IOC Report
script.ps1

loading gif

Files

File Path
Type
Category
Malicious
script.ps1
Unicode text, UTF-8 text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\105235\Inf.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\lem[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\putt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\4O8YUSJEUA1N\2D2VASR9H
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\4O8YUSJEUA1N\47Q9HL
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\4O8YUSJEUA1N\7G4EUS
Microsoft Cabinet archive data, 487443 bytes, 11 files, at 0x2c +A "Proceedings" +A "Recovery", ID 8198, number 1, 29 datablocks, 0x1 compression
dropped
C:\ProgramData\4O8YUSJEUA1N\BSRIEK
Microsoft Cabinet archive data, 487443 bytes, 11 files, at 0x2c +A "Proceedings" +A "Recovery", ID 8198, number 1, 29 datablocks, 0x1 compression
dropped
C:\ProgramData\4O8YUSJEUA1N\C2DBS2
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\4O8YUSJEUA1N\CBASRI
data
dropped
C:\ProgramData\4O8YUSJEUA1N\D2NY5P
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\4O8YUSJEUA1N\EUAIEC
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\4O8YUSJEUA1N\FCTR1D
data
dropped
C:\ProgramData\4O8YUSJEUA1N\OZ5XT2
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\4O8YUSJEUA1N\Q9R1NG
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\ProgramData\4O8YUSJEUA1N\UAI5X4
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\4O8YUSJEUA1N\VSJECB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\4O8YUSJEUA1N\WT2NOZ
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\4O8YUSJEUA1N\Z5XL6XTRI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xe7f313cb, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\105235\m
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Authorization
Microsoft Cabinet archive data, 487443 bytes, 11 files, at 0x2c +A "Proceedings" +A "Recovery", ID 8198, number 1, 29 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Being
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Cohen
ASCII text, with very long lines (944), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Cohen.cmd (copy)
ASCII text, with very long lines (944), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Cultural
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Division
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Glad
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Name
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Norway
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Proceedings
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Recovery
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Silicon
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Subtle
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Sunglasses
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Tired
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Tulsa
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Webster
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cumjcpwa.1xy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eaku4v1l.5ck.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r5xagdxm.ldf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wk52gmot.h3x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9ORQML7FQYHPEPIT1FT3.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
Chrome Cache Entry: 95
ASCII text, with very long lines (3837)
downloaded
Chrome Cache Entry: 96
ASCII text
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (65531)
downloaded
There are 43 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\script.ps1"
malicious
C:\Users\user\AppData\Local\Temp\putt.exe
"C:\Users\user\AppData\Local\Temp\putt.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Cohen Cohen.cmd & Cohen.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 105235
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "aid" Division
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b 105235\Inf.com + Proceedings + Recovery + Webster + Sunglasses + Cultural + Tulsa + Being + Name + Silicon + Subtle 105235\Inf.com
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Glad + ..\Norway + ..\Tired m
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\105235\Inf.com
Inf.com m
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2204,i,11129156234363170229,15711613053576599617,262144 /prefetch:8
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\extrac32.exe
extrac32 /Y /E Authorization
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/ac/?q=
unknown
http://5.252.155.64/lem.exe
5.252.155.64
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/C
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://google-ohttp-relay-join.fastly-edge.com/F
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://anglebug.com/7714
unknown
https://bijutr.shop7900ZU
unknown
https://bijutr.shop/e3
unknown
https://google-ohttp-relay-join.fastly-edge.com/M
unknown
http://5.2
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/Q
unknown
https://google-ohttp-relay-join.fastly-edge.com/P
unknown
https://google-ohttp-relay-join.fastly-edge.com/W
unknown
https://nuget.org/nuget.exe
unknown
http://anglebug.com/6248
unknown
https://google-ohttp-relay-join.fastly-edge.com/T
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/Z
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://google-ohttp-relay-join.fastly-edge.com/a
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://google-ohttp-relay-join.fastly-edge.com/e
unknown
https://google-ohttp-relay-join.fastly-edge.com/d
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://anglebug.com/7489
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://contoso.com/Icon
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
http://crl.ver)
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://t.me/k04aelm0nk3Mozilla/5.0
unknown
http://www.autoitscript.com/autoit3/X
unknown
https://issuetracker.google.com/161903006
unknown
https://drive-daily-1.corp.google.com/
unknown
https://github.com/Pester/Pester
unknown
https://drive-daily-5.corp.google.com/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://bijutr.shopKNOHVA
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://t.m
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://bijutr.shopEUK6P8
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
http://anglebug.com/4384
unknown
http://5.252.155.64/lem.exeG
unknown
https://bijutr.shopta
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
https://bijutr.shopart/form-data;
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://5.252.155.64/lem.exe;
unknown
https://apis.google.com
unknown
https://bijutr.shop/op
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://5.252.
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bijutr.shop
188.245.216.205
malicious
t.me
149.154.167.99
www.google.com
172.217.21.36
sAOREpcgcodbdSPJ.sAOREpcgcodbdSPJ
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
188.245.216.205
bijutr.shop
Iran (ISLAMIC Republic Of)
malicious
149.154.167.99
t.me
United Kingdom
5.252.155.64
unknown
Russian Federation
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
19D9000
heap
page read and write
malicious
1A33000
heap
page read and write
malicious
1A3B000
heap
page read and write
malicious
4BF1000
trusted library allocation
page read and write
malicious
4A7C000
trusted library allocation
page read and write
malicious
19F0000
heap
page read and write
malicious
4BF0000
trusted library allocation
page read and write
malicious
391000
direct allocation
page execute and read and write
malicious
1A58000
heap
page read and write
malicious
1960000
heap
page read and write
malicious
28F5FFB0000
trusted library allocation
page read and write
7FFD9B0C0000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D05470A000
trusted library allocation
page read and write
28F5BFB0000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
21703126000
heap
page read and write
ED800B38000
trusted library allocation
page read and write
3F21000
heap
page read and write
15F6000
heap
page read and write
ED80106C000
trusted library allocation
page read and write
34027BB000
stack
page read and write
ED802EAC000
trusted library allocation
page read and write
ED803028000
trusted library allocation
page read and write
DA7000
heap
page read and write
6A35000
trusted library allocation
page read and write
6AA9000
trusted library allocation
page read and write
ED80020C000
trusted library allocation
page read and write
1D06B03E000
heap
page read and write
3550000
heap
page read and write
ED80300C000
trusted library allocation
page read and write
4C7F000
stack
page read and write
AA9527E000
unkown
page readonly
392C0030C000
trusted library allocation
page read and write
ED802938000
trusted library allocation
page read and write
ED802E28000
trusted library allocation
page read and write
3F21000
heap
page read and write
2455000
heap
page read and write
96D000
unkown
page read and write
3F21000
heap
page read and write
21703123000
heap
page read and write
ED80101C000
trusted library allocation
page read and write
392C00248000
trusted library allocation
page read and write
ED802D18000
trusted library allocation
page read and write
21703126000
heap
page read and write
392C0034C000
trusted library allocation
page read and write
445000
direct allocation
page execute and read and write
DC0000
heap
page read and write
28F60102000
trusted library allocation
page read and write
ED802C34000
trusted library allocation
page read and write
3240000
heap
page read and write
1A78000
heap
page read and write
40C000
unkown
page read and write
299F000
stack
page read and write
AA938FE000
stack
page read and write
340320C000
stack
page read and write
1D06B1A7000
heap
page read and write
197C000
heap
page read and write
1A01000
heap
page read and write
21703123000
heap
page read and write
ED803094000
trusted library allocation
page read and write
ED8002F3000
trusted library allocation
page read and write
1D062E6A000
trusted library allocation
page read and write
339F000
stack
page read and write
392C00710000
trusted library allocation
page read and write
28F602E8000
heap
page read and write
3F30000
heap
page read and write
390000
direct allocation
page read and write
AA94BFE000
stack
page read and write
2170311B000
heap
page read and write
3F21000
heap
page read and write
2E10000
heap
page read and write
7B19000
trusted library allocation
page read and write
28F60060000
trusted library allocation
page read and write
1400000
stack
page read and write
28F5FFC0000
trusted library allocation
page read and write
ED802A30000
trusted library allocation
page read and write
ED802ED4000
trusted library allocation
page read and write
1759000
heap
page read and write
1A01000
heap
page read and write
7FFD9B170000
trusted library allocation
page read and write
ED800CB4000
trusted library allocation
page read and write
6A63000
trusted library allocation
page read and write
28F600CE000
trusted library allocation
page read and write
3F21000
heap
page read and write
6A2C000
trusted library allocation
page read and write
1A01000
heap
page read and write
AA9457E000
unkown
page readonly
7ACF000
trusted library allocation
page read and write
7AB7000
trusted library allocation
page read and write
182C000
heap
page read and write
6A6F000
trusted library allocation
page read and write
AA9577C000
stack
page read and write
7FFD9B130000
trusted library allocation
page read and write
7AAF000
trusted library allocation
page read and write
28F5BC50000
trusted library section
page readonly
3F21000
heap
page read and write
ED800294000
trusted library allocation
page read and write
21703121000
heap
page read and write
21703123000
heap
page read and write
6A33000
trusted library allocation
page read and write
197C000
heap
page read and write
4C1C000
trusted library allocation
page read and write
392C00330000
trusted library allocation
page read and write
28F5B51B000
heap
page read and write
2170311B000
heap
page read and write
93D000
unkown
page readonly
4A6D000
stack
page read and write
ED800220000
trusted library allocation
page read and write
75DD000
trusted library allocation
page read and write
1D06B0B6000
heap
page read and write
ED802A70000
trusted library allocation
page read and write
7FFD9B060000
trusted library allocation
page execute and read and write
21709006000
heap
page read and write
ED801CB9000
trusted library allocation
page read and write
68E4000
trusted library allocation
page read and write
ED8029BC000
trusted library allocation
page read and write
21703111000
heap
page read and write
392C0036C000
trusted library allocation
page read and write
7FFD9B200000
trusted library allocation
page read and write
392C0040C000
trusted library allocation
page read and write
197C000
heap
page read and write
ED800AFC000
trusted library allocation
page read and write
28F5B400000
heap
page read and write
21703126000
heap
page read and write
6F3F000
trusted library allocation
page read and write
ED802B38000
trusted library allocation
page read and write
392C0070C000
trusted library allocation
page read and write
68E7000
trusted library allocation
page read and write
ED800E54000
trusted library allocation
page read and write
ED802BB0000
trusted library allocation
page read and write
1A01000
heap
page read and write
96D000
unkown
page write copy
94D000
heap
page read and write
3041000
heap
page read and write
ED802B64000
trusted library allocation
page read and write
16B0000
direct allocation
page execute and read and write
21703126000
heap
page read and write
ED800210000
trusted library allocation
page read and write
28F5AD29000
heap
page read and write
ED800E54000
trusted library allocation
page read and write
ED800C30000
trusted library allocation
page read and write
282E000
stack
page read and write
2170312B000
heap
page read and write
ED800CB4000
trusted library allocation
page read and write
289F000
stack
page read and write
AA94AFE000
stack
page read and write
ED802B3C000
trusted library allocation
page read and write
21703126000
heap
page read and write
3F21000
heap
page read and write
ED802D48000
trusted library allocation
page read and write
305D000
heap
page read and write
ED80032C000
trusted library allocation
page read and write
392C00424000
trusted library allocation
page read and write
28F5B51A000
heap
page read and write
ED800338000
trusted library allocation
page read and write
21703126000
heap
page read and write
2170313E000
heap
page read and write
33F6000
heap
page read and write
3589000
heap
page read and write
7FFD9B1A0000
trusted library allocation
page read and write
68EC000
trusted library allocation
page read and write
392C00408000
trusted library allocation
page read and write
392C00678000
trusted library allocation
page read and write
AA9547E000
unkown
page readonly
ED80037C000
trusted library allocation
page read and write
2170310C000
heap
page read and write
ED801CD1000
trusted library allocation
page read and write
ED802FA4000
trusted library allocation
page read and write
3F21000
heap
page read and write
21703123000
heap
page read and write
ED8002A8000
trusted library allocation
page read and write
7BD9000
trusted library allocation
page read and write
ED802AE4000
trusted library allocation
page read and write
949000
heap
page read and write
ED8001AC000
trusted library allocation
page read and write
6C16000
trusted library allocation
page read and write
6A95000
trusted library allocation
page read and write
D6E000
stack
page read and write
ED80120C000
trusted library allocation
page read and write
21703126000
heap
page read and write
409000
unkown
page readonly
AA9567E000
unkown
page readonly
21703123000
heap
page read and write
21703126000
heap
page read and write
ED800300000
trusted library allocation
page read and write
ED802F0C000
trusted library allocation
page read and write
2D4E000
stack
page read and write
ED800AFC000
trusted library allocation
page read and write
229F000
stack
page read and write
1D050E60000
heap
page read and write
ED80129C000
trusted library allocation
page read and write
ED802E8C000
trusted library allocation
page read and write
5BA0002D4000
trusted library allocation
page read and write
8A0000
unkown
page readonly
68E2000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
69DC000
trusted library allocation
page read and write
392C006B0000
trusted library allocation
page read and write
197C000
heap
page read and write
28F6013C000
trusted library allocation
page read and write
ED800F34000
trusted library allocation
page read and write
ED802BD4000
trusted library allocation
page read and write
1A01000
heap
page read and write
95A000
heap
page read and write
ED8003B4000
trusted library allocation
page read and write
28F60110000
trusted library allocation
page read and write
7AEF000
trusted library allocation
page read and write
1D062BE1000
trusted library allocation
page read and write
ED802DE0000
trusted library allocation
page read and write
3060000
heap
page read and write
29E9000
heap
page read and write
ED80034C000
trusted library allocation
page read and write
1A01000
heap
page read and write
5BA0002D8000
trusted library allocation
page read and write
28F60070000
trusted library allocation
page read and write
ED800E18000
trusted library allocation
page read and write
ED802948000
trusted library allocation
page read and write
392C00330000
trusted library allocation
page read and write
84F000
stack
page read and write
21703141000
heap
page read and write
21703126000
heap
page read and write
6C2B000
trusted library allocation
page read and write
ED802B68000
trusted library allocation
page read and write
ED802E74000
trusted library allocation
page read and write
ED800F40000
trusted library allocation
page read and write
1D050E40000
heap
page read and write
6B28000
trusted library allocation
page read and write
ED8030B4000
trusted library allocation
page read and write
7408000
trusted library allocation
page read and write
392C00378000
trusted library allocation
page read and write
142F000
stack
page read and write
3F21000
heap
page read and write
3593000
heap
page read and write
3592000
heap
page read and write
ED80135C000
trusted library allocation
page read and write
ED801CB7000
trusted library allocation
page read and write
1D062E71000
trusted library allocation
page read and write
21703123000
heap
page read and write
ED802990000
trusted library allocation
page read and write
ED802278000
trusted library allocation
page read and write
ED802F7C000
trusted library allocation
page read and write
692D000
trusted library allocation
page read and write
ED8001E8000
trusted library allocation
page read and write
21703123000
heap
page read and write
32B7000
heap
page read and write
ED80101C000
trusted library allocation
page read and write
5BA0002A8000
trusted library allocation
page read and write
21703126000
heap
page read and write
467000
direct allocation
page execute and read and write
392C00330000
trusted library allocation
page read and write
3F21000
heap
page read and write
434000
unkown
page read and write
6EE8000
trusted library allocation
page read and write
ED802EC4000
trusted library allocation
page read and write
1039000
stack
page read and write
ED802978000
trusted library allocation
page read and write
ED800294000
trusted library allocation
page read and write
ED802E38000
trusted library allocation
page read and write
1D050D17000
heap
page read and write
ED8001D4000
trusted library allocation
page read and write
1D06ACC2000
heap
page read and write
ED802904000
trusted library allocation
page read and write
340348E000
stack
page read and write
340273E000
stack
page read and write
1D052690000
heap
page read and write
34023BE000
stack
page read and write
5BA0002F8000
trusted library allocation
page read and write
2170311B000
heap
page read and write
AA948FE000
stack
page read and write
ED8029F8000
trusted library allocation
page read and write
3F21000
heap
page read and write
4CE5000
trusted library allocation
page read and write
3F21000
heap
page read and write
28F5AD02000
heap
page read and write
6A44000
trusted library allocation
page read and write
2170311B000
heap
page read and write
1A01000
heap
page read and write
98B000
heap
page read and write
ED80034C000
trusted library allocation
page read and write
407000
direct allocation
page execute and read and write
4A3000
unkown
page read and write
392C0061C000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED8002F0000
trusted library allocation
page read and write
28F60134000
trusted library allocation
page read and write
6A3B000
trusted library allocation
page read and write
6A84000
trusted library allocation
page read and write
2170312B000
heap
page read and write
392C00798000
trusted library allocation
page read and write
5BA0002D4000
trusted library allocation
page read and write
5BA0002C8000
trusted library allocation
page read and write
197C000
heap
page read and write
21703121000
heap
page read and write
21703121000
heap
page read and write
1D06AD78000
heap
page read and write
7FFD9B054000
trusted library allocation
page read and write
ED80293C000
trusted library allocation
page read and write
392C00650000
trusted library allocation
page read and write
98B000
heap
page read and write
ED80030C000
trusted library allocation
page read and write
28F6028A000
heap
page read and write
1D053786000
trusted library allocation
page read and write
ED802BB8000
trusted library allocation
page read and write
1A01000
heap
page read and write
3F21000
heap
page read and write
ED800D8C000
trusted library allocation
page read and write
28F6030A000
heap
page read and write
2170311B000
heap
page read and write
ED800318000
trusted library allocation
page read and write
3F21000
heap
page read and write
306E000
heap
page read and write
ED800294000
trusted library allocation
page read and write
ED802F28000
trusted library allocation
page read and write
ED802E98000
trusted library allocation
page read and write
1A01000
heap
page read and write
3F21000
heap
page read and write
ED800298000
trusted library allocation
page read and write
13FC000
stack
page read and write
401000
unkown
page execute read
6060000
trusted library allocation
page read and write
ED800340000
trusted library allocation
page read and write
28F60180000
trusted library allocation
page read and write
197C000
heap
page read and write
ED800324000
trusted library allocation
page read and write
3F40000
heap
page read and write
28F5AC8E000
heap
page read and write
1A01000
heap
page read and write
ED800CC4000
trusted library allocation
page read and write
1D06AB7A000
heap
page read and write
ED802DA4000
trusted library allocation
page read and write
197C000
heap
page read and write
3571000
heap
page read and write
3F21000
heap
page read and write
94D000
heap
page read and write
7BC4000
trusted library allocation
page read and write
3F21000
heap
page read and write
45E000
direct allocation
page execute and read and write
ED802738000
trusted library allocation
page read and write
ED802FA4000
trusted library allocation
page read and write
28F5B502000
heap
page read and write
288E000
stack
page read and write
ED802EF0000
trusted library allocation
page read and write
ED8001AC000
trusted library allocation
page read and write
ED80136C000
trusted library allocation
page read and write
ED802AA8000
trusted library allocation
page read and write
17C3000
heap
page read and write
7FFD9B1B0000
trusted library allocation
page read and write
35A0000
heap
page read and write
1A01000
heap
page read and write
1D06B604000
heap
page read and write
28F60020000
trusted library allocation
page read and write
2980000
heap
page read and write
29C8000
heap
page read and write
1D06B014000
heap
page read and write
7BAF000
trusted library allocation
page read and write
7468000
trusted library allocation
page read and write
21703121000
heap
page read and write
ED8030E0000
trusted library allocation
page read and write
ED800F0C000
trusted library allocation
page read and write
392C00694000
trusted library allocation
page read and write
1A01000
heap
page read and write
ED8029C0000
trusted library allocation
page read and write
ED802ABC000
trusted library allocation
page read and write
7508000
trusted library allocation
page read and write
2170310C000
heap
page read and write
5BA0002D4000
trusted library allocation
page read and write
1D062B87000
trusted library allocation
page read and write
ED802A74000
trusted library allocation
page read and write
1A01000
heap
page read and write
16C8000
heap
page read and write
21703126000
heap
page read and write
AA9407C000
stack
page read and write
29D3000
heap
page read and write
1D052820000
heap
page read and write
21703123000
heap
page read and write
143F000
stack
page read and write
7C4F000
trusted library allocation
page read and write
2170313E000
heap
page read and write
170E000
heap
page read and write
1D06B4B5000
heap
page read and write
6980000
trusted library allocation
page read and write
ED802940000
trusted library allocation
page read and write
ED802F24000
trusted library allocation
page read and write
1A01000
heap
page read and write
3F21000
heap
page read and write
1D06B0AA000
heap
page read and write
900000
heap
page read and write
28CE000
stack
page read and write
ED802E6C000
trusted library allocation
page read and write
ED800338000
trusted library allocation
page read and write
1415000
stack
page read and write
6991000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
1A00000
heap
page read and write
28F60200000
heap
page read and write
3F21000
heap
page read and write
359C000
heap
page read and write
6F1F000
trusted library allocation
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
ED801C44000
trusted library allocation
page read and write
ED801388000
trusted library allocation
page read and write
21703123000
heap
page read and write
ED801038000
trusted library allocation
page read and write
ED800294000
trusted library allocation
page read and write
52DF000
stack
page read and write
98D000
heap
page read and write
28F5ACB3000
heap
page read and write
21703126000
heap
page read and write
291C000
stack
page read and write
ED802A9C000
trusted library allocation
page read and write
ED801CB9000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D054846000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F20000
heap
page read and write
197C000
heap
page read and write
21703126000
heap
page read and write
AA95579000
stack
page read and write
7FFD9B040000
trusted library allocation
page execute and read and write
7FFD9AE70000
trusted library allocation
page read and write
28F60254000
heap
page read and write
5F2F000
stack
page read and write
7FFD9B210000
trusted library allocation
page read and write
4C31000
trusted library allocation
page read and write
6A24000
trusted library allocation
page read and write
ED801038000
trusted library allocation
page read and write
ED802A40000
trusted library allocation
page read and write
3F21000
heap
page read and write
21703126000
heap
page read and write
2170311B000
heap
page read and write
400000
unkown
page readonly
21703126000
heap
page read and write
1A01000
heap
page read and write
66D8000
heap
page read and write
1D06AE60000
heap
page execute and read and write
745D000
trusted library allocation
page read and write
21703121000
heap
page read and write
5BA0002A8000
trusted library allocation
page read and write
1A01000
heap
page read and write
197C000
heap
page read and write
21703126000
heap
page read and write
ED800C30000
trusted library allocation
page read and write
6AA1000
trusted library allocation
page read and write
21703121000
heap
page read and write
960000
heap
page read and write
ED800E9C000
trusted library allocation
page read and write
1D06AED0000
heap
page execute and read and write
1D052770000
heap
page execute and read and write
7DF4A2430000
trusted library allocation
page execute and read and write
2450000
heap
page read and write
ED801CB7000
trusted library allocation
page read and write
140D000
stack
page read and write
ED800300000
trusted library allocation
page read and write
28F5B940000
trusted library allocation
page read and write
2170311B000
heap
page read and write
3F21000
heap
page read and write
335E000
stack
page read and write
1D053794000
trusted library allocation
page read and write
21703123000
heap
page read and write
1D050C60000
heap
page read and write
29EC000
heap
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
1D06AED7000
heap
page execute and read and write
28F5B500000
heap
page read and write
ED802DE4000
trusted library allocation
page read and write
90E000
heap
page read and write
4CDF000
trusted library allocation
page read and write
ED802AB8000
trusted library allocation
page read and write
358C000
heap
page read and write
5BA0002EC000
trusted library allocation
page read and write
7FFD9B030000
trusted library allocation
page execute and read and write
1A01000
heap
page read and write
21703126000
heap
page read and write
ED802A78000
trusted library allocation
page read and write
28F5AC00000
heap
page read and write
2170311B000
heap
page read and write
359D000
heap
page read and write
2BDB000
heap
page read and write
21703126000
heap
page read and write
1D06B186000
heap
page read and write
1D06B053000
heap
page read and write
68E0000
trusted library allocation
page read and write
2170313C000
heap
page read and write
ED8026E0000
trusted library allocation
page read and write
E4E000
stack
page read and write
2170312B000
heap
page read and write
21703126000
heap
page read and write
197C000
heap
page read and write
ED802A5C000
trusted library allocation
page read and write
29C8000
heap
page read and write
ED800F34000
trusted library allocation
page read and write
392C00340000
trusted library allocation
page read and write
340338C000
stack
page read and write
3F21000
heap
page read and write
1D0546D8000
trusted library allocation
page read and write
93C000
stack
page read and write
ED801184000
trusted library allocation
page read and write
197C000
heap
page read and write
7FFD9AF20000
trusted library allocation
page read and write
21703121000
heap
page read and write
28F60080000
trusted library allocation
page read and write
ED802C10000
trusted library allocation
page read and write
1D062E6F000
trusted library allocation
page read and write
D0F000
stack
page read and write
1A01000
heap
page read and write
197C000
heap
page read and write
392C00668000
trusted library allocation
page read and write
4C59000
trusted library allocation
page read and write
ED80309C000
trusted library allocation
page read and write
ED80029A000
trusted library allocation
page read and write
971000
unkown
page write copy
323F000
stack
page read and write
197C000
heap
page read and write
28F60110000
trusted library allocation
page read and write
ED8026FC000
trusted library allocation
page read and write
ED802AB4000
trusted library allocation
page read and write
3F21000
heap
page read and write
E1C000
stack
page read and write
340253A000
stack
page read and write
21703121000
heap
page read and write
392C00330000
trusted library allocation
page read and write
2424000
heap
page read and write
1D050D66000
heap
page read and write
21703121000
heap
page read and write
ED800298000
trusted library allocation
page read and write
29B0000
heap
page read and write
28F602F3000
heap
page read and write
5BA0002C8000
trusted library allocation
page read and write
32AE000
stack
page read and write
28F60147000
trusted library allocation
page read and write
8A1000
unkown
page execute read
3594000
heap
page read and write
1D06B008000
heap
page read and write
28F60084000
trusted library allocation
page read and write
1D06B166000
heap
page read and write
5AF0000
remote allocation
page read and write
ED800CB4000
trusted library allocation
page read and write
1D06AD39000
heap
page read and write
ED800F0C000
trusted library allocation
page read and write
745000
heap
page read and write
21703106000
heap
page read and write
3574000
heap
page read and write
141F000
stack
page read and write
AA9447C000
stack
page read and write
ED802DB4000
trusted library allocation
page read and write
28F60305000
heap
page read and write
1D06AEC0000
trusted library allocation
page read and write
3F21000
heap
page read and write
21703126000
heap
page read and write
AA94C7E000
unkown
page readonly
2170311A000
heap
page read and write
ED800C98000
trusted library allocation
page read and write
5BA0002D4000
trusted library allocation
page read and write
AA9397E000
unkown
page readonly
29E8000
heap
page read and write
4CB8000
trusted library allocation
page read and write
28F600A4000
trusted library allocation
page read and write
28F6008D000
trusted library allocation
page read and write
2170313C000
heap
page read and write
ED802EE0000
trusted library allocation
page read and write
AA94A7E000
unkown
page readonly
963000
unkown
page readonly
ED802DC8000
trusted library allocation
page read and write
21703121000
heap
page read and write
ED802E54000
trusted library allocation
page read and write
21708FDC000
heap
page read and write
6913000
trusted library allocation
page read and write
34024B9000
stack
page read and write
28F5AB90000
trusted library allocation
page read and write
ED801380000
trusted library allocation
page read and write
7FFD9AE73000
trusted library allocation
page execute and read and write
ED802AEC000
trusted library allocation
page read and write
28F602BF000
heap
page read and write
392C006A4000
trusted library allocation
page read and write
51EF000
stack
page read and write
3F21000
heap
page read and write
ED802974000
trusted library allocation
page read and write
66D0000
heap
page read and write
304F000
heap
page read and write
21703126000
heap
page read and write
AA94B7E000
unkown
page readonly
2170310A000
heap
page read and write
4CD1000
trusted library allocation
page read and write
21703112000
heap
page read and write
ED801CF4000
trusted library allocation
page read and write
ED802C54000
trusted library allocation
page read and write
21703126000
heap
page read and write
ED802A48000
trusted library allocation
page read and write
19D7000
heap
page read and write
197C000
heap
page read and write
740000
heap
page read and write
2170311B000
heap
page read and write
2170310A000
heap
page read and write
ED802C68000
trusted library allocation
page read and write
197C000
heap
page read and write
3F21000
heap
page read and write
2E8C000
stack
page read and write
3F21000
heap
page read and write
ED802E50000
trusted library allocation
page read and write
ED80135C000
trusted library allocation
page read and write
17F2000
heap
page read and write
ED8001EC000
trusted library allocation
page read and write
ED8028F0000
trusted library allocation
page read and write
1EBE000
stack
page read and write
7BB9000
trusted library allocation
page read and write
ED8029B4000
trusted library allocation
page read and write
ED8001E0000
trusted library allocation
page read and write
21703121000
heap
page read and write
3B5E000
stack
page read and write
6B7D000
trusted library allocation
page read and write
ED802BF8000
trusted library allocation
page read and write
ED8001B4000
trusted library allocation
page read and write
1D052750000
trusted library allocation
page read and write
29D0000
heap
page read and write
409000
unkown
page readonly
98000
stack
page read and write
ED80065D000
trusted library allocation
page read and write
ED800C30000
trusted library allocation
page read and write
970000
heap
page read and write
7FFD9B21C000
trusted library allocation
page read and write
3F21000
heap
page read and write
570000
heap
page read and write
ED8029A0000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED802BA8000
trusted library allocation
page read and write
21703122000
heap
page read and write
28F600D1000
trusted library allocation
page read and write
ED8028D0000
trusted library allocation
page read and write
410000
direct allocation
page execute and read and write
ED800FDC000
trusted library allocation
page read and write
197C000
heap
page read and write
21703126000
heap
page read and write
4C80000
trusted library allocation
page read and write
28F6021E000
heap
page read and write
6A04000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED802E80000
trusted library allocation
page read and write
ED80135C000
trusted library allocation
page read and write
28F5BC30000
trusted library section
page readonly
3F21000
heap
page read and write
28F5B55B000
heap
page read and write
ED802BAC000
trusted library allocation
page read and write
691B000
trusted library allocation
page read and write
7FFD9B05D000
trusted library allocation
page read and write
ED80029A000
trusted library allocation
page read and write
46B000
unkown
page read and write
21703137000
heap
page read and write
7FFD9B1D0000
trusted library allocation
page read and write
7FFD9B0A0000
trusted library allocation
page read and write
21703123000
heap
page read and write
ED8003A4000
trusted library allocation
page read and write
ED800224000
trusted library allocation
page read and write
ED8028F8000
trusted library allocation
page read and write
21703123000
heap
page read and write
ED802DEC000
trusted library allocation
page read and write
197C000
heap
page read and write
1A7F000
heap
page read and write
ED802B50000
trusted library allocation
page read and write
96D000
heap
page read and write
90A000
heap
page read and write
3F21000
heap
page read and write
1D0546B3000
trusted library allocation
page read and write
ED801D1C000
trusted library allocation
page read and write
AA9417E000
unkown
page readonly
21703121000
heap
page read and write
1A01000
heap
page read and write
4CBE000
trusted library allocation
page read and write
42C000
unkown
page read and write
AA93B77000
stack
page read and write
1D052740000
heap
page readonly
3F21000
heap
page read and write
1D0537A4000
trusted library allocation
page read and write
21703106000
heap
page read and write
7FFD9B218000
trusted library allocation
page read and write
6A9E000
trusted library allocation
page read and write
3F21000
heap
page read and write
392C00640000
trusted library allocation
page read and write
3558000
heap
page read and write
1D062B71000
trusted library allocation
page read and write
295C000
stack
page read and write
1A01000
heap
page read and write
3F21000
heap
page read and write
5BA0002D8000
trusted library allocation
page read and write
46D000
direct allocation
page execute and read and write
28F601E0000
remote allocation
page read and write
7FFD9B058000
trusted library allocation
page read and write
1A4B000
heap
page read and write
ED80271C000
trusted library allocation
page read and write
1A01000
heap
page read and write
21708FFE000
heap
page read and write
21703126000
heap
page read and write
ED802D6C000
trusted library allocation
page read and write
ED802D6C000
trusted library allocation
page read and write
21703119000
heap
page read and write
1A60000
heap
page read and write
16C0000
heap
page read and write
ED8002B4000
trusted library allocation
page read and write
7FFD9B150000
trusted library allocation
page read and write
AA9359B000
stack
page read and write
28F600E3000
trusted library allocation
page read and write
ED800F84000
trusted library allocation
page read and write
21703123000
heap
page read and write
ED802E1C000
trusted library allocation
page read and write
ED800F40000
trusted library allocation
page read and write
7FFD9AF26000
trusted library allocation
page read and write
28F60055000
trusted library allocation
page read and write
28F60070000
trusted library allocation
page read and write
ED8002B4000
trusted library allocation
page read and write
21703126000
heap
page read and write
AA93CFD000
stack
page read and write
1D06ACBA000
heap
page read and write
ED800300000
trusted library allocation
page read and write
ED802F20000
trusted library allocation
page read and write
ED800C30000
trusted library allocation
page read and write
AA93D7E000
unkown
page readonly
21703126000
heap
page read and write
3050000
heap
page read and write
1D062E5C000
trusted library allocation
page read and write
21703126000
heap
page read and write
ED800294000
trusted library allocation
page read and write
3570000
heap
page read and write
741D000
trusted library allocation
page read and write
21703126000
heap
page read and write
357D000
heap
page read and write
ED802E3C000
trusted library allocation
page read and write
193E000
heap
page read and write
21703612000
heap
page read and write
1D06B1DB000
heap
page read and write
6AB9000
trusted library allocation
page read and write
ED8001C8000
trusted library allocation
page read and write
1A01000
heap
page read and write
340227E000
stack
page read and write
3F21000
heap
page read and write
6EE000
stack
page read and write
ED802EEC000
trusted library allocation
page read and write
5F44000
trusted library allocation
page read and write
197C000
heap
page read and write
E0F000
stack
page read and write
4CAC000
trusted library allocation
page read and write
1A96000
heap
page read and write
ED80136C000
trusted library allocation
page read and write
28F5AB60000
heap
page read and write
ED8001E4000
trusted library allocation
page read and write
392C006C0000
trusted library allocation
page read and write
52F000
direct allocation
page execute and read and write
700000
heap
page read and write
ED801C44000
trusted library allocation
page read and write
ED800FA8000
trusted library allocation
page read and write
ED802BE0000
trusted library allocation
page read and write
28F60240000
heap
page read and write
ED802AE0000
trusted library allocation
page read and write
197C000
heap
page read and write
197C000
heap
page read and write
1660000
heap
page read and write
28F600AF000
trusted library allocation
page read and write
2F90000
heap
page read and write
28F602FB000
heap
page read and write
1A81000
heap
page read and write
2170311B000
heap
page read and write
28F6025A000
heap
page read and write
ED8001AC000
trusted library allocation
page read and write
28F5AC8C000
heap
page read and write
3F21000
heap
page read and write
21703121000
heap
page read and write
392C0076C000
trusted library allocation
page read and write
197C000
heap
page read and write
197C000
heap
page read and write
ED802988000
trusted library allocation
page read and write
29C4000
heap
page read and write
7FFD9AF90000
trusted library allocation
page execute and read and write
ED80034C000
trusted library allocation
page read and write
7FFD9B080000
trusted library allocation
page read and write
3F21000
heap
page read and write
21703126000
heap
page read and write
2170313E000
heap
page read and write
3F21000
heap
page read and write
1A01000
heap
page read and write
7FFD9B0E0000
trusted library allocation
page read and write
ED802EE8000
trusted library allocation
page read and write
ED800CB4000
trusted library allocation
page read and write
7B24000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D0546FD000
trusted library allocation
page read and write
AA94CFE000
stack
page read and write
DC6000
heap
page read and write
ED8001B4000
trusted library allocation
page read and write
ED802ADC000
trusted library allocation
page read and write
ED800CB4000
trusted library allocation
page read and write
6921000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
ED802DC4000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED802A44000
trusted library allocation
page read and write
21703126000
heap
page read and write
1D053071000
trusted library allocation
page read and write
ED802970000
trusted library allocation
page read and write
ED80029A000
trusted library allocation
page read and write
ED8009A0000
trusted library allocation
page read and write
1A01000
heap
page read and write
69DA000
trusted library allocation
page read and write
392C00768000
trusted library allocation
page read and write
69BB000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
ED80164F000
trusted library allocation
page read and write
314F000
stack
page read and write
21703126000
heap
page read and write
21703123000
heap
page read and write
7592000
trusted library allocation
page read and write
357E000
heap
page read and write
ED802A6C000
trusted library allocation
page read and write
26AC000
stack
page read and write
ED802E84000
trusted library allocation
page read and write
1D050C78000
heap
page read and write
3F21000
heap
page read and write
21703126000
heap
page read and write
21703119000
heap
page read and write
197C000
heap
page read and write
4440000
trusted library allocation
page read and write
4C98000
trusted library allocation
page read and write
28F5AC6E000
heap
page read and write
ED80034C000
trusted library allocation
page read and write
5B2E000
stack
page read and write
21703111000
heap
page read and write
392C006E0000
trusted library allocation
page read and write
28F600B2000
trusted library allocation
page read and write
AA93E7E000
stack
page read and write
197C000
heap
page read and write
ED800340000
trusted library allocation
page read and write
21703121000
heap
page read and write
7FFD9AF56000
trusted library allocation
page execute and read and write
2170311B000
heap
page read and write
21703141000
heap
page read and write
21703123000
heap
page read and write
21703121000
heap
page read and write
6B32000
trusted library allocation
page read and write
197C000
heap
page read and write
466C000
stack
page read and write
392C00620000
trusted library allocation
page read and write
5AF0000
remote allocation
page read and write
7FFD9AE72000
trusted library allocation
page read and write
3F21000
heap
page read and write
28F600E0000
trusted library allocation
page read and write
5230000
heap
page read and write
500000
unkown
page readonly
7DF4A2420000
trusted library allocation
page execute and read and write
69E000
stack
page read and write
28F60190000
trusted library allocation
page read and write
4020000
trusted library allocation
page read and write
ED802B00000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
392C006F0000
trusted library allocation
page read and write
28F5B601000
trusted library allocation
page read and write
3F21000
heap
page read and write
28F601A0000
trusted library allocation
page read and write
93A000
heap
page read and write
1690000
heap
page read and write
4C69000
trusted library allocation
page read and write
ED800C78000
trusted library allocation
page read and write
E5C000
stack
page read and write
197C000
heap
page read and write
21703126000
heap
page read and write
392C0060C000
trusted library allocation
page read and write
1D06B638000
heap
page read and write
28F5BC20000
trusted library section
page readonly
28F60058000
trusted library allocation
page read and write
392C0034C000
trusted library allocation
page read and write
29B8000
heap
page read and write
ED800E1C000
trusted library allocation
page read and write
1D050E70000
heap
page read and write
ED802FD0000
trusted library allocation
page read and write
2BD7000
heap
page read and write
4CBE000
stack
page read and write
239E000
stack
page read and write
ED800F5C000
trusted library allocation
page read and write
197C000
heap
page read and write
21703121000
heap
page read and write
ED800C74000
trusted library allocation
page read and write
AA95C7E000
unkown
page readonly
ED80037C000
trusted library allocation
page read and write
2D4E000
stack
page read and write
1D05477C000
trusted library allocation
page read and write
ED802F2C000
trusted library allocation
page read and write
2FFE000
stack
page read and write
6A2A000
trusted library allocation
page read and write
3F21000
heap
page read and write
970000
heap
page read and write
21703121000
heap
page read and write
ED8029A4000
trusted library allocation
page read and write
21703602000
heap
page read and write
2170313C000
heap
page read and write
7FFD9AE74000
trusted library allocation
page read and write
ED800218000
trusted library allocation
page read and write
8A1000
unkown
page execute read
1D06B420000
heap
page read and write
18FB000
heap
page read and write
6A7C000
trusted library allocation
page read and write
ED800FDC000
trusted library allocation
page read and write
ED802A8C000
trusted library allocation
page read and write
3402077000
stack
page read and write
28F5ACBB000
heap
page read and write
41D0000
heap
page read and write
5BA0002E0000
trusted library allocation
page read and write
6989000
trusted library allocation
page read and write
23FE000
stack
page read and write
422D000
stack
page read and write
69B4000
trusted library allocation
page read and write
28F60131000
trusted library allocation
page read and write
6FC7000
trusted library allocation
page read and write
7FFD9B160000
trusted library allocation
page read and write
392C00624000
trusted library allocation
page read and write
7FFD9B2B0000
trusted library allocation
page read and write
ED800E54000
trusted library allocation
page read and write
ED802EB0000
trusted library allocation
page read and write
ED802DC0000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED802E18000
trusted library allocation
page read and write
2170311B000
heap
page read and write
392C00764000
trusted library allocation
page read and write
ED80129C000
trusted library allocation
page read and write
2E18000
heap
page read and write
ED800340000
trusted library allocation
page read and write
6AE7000
trusted library allocation
page read and write
ED800300000
trusted library allocation
page read and write
21703121000
heap
page read and write
3040000
heap
page read and write
21703121000
heap
page read and write
ED8002A8000
trusted library allocation
page read and write
28F5B402000
heap
page read and write
ED800CC4000
trusted library allocation
page read and write
17DF000
heap
page read and write
6B93000
trusted library allocation
page read and write
28F5BC00000
trusted library section
page readonly
392C00364000
trusted library allocation
page read and write
53C000
direct allocation
page execute and read and write
28F60128000
trusted library allocation
page read and write
69AC000
trusted library allocation
page read and write
3F21000
heap
page read and write
7AD9000
trusted library allocation
page read and write
3401DEE000
stack
page read and write
21703123000
heap
page read and write
AA949FE000
stack
page read and write
3F21000
heap
page read and write
1D050C70000
heap
page read and write
1A01000
heap
page read and write
73FB000
trusted library allocation
page read and write
1A01000
heap
page read and write
1A98000
heap
page read and write
1D054227000
trusted library allocation
page read and write
1A01000
heap
page read and write
ED80111C000
trusted library allocation
page read and write
7512000
trusted library allocation
page read and write
ED802C0C000
trusted library allocation
page read and write
1A01000
heap
page read and write
7FFD9AE7D000
trusted library allocation
page execute and read and write
2440000
heap
page read and write
21703123000
heap
page read and write
28F5B3E1000
trusted library allocation
page read and write
ED802FC4000
trusted library allocation
page read and write
7FFD9B100000
trusted library allocation
page read and write
21703122000
heap
page read and write
2170311E000
heap
page read and write
7AF9000
trusted library allocation
page read and write
751D000
trusted library allocation
page read and write
1D052B71000
trusted library allocation
page read and write
3F21000
heap
page read and write
29EC000
heap
page read and write
ED802B60000
trusted library allocation
page read and write
28F5AC9D000
heap
page read and write
ED802FB4000
trusted library allocation
page read and write
ED802DCC000
trusted library allocation
page read and write
28F5AC40000
heap
page read and write
975000
unkown
page readonly
21703126000
heap
page read and write
4C83000
trusted library allocation
page read and write
ED801184000
trusted library allocation
page read and write
1A01000
heap
page read and write
34020FD000
stack
page read and write
ED80298C000
trusted library allocation
page read and write
1D06B46D000
heap
page read and write
ED802738000
trusted library allocation
page read and write
ED802EC0000
trusted library allocation
page read and write
ED800C94000
trusted library allocation
page read and write
AA9587E000
unkown
page readonly
1A01000
heap
page read and write
392C00714000
trusted library allocation
page read and write
ED802D18000
trusted library allocation
page read and write
ED802E90000
trusted library allocation
page read and write
28F60302000
heap
page read and write
ED802E94000
trusted library allocation
page read and write
7FFD9B090000
trusted library allocation
page read and write
3061000
heap
page read and write
173A000
heap
page read and write
1A85000
heap
page read and write
7FFD9B110000
trusted library allocation
page read and write
305D000
heap
page read and write
1D06B0AF000
heap
page read and write
29C4000
heap
page read and write
ED800490000
trusted library allocation
page read and write
15BE000
stack
page read and write
2BC0000
heap
page read and write
ED802B70000
trusted library allocation
page read and write
7FFD9AE80000
trusted library allocation
page read and write
420000
unkown
page read and write
ED802334000
trusted library allocation
page read and write
ED801CD1000
trusted library allocation
page read and write
ED80037C000
trusted library allocation
page read and write
28F5AA60000
heap
page read and write
340318F000
stack
page read and write
3401D6E000
stack
page read and write
96D000
heap
page read and write
21703123000
heap
page read and write
ED800CB4000
trusted library allocation
page read and write
16F6000
heap
page read and write
28F602C7000
heap
page read and write
8A0000
unkown
page readonly
ED800C34000
trusted library allocation
page read and write
197C000
heap
page read and write
2E4F000
stack
page read and write
28F601E0000
remote allocation
page read and write
21703121000
heap
page read and write
ED8001F8000
trusted library allocation
page read and write
1A01000
heap
page read and write
3044000
heap
page read and write
3F21000
heap
page read and write
1D052700000
trusted library allocation
page read and write
ED802DA0000
trusted library allocation
page read and write
21703121000
heap
page read and write
1A01000
heap
page read and write
4C7B000
trusted library allocation
page read and write
7FFD9B021000
trusted library allocation
page read and write
3DD000
direct allocation
page execute and read and write
AA9437E000
unkown
page readonly
AA947FE000
stack
page read and write
ED802A0C000
trusted library allocation
page read and write
359C000
heap
page read and write
1D052825000
heap
page read and write
306E000
heap
page read and write
74D2000
trusted library allocation
page read and write
ED800228000
trusted library allocation
page read and write
1D052BF8000
trusted library allocation
page read and write
ED8030CC000
trusted library allocation
page read and write
6FB7000
trusted library allocation
page read and write
340330C000
stack
page read and write
ED80135C000
trusted library allocation
page read and write
21703111000
heap
page read and write
28F5AC6A000
heap
page read and write
21703115000
heap
page read and write
21703122000
heap
page read and write
3F21000
heap
page read and write
14A0000
heap
page read and write
1D06ACB6000
heap
page read and write
1D06AF09000
heap
page read and write
3F21000
heap
page read and write
ED802BDC000
trusted library allocation
page read and write
ED800C30000
trusted library allocation
page read and write
ED802AE8000
trusted library allocation
page read and write
1D06B44F000
heap
page read and write
21703126000
heap
page read and write
1A01000
heap
page read and write
392C00418000
trusted library allocation
page read and write
1D05390A000
trusted library allocation
page read and write
197C000
heap
page read and write
1D0538A6000
trusted library allocation
page read and write
7FFD9B070000
trusted library allocation
page read and write
197C000
heap
page read and write
3F21000
heap
page read and write
3AFC002D4000
direct allocation
page read and write
21703126000
heap
page read and write
4CED000
trusted library allocation
page read and write
34025BE000
stack
page read and write
1A01000
heap
page read and write
ED800340000
trusted library allocation
page read and write
ED8001DC000
trusted library allocation
page read and write
197C000
heap
page read and write
ED80037C000
trusted library allocation
page read and write
306E000
heap
page read and write
1D0527B0000
trusted library allocation
page read and write
28F5AC92000
heap
page read and write
ED8026E0000
trusted library allocation
page read and write
ED802AD0000
trusted library allocation
page read and write
2170313E000
heap
page read and write
3589000
heap
page read and write
7FFD9AECC000
trusted library allocation
page execute and read and write
ED802DE8000
trusted library allocation
page read and write
21703126000
heap
page read and write
28F5B513000
heap
page read and write
28F5AC64000
heap
page read and write
ED802E4C000
trusted library allocation
page read and write
6BF6000
trusted library allocation
page read and write
1D06AF00000
heap
page read and write
5BA0002B8000
trusted library allocation
page read and write
5C7000
direct allocation
page execute and read and write
ED802ED8000
trusted library allocation
page read and write
33F0000
heap
page read and write
197C000
heap
page read and write
28F600AC000
trusted library allocation
page read and write
32FF000
stack
page read and write
ED802908000
trusted library allocation
page read and write
392C003AC000
trusted library allocation
page read and write
197C000
heap
page read and write
340217B000
stack
page read and write
ED8029D8000
trusted library allocation
page read and write
3F21000
heap
page read and write
4CA2000
trusted library allocation
page read and write
3402436000
stack
page read and write
ED8029E4000
trusted library allocation
page read and write
ED802B6C000
trusted library allocation
page read and write
28F601E0000
remote allocation
page read and write
3F21000
heap
page read and write
28F60040000
trusted library allocation
page read and write
5ADF000
stack
page read and write
ED802EE4000
trusted library allocation
page read and write
7FFD9B140000
trusted library allocation
page read and write
5C4000
direct allocation
page execute and read and write
3401CE5000
stack
page read and write
21703126000
heap
page read and write
4A80000
trusted library allocation
page read and write
5BA0002FC000
trusted library allocation
page read and write
ED802E70000
trusted library allocation
page read and write
21703123000
heap
page read and write
ED8010C4000
trusted library allocation
page read and write
2170311B000
heap
page read and write
21703121000
heap
page read and write
3F21000
heap
page read and write
8FC000
stack
page read and write
305D000
heap
page read and write
1A01000
heap
page read and write
197C000
heap
page read and write
28F60096000
trusted library allocation
page read and write
743D000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED802C14000
trusted library allocation
page read and write
3F21000
heap
page read and write
2F8C000
stack
page read and write
21703126000
heap
page read and write
ED802984000
trusted library allocation
page read and write
6B88000
trusted library allocation
page read and write
1A01000
heap
page read and write
21703126000
heap
page read and write
28F6015A000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
28F5AC5D000
heap
page read and write
ED800338000
trusted library allocation
page read and write
ED80101C000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
29E8000
heap
page read and write
6B1F000
trusted library allocation
page read and write
ED80100C000
trusted library allocation
page read and write
197C000
heap
page read and write
1A5B000
heap
page read and write
197C000
heap
page read and write
15C0000
heap
page read and write
AA93C7E000
unkown
page readonly
197C000
heap
page read and write
392C00674000
trusted library allocation
page read and write
1D06AFE0000
heap
page read and write
ED800F34000
trusted library allocation
page read and write
392C00760000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED802AC8000
trusted library allocation
page read and write
ED8001F4000
trusted library allocation
page read and write
ED800CC4000
trusted library allocation
page read and write
5BA0002D4000
trusted library allocation
page read and write
1A01000
heap
page read and write
21703123000
heap
page read and write
650000
heap
page read and write
ED80296C000
trusted library allocation
page read and write
29C8000
heap
page read and write
6A48000
trusted library allocation
page read and write
2170312B000
heap
page read and write
21703126000
heap
page read and write
1A01000
heap
page read and write
ED802B98000
trusted library allocation
page read and write
7FFD9B190000
trusted library allocation
page read and write
6A68000
trusted library allocation
page read and write
5BA0002D8000
trusted library allocation
page read and write
3589000
heap
page read and write
197C000
heap
page read and write
AA94E7B000
stack
page read and write
5BA0002C8000
trusted library allocation
page read and write
7FFD9AE8B000
trusted library allocation
page read and write
5BA0002A8000
trusted library allocation
page read and write
ED802944000
trusted library allocation
page read and write
2DCE000
stack
page read and write
392C00688000
trusted library allocation
page read and write
AA94D7E000
unkown
page readonly
43D000
direct allocation
page execute and read and write
ED80034C000
trusted library allocation
page read and write
ED800C30000
trusted library allocation
page read and write
ED800294000
trusted library allocation
page read and write
7FFD9B209000
trusted library allocation
page read and write
6971000
trusted library allocation
page read and write
28F60261000
heap
page read and write
21703121000
heap
page read and write
ED8028CC000
trusted library allocation
page read and write
4C3E000
stack
page read and write
2BC4000
heap
page read and write
ED802B40000
trusted library allocation
page read and write
28F5BC40000
trusted library section
page readonly
392C00320000
trusted library allocation
page read and write
29D0000
heap
page read and write
392C006F4000
trusted library allocation
page read and write
AA9537E000
stack
page read and write
ED802BD8000
trusted library allocation
page read and write
2170311B000
heap
page read and write
392C00700000
trusted library allocation
page read and write
21703121000
heap
page read and write
ED8030AC000
trusted library allocation
page read and write
7BCF000
trusted library allocation
page read and write
28F602B5000
heap
page read and write
6EEE000
trusted library allocation
page read and write
2170311B000
heap
page read and write
28F5AC6C000
heap
page read and write
3F21000
heap
page read and write
ED802928000
trusted library allocation
page read and write
3F21000
heap
page read and write
56DD000
stack
page read and write
3F21000
heap
page read and write
2BD0000
heap
page read and write
AA9497E000
unkown
page readonly
3F21000
heap
page read and write
6909000
trusted library allocation
page read and write
6A41000
trusted library allocation
page read and write
28F60190000
trusted library allocation
page read and write
ED802EA8000
trusted library allocation
page read and write
2830000
heap
page read and write
197C000
heap
page read and write
ED800300000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D06B00C000
heap
page read and write
197C000
heap
page read and write
ED802E0C000
trusted library allocation
page read and write
1A01000
heap
page read and write
392C0085C000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED800C34000
trusted library allocation
page read and write
5BA0002D8000
trusted library allocation
page read and write
2D8F000
stack
page read and write
ED800300000
trusted library allocation
page read and write
AA93F7E000
unkown
page readonly
6A79000
trusted library allocation
page read and write
ED800F50000
trusted library allocation
page read and write
9EE000
stack
page read and write
28F61000000
heap
page read and write
ED8001F0000
trusted library allocation
page read and write
28F6013F000
trusted library allocation
page read and write
ED80022C000
trusted library allocation
page read and write
29EE000
heap
page read and write
400000
unkown
page readonly
7FFD9AF2C000
trusted library allocation
page execute and read and write
ED802DB0000
trusted library allocation
page read and write
ED802F10000
trusted library allocation
page read and write
1A01000
heap
page read and write
AA93A7E000
unkown
page readonly
3402378000
stack
page read and write
392C00744000
trusted library allocation
page read and write
1D050D1B000
heap
page read and write
3F21000
heap
page read and write
245B000
heap
page read and write
6A61000
trusted library allocation
page read and write
7FFD9B230000
trusted library allocation
page read and write
2420000
heap
page read and write
141C000
stack
page read and write
16E7000
heap
page read and write
21703126000
heap
page read and write
306E000
heap
page read and write
3F21000
heap
page read and write
2D00000
heap
page read and write
7FFD9B1E0000
trusted library allocation
page read and write
95A000
heap
page read and write
3B9000
direct allocation
page execute and read and write
699B000
trusted library allocation
page read and write
2710000
heap
page read and write
7FFD9B1E3000
trusted library allocation
page read and write
3020000
heap
page read and write
28F5AC2B000
heap
page read and write
1A01000
heap
page read and write
1D06B48D000
heap
page read and write
7FFD9B052000
trusted library allocation
page read and write
AA9467B000
stack
page read and write
ED802BA0000
trusted library allocation
page read and write
3570000
heap
page read and write
ED8028F4000
trusted library allocation
page read and write
ED802BE4000
trusted library allocation
page read and write
3F21000
heap
page read and write
392C006E4000
trusted library allocation
page read and write
ED802D90000
trusted library allocation
page read and write
3F21000
heap
page read and write
29E8000
heap
page read and write
1A78000
heap
page read and write
ED800AFC000
trusted library allocation
page read and write
1D050C82000
heap
page read and write
3F21000
heap
page read and write
ED800294000
trusted library allocation
page read and write
6A54000
trusted library allocation
page read and write
462E000
stack
page read and write
ED800F40000
trusted library allocation
page read and write
2170311B000
heap
page read and write
ED800294000
trusted library allocation
page read and write
392C006A8000
trusted library allocation
page read and write
28F60125000
trusted library allocation
page read and write
28F5BB20000
trusted library allocation
page read and write
21709006000
heap
page read and write
392C00654000
trusted library allocation
page read and write
1D052650000
heap
page read and write
2170313C000
heap
page read and write
21703123000
heap
page read and write
2170313E000
heap
page read and write
ED80295C000
trusted library allocation
page read and write
69FA000
trusted library allocation
page read and write
ED800338000
trusted library allocation
page read and write
ED802AAC000
trusted library allocation
page read and write
32B0000
heap
page read and write
3040000
heap
page read and write
392C00724000
trusted library allocation
page read and write
21703125000
heap
page read and write
7057000
trusted library allocation
page read and write
6995000
trusted library allocation
page read and write
4CCC000
trusted library allocation
page read and write
197C000
heap
page read and write
1D06AD11000
heap
page read and write
3F21000
heap
page read and write
AA94FFE000
stack
page read and write
ED800F40000
trusted library allocation
page read and write
2170313C000
heap
page read and write
7FFD9B204000
trusted library allocation
page read and write
93D000
unkown
page readonly
1D050E65000
heap
page read and write
ED802A1C000
trusted library allocation
page read and write
3F21000
heap
page read and write
5AF0000
remote allocation
page read and write
1D052D98000
trusted library allocation
page read and write
4ACE000
stack
page read and write
ED803058000
trusted library allocation
page read and write
28F60300000
heap
page read and write
ED802A4C000
trusted library allocation
page read and write
2970000
heap
page read and write
ED802C24000
trusted library allocation
page read and write
ED802A10000
trusted library allocation
page read and write
21703121000
heap
page read and write
69A3000
trusted library allocation
page read and write
AA9517A000
stack
page read and write
ED802B34000
trusted library allocation
page read and write
7B8E000
trusted library allocation
page read and write
7FFD9B120000
trusted library allocation
page read and write
1D06B149000
heap
page read and write
ED800338000
trusted library allocation
page read and write
1D050D37000
heap
page read and write
9A0000
heap
page read and write
21703121000
heap
page read and write
51AE000
stack
page read and write
392C00664000
trusted library allocation
page read and write
21703123000
heap
page read and write
2170311B000
heap
page read and write
28F5AC13000
heap
page read and write
ED802B8C000
trusted library allocation
page read and write
28F5ACFE000
heap
page read and write
392C00698000
trusted library allocation
page read and write
ED802A2C000
trusted library allocation
page read and write
1A01000
heap
page read and write
AA9427C000
stack
page read and write
4CDC000
trusted library allocation
page read and write
1A01000
heap
page read and write
3F21000
heap
page read and write
6BDE000
trusted library allocation
page read and write
93C000
heap
page read and write
6928000
trusted library allocation
page read and write
ED80294C000
trusted library allocation
page read and write
942000
heap
page read and write
1D050D21000
heap
page read and write
ED8003B4000
trusted library allocation
page read and write
ED802738000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED800214000
trusted library allocation
page read and write
ED802A7C000
trusted library allocation
page read and write
29C0000
heap
page read and write
ED802EDC000
trusted library allocation
page read and write
197C000
heap
page read and write
21703126000
heap
page read and write
29EC000
heap
page read and write
3F21000
heap
page read and write
21703108000
heap
page read and write
3F21000
heap
page read and write
DA0000
heap
page read and write
ED800294000
trusted library allocation
page read and write
1D06B63E000
heap
page read and write
1A01000
heap
page read and write
ED802AF0000
trusted library allocation
page read and write
401000
unkown
page execute read
ED802BA4000
trusted library allocation
page read and write
1D06B447000
heap
page read and write
ED802B04000
trusted library allocation
page read and write
7DF4A2440000
trusted library allocation
page execute and read and write
197C000
heap
page read and write
ED8001D8000
trusted library allocation
page read and write
4D10000
heap
page read and write
500000
unkown
page readonly
28F6024D000
heap
page read and write
AA94F7E000
unkown
page readonly
7C99000
trusted library allocation
page read and write
ED80240C000
trusted library allocation
page read and write
ED8029A8000
trusted library allocation
page read and write
ED8009A0000
trusted library allocation
page read and write
1D06B0BB000
heap
page read and write
2170310C000
heap
page read and write
7FFD9B300000
trusted library allocation
page read and write
2430000
heap
page read and write
ED800AFC000
trusted library allocation
page read and write
21703123000
heap
page read and write
21703121000
heap
page read and write
21703117000
heap
page read and write
AA9487E000
unkown
page readonly
2840000
heap
page read and write
19D9000
heap
page read and write
28F5AD13000
heap
page read and write
392C006D8000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
1D052800000
heap
page read and write
21703123000
heap
page read and write
392C00630000
trusted library allocation
page read and write
1D06B5F5000
heap
page read and write
392C006F8000
trusted library allocation
page read and write
6A8D000
trusted library allocation
page read and write
1D062B89000
trusted library allocation
page read and write
28F60120000
trusted library allocation
page read and write
2170311B000
heap
page read and write
4CFF000
stack
page read and write
ED80292C000
trusted library allocation
page read and write
AA9477E000
unkown
page readonly
ED802334000
trusted library allocation
page read and write
40C000
direct allocation
page execute and read and write
164E000
stack
page read and write
7FFD9B010000
trusted library allocation
page read and write
66D1000
heap
page read and write
1A01000
heap
page read and write
21703123000
heap
page read and write
7FFD9B05B000
trusted library allocation
page read and write
197C000
heap
page read and write
28F6022B000
heap
page read and write
6A57000
trusted library allocation
page read and write
3F21000
heap
page read and write
2170311D000
heap
page read and write
ED802E7C000
trusted library allocation
page read and write
1D06B000000
heap
page read and write
28F60048000
trusted library allocation
page read and write
ED800F50000
trusted library allocation
page read and write
7FFD9B240000
trusted library allocation
page execute and read and write
7FFD9B0F0000
trusted library allocation
page read and write
197C000
heap
page read and write
AA95BFE000
stack
page read and write
19A000
stack
page read and write
1D06AC80000
heap
page read and write
3F21000
heap
page read and write
1D06AFFC000
heap
page read and write
1664000
heap
page read and write
ED802F94000
trusted library allocation
page read and write
ED802ACC000
trusted library allocation
page read and write
ED802F7C000
trusted library allocation
page read and write
34021FE000
stack
page read and write
ED8024DC000
trusted library allocation
page read and write
28F602D3000
heap
page read and write
ED802D48000
trusted library allocation
page read and write
15F4000
heap
page read and write
73F3000
trusted library allocation
page read and write
ED802E68000
trusted library allocation
page read and write
ED803088000
trusted library allocation
page read and write
1D052730000
trusted library allocation
page read and write
ED802C38000
trusted library allocation
page read and write
1D06B1D4000
heap
page read and write
2170311B000
heap
page read and write
ED8012FC000
trusted library allocation
page read and write
1411000
stack
page read and write
3F21000
heap
page read and write
1D0535EF000
trusted library allocation
page read and write
ED800230000
trusted library allocation
page read and write
3F21000
heap
page read and write
98D000
heap
page read and write
ED802BE8000
trusted library allocation
page read and write
290E000
stack
page read and write
21703126000
heap
page read and write
ED8026F8000
trusted library allocation
page read and write
ED8026EC000
trusted library allocation
page read and write
ED800B74000
trusted library allocation
page read and write
ED802950000
trusted library allocation
page read and write
306E000
heap
page read and write
3F21000
heap
page read and write
ED800FA9000
trusted library allocation
page read and write
28F5ABA0000
trusted library section
page read and write
28F60170000
trusted library allocation
page read and write
AA9507E000
unkown
page readonly
2170311B000
heap
page read and write
1D0546F8000
trusted library allocation
page read and write
ED802918000
trusted library allocation
page read and write
1D052710000
trusted library section
page read and write
1D062B99000
trusted library allocation
page read and write
ED802B1C000
trusted library allocation
page read and write
ED803044000
trusted library allocation
page read and write
6C0B000
trusted library allocation
page read and write
7FFD9B2D0000
trusted library allocation
page execute and read and write
ED8028BC000
trusted library allocation
page read and write
21703123000
heap
page read and write
69D3000
trusted library allocation
page read and write
E60000
heap
page read and write
ED80021C000
trusted library allocation
page read and write
21703122000
heap
page read and write
7AC4000
trusted library allocation
page read and write
1D06B004000
heap
page read and write
197C000
heap
page read and write
392C006C8000
trusted library allocation
page read and write
28F5AA80000
heap
page read and write
ED8030C4000
trusted library allocation
page read and write
5BA000248000
trusted library allocation
page read and write
7FFD9B02A000
trusted library allocation
page read and write
7FFD9AE90000
trusted library allocation
page read and write
1D050D62000
heap
page read and write
3F21000
heap
page read and write
392C00770000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
ED8029D0000
trusted library allocation
page read and write
2669000
stack
page read and write
ED8029D4000
trusted library allocation
page read and write
29D3000
heap
page read and write
392C006C4000
trusted library allocation
page read and write
88E000
stack
page read and write
ED800300000
trusted library allocation
page read and write
28F602E4000
heap
page read and write
392C00740000
trusted library allocation
page read and write
2E00000
heap
page read and write
ED802D2C000
trusted library allocation
page read and write
5BA0002D8000
trusted library allocation
page read and write
1FB0000
heap
page read and write
6F8F000
trusted library allocation
page read and write
ED800F84000
trusted library allocation
page read and write
ED802A60000
trusted library allocation
page read and write
1A01000
heap
page read and write
ED800FB4000
trusted library allocation
page read and write
6BE9000
trusted library allocation
page read and write
ED802F00000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
3F21000
heap
page read and write
197C000
heap
page read and write
4C70000
trusted library allocation
page read and write
5BA0002B8000
trusted library allocation
page read and write
4C53000
trusted library allocation
page read and write
ED800F5C000
trusted library allocation
page read and write
ED8030D4000
trusted library allocation
page read and write
301F000
stack
page read and write
3F21000
heap
page read and write
ED802D90000
trusted library allocation
page read and write
21703123000
heap
page read and write
3589000
heap
page read and write
1A01000
heap
page read and write
ED802B9C000
trusted library allocation
page read and write
3595000
heap
page read and write
1D06B4CE000
heap
page read and write
34026BD000
stack
page read and write
21703126000
heap
page read and write
340263F000
stack
page read and write
7FFD9B2A0000
trusted library allocation
page read and write
40C000
unkown
page write copy
5BA0002D4000
trusted library allocation
page read and write
ED802E34000
trusted library allocation
page read and write
28F6004E000
trusted library allocation
page read and write
ED800234000
trusted library allocation
page read and write
28F5BC10000
trusted library section
page readonly
3F21000
heap
page read and write
ED800338000
trusted library allocation
page read and write
ED802B08000
trusted library allocation
page read and write
7FFD9B1C0000
trusted library allocation
page read and write
28F6028C000
heap
page read and write
516F000
stack
page read and write
21703126000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
ED800338000
trusted library allocation
page read and write
74FD000
trusted library allocation
page read and write
ED800338000
trusted library allocation
page read and write
28F60030000
trusted library allocation
page read and write
21708FFE000
heap
page read and write
8CE000
stack
page read and write
29EC000
heap
page read and write
197C000
heap
page read and write
7FFD9B180000
trusted library allocation
page read and write
305D000
heap
page read and write
197C000
heap
page read and write
1A01000
heap
page read and write
21703121000
heap
page read and write
1A01000
heap
page read and write
ED801080000
trusted library allocation
page read and write
28F60041000
trusted library allocation
page read and write
1D062DBC000
trusted library allocation
page read and write
1A90000
heap
page read and write
963000
unkown
page readonly
ED80034C000
trusted library allocation
page read and write
4B0D000
stack
page read and write
6979000
trusted library allocation
page read and write
ED801CD3000
trusted library allocation
page read and write
ED802A34000
trusted library allocation
page read and write
197C000
heap
page read and write
ED802AC4000
trusted library allocation
page read and write
ED802DDC000
trusted library allocation
page read and write
21703119000
heap
page read and write
3F21000
heap
page read and write
15F0000
heap
page read and write
2170311B000
heap
page read and write
ED801404000
trusted library allocation
page read and write
392C0080C000
trusted library allocation
page read and write
949000
heap
page read and write
2170311B000
heap
page read and write
ED802AC0000
trusted library allocation
page read and write
4C78000
trusted library allocation
page read and write
ED800CE8000
trusted library allocation
page read and write
3CA000
direct allocation
page execute and read and write
ED800294000
trusted library allocation
page read and write
3F21000
heap
page read and write
340340E000
stack
page read and write
6FBF000
trusted library allocation
page read and write
5BA000248000
trusted library allocation
page read and write
3403289000
stack
page read and write
3F21000
heap
page read and write
28F602F8000
heap
page read and write
34022FA000
stack
page read and write
7FFD9B220000
trusted library allocation
page read and write
1D052720000
trusted library section
page read and write
21703126000
heap
page read and write
392C003A0000
trusted library allocation
page read and write
ED80280C000
trusted library allocation
page read and write
ED800CCC000
trusted library allocation
page read and write
ED800C34000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
7FFD9B0D0000
trusted library allocation
page read and write
7FFD9B0B0000
trusted library allocation
page read and write
4C57000
trusted library allocation
page read and write
ED802E88000
trusted library allocation
page read and write
6A4D000
trusted library allocation
page read and write
9F0000
heap
page read and write
197C000
heap
page read and write
ED8029B8000
trusted library allocation
page read and write
ED800338000
trusted library allocation
page read and write
197C000
heap
page read and write
359C000
heap
page read and write
3F21000
heap
page read and write
ED80034C000
trusted library allocation
page read and write
1ECE000
heap
page read and write
5200000
heap
page read and write
28F5B415000
heap
page read and write
ED800340000
trusted library allocation
page read and write
28F60040000
trusted library allocation
page read and write
ED802BB4000
trusted library allocation
page read and write
ED802F88000
trusted library allocation
page read and write
1A01000
heap
page read and write
21703142000
heap
page read and write
2EE0000
heap
page read and write
21703111000
heap
page read and write
4B8E000
stack
page read and write
1D053C5D000
trusted library allocation
page read and write
6F07000
trusted library allocation
page read and write
ED800F50000
trusted library allocation
page read and write
358D000
heap
page read and write
21703126000
heap
page read and write
392C00634000
trusted library allocation
page read and write
392C00364000
trusted library allocation
page read and write
ED802E78000
trusted library allocation
page read and write
6A5F000
trusted library allocation
page read and write
4CC4000
trusted library allocation
page read and write
2170311B000
heap
page read and write
28F600FA000
trusted library allocation
page read and write
ED802FB4000
trusted library allocation
page read and write
6A01000
trusted library allocation
page read and write
392C00390000
trusted library allocation
page read and write
ED800F84000
trusted library allocation
page read and write
392C00340000
trusted library allocation
page read and write
21703126000
heap
page read and write
ED802744000
trusted library allocation
page read and write
1D054842000
trusted library allocation
page read and write
15F5000
heap
page read and write
4C86000
trusted library allocation
page read and write
ED80106C000
trusted library allocation
page read and write
ED802AB0000
trusted library allocation
page read and write
1D06B5FC000
heap
page read and write
21703126000
heap
page read and write
68EA000
trusted library allocation
page read and write
ED80100C000
trusted library allocation
page read and write
1FB6000
heap
page read and write
33DE000
stack
page read and write
4740000
trusted library allocation
page read and write
21703111000
heap
page read and write
975000
unkown
page readonly
ED8028C8000
trusted library allocation
page read and write
AA939FE000
stack
page read and write
2170313E000
heap
page read and write
21703119000
heap
page read and write
ED802B28000
trusted library allocation
page read and write
7FFD9B2C0000
trusted library allocation
page read and write
392C006DC000
trusted library allocation
page read and write
19AE000
heap
page read and write
ED801C14000
trusted library allocation
page read and write
3F21000
heap
page read and write
ED80037C000
trusted library allocation
page read and write
There are 1700 hidden memdumps, click here to show them.