write
77E000
stack
page read and write
790002514000
trusted library allocation
page read and write
22987CC6000
heap
page read and write
790002514000
trusted library allocation
page read and write
32B8002A0000
trusted library allocation
page read and write
F7B3BFC000
stack
page read and write
1A49F000
stack
page read and write
401000
unkown
page execute read
1D800040C000
trusted library allocation
page read and write
790002E50000
trusted library allocation
page read and write
790002F34000
trusted library allocation
page read and write
790003A78000
trusted library allocation
page read and write
790003B1C000
trusted library allocation
page read and write
790003744000
trusted library allocation
page read and write
5380003E3000
trusted library allocation
page read and write
20EB0000
heap
page read and write
22989B23000
heap
page read and write
22989B00000
heap
page read and write
790003DAC000
trusted library allocation
page read and write
20EA1000
heap
page read and write
22987CDE000
heap
page read and write
790003E88000
trusted library allocation
page read and write
790003DDC000
trusted library allocation
page read and write
7900023B4000
trusted library allocation
page read and write
F7C73FE000
unkown
page readonly
22987CDC000
heap
page read and write
790003134000
trusted library allocation
page read and write
790002428000
trusted library allocation
page read and write
60A400418000
trusted library allocation
page read and write
6C5D1000
unkown
page execute read
79000240C000
trusted library allocation
page read and write
790003510000
trusted library allocation
page read and write
790003509000
trusted library allocation
page read and write
790003E18000
trusted library allocation
page read and write
1D80007BC000
trusted library allocation
page read and write
1D80006AC000
trusted library allocation
page read and write
22989B81000
heap
page read and write
790003E58000
trusted library allocation
page read and write
790002590000
trusted library allocation
page read and write
790003124000
trusted library allocation
page read and write
22989BE4000
heap
page read and write
2B8BD138000
heap
page read and write
20EC3000
heap
page read and write
60A40040C000
trusted library allocation
page read and write
20EC8000
heap
page read and write
79000380C000
trusted library allocation
page read and write
20EBB000
heap
page read and write
64A000
unkown
page execute and read and write
22989B83000
heap
page read and write
538000230000
trusted library allocation
page read and write
1ADD9000
heap
page read and write
790003DE8000
trusted library allocation
page read and write
790003A64000
trusted library allocation
page read and write
7900036D0000
trusted library allocation
page read and write
538000298000
trusted library allocation
page read and write
790003B44000
trusted library allocation
page read and write
22989B75000
heap
page read and write
35B0002B8000
trusted library allocation
page read and write
20EAA000
heap
page read and write
60A4002B0000
trusted library allocation
page read and write
5380001E0000
trusted library allocation
page read and write
35B0002B4000
trusted library allocation
page read and write
7900023E0000
trusted library allocation
page read and write
790003E64000
trusted library allocation
page read and write
790002E50000
trusted library allocation
page read and write
20EAA000
heap
page read and write
790003A4C000
trusted library allocation
page read and write
1D800082C000
trusted library allocation
page read and write
210FE000
stack
page read and write
790003904000
trusted library allocation
page read and write
20EAE000
heap
page read and write
60A400390000
trusted library allocation
page read and write
790002E60000
trusted library allocation
page read and write
790003918000
trusted library allocation
page read and write
20ED0000
heap
page read and write
538000134000
trusted library allocation
page read and write
79000254C000
trusted library allocation
page read and write
5380003E0000
trusted library allocation
page read and write
790002514000
trusted library allocation
page read and write
790003334000
trusted library allocation
page read and write
7900030F4000
trusted library allocation
page read and write
790003BF8000
trusted library allocation
page read and write
538000190000
trusted library allocation
page read and write
790003750000
trusted library allocation
page read and write
463000
unkown
page readonly
790002514000
trusted library allocation
page read and write
6C5BE000
unkown
page read and write
7900036E4000
trusted library allocation
page read and write
2B8BCB2D000
heap
page read and write
790003F2C000
trusted library allocation
page read and write
F7AD3FE000
unkown
page readonly
35B0002B4000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
730000
heap
page read and write
5380003F9000
trusted library allocation
page read and write
790003E50000
trusted library allocation
page read and write
F7C93FE000
unkown
page readonly
87F000
stack
page read and write
1D800085C000
trusted library allocation
page read and write
790002F7C000
trusted library allocation
page read and write
20EAB000
heap
page read and write
2D4000311000
direct allocation
page read and write
2D4000284000
direct allocation
page read and write
538000340000
trusted library allocation
page read and write
5380002D8000
trusted library allocation
page read and write
538000258000
trusted library allocation
page read and write
35B0002A8000
trusted library allocation
page read and write
22989B7A000
heap
page read and write
1D8000790000
trusted library allocation
page read and write
7900023B4000
trusted library allocation
page read and write
79000220C000
trusted library allocation
page read and write
60A4003C4000
trusted library allocation
page read and write
53800008C000
trusted library allocation
page read and write
1ACD1000
heap
page read and write
F7C83FE000
unkown
page readonly
790003E28000
trusted library allocation
page read and write
5380001CC000
trusted library allocation
page read and write
790002E50000
trusted library allocation
page read and write
790003518000
trusted library allocation
page read and write
790003DB4000
trusted library allocation
page read and write
790003B78000
trusted library allocation
page read and write
5380002CC000
trusted library allocation
page read and write
60A400230000
trusted library allocation
page read and write
7900023F0000
trusted library allocation
page read and write
53800020C000
trusted library allocation
page read and write
20EB7000
heap
page read and write
2D4000201000
direct allocation
page read and write
23C0000
heap
page read and write
790003938000
trusted library allocation
page read and write
2D4000234000
direct allocation
page read and write
2B8BD169000
heap
page read and write
790003A68000
trusted library allocation
page read and write
790003B30000
trusted library allocation
page read and write
20EC8000
heap
page read and write
79000303C000
trusted library allocation
page read and write
32B800248000
trusted library allocation
page read and write
790003E80000
trusted library allocation
page read and write
60A400300000
trusted library allocation
page read and write
790003E34000
trusted library allocation
page read and write
20ED0000
heap
page read and write
538000082000
trusted library allocation
page read and write
1F0000
heap
page read and write
790003C58000
trusted library allocation
page read and write
22987C43000
heap
page read and write
790002FB8000
trusted library allocation
page read and write
32B8002A8000
trusted library allocation
page read and write
7900034F0000
trusted library allocation
page read and write
53800047C000
trusted library allocation
page read and write
2D40002D0000
direct allocation
page read and write
5380000C0000
trusted library allocation
page read and write
790003160000
trusted library allocation
page read and write
22987D13000
heap
page read and write
790003160000
trusted library allocation
page read and write
7900039EC000
trusted library allocation
page read and write
22987CB9000
heap
page read and write
7900030F4000
trusted library allocation
page read and write
79000359C000
trusted library allocation
page read and write
7900024A4000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
790003998000
trusted library allocation
page read and write
5380003C0000
trusted library allocation
page read and write
79000351C000
trusted library allocation
page read and write
2D400023C000
direct allocation
page read and write
790003A8C000
trusted library allocation
page read and write
1D8000848000
trusted library allocation
page read and write
7900031D0000
trusted library allocation
page read and write
60A400338000
trusted library allocation
page read and write
7900024B4000
trusted library allocation
page read and write
538000240000
trusted library allocation
page read and write
32B8002A0000
trusted library allocation
page read and write
1D800070C000
trusted library allocation
page read and write
790003F54000
trusted library allocation
page read and write
2D40002D8000
direct allocation
page read and write
1D80006E0000
trusted library allocation
page read and write
2B8BCB1E000
heap
page read and write
1A9BD000
stack
page read and write
79000254C000
trusted library allocation
page read and write
7900038E8000
trusted library allocation
page read and write
7900023E8000
trusted library allocation
page read and write
F7B8BFE000
stack
page read and write
60A40039C000
trusted library allocation
page read and write
F7C53FE000
unkown
page readonly
790003AC0000
trusted library allocation
page read and write
60A40031C000
trusted library allocation
page read and write
47DC00234000
direct allocation
page read and write
1D8000408000
trusted library allocation
page read and write
2B8BCB1E000
heap
page read and write
53800022C000
trusted library allocation
page read and write
32B8002B8000
trusted library allocation
page read and write
790003F40000
trusted library allocation
page read and write
790003190000
trusted library allocation
page read and write
1D8000248000
trusted library allocation
page read and write
720000
heap
page read and write
F7B13FE000
unkown
page readonly
79000361C000
trusted library allocation
page read and write
7900039B0000
trusted library allocation
page read and write
F7C63FE000
unkown
page readonly
61ED3000
direct allocation
page read and write
1D8000860000
trusted library allocation
page read and write
538000290000
trusted library allocation
page read and write
53800025C000
trusted library allocation
page read and write
20EC3000
heap
page read and write
61ED4000
direct allocation
page readonly
538000228000
trusted library allocation
page read and write
538000224000
trusted library allocation
page read and write
1D80007D4000
trusted library allocation
page read and write
20EB0000
heap
page read and write
790003E0C000
trusted library allocation
page read and write
F7ADBFE000
stack
page read and write
790002E68000
trusted library allocation
page read and write
22987BB0000
trusted library allocation
page read and write
790002F34000
trusted library allocation
page read and write
20E90000
trusted library allocation
page read and write
790003218000
trusted library allocation
page read and write
538000054000
trusted library allocation
page read and write
7900036D4000
trusted library allocation
page read and write
7900038F0000
trusted library allocation
page read and write
F7ACBFE000
stack
page read and write
20E90000
heap
page read and write
790003A60000
trusted library allocation
page read and write
790003538000
trusted library allocation
page read and write
7900031D0000
trusted library allocation
page read and write
60A400284000
trusted library allocation
page read and write
2B8BCB2E000
heap
page read and write
1AC9E000
stack
page read and write
7900025A2000
trusted library allocation
page read and write
790002E50000
trusted library allocation
page read and write
790003AF0000
trusted library allocation
page read and write
790003504000
trusted library allocation
page read and write
22989B59000
heap
page read and write
20ED9000
heap
page read and write
32B8002B8000
trusted library allocation
page read and write
790003B5C000
trusted library allocation
page read and write
20EB0000
heap
page read and write
790003A40000
trusted library allocation
page read and write
790003098000
trusted library allocation
page read and write
790003AB0000
trusted library allocation
page read and write
35B0002A8000
trusted library allocation
page read and write
60A4003A0000
trusted library allocation
page read and write
22989BA2000
heap
page read and write
32B8002C4000
trusted library allocation
page read and write
790002F34000
trusted library allocation
page read and write
20EC3000
heap
page read and write
22989B5B000
heap
page read and write
7900035AE000
trusted library allocation
page read and write
7900024A8000
trusted library allocation
page read and write
790002514000
trusted library allocation
page read and write
20ED0000
heap
page read and write
790002F34000
trusted library allocation
page read and write
7900036E4000
trusted library allocation
page read and write
7900031F0000
trusted library allocation
page read and write
5380000AD000
trusted library allocation
page read and write
60A40032C000
trusted library allocation
page read and write
727000
heap
page read and write
5380002E4000
trusted library allocation
page read and write
20EB7000
heap
page read and write
790003E68000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
20EC3000
heap
page read and write
790003B74000
trusted library allocation
page read and write
2D4000308000
direct allocation
page read and write
790002E60000
trusted library allocation
page read and write
8EB000
heap
page read and write
2103D000
heap
page read and write
7900023F4000
trusted library allocation
page read and write
20ED0000
heap
page read and write
53800037C000
trusted library allocation
page read and write
7900036F8000
trusted library allocation
page read and write
22987C98000
heap
page read and write
5380002A4000
trusted library allocation
page read and write
7900036D0000
trusted library allocation
page read and write
53800015C000
trusted library allocation
page read and write
20EBB000
heap
page read and write
32B8002C4000
trusted library allocation
page read and write
22987D58000
heap
page read and write
60A400358000
trusted library allocation
page read and write
790003BA8000
trusted library allocation
page read and write
790003590000
trusted library allocation
page read and write
7900024A4000
trusted library allocation
page read and write
F7C7BFC000
stack
page read and write
538000334000
trusted library allocation
page read and write
22989B43000
heap
page read and write
1D80008F4000
trusted library allocation
page read and write
F7B7BFE000
stack
page read and write
790003160000
trusted library allocation
page read and write
790002318000
trusted library allocation
page read and write
F7B0BFE000
stack
page read and write
61ED0000
direct allocation
page read and write
2D4000230000
direct allocation
page read and write
53800028C000
trusted library allocation
page read and write
32B8002B8000
trusted library allocation
page read and write
538000314000
trusted library allocation
page read and write
60A400210000
trusted library allocation
page read and write
5380000D8000
trusted library allocation
page read and write
53800000C000
trusted library allocation
page read and write
790003E10000
trusted library allocation
page read and write
790003EC4000
trusted library allocation
page read and write
790002E68000
trusted library allocation
page read and write
790003EDC000
trusted library allocation
page read and write
1D80006F4000
trusted library allocation
page read and write
2D4000212000
direct allocation
page read and write
20D4A000
heap
page read and write
5380001EC000
trusted library allocation
page read and write
F7BEBFE000
stack
page read and write
790003E14000
trusted library allocation
page read and write
22989B6C000
heap
page read and write
53800026C000
trusted library allocation
page read and write
7900039F0000
trusted library allocation
page read and write
53800019C000
trusted library allocation
page read and write
790003160000
trusted library allocation
page read and write
2B8BD210000
heap
page read and write
22987C94000
heap
page read and write
35B0002A8000
trusted library allocation
page read and write
53800017C000
trusted library allocation
page read and write
790003A30000
trusted library allocation
page read and write
1D80002FC000
trusted library allocation
page read and write
5380001D8000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
229909C0000
trusted library allocation
page read and write
7900023DC000
trusted library allocation
page read and write
20EC3000
heap
page read and write
790002414000
trusted library allocation
page read and write
790002540000
trusted library allocation
page read and write
79000303C000
trusted library allocation
page read and write
22989B85000
heap
page read and write
1ACC0000
heap
page read and write
4CC000
unkown
page execute and read and write
790003550000
trusted library allocation
page read and write
20EC3000
heap
page read and write
79000254C000
trusted library allocation
page read and write
79000350E000
trusted library allocation
page read and write
400000
unkown
page readonly
790003EC8000
trusted library allocation
page read and write
20EB0000
heap
page read and write
790003BF4000
trusted library allocation
page read and write
790003BCC000
trusted library allocation
page read and write
79000254C000
trusted library allocation
page read and write
20EBC000
heap
page read and write
2B8BCB29000
heap
page read and write
790003BBC000
trusted library allocation
page read and write
1D80007E0000
trusted library allocation
page read and write
790003D24000
trusted library allocation
page read and write
53800029C000
trusted library allocation
page read and write
790002318000
trusted library allocation
page read and write
538000214000
trusted library allocation
page read and write
7900039CC000
trusted library allocation
page read and write
35B0002A8000
trusted library allocation
page read and write
60A40031C000
trusted library allocation
page read and write
538000264000
trusted library allocation
page read and write
53800006C000
trusted library allocation
page read and write
20FB0000
heap
page read and write
20FD5000
heap
page read and write
32B8002A0000
trusted library allocation
page read and write
60A400284000
trusted library allocation
page read and write
79000254C000
trusted library allocation
page read and write
790003F50000
trusted library allocation
page read and write
60A400430000
trusted library allocation
page read and write
20ED0000
heap
page read and write
20EB0000
heap
page read and write
35B0002B4000
trusted library allocation
page read and write
7900034FC000
trusted library allocation
page read and write
7900038F4000
trusted library allocation
page read and write
1D8000728000
trusted library allocation
page read and write
790002E50000
trusted library allocation
page read and write
20FF2000
heap
page read and write
5380002CC000
trusted library allocation
page read and write
5380001DC000
trusted library allocation
page read and write
20EAD000
heap
page read and write
20EB9000
heap
page read and write
7900031E4000
trusted library allocation
page read and write
790003984000
trusted library allocation
page read and write
20ED9000
heap
page read and write
20E94000
heap
page read and write
2D40002D0000
direct allocation
page read and write
790002560000
trusted library allocation
page read and write
60A400201000
trusted library allocation
page read and write
5380001F0000
trusted library allocation
page read and write
53800040C000
trusted library allocation
page read and write
790003A50000
trusted library allocation
page read and write
790003691000
trusted library allocation
page read and write
1D800078C000
trusted library allocation
page read and write
22987C5C000
heap
page read and write
790003974000
trusted library allocation
page read and write
5380002F0000
trusted library allocation
page read and write
22987D30000
heap
page read and write
60A400310000
trusted library allocation
page read and write
22987CF0000
heap
page read and write
212A4000
heap
page read and write
2B8BCB24000
heap
page read and write
20EC3000
heap
page read and write
968000
heap
page read and write
5380002B0000
trusted library allocation
page read and write
60A4003CC000
trusted library allocation
page read and write
7900036D0000
trusted library allocation
page read and write
7900024A4000
trusted library allocation
page read and write
790003E84000
trusted library allocation
page read and write
F7B4BFC000
stack
page read and write
60A40027C000
trusted library allocation
page read and write
790003A7C000
trusted library allocation
page read and write
2D40002AC000
direct allocation
page read and write
20EAE000
heap
page read and write
22987A70000
heap
page read and write
20EAE000
heap
page read and write
20EAE000
heap
page read and write
790003730000
trusted library allocation
page read and write
2B8BCB34000
heap
page read and write
212A0000
heap
page read and write
790003B88000
trusted library allocation
page read and write
790003228000
trusted library allocation
page read and write
790002FB0000
trusted library allocation
page read and write
22987CA0000
heap
page read and write
790002514000
trusted library allocation
page read and write
60A400320000
trusted library allocation
page read and write
21090000
trusted library allocation
page read and write
1A8BE000
stack
page read and write
32B8002A8000
trusted library allocation
page read and write
1D800071C000
trusted library allocation
page read and write
60A4003A8000
trusted library allocation
page read and write
8FD000
heap
page read and write
790002F34000
trusted library allocation
page read and write
790003DD4000
trusted library allocation
page read and write
2B8BCB2D000
heap
page read and write
35B0002B4000
trusted library allocation
page read and write
790003964000
trusted library allocation
page read and write
790002410000
trusted library allocation
page read and write
538000240000
trusted library allocation
page read and write
35B0002B4000
trusted library allocation
page read and write
20EBA000
heap
page read and write
790003590000
trusted library allocation
page read and write
7900031F0000
trusted library allocation
page read and write
1D800079C000
trusted library allocation
page read and write
1D80006C8000
trusted library allocation
page read and write
1A5DF000
stack
page read and write
538000324000
trusted library allocation
page read and write
F7C03FE000
unkown
page readonly
20EBA000
heap
page read and write
790003588000
trusted library allocation
page read and write
1D8000424000
trusted library allocation
page read and write
7900025B4000
trusted library allocation
page read and write
32B8002A8000
trusted library allocation
page read and write
20FD7000
heap
page read and write
F7C2BFE000
stack
page read and write
20EBC000
heap
page read and write
6C5C2000
unkown
page readonly
60A4002D0000
trusted library allocation
page read and write
20ED9000
heap
page read and write
1D8000974000
trusted library allocation
page read and write
790002554000
trusted library allocation
page read and write
790003A34000
trusted library allocation
page read and write
7900039B4000
trusted library allocation
page read and write
790002E68000
trusted library allocation
page read and write
790002CF8000
trusted library allocation
page read and write
35B000294000
trusted library allocation
page read and write
35B0002B4000
trusted library allocation
page read and write
20EB2000
heap
page read and write
790002F34000
trusted library allocation
page read and write
1D800039C000
trusted library allocation
page read and write
2340000
heap
page read and write
1D800091C000
trusted library allocation
page read and write
790003188000
trusted library allocation
page read and write
1D80007C0000
trusted library allocation
page read and write
35B000264000
trusted library allocation
page read and write
1D8000844000
trusted library allocation
page read and write
22989B8D000
heap
page read and write
538000488000
trusted library allocation
page read and write
538000250000
trusted library allocation
page read and write
538000314000
trusted library allocation
page read and write
2B8BCB28000
heap
page read and write
790003564000
trusted library allocation
page read and write
35B000294000
trusted library allocation
page read and write
790003BF0000
trusted library allocation
page read and write
35B000230000
trusted library allocation
page read and write
2B8BCB1E000
heap
page read and write
F7C5BFE000
stack
page read and write
790003F04000
trusted library allocation
page read and write
53800023C000
trusted library allocation
page read and write
60A400360000
trusted library allocation
page read and write
7900024A4000
trusted library allocation
page read and write
7900034D4000
trusted library allocation
page read and write
22989B0F000
heap
page read and write
538000024000
trusted library allocation
page read and write
790003BB4000
trusted library allocation
page read and write
5380003A4000
trusted library allocation
page read and write
2B8BCB34000
heap
page read and write
538000260000
trusted library allocation
page read and write
211FF000
stack
page read and write
60A400380000
trusted library allocation
page read and write
2B8BD208000
heap
page read and write
22991E02000
heap
page read and write
2D4000220000
direct allocation
page read and write
79000252C000
trusted library allocation
page read and write
20EAE000
heap
page read and write
79000393C000
trusted library allocation
page read and write
790003778000
trusted library allocation
page read and write
60A4002C4000
trusted library allocation
page read and write
22989B92000
heap
page read and write
20FDD000
heap
page read and write
60A40025C000
trusted library allocation
page read and write
1D80008C4000
trusted library allocation
page read and write
5380001E8000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
790002F7C000
trusted library allocation
page read and write
790002DB8000
trusted library allocation
page read and write
7900023F8000
trusted library allocation
page read and write
973000
heap
page read and write
22987B70000
heap
page read and write
20EC3000
heap
page read and write
20ED0000
heap
page read and write
790003098000
trusted library allocation
page read and write
35B0002E4000
trusted library allocation
page read and write
2B8BFBAE000
heap
page read and write
79000254C000
trusted library allocation
page read and write
790003B18000
trusted library allocation
page read and write
790002E60000
trusted library allocation
page read and write
60A4002F1000
trusted library allocation
page read and write
1D80006C8000
trusted library allocation
page read and write
790002BCD000
trusted library allocation
page read and write
1D80008A8000
trusted library allocation
page read and write
F7B73FE000
unkown
page readonly
2D40002EC000
direct allocation
page read and write
790002560000
trusted library allocation
page read and write
790002D38000
trusted library allocation
page read and write
790003794000
trusted library allocation
page read and write
790003734000
trusted library allocation
page read and write
22991E00000
heap
page read and write
538000040000
trusted library allocation
page read and write
1D800060C000
trusted library allocation
page read and write
790002F7C000
trusted library allocation
page read and write
35B0002A8000
trusted library allocation
page read and write
60A400338000
trusted library allocation
page read and write
5380001C4000
trusted library allocation
page read and write
5380002D8000
trusted library allocation
page read and write
538000401000
trusted library allocation
page read and write
790003BA0000
trusted library allocation
page read and write
32B8002A8000
trusted library allocation
page read and write
79000340C000
trusted library allocation
page read and write
538000464000
trusted library allocation
page read and write
20EC3000
heap
page read and write
35B000220000
trusted library allocation
page read and write
20EA1000
heap
page read and write
21298000
heap
page read and write
538000244000
trusted library allocation
page read and write
2D4000316000
direct allocation
page read and write
790003C24000
trusted library allocation
page read and write
79000357A000
trusted library allocation
page read and write
790003134000
trusted library allocation
page read and write
22987B50000
heap
page readonly
35B000210000
trusted library allocation
page read and write
20ED0000
heap
page read and write
5380002C0000
trusted library allocation
page read and write
5380002F0000
trusted library allocation
page read and write
538000001000
trusted library allocation
page read and write
2B8BCB2E000
heap
page read and write
35B0002B4000
trusted library allocation
page read and write
79000254C000
trusted library allocation
page read and write
60A4002D8000
trusted library allocation
page read and write
229909C0000
trusted library allocation
page read and write
538000368000
trusted library allocation
page read and write
790003BA4000
trusted library allocation
page read and write
79000399C000
trusted library allocation
page read and write
2D4000260000
direct allocation
page read and write
F7C13FE000
unkown
page readonly
790003188000
trusted library allocation
page read and write
20EAE000
heap
page read and write
22987C13000
heap
page read and write
F7AABFE000
stack
page read and write
538000394000
trusted library allocation
page read and write
1AB0E000
stack
page read and write
60A400220000
trusted library allocation
page read and write
7900036D0000
trusted library allocation
page read and write
790003930000
trusted library allocation
page read and write
790003A6C000
trusted library allocation
page read and write
7900031B4000
trusted library allocation
page read and write
22989B2F000
heap
page read and write
790003518000
trusted library allocation
page read and write
790003FA4000
trusted library allocation
page read and write
1ACD0000
heap
page read and write
79000254C000
trusted library allocation
page read and write
790003908000
trusted library allocation
page read and write
790002ED0000
trusted library allocation
page read and write
790003784000
trusted library allocation
page read and write
35B000288000
trusted library allocation
page read and write
22987C9E000
heap
page read and write
790003504000
trusted library allocation
page read and write
790003EBC000
trusted library allocation
page read and write
F7C4BFE000
stack
page read and write
790003248000
trusted library allocation
page read and write
53800048C000
trusted library allocation
page read and write
20ED0000
heap
page read and write
538000268000
trusted library allocation
page read and write
790002520000
trusted library allocation
page read and write
7900024A4000
trusted library allocation
page read and write
790003AF8000
trusted library allocation
page read and write
1D80007E4000
trusted library allocation
page read and write
790002560000
trusted library allocation
page read and write
22987D02000
heap
page read and write
790002680000
trusted library allocation
page read and write
538000234000
trusted library allocation
page read and write
790003518000
trusted library allocation
page read and write
20EB0000
heap
page read and write
35B000260000
trusted library allocation
page read and write
22987C98000
heap
page read and write
F7AB3FE000
unkown
page readonly
22989B39000
heap
page read and write
79000355F000
trusted library allocation
page read and write
790003190000
trusted library allocation
page read and write
790003541000
trusted library allocation
page read and write
567000
unkown
page execute and read and write
725000
heap
page read and write
790003B60000
trusted library allocation
page read and write
32B8002C4000
trusted library allocation
page read and write
20EB0000
heap
page read and write
538000310000
trusted library allocation
page read and write
F7A83FE000
unkown
page readonly
790003AC4000
trusted library allocation
page read and write
F7C3BFE000
stack
page read and write
22987C2B000
heap
page read and write
790002418000
trusted library allocation
page read and write
60A4003AC000
trusted library allocation
page read and write
20E9D000
heap
page read and write
790003E8C000
trusted library allocation
page read and write
6C7B5000
unkown
page readonly
5380003BC000
trusted library allocation
page read and write
790003518000
trusted library allocation
page read and write
1ACD1000
heap
page read and write
79000242C000
trusted library allocation
page read and write
F7A7BFF000
unkown
page read and write
60A400344000
trusted library allocation
page read and write
7900024E0000
trusted library allocation
page read and write
22987C94000
heap
page read and write
790003D24000
trusted library allocation
page read and write
2B8BFBB5000
heap
page read and write
790003D64000
trusted library allocation
page read and write
790003A38000
trusted library allocation
page read and write
32B8002C4000
trusted library allocation
page read and write
538000238000
trusted library allocation
page read and write
20EAE000
heap
page read and write
790003134000
trusted library allocation
page read and write
790003AA0000
trusted library allocation
page read and write
20ED2000
heap
page read and write
20FD1000
heap
page read and write
20EDE000
heap
page read and write
790003124000
trusted library allocation
page read and write
22989BB6000
heap
page read and write
7900034AC000
trusted library allocation
page read and write
790003DC4000
trusted library allocation
page read and write
790003098000
trusted library allocation
page read and write
5380003F0000
trusted library allocation
page read and write
20EAE000
heap
page read and write
880000
heap
page read and write
790003EA8000
trusted library allocation
page read and write
538000270000
trusted library allocation
page read and write
35B000304000
trusted library allocation
page read and write
790003ABC000
trusted library allocation
page read and write
790002554000
trusted library allocation
page read and write
6C531000
unkown
page execute read
1D80008F0000
trusted library allocation
page read and write
22987D61000
heap
page read and write
790003B9C000
trusted library allocation
page read and write
538000288000
trusted library allocation
page read and write
35B000274000
trusted library allocation
page read and write
1D80008EC000
trusted library allocation
page read and write
35B0002C8000
trusted library allocation
page read and write
20EB4000
heap
page read and write
22987BE0000
trusted library section
page readonly
20EA3000
heap
page read and write
F7B6BFD000
stack
page read and write
912000
heap
page read and write
538000024000
trusted library allocation
page read and write
1D80007D0000
trusted library allocation
page read and write
790003968000
trusted library allocation
page read and write
22987C9C000
heap
page read and write
There are 1223 hidden memdumps, click here to show them.