IOC Report
hD7SED8r8Q.exe

loading gif

Files

File Path
Type
Category
Malicious
hD7SED8r8Q.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_hD7SED8r8Q.exe_20ec510959d4c9448f15cfb0a4d792dc4617c5_18bd12ec_0f159eb5-ede8-4f7b-b823-7d001891de32\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBFIIEHJDBKJKECBFHDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBKJKJDBFIIDHJKEHJEHIIIDAK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GIIIECBGDHJJKFIDAKJD
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\HDGCAAFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\IIJDBGDGCGDAKFIDGIDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJECGCBGDBKJJKEBFBFHJEBGDG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKFHIIEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB08.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Dec 9 17:37:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC42.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC81.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\346fc93c-8ec2-4985-83f2-320958992df4.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\778ba0a0-d87f-47a7-80c1-ac6c1f3377c0.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\95d721ca-edee-495c-8d77-d89a51dc827f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67572ACA-1FE0.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35cb7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35e7c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF36d80.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF36d90.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c35eb88d-a55b-4a4d-ae18-70dd97a51db8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f82ec84f-3e3a-46b8-afdf-c1d0df31a541.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 16:37:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 16:37:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 16:37:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 16:37:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 16:37:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 105
ASCII text, with very long lines (781)
downloaded
Chrome Cache Entry: 106
ASCII text
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (65531)
downloaded
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hD7SED8r8Q.exe
"C:\Users\user\Desktop\hD7SED8r8Q.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 --field-trial-handle=2152,i,11304397797902853862,3693025574854987503,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=2140,i,2263842857995782028,11139963313710936847,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=2184,i,17756367075869404674,2129531162182908309,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 2356

URLs

Name
IP
Malicious
http://45.91.201.185/20aa6cac9e2233ef/freebl3.dll
45.91.201.185
malicious
http://45.91.201.185/e3e098fc1797439d.php
45.91.201.185
malicious
http://45.91.201.185
unknown
malicious
http://45.91.201.185/20aa6cac9e2233ef/sqlite3.dllu
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://issuetracker.google.com/284462263
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
http://45.91.201.185/20aa6cac9e2233ef/vcruntime140.dllE
unknown
https://anglebug.com/7714
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6248
unknown
http://45.91.201.185/20aa6cac9e2233ef/vcruntime140.dllV
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://issuetracker.google.com/255411748
unknown
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
http://45.91.201.185/20aa6cac9e2233ef/nss3.dllFi
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://anglebug.com/7556
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://45.91.201.185/20aa6cac9e2233ef/nss3.dll;
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://msn.com/
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
https://permanently-removed.invalid/MergeSession
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68

IPs

IP
Domain
Country
Malicious
45.91.201.185
unknown
Netherlands
malicious
192.168.2.5
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
ProgramId
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
FileId
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
LowerCaseLongPath
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
LongPathHash
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
Name
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
OriginalFileName
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
Publisher
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
Version
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
BinFileVersion
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
BinaryType
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
ProductName
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
ProductVersion
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
LinkDate
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
BinProductVersion
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
AppxPackageFullName
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
AppxPackageRelativeId
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
Size
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
Language
\REGISTRY\A\{fece7a33-3311-684a-94ae-36c454eccac5}\Root\InventoryApplicationFile\hd7sed8r8q.exe|ac0dc405e22b5254
Usn
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
7D0000
direct allocation
page execute and read and write
malicious
920000
direct allocation
page read and write
malicious
82E000
heap
page read and write
malicious
FC0024A4000
trusted library allocation
page read and write
79B8002D0000
direct allocation
page read and write
FC003934000
trusted library allocation
page read and write
1DC84925000
heap
page read and write
240009B0000
heap
page read and write
FC003A3C000
trusted library allocation
page read and write
FC0038BC000
trusted library allocation
page read and write
9233000
heap
page read and write
FC003544000
trusted library allocation
page read and write
9227000
heap
page read and write
79B80021C000
direct allocation
page read and write
79B800280000
direct allocation
page read and write
FC00368C000
trusted library allocation
page read and write
2598001EC000
trusted library allocation
page read and write
3DA800390000
trusted library allocation
page read and write
7D04002A8000
trusted library allocation
page read and write
88E000
heap
page read and write
FC0024A4000
trusted library allocation
page read and write
FC00356E000
trusted library allocation
page read and write
9233000
heap
page read and write
FC00397C000
trusted library allocation
page read and write
FC003B90000
trusted library allocation
page read and write
FC0031EC000
trusted library allocation
page read and write
FC00354D000
trusted library allocation
page read and write
3031000
heap
page read and write
79B8002EC000
direct allocation
page read and write
2598003D0000
trusted library allocation
page read and write
FC003930000
trusted library allocation
page read and write
24005BD0000
trusted library allocation
page read and write
24002984000
heap
page read and write
24002959000
heap
page read and write
1DC81409000
heap
page read and write
FC0039F0000
trusted library allocation
page read and write
24000960000
heap
page read and write
1DC84923000
heap
page read and write
24002997000
heap
page read and write
FC002500000
trusted library allocation
page read and write
3DA800230000
trusted library allocation
page read and write
FC0023B4000
trusted library allocation
page read and write
FC002428000
trusted library allocation
page read and write
25980040C000
trusted library allocation
page read and write
24000A5F000
heap
page read and write
259800258000
trusted library allocation
page read and write
259800040000
trusted library allocation
page read and write
FC002EC4000
trusted library allocation
page read and write
FC0024C4000
trusted library allocation
page read and write
FC002540000
trusted library allocation
page read and write
9220000
heap
page read and write
1DC84925000
heap
page read and write
79B800212000
direct allocation
page read and write
FC003B20000
trusted library allocation
page read and write
FC0038C0000
trusted library allocation
page read and write
FC003BF4000
trusted library allocation
page read and write
9B0000
heap
page read and write
FC00349C000
trusted library allocation
page read and write
24002986000
heap
page read and write
24000A5F000
heap
page read and write
2400AC00000
heap
page read and write
FC003C18000
trusted library allocation
page read and write
259800238000
trusted library allocation
page read and write
FC003585000
trusted library allocation
page read and write
FC003150000
trusted library allocation
page read and write
58C4007C0000
trusted library allocation
page read and write
FC0031EC000
trusted library allocation
page read and write
58C4008F4000
trusted library allocation
page read and write
FC0040B8000
trusted library allocation
page read and write
401000
unkown
page execute read
3DA800338000
trusted library allocation
page read and write
FC00380C000
trusted library allocation
page read and write
921E000
heap
page read and write
24000ABA000
heap
page read and write
259800180000
trusted library allocation
page read and write
FC0024A4000
trusted library allocation
page read and write
FC003F58000
trusted library allocation
page read and write
79B800308000
direct allocation
page read and write
6C7CE000
unkown
page read and write
FC002EB4000
trusted library allocation
page read and write
C6375FE000
unkown
page readonly
921E000
heap
page read and write
FC00241C000
trusted library allocation
page read and write
3DA800358000
trusted library allocation
page read and write
259800104000
trusted library allocation
page read and write
24002921000
heap
page read and write
FC003E68000
trusted library allocation
page read and write
58C400844000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
FC002654000
trusted library allocation
page read and write
1DC8492B000
heap
page read and write
FC002500000
trusted library allocation
page read and write
FC0038BC000
trusted library allocation
page read and write
FC0038D4000
trusted library allocation
page read and write
24000990000
heap
page readonly
FC003BD4000
trusted library allocation
page read and write
7D0400210000
trusted library allocation
page read and write
FC0039B0000
trusted library allocation
page read and write
24000A52000
heap
page read and write
FC002654000
trusted library allocation
page read and write
917000
heap
page read and write
FC003A6C000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
9220000
heap
page read and write
933E000
heap
page read and write
FC004140000
trusted library allocation
page read and write
FC003654000
trusted library allocation
page read and write
9200000
heap
page read and write
9220000
heap
page read and write
7CE000
stack
page read and write
FC003750000
trusted library allocation
page read and write
FC003E40000
trusted library allocation
page read and write
58C4008A8000
trusted library allocation
page read and write
FC0034EC000
trusted library allocation
page read and write
FC003DE0000
trusted library allocation
page read and write
3DA80032C000
trusted library allocation
page read and write
FC002658000
trusted library allocation
page read and write
9233000
heap
page read and write
FC0039B8000
trusted library allocation
page read and write
FC00252C000
trusted library allocation
page read and write
C6475FE000
unkown
page readonly
C6535FE000
unkown
page readonly
1DC8142E000
heap
page read and write
FC003520000
trusted library allocation
page read and write
2598002DC000
trusted library allocation
page read and write
FC002EB4000
trusted library allocation
page read and write
58C400868000
trusted library allocation
page read and write
FC003EB4000
trusted library allocation
page read and write
25980037C000
trusted library allocation
page read and write
FC0038DC000
trusted library allocation
page read and write
FC00369C000
trusted library allocation
page read and write
3DA800250000
trusted library allocation
page read and write
FC002654000
trusted library allocation
page read and write
FC003BE0000
trusted library allocation
page read and write
C63FDFE000
stack
page read and write
9220000
heap
page read and write
1DC84923000
heap
page read and write
2598003C0000
trusted library allocation
page read and write
9238000
heap
page read and write
1DC8491C000
heap
page read and write
9342000
heap
page read and write
FC003178000
trusted library allocation
page read and write
58C40087C000
trusted library allocation
page read and write
FC00340C000
trusted library allocation
page read and write
FC003D68000
trusted library allocation
page read and write
FC0024C4000
trusted library allocation
page read and write
58C4002FC000
trusted library allocation
page read and write
8BF000
heap
page read and write
2E8D000
stack
page read and write
C643DFE000
stack
page read and write
C64F5FE000
unkown
page readonly
FC003DD0000
trusted library allocation
page read and write
1DC8141F000
heap
page read and write
25980014C000
trusted library allocation
page read and write
79B800260000
direct allocation
page read and write
24002986000
heap
page read and write
9B000
stack
page read and write
C62FDF3000
stack
page read and write
C6595FE000
unkown
page readonly
58C40039C000
trusted library allocation
page read and write
3DA800430000
trusted library allocation
page read and write
7D04002A8000
trusted library allocation
page read and write
FC0023D8000
trusted library allocation
page read and write
24002977000
heap
page read and write
1DC8142A000
heap
page read and write
3DA8003AC000
trusted library allocation
page read and write
FC002DF0000
trusted library allocation
page read and write
C64D5FE000
unkown
page readonly
FC0036B2000
trusted library allocation
page read and write
25980040F000
trusted library allocation
page read and write
3DA80031C000
trusted library allocation
page read and write
3DA8002A4000
trusted library allocation
page read and write
259800354000
trusted library allocation
page read and write
7D0400274000
trusted library allocation
page read and write
58C4006C8000
trusted library allocation
page read and write
920D000
heap
page read and write
FC003514000
trusted library allocation
page read and write
3DA80020C000
trusted library allocation
page read and write
1DC8492F000
heap
page read and write
FC003750000
trusted library allocation
page read and write
2503000
heap
page read and write
58C400884000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
9233000
heap
page read and write
2598000AC000
trusted library allocation
page read and write
259800220000
trusted library allocation
page read and write
FC002540000
trusted library allocation
page read and write
FC003F1C000
trusted library allocation
page read and write
10090000
heap
page read and write
240029A8000
heap
page read and write
922C000
heap
page read and write
3DA8003A0000
trusted library allocation
page read and write
3DA800338000
trusted library allocation
page read and write
FC003B6C000
trusted library allocation
page read and write
1DC84924000
heap
page read and write
FC003150000
trusted library allocation
page read and write
FC003270000
trusted library allocation
page read and write
58C400778000
trusted library allocation
page read and write
FC003E5C000
trusted library allocation
page read and write
58C4008E8000
trusted library allocation
page read and write
FC003520000
trusted library allocation
page read and write
FC0023E0000
trusted library allocation
page read and write
259800284000
trusted library allocation
page read and write
24002984000
heap
page read and write
FC002ECC000
trusted library allocation
page read and write
FC0033AC000
trusted library allocation
page read and write
9240000
heap
page read and write
2598002C4000
trusted library allocation
page read and write
24002995000
heap
page read and write
FC0023E4000
trusted library allocation
page read and write
2598002F4000
trusted library allocation
page read and write
FC0034F8000
trusted library allocation
page read and write
FC0039A0000
trusted library allocation
page read and write
FC003E0C000
trusted library allocation
page read and write
FC002ECC000
trusted library allocation
page read and write
3030000
heap
page read and write
259800340000
trusted library allocation
page read and write
FC003C2C000
trusted library allocation
page read and write
2598001E0000
trusted library allocation
page read and write
240009D0000
heap
page read and write
61ED4000
direct allocation
page readonly
FC0038F4000
trusted library allocation
page read and write
7D0400294000
trusted library allocation
page read and write
9220000
heap
page read and write
FC003FD4000
trusted library allocation
page read and write
C6505FE000
unkown
page readonly
259800068000
trusted library allocation
page read and write
FC003B00000
trusted library allocation
page read and write
24002813000
heap
page read and write
9213000
heap
page read and write
6E6C002A8000
trusted library allocation
page read and write
58C400830000
trusted library allocation
page read and write
192000
stack
page read and write
259800228000
trusted library allocation
page read and write
259800050000
trusted library allocation
page read and write
25980023C000
trusted library allocation
page read and write
FC002DF0000
trusted library allocation
page read and write
2400297E000
heap
page read and write
6E6C002C8000
trusted library allocation
page read and write
FC00366C000
trusted library allocation
page read and write
FC0040F4000
trusted library allocation
page read and write
58C400850000
trusted library allocation
page read and write
FC003270000
trusted library allocation
page read and write
9211000
heap
page read and write
FC002EB4000
trusted library allocation
page read and write
932B000
heap
page read and write
58C40091C000
trusted library allocation
page read and write
79B800311000
direct allocation
page read and write
3DA8003C4000
trusted library allocation
page read and write
FC003F18000
trusted library allocation
page read and write
7D04002FC000
trusted library allocation
page read and write
1DC8491E000
heap
page read and write
1DC8491E000
heap
page read and write
259800214000
trusted library allocation
page read and write
2400297E000
heap
page read and write
2598003B0000
trusted library allocation
page read and write
FC002C54000
trusted library allocation
page read and write
FC00240C000
trusted library allocation
page read and write
FC0038D0000
trusted library allocation
page read and write
1DC8491A000
heap
page read and write
C631DFF000
stack
page read and write
C63E5FE000
unkown
page readonly
24002986000
heap
page read and write
25980024C000
trusted library allocation
page read and write
24000A9A000
heap
page read and write
FC003B40000
trusted library allocation
page read and write
259800024000
trusted library allocation
page read and write
FC0038CC000
trusted library allocation
page read and write
FC003184000
trusted library allocation
page read and write
FC0023F0000
trusted library allocation
page read and write
FC00390C000
trusted library allocation
page read and write
3DA80032C000
trusted library allocation
page read and write
6E6C002B8000
trusted library allocation
page read and write
6E6C002B8000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
259800314000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
FC003EC8000
trusted library allocation
page read and write
8CC000
heap
page read and write
3DA800284000
trusted library allocation
page read and write
2400291F000
heap
page read and write
FC003BA0000
trusted library allocation
page read and write
6E6C002A0000
trusted library allocation
page read and write
921E000
heap
page read and write
9240000
heap
page read and write
FC0031BC000
trusted library allocation
page read and write
7D04002F8000
trusted library allocation
page read and write
9249000
heap
page read and write
FC002ECC000
trusted library allocation
page read and write
24000B2B000
heap
page read and write
FC002538000
trusted library allocation
page read and write
313F000
heap
page read and write
9220000
heap
page read and write
FC002500000
trusted library allocation
page read and write
2598001F4000
trusted library allocation
page read and write
24000AA6000
heap
page read and write
58C40078C000
trusted library allocation
page read and write
FC002538000
trusted library allocation
page read and write
58C40070C000
trusted library allocation
page read and write
2400291A000
heap
page read and write
720000
heap
page read and write
6E6C002A8000
trusted library allocation
page read and write
FC003F00000
trusted library allocation
page read and write
FC003AB0000
trusted library allocation
page read and write
C6365FE000
unkown
page readonly
FC0031EC000
trusted library allocation
page read and write
7D04002A8000
trusted library allocation
page read and write
9229000
heap
page read and write
FC002430000
trusted library allocation
page read and write
79B800303000
direct allocation
page read and write
58C40071C000
trusted library allocation
page read and write
2598002F4000
trusted library allocation
page read and write
6F8F2000
unkown
page readonly
FC003590000
trusted library allocation
page read and write
FC00259C000
trusted library allocation
page read and write
259800201000
trusted library allocation
page read and write
C64EDFE000
stack
page read and write
1062E000
heap
page read and write
9233000
heap
page read and write
9240000
heap
page read and write
FC0035E9000
trusted library allocation
page read and write
C63CDFC000
stack
page read and write
FC003586000
trusted library allocation
page read and write
FC0023D0000
trusted library allocation
page read and write
240029C4000
heap
page read and write
9241000
heap
page read and write
9228000
heap
page read and write
FC003178000
trusted library allocation
page read and write
FC003BEC000
trusted library allocation
page read and write
FC003AAC000
trusted library allocation
page read and write
FC00349C000
trusted library allocation
page read and write
79B80030A000
direct allocation
page read and write
2598001D8000
trusted library allocation
page read and write
58C40060C000
trusted library allocation
page read and write
6C5F1000
unkown
page execute read
2D8E000
stack
page read and write
79B800217000
direct allocation
page read and write
24000A9E000
heap
page read and write
9233000
heap
page read and write
FC003284000
trusted library allocation
page read and write
FC003A40000
trusted library allocation
page read and write
259800368000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
C658DFE000
stack
page read and write
9249000
heap
page read and write
FC003ED4000
trusted library allocation
page read and write
58C40080C000
trusted library allocation
page read and write
25980015C000
trusted library allocation
page read and write
FC002D40000
trusted library allocation
page read and write
921A000
heap
page read and write
58C4006E8000
trusted library allocation
page read and write
24002980000
heap
page read and write
FC003AA8000
trusted library allocation
page read and write
FC0031C8000
trusted library allocation
page read and write
58C400890000
trusted library allocation
page read and write
7D04002F0000
trusted library allocation
page read and write
1F0000
heap
page read and write
FC0024F0000
trusted library allocation
page read and write
79B8002AC000
direct allocation
page read and write
FC0024A4000
trusted library allocation
page read and write
C6325FE000
unkown
page readonly
C64ADFE000
stack
page read and write
61E01000
direct allocation
page execute read
FC002540000
trusted library allocation
page read and write
6E6C002A8000
trusted library allocation
page read and write
2598000AE000
trusted library allocation
page read and write
1DC8142A000
heap
page read and write
FC003E6C000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
3DA800360000
trusted library allocation
page read and write
58C400408000
trusted library allocation
page read and write
785000
heap
page read and write
FC002658000
trusted library allocation
page read and write
259800024000
trusted library allocation
page read and write
7D04002B8000
trusted library allocation
page read and write
FC003264000
trusted library allocation
page read and write
24000A98000
heap
page read and write
3DA8003C0000
trusted library allocation
page read and write
6E6C002C4000
trusted library allocation
page read and write
2598002E8000
trusted library allocation
page read and write
FC00260C000
trusted library allocation
page read and write
946E000
stack
page read and write
FC002F58000
trusted library allocation
page read and write
1DC84E3D000
heap
page read and write
2598002D0000
trusted library allocation
page read and write
24002959000
heap
page read and write
7D0400230000
trusted library allocation
page read and write
FC003EE0000
trusted library allocation
page read and write
24002992000
heap
page read and write
FC00254C000
trusted library allocation
page read and write
FC003F3C000
trusted library allocation
page read and write
FC002ECC000
trusted library allocation
page read and write
1DC8141F000
heap
page read and write
9240000
heap
page read and write
6C7CF000
unkown
page write copy
24002923000
heap
page read and write
FC0040FC000
trusted library allocation
page read and write
FC003270000
trusted library allocation
page read and write
1DC84E3B000
heap
page read and write
921E000
heap
page read and write
FC003ECC000
trusted library allocation
page read and write
24000B02000
heap
page read and write
2598000BC000
trusted library allocation
page read and write
9220000
heap
page read and write
58C4007AC000
trusted library allocation
page read and write
1DC84DC0000
heap
page read and write
EF000234000
direct allocation
page read and write
1DC8492B000
heap
page read and write
58C400248000
trusted library allocation
page read and write
FC003270000
trusted library allocation
page read and write
458000
unkown
page write copy
259800264000
trusted library allocation
page read and write
FC003500000
trusted library allocation
page read and write
FC00357C000
trusted library allocation
page read and write
FC004204000
trusted library allocation
page read and write
240029C4000
heap
page read and write
FC002538000
trusted library allocation
page read and write
C652DFD000
stack
page read and write
FC003348000
trusted library allocation
page read and write
6F860000
unkown
page readonly
FC0024A4000
trusted library allocation
page read and write
C633DFE000
stack
page read and write
259800270000
trusted library allocation
page read and write
FC003678000
trusted library allocation
page read and write
6E6C002B8000
trusted library allocation
page read and write
FC003EAC000
trusted library allocation
page read and write
9220000
heap
page read and write
24002980000
heap
page read and write
9224000
heap
page read and write
9221000
heap
page read and write
FC003B74000
trusted library allocation
page read and write
259800120000
trusted library allocation
page read and write
9398000
heap
page read and write
FC002E98000
trusted library allocation
page read and write
259800324000
trusted library allocation
page read and write
24000B58000
heap
page read and write
FC003B18000
trusted library allocation
page read and write
FC00260C000
trusted library allocation
page read and write
1DC8492F000
heap
page read and write
2B4F000
stack
page read and write
FC003659000
trusted library allocation
page read and write
921E000
heap
page read and write
9220000
heap
page read and write
240035C0000
unkown
page read and write
7D0400264000
trusted library allocation
page read and write
259800280000
trusted library allocation
page read and write
FC002D80000
trusted library allocation
page read and write
259800224000
trusted library allocation
page read and write
25980026C000
trusted library allocation
page read and write
FC002658000
trusted library allocation
page read and write
FC003140000
trusted library allocation
page read and write
2400291B000
heap
page read and write
FC002ECC000
trusted library allocation
page read and write
FC004098000
trusted library allocation
page read and write
3DA800374000
trusted library allocation
page read and write
7D0400294000
trusted library allocation
page read and write
58C400848000
trusted library allocation
page read and write
240029A8000
heap
page read and write
24002920000
heap
page read and write
58C4006F4000
trusted library allocation
page read and write
3DA800404000
trusted library allocation
page read and write
FC0038F0000
trusted library allocation
page read and write
24000AA6000
heap
page read and write
259800334000
trusted library allocation
page read and write
FC003988000
trusted library allocation
page read and write
24000A7C000
heap
page read and write
1DC8492B000
heap
page read and write
2598000E4000
trusted library allocation
page read and write
FC0024B8000
trusted library allocation
page read and write
FC003094000
trusted library allocation
page read and write
249E000
stack
page read and write
FC0026D4000
trusted library allocation
page read and write
FC003EB0000
trusted library allocation
page read and write
79B800284000
direct allocation
page read and write
FC003EF0000
trusted library allocation
page read and write
259800190000
trusted library allocation
page read and write
10B30000
heap
page read and write
3DA800380000
trusted library allocation
page read and write
9347000
heap
page read and write
58C4008C4000
trusted library allocation
page read and write
920D000
heap
page read and write
FC003ADC000
trusted library allocation
page read and write
24000AE2000
heap
page read and write
FC003535000
trusted library allocation
page read and write
FC00259C000
trusted library allocation
page read and write
FC0034EC000
trusted library allocation
page read and write
FC00352C000
trusted library allocation
page read and write
FC003BB8000
trusted library allocation
page read and write
FC002410000
trusted library allocation
page read and write
FC002500000
trusted library allocation
page read and write
7D04002A8000
trusted library allocation
page read and write
FC003E84000
trusted library allocation
page read and write
FC003A0C000
trusted library allocation
page read and write
6E6C002A0000
trusted library allocation
page read and write
FC003150000
trusted library allocation
page read and write
FC00404C000
trusted library allocation
page read and write
FC002538000
trusted library allocation
page read and write
FC0039E0000
trusted library allocation
page read and write
3DA800238000
trusted library allocation
page read and write
79B800215000
direct allocation
page read and write
58C400790000
trusted library allocation
page read and write
C6405FE000
unkown
page readonly
C6515FE000
unkown
page readonly
24002802000
heap
page read and write
259800288000
trusted library allocation
page read and write
FC0024A8000
trusted library allocation
page read and write
FC003A1C000
trusted library allocation
page read and write
3DA8002D8000
trusted library allocation
page read and write
9614000
heap
page read and write
FC003B04000
trusted library allocation
page read and write
FC003BBC000
trusted library allocation
page read and write
915F000
heap
page read and write
2400AC02000
heap
page read and write
FC0024A4000
trusted library allocation
page read and write
2598001F8000
trusted library allocation
page read and write
9242000
heap
page read and write
961C000
heap
page read and write
FC004068000
trusted library allocation
page read and write
2400293C000
heap
page read and write
FC003584000
trusted library allocation
page read and write
FC003B64000
trusted library allocation
page read and write
82A000
heap
page read and write
307C000
heap
page read and write
FC002538000
trusted library allocation
page read and write
FC003964000
trusted library allocation
page read and write
58C40079C000
trusted library allocation
page read and write
FC0038EC000
trusted library allocation
page read and write
FC003678000
trusted library allocation
page read and write
3DA800308000
trusted library allocation
page read and write
2598002DC000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
6E6C002A0000
trusted library allocation
page read and write
FC003ED8000
trusted library allocation
page read and write
1DC84923000
heap
page read and write
9300000
heap
page read and write
58C400894000
trusted library allocation
page read and write
7D04002A0000
trusted library allocation
page read and write
259800390000
trusted library allocation
page read and write
3DA8002F4000
trusted library allocation
page read and write
FC003D8C000
trusted library allocation
page read and write
79B8002E0000
direct allocation
page read and write
9227000
heap
page read and write
FC002500000
trusted library allocation
page read and write
240029C4000
heap
page read and write
FC003928000
trusted library allocation
page read and write
ABF000
stack
page read and write
24002982000
heap
page read and write
240029C7000
heap
page read and write
2598001C4000
trusted library allocation
page read and write
24002982000
heap
page read and write
1DC84DD7000
heap
page read and write
FC002654000
trusted library allocation
page read and write
25980029C000
trusted library allocation
page read and write
24000B61000
heap
page read and write
FC003750000
trusted library allocation
page read and write
6E6C002A0000
trusted library allocation
page read and write
9228000
heap
page read and write
FC002538000
trusted library allocation
page read and write
25980019C000
trusted library allocation
page read and write
FC0034F3000
trusted library allocation
page read and write
1DC8491E000
heap
page read and write
FC003D8C000
trusted library allocation
page read and write
FC00379C000
trusted library allocation
page read and write
259800230000
trusted library allocation
page read and write
FC003968000
trusted library allocation
page read and write
FC002F30000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
2598002F4000
trusted library allocation
page read and write
3DA800284000
trusted library allocation
page read and write
FC002EB4000
trusted library allocation
page read and write
C64C5FE000
unkown
page readonly
FC003E20000
trusted library allocation
page read and write
58C4007D0000
trusted library allocation
page read and write
FC003354000
trusted library allocation
page read and write
C641DFE000
stack
page read and write
8B0000
heap
page read and write
2500000
heap
page read and write
3DA8002B0000
trusted library allocation
page read and write
1DC8143E000
heap
page read and write
2506000
heap
page read and write
FC003AC0000
trusted library allocation
page read and write
FC003954000
trusted library allocation
page read and write
2598002DC000
trusted library allocation
page read and write
922C000
heap
page read and write
FC003958000
trusted library allocation
page read and write
1DC84DEB000
heap
page read and write
FC00391C000
trusted library allocation
page read and write
25980045D000
trusted library allocation
page read and write
FC003A20000
trusted library allocation
page read and write
79B800250000
direct allocation
page read and write
FC003C78000
trusted library allocation
page read and write
24002928000
heap
page read and write
7D04002C8000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
7D0400220000
trusted library allocation
page read and write
3DA80031C000
trusted library allocation
page read and write
FC003F04000
trusted library allocation
page read and write
259800248000
trusted library allocation
page read and write
C63B5FE000
unkown
page readonly
24002959000
heap
page read and write
24000ABE000
heap
page read and write
95D0000
heap
page read and write
58C400788000
trusted library allocation
page read and write
FC003AEC000
trusted library allocation
page read and write
FC003274000
trusted library allocation
page read and write
2598000A3000
trusted library allocation
page read and write
7D0400294000
trusted library allocation
page read and write
24000AA9000
heap
page read and write
9240000
heap
page read and write
3DA8002D0000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
787000
heap
page read and write
1DC84916000
heap
page read and write
3DA80027C000
trusted library allocation
page read and write
FC0023F8000
trusted library allocation
page read and write
8C6000
heap
page read and write
259800290000
trusted library allocation
page read and write
FC003E80000
trusted library allocation
page read and write
9233000
heap
page read and write
7D04002A8000
trusted library allocation
page read and write
24DE000
stack
page read and write
960D000
heap
page read and write
FC003FD4000
trusted library allocation
page read and write
24002995000
heap
page read and write
922A000
heap
page read and write
FC002420000
trusted library allocation
page read and write
9233000
heap
page read and write
FC0034E1000
trusted library allocation
page read and write
58C4006AC000
trusted library allocation
page read and write
2450000
heap
page read and write
3DA80040C000
trusted library allocation
page read and write
FC003ED0000
trusted library allocation
page read and write
58C400728000
trusted library allocation
page read and write
58C4007BC000
trusted library allocation
page read and write
FC003BE8000
trusted library allocation
page read and write
240027D0000
trusted library section
page readonly
FC0036F8000
trusted library allocation
page read and write
259800020000
trusted library allocation
page read and write
FC003654000
trusted library allocation
page read and write
24002984000
heap
page read and write
FC0023DC000
trusted library allocation
page read and write
1DC84925000
heap
page read and write
24000A98000
heap
page read and write
FC0034F6000
trusted library allocation
page read and write
FC003B84000
trusted library allocation
page read and write
7D04002A8000
trusted library allocation
page read and write
9224000
heap
page read and write
58C4006C8000
trusted library allocation
page read and write
259800030000
trusted library allocation
page read and write
FC0023D4000
trusted library allocation
page read and write
2400298A000
heap
page read and write
C63DDFD000
stack
page read and write
235F000
stack
page read and write
259800218000
trusted library allocation
page read and write
FC003DB0000
trusted library allocation
page read and write
FC003EB8000
trusted library allocation
page read and write
259800030000
trusted library allocation
page read and write
1DC8492F000
heap
page read and write
24000A63000
heap
page read and write
79B800328000
direct allocation
page read and write
C640DFD000
stack
page read and write
7D04002B4000
trusted library allocation
page read and write
C648DFE000
stack
page read and write
FC003E38000
trusted library allocation
page read and write
FC002C54000
trusted library allocation
page read and write
2598002A8000
trusted library allocation
page read and write
8B0000
heap
page read and write
FC003B88000
trusted library allocation
page read and write
FC0034F1000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
2EEE000
stack
page read and write
58C4006E0000
trusted library allocation
page read and write
58C400864000
trusted library allocation
page read and write
2598000F4000
trusted library allocation
page read and write
7D04002E4000
trusted library allocation
page read and write
58C400828000
trusted library allocation
page read and write
FC003908000
trusted library allocation
page read and write
FC002EC4000
trusted library allocation
page read and write
259800334000
trusted library allocation
page read and write
1DC84923000
heap
page read and write
2598002B0000
trusted library allocation
page read and write
1DC84DE8000
heap
page read and write
7D04002A8000
trusted library allocation
page read and write
79B80023C000
direct allocation
page read and write
9226000
heap
page read and write
24000980000
heap
page read and write
7D0400238000
trusted library allocation
page read and write
FC003BD0000
trusted library allocation
page read and write
9249000
heap
page read and write
FC002FCC000
trusted library allocation
page read and write
2598002A4000
trusted library allocation
page read and write
FC002500000
trusted library allocation
page read and write
9240000
heap
page read and write
24000A40000
heap
page read and write
FC0024A4000
trusted library allocation
page read and write
25980000C000
trusted library allocation
page read and write
FC002538000
trusted library allocation
page read and write
2598004A8000
trusted library allocation
page read and write
9233000
heap
page read and write
922C000
heap
page read and write
C64CDFE000
stack
page read and write
FC002540000
trusted library allocation
page read and write
24002997000
heap
page read and write
9220000
heap
page read and write
921E000
heap
page read and write
6F861000
unkown
page execute read
24000AC1000
heap
page read and write
C64E5FE000
unkown
page readonly
FC003E58000
trusted library allocation
page read and write
9211000
heap
page read and write
24000A92000
heap
page read and write
FC0031BC000
trusted library allocation
page read and write
58C40082C000
trusted library allocation
page read and write
FC002518000
trusted library allocation
page read and write
24000AA7000
heap
page read and write
FC003F54000
trusted library allocation
page read and write
FC003D28000
trusted library allocation
page read and write
24000B30000
heap
page read and write
294F000
stack
page read and write
2FEE000
stack
page read and write
79B800234000
direct allocation
page read and write
25980028C000
trusted library allocation
page read and write
9238000
heap
page read and write
259800458000
trusted library allocation
page read and write
FC003A54000
trusted library allocation
page read and write
3DA80039C000
trusted library allocation
page read and write
58C400860000
trusted library allocation
page read and write
95DA000
heap
page read and write
24000AE9000
heap
page read and write
79B800294000
direct allocation
page read and write
FC003194000
trusted library allocation
page read and write
FC0031C8000
trusted library allocation
page read and write
FC003938000
trusted library allocation
page read and write
9220000
heap
page read and write
FC00340C000
trusted library allocation
page read and write
FC003B3C000
trusted library allocation
page read and write
58C40085C000
trusted library allocation
page read and write
FC003F40000
trusted library allocation
page read and write
24002959000
heap
page read and write
1DC8142E000
heap
page read and write
3DA800364000
trusted library allocation
page read and write
FC00349C000
trusted library allocation
page read and write
6E6C002B8000
trusted library allocation
page read and write
259800001000
trusted library allocation
page read and write
FC00258C000
trusted library allocation
page read and write
9240000
heap
page read and write
25980044C000
trusted library allocation
page read and write
FC00354C000
trusted library allocation
page read and write
79B8002D8000
direct allocation
page read and write
922B000
heap
page read and write
FC002928000
trusted library allocation
page read and write
58C4008EC000
trusted library allocation
page read and write
3DA800248000
trusted library allocation
page read and write
FC0038FC000
trusted library allocation
page read and write
24002986000
heap
page read and write
921D000
heap
page read and write
920C000
heap
page read and write
FC0039C0000
trusted library allocation
page read and write
FC003A9C000
trusted library allocation
page read and write
FC003DEC000
trusted library allocation
page read and write
6F8DD000
unkown
page readonly
259800140000
trusted library allocation
page read and write
58C4007E4000
trusted library allocation
page read and write
922C000
heap
page read and write
FC00320C000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
922A000
heap
page read and write
FC0039DC000
trusted library allocation
page read and write
FC003BB4000
trusted library allocation
page read and write
FC003B68000
trusted library allocation
page read and write
24000ACF000
heap
page read and write
2598002C0000
trusted library allocation
page read and write
932D000
heap
page read and write
24002959000
heap
page read and write
FC00393C000
trusted library allocation
page read and write
24000AD3000
heap
page read and write
FC00320C000
trusted library allocation
page read and write
3DA800288000
trusted library allocation
page read and write
24000B30000
heap
page read and write
9240000
heap
page read and write
FC002500000
trusted library allocation
page read and write
FC00366C000
trusted library allocation
page read and write
FC00417C000
trusted library allocation
page read and write
FC003688000
trusted library allocation
page read and write
79B8002A8000
direct allocation
page read and write
259800440000
trusted library allocation
page read and write
567000
unkown
page execute and read and write
58C4007D4000
trusted library allocation
page read and write
400000
unkown
page readonly
259800394000
trusted library allocation
page read and write
25980022C000
trusted library allocation
page read and write
9238000
heap
page read and write
C639DFE000
stack
page read and write
FC003BE4000
trusted library allocation
page read and write
259800380000
trusted library allocation
page read and write
921E000
heap
page read and write
FC0034C4000
trusted library allocation
page read and write
FC002E64000
trusted library allocation
page read and write
259800268000
trusted library allocation
page read and write
58C4008F0000
trusted library allocation
page read and write
9222000
heap
page read and write
7D04002A8000
trusted library allocation
page read and write
2598001DC000
trusted library allocation
page read and write
FC003A64000
trusted library allocation
page read and write
9242000
heap
page read and write
FC003DCC000
trusted library allocation
page read and write
6E6C002C4000
trusted library allocation
page read and write
197000
stack
page read and write
1DC8143E000
heap
page read and write
FC003E7C000
trusted library allocation
page read and write
2598003A4000
trusted library allocation
page read and write
9233000
heap
page read and write
FC002C54000
trusted library allocation
page read and write
FC003A24000
trusted library allocation
page read and write
FC00250C000
trusted library allocation
page read and write
1DC84DD4000
heap
page read and write
9240000
heap
page read and write
3DA800401000
trusted library allocation
page read and write
2598002DC000
trusted library allocation
page read and write
FC002C54000
trusted library allocation
page read and write
9240000
heap
page read and write
C656DFE000
stack
page read and write
61ECD000
direct allocation
page readonly
FC003EBC000
trusted library allocation
page read and write
24002984000
heap
page read and write
C650DFE000
stack
page read and write
FC003E9C000
trusted library allocation
page read and write
FC004164000
trusted library allocation
page read and write
79B800270000
direct allocation
page read and write
64A000
unkown
page execute and read and write
FC003F64000
trusted library allocation
page read and write
FC003D28000
trusted library allocation
page read and write
25980040C000
trusted library allocation
page read and write
259800298000
trusted library allocation
page read and write
C647DFE000
stack
page read and write
C63ADFC000
stack
page read and write
24002986000
heap
page read and write
FC003094000
trusted library allocation
page read and write
FC002615000
trusted library allocation
page read and write
24000AE7000
heap
page read and write
C6425FE000
unkown
page readonly
58C4008E4000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
79B80031C000
direct allocation
page read and write
9233000
heap
page read and write
FC003558000
trusted library allocation
page read and write
1DC84931000
heap
page read and write
24002997000
heap
page read and write
2598002A0000
trusted library allocation
page read and write
FC003BA8000
trusted library allocation
page read and write
FC002ECC000
trusted library allocation
page read and write
9227000
heap
page read and write
FC0040E4000
trusted library allocation
page read and write
FC0040CC000
trusted library allocation
page read and write
FC0024A4000
trusted library allocation
page read and write
FC003659000
trusted library allocation
page read and write
FC003950000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
259800428000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
2400291A000
heap
page read and write
9212000
heap
page read and write
1DC84923000
heap
page read and write
6E6C002E4000
trusted library allocation
page read and write
2400298D000
heap
page read and write
FC00392C000
trusted library allocation
page read and write
92A7000
heap
page read and write
24002982000
heap
page read and write
FC003B70000
trusted library allocation
page read and write
FC003DB8000
trusted library allocation
page read and write
FC003094000
trusted library allocation
page read and write
1DC81410000
heap
page read and write
C6315FE000
unkown
page readonly
7D04002B8000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
FC003B14000
trusted library allocation
page read and write
FC002658000
trusted library allocation
page read and write
9220000
heap
page read and write
FC003ABC000
trusted library allocation
page read and write
79B800290000
direct allocation
page read and write
240009F0000
trusted library allocation
page read and write
FC003AFC000
trusted library allocation
page read and write
C63D5FE000
unkown
page readonly
99E000
stack
page read and write
7D0400235000
trusted library allocation
page read and write
2598002E8000
trusted library allocation
page read and write
24002959000
heap
page read and write
1DC8492B000
heap
page read and write
FC003B2C000
trusted library allocation
page read and write
85D000
heap
page read and write
24002980000
heap
page read and write
FC002324000
trusted library allocation
page read and write
638000
unkown
page execute and read and write
240029C4000
heap
page read and write
FC002434000
trusted library allocation
page read and write
9240000
heap
page read and write
FC003B1C000
trusted library allocation
page read and write
25980020C000
trusted library allocation
page read and write
259800114000
trusted library allocation
page read and write
FC00325C000
trusted library allocation
page read and write
2400291F000
heap
page read and write
FC0040C4000
trusted library allocation
page read and write
259800300000
trusted library allocation
page read and write
58C4006AC000
trusted library allocation
page read and write
2598003E0000
trusted library allocation
page read and write
250C000
heap
page read and write
79B800210000
direct allocation
page read and write
FC0024B8000
trusted library allocation
page read and write
FC003B54000
trusted library allocation
page read and write
C64B5FE000
unkown
page readonly
240029C4000
heap
page read and write
FC0023B4000
trusted library allocation
page read and write
1DC8492B000
heap
page read and write
FC0038F8000
trusted library allocation
page read and write
FC00254C000
trusted library allocation
page read and write
2598003BC000
trusted library allocation
page read and write
2598001D0000
trusted library allocation
page read and write
FC003FE4000
trusted library allocation
page read and write
FC00254C000
trusted library allocation
page read and write
FC003A78000
trusted library allocation
page read and write
79B8002D0000
direct allocation
page read and write
9227000
heap
page read and write
24002992000
heap
page read and write
1DC8492F000
heap
page read and write
3DA800408000
trusted library allocation
page read and write
9240000
heap
page read and write
58C400818000
trusted library allocation
page read and write
FC003284000
trusted library allocation
page read and write
58C400878000
trusted library allocation
page read and write
FC002C54000
trusted library allocation
page read and write
24000AA6000
heap
page read and write
FC00398C000
trusted library allocation
page read and write
42A000
unkown
page execute read
921B000
heap
page read and write
9400000
trusted library allocation
page read and write
C642DFE000
stack
page read and write
FC00259C000
trusted library allocation
page read and write
3DA800290000
trusted library allocation
page read and write
FC003274000
trusted library allocation
page read and write
24002939000
heap
page read and write
FC003756000
trusted library allocation
page read and write
FC003A98000
trusted library allocation
page read and write
FC003536000
trusted library allocation
page read and write
FC00379C000
trusted library allocation
page read and write
2598002AC000
trusted library allocation
page read and write
FC002EC4000
trusted library allocation
page read and write
7D0400270000
trusted library allocation
page read and write
FC003756000
trusted library allocation
page read and write
259800294000
trusted library allocation
page read and write
FC0035A9000
trusted library allocation
page read and write
6E6C002A8000
trusted library allocation
page read and write
24005BD0000
trusted library allocation
page read and write
259800078000
trusted library allocation
page read and write
C64BDFE000
stack
page read and write
922A000
heap
page read and write
2598001E4000
trusted library allocation
page read and write
C6485FE000
unkown
page readonly
FC002524000
trusted library allocation
page read and write
921E000
heap
page read and write
259800250000
trusted library allocation
page read and write
9249000
heap
page read and write
FC003DC8000
trusted library allocation
page read and write
FC002500000
trusted library allocation
page read and write
24000A2B000
heap
page read and write
FC002C54000
trusted library allocation
page read and write
9233000
heap
page read and write
FC003E88000
trusted library allocation
page read and write
FC00242C000
trusted library allocation
page read and write
780000
heap
page read and write
FC003EDC000
trusted library allocation
page read and write
FC003BF0000
trusted library allocation
page read and write
6E6C002C4000
trusted library allocation
page read and write
FC003E98000
trusted library allocation
page read and write
9240000
heap
page read and write
24002984000
heap
page read and write
9241000
heap
page read and write
1DC8492B000
heap
page read and write
1DC84E55000
heap
page read and write
3DA8003BC000
trusted library allocation
page read and write
FC003E1C000
trusted library allocation
page read and write
FC003A44000
trusted library allocation
page read and write
FC00400C000
trusted library allocation
page read and write
730000
direct allocation
page execute and read and write
3DA800350000
trusted library allocation
page read and write
9220000
heap
page read and write
9330000
heap
page read and write
24002986000
heap
page read and write
79B800316000
direct allocation
page read and write
1DC84E3D000
heap
page read and write
25980005C000
trusted library allocation
page read and write
6E6C00248000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
24002982000
heap
page read and write
FC003A68000
trusted library allocation
page read and write
79B800201000
direct allocation
page read and write
3DA8002F1000
trusted library allocation
page read and write
240029A8000
heap
page read and write
FC0036F8000
trusted library allocation
page read and write
6C5F0000
unkown
page readonly
2598002D0000
trusted library allocation
page read and write
FC0038D8000
trusted library allocation
page read and write
7D0400248000
trusted library allocation
page read and write
FC004110000
trusted library allocation
page read and write
921E000
heap
page read and write
921E000
heap
page read and write
1DC8492F000
heap
page read and write
25980008C000
trusted library allocation
page read and write
6C7D5000
unkown
page readonly
7D0400210000
trusted library allocation
page read and write
2598001F0000
trusted library allocation
page read and write
FC003B60000
trusted library allocation
page read and write
FC003A80000
trusted library allocation
page read and write
239E000
stack
page read and write
C636DFE000
stack
page read and write
259800248000
trusted library allocation
page read and write
79B80024C000
direct allocation
page read and write
6E6C002D8000
trusted library allocation
page read and write
FC00369C000
trusted library allocation
page read and write
259800098000
trusted library allocation
page read and write
FC003720000
trusted library allocation
page read and write
240029AA000
heap
page read and write
FC00356D000
trusted library allocation
page read and write
9222000
heap
page read and write
FC00379C000
trusted library allocation
page read and write
FC003FB4000
trusted library allocation
page read and write
6C78F000
unkown
page readonly
58C4007A0000
trusted library allocation
page read and write
4CC000
unkown
page execute and read and write
23DE000
stack
page read and write
7D0400288000
trusted library allocation
page read and write
3DA800201000
trusted library allocation
page read and write
FC0026C4000
trusted library allocation
page read and write
C630DFE000
unkown
page read and write
24000A13000
heap
page read and write
FC0039E4000
trusted library allocation
page read and write
24000B02000
heap
page read and write
9220000
heap
page read and write
24000B2B000
heap
page read and write
922A000
heap
page read and write
938A000
heap
page read and write
2598001E8000
trusted library allocation
page read and write
240029CE000
heap
page read and write
25980021C000
trusted library allocation
page read and write
FC003990000
trusted library allocation
page read and write
6E6C002C4000
trusted library allocation
page read and write
7D0400278000
trusted library allocation
page read and write
FC002DF0000
trusted library allocation
page read and write
C6415FE000
unkown
page readonly
9615000
heap
page read and write
1DC84E45000
heap
page read and write
FC0023E8000
trusted library allocation
page read and write
FC003270000
trusted library allocation
page read and write
58C400418000
trusted library allocation
page read and write
FC002538000
trusted library allocation
page read and write
25980037C000
trusted library allocation
page read and write
1DC8492B000
heap
page read and write
FC003094000
trusted library allocation
page read and write
1DC8492F000
heap
page read and write
FC003E54000
trusted library allocation
page read and write
FC002414000
trusted library allocation
page read and write
1DC84924000
heap
page read and write
2598001A8000
trusted library allocation
page read and write
259800130000
trusted library allocation
page read and write
FC002540000
trusted library allocation
page read and write
24002900000
heap
page read and write
9320000
heap
page read and write
FC003194000
trusted library allocation
page read and write
25980041C000
trusted library allocation
page read and write
FC00358A000
trusted library allocation
page read and write
FC003590000
trusted library allocation
page read and write
240029C4000
heap
page read and write
FC003500000
trusted library allocation
page read and write
3DA800320000
trusted library allocation
page read and write
3DA800310000
trusted library allocation
page read and write
1DC8491E000
heap
page read and write
FC003A84000
trusted library allocation
page read and write
FC002424000
trusted library allocation
page read and write
FC002658000
trusted library allocation
page read and write
FC003F20000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
872000
heap
page read and write
FC003564000
trusted library allocation
page read and write
25980016C000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
58C4007E0000
trusted library allocation
page read and write
FC004084000
trusted library allocation
page read and write
FC0034B4000
trusted library allocation
page read and write
240029C4000
heap
page read and write
3DA800300000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
1DC84923000
heap
page read and write
FC003B30000
trusted library allocation
page read and write
C6525FE000
unkown
page readonly
259800425000
trusted library allocation
page read and write
FC003270000
trusted library allocation
page read and write
C651DFC000
stack
page read and write
FC0035A2000
trusted library allocation
page read and write
FC003178000
trusted library allocation
page read and write
922B000
heap
page read and write
FC003F08000
trusted library allocation
page read and write
FC00254C000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
820000
heap
page read and write
FC003AB4000
trusted library allocation
page read and write
24000B27000
heap
page read and write
1DC8491E000
heap
page read and write
921A000
heap
page read and write
FC003A50000
trusted library allocation
page read and write
FC00349C000
trusted library allocation
page read and write
C6495FE000
unkown
page readonly
FC003E24000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
C64FDFE000
stack
page read and write
FC003E78000
trusted library allocation
page read and write
FC003C1C000
trusted library allocation
page read and write
C635DFE000
stack
page read and write
FC002EB4000
trusted library allocation
page read and write
6E6C002C4000
trusted library allocation
page read and write
24002959000
heap
page read and write
9336000
heap
page read and write
7D0400201000
trusted library allocation
page read and write
58C400974000
trusted library allocation
page read and write
7D04002B4000
trusted library allocation
page read and write
259800401000
trusted library allocation
page read and write
C64DDFE000
stack
page read and write
24002976000
heap
page read and write
C646DFC000
stack
page read and write
259800108000
trusted library allocation
page read and write
FC0023EC000
trusted library allocation
page read and write
24002971000
heap
page read and write
FC002654000
trusted library allocation
page read and write
24000A74000
heap
page read and write
58C40081C000
trusted library allocation
page read and write
259800244000
trusted library allocation
page read and write
FC00360E000
trusted library allocation
page read and write
24002959000
heap
page read and write
463000
unkown
page readonly
FC003B44000
trusted library allocation
page read and write
24002959000
heap
page read and write
C6345FE000
unkown
page readonly
2598002E8000
trusted library allocation
page read and write
921E000
heap
page read and write
FC002F59000
trusted library allocation
page read and write
6F8EE000
unkown
page read and write
90AD000
heap
page read and write
FC002418000
trusted library allocation
page read and write
C649DFE000
stack
page read and write
FC003DD4000
trusted library allocation
page read and write
FC003228000
trusted library allocation
page read and write
FC0023B4000
trusted library allocation
page read and write
79B800274000
direct allocation
page read and write
3DA800418000
trusted library allocation
page read and write
3DA80025C000
trusted library allocation
page read and write
2598002D0000
trusted library allocation
page read and write
FC003EC4000
trusted library allocation
page read and write
FC003AC4000
trusted library allocation
page read and write
FC003DB4000
trusted library allocation
page read and write
FC004104000
trusted library allocation
page read and write
79B800220000
direct allocation
page read and write
79B8002D8000
direct allocation
page read and write
921E000
heap
page read and write
9224000
heap
page read and write
24000A00000
heap
page read and write
C6435FE000
unkown
page readonly
7D0400260000
trusted library allocation
page read and write
9240000
heap
page read and write
FC003D44000
trusted library allocation
page read and write
2C4F000
stack
page read and write
259800254000
trusted library allocation
page read and write
259800240000
trusted library allocation
page read and write
1DC84924000
heap
page read and write
259800240000
trusted library allocation
page read and write
FC0039B4000
trusted library allocation
page read and write
259800234000
trusted library allocation
page read and write
484000
unkown
page execute and read and write
FC003558000
trusted library allocation
page read and write
FC003EC0000
trusted library allocation
page read and write
259800210000
trusted library allocation
page read and write
2A4F000
stack
page read and write
C64A5FE000
unkown
page readonly
FC003B94000
trusted library allocation
page read and write
2598002B0000
trusted library allocation
page read and write
6E6C002A0000
trusted library allocation
page read and write
920C000
heap
page read and write
61EB4000
direct allocation
page read and write
FC003FC8000
trusted library allocation
page read and write
FC003E3C000
trusted library allocation
page read and write
FC002538000
trusted library allocation
page read and write
7D04002B8000
trusted library allocation
page read and write
3020000
heap
page read and write
FC00259C000
trusted library allocation
page read and write
FC0039BC000
trusted library allocation
page read and write
FC0023F4000
trusted library allocation
page read and write
FC003660000
trusted library allocation
page read and write
2598000CC000
trusted library allocation
page read and write
1DC84E3D000
heap
page read and write
58C40040C000
trusted library allocation
page read and write
FC00394C000
trusted library allocation
page read and write
9233000
heap
page read and write
24002959000
heap
page read and write
961B000
heap
page read and write
58C4008C8000
trusted library allocation
page read and write
FC003BA4000
trusted library allocation
page read and write
FC003E28000
trusted library allocation
page read and write
6E6C002C4000
trusted library allocation
page read and write
240029D8000
heap
page read and write
24002995000
heap
page read and write
FC002540000
trusted library allocation
page read and write
8B9000
heap
page read and write
240029C4000
heap
page read and write
9240000
heap
page read and write
FC00369C000
trusted library allocation
page read and write
C6575FE000
unkown
page readonly
58C400424000
trusted library allocation
page read and write
1DC813FB000
heap
page read and write
923F000
heap
page read and write
9233000
heap
page read and write
FC003A34000
trusted library allocation
page read and write
C6445FE000
unkown
page readonly
24000A93000
heap
page read and write
FC002DF0000
trusted library allocation
page read and write
FC003AF0000
trusted library allocation
page read and write
FC003A94000
trusted library allocation
page read and write
FC003E44000
trusted library allocation
page read and write
FC0040DC000
trusted library allocation
page read and write
2598001B8000
trusted library allocation
page read and write
FC003B8C000
trusted library allocation
page read and write
FC002D80000
trusted library allocation
page read and write
FC0039CC000
trusted library allocation
page read and write
79B8002C0000
direct allocation
page read and write
9220000
heap
page read and write
8B4000
heap
page read and write
6C7D0000
unkown
page read and write
FC003AD8000
trusted library allocation
page read and write
1DC84E2E000
heap
page read and write
24002930000
heap
page read and write
79B800318000
direct allocation
page read and write
7D04002D8000
trusted library allocation
page read and write
7D0400294000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
3DA800344000
trusted library allocation
page read and write
58C40039C000
trusted library allocation
page read and write
FC002F58000
trusted library allocation
page read and write
FC0035E8000
trusted library allocation
page read and write
FC004120000
trusted library allocation
page read and write
FC003F30000
trusted library allocation
page read and write
3DA800424000
trusted library allocation
page read and write
3DA800220000
trusted library allocation
page read and write
24000B13000
heap
page read and write
FC003DB0000
trusted library allocation
page read and write
C63A5FE000
unkown
page readonly
FC003688000
trusted library allocation
page read and write
1DC84924000
heap
page read and write
FC003500000
trusted library allocation
page read and write
2598004AE000
trusted library allocation
page read and write
924E000
heap
page read and write
2400291D000
heap
page read and write
7D0400250000
trusted library allocation
page read and write
24002997000
heap
page read and write
9204000
heap
page read and write
3DA800210000
trusted library allocation
page read and write
FC002324000
trusted library allocation
page read and write
8B5000
heap
page read and write
6E6C002A0000
trusted library allocation
page read and write
259800434000
trusted library allocation
page read and write
58C4006AC000
trusted library allocation
page read and write
930000
heap
page read and write
FC003C5C000
trusted library allocation
page read and write
79B800230000
direct allocation
page read and write
2D4D000
stack
page read and write
91E000
heap
page read and write
FC003A38000
trusted library allocation
page read and write
3DA8003A8000
trusted library allocation
page read and write
FC003A7C000
trusted library allocation
page read and write
58C400898000
trusted library allocation
page read and write
25980025C000
trusted library allocation
page read and write
FC004035000
trusted library allocation
page read and write
FC003D68000
trusted library allocation
page read and write
9233000
heap
page read and write
956F000
stack
page read and write
259800260000
trusted library allocation
page read and write
FC00377C000
trusted library allocation
page read and write
241E000
stack
page read and write
921E000
heap
page read and write
3DA8002C4000
trusted library allocation
page read and write
FC0031BC000
trusted library allocation
page read and write
FC0024A4000
trusted library allocation
page read and write
FC003AB8000
trusted library allocation
page read and write
1DC8491E000
heap
page read and write
There are 1281 hidden memdumps, click here to show them.