IOC Report
IeccNv7PP6.exe

loading gif

Files

File Path
Type
Category
Malicious
IeccNv7PP6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\795F.tmp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BAKFBKEHDBGHJJKFIEGDBKKFID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BFBGHDGCFHIDBGDGIIIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBGCGDBK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DVWHKMNFNN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EGHCBKKKFHCGCBFIJEHD
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\HIIIECAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJEGHJECFCFCBFIDBGCG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KEGDBFIJKEBGIDGDHCGCAFHJKK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_795F.tmp.exe_4c36602123b780a5103e2c77d8eee33836dd2d2b_fe89adb8_9645d9f8-bb8d-41c5-92e4-e861ebd515e8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD9DF.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 23:07:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB28.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB67.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 91
ASCII text, with very long lines (792)
downloaded
Chrome Cache Entry: 92
ASCII text
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (65531)
downloaded
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IeccNv7PP6.exe
"C:\Users\user\Desktop\IeccNv7PP6.exe"
malicious
C:\Users\user\AppData\Local\Temp\795F.tmp.exe
"C:\Users\user\AppData\Local\Temp\795F.tmp.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2588 --field-trial-handle=2396,i,7018353345002748784,17151017752572951290,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7684 -s 2368

URLs

Name
IP
Malicious
http://92.255.57.88/7550b1c08332241a/vcruntime140.dll
92.255.57.88
malicious
http://92.255.57.88/7bbacc20a3bd2eb5.php
92.255.57.88
malicious
http://92.255.57.88/7550b1c08332241a/nss3.dll
92.255.57.88
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://google-ohttp-relay-query.fastly-edge.com/i
unknown
http://92.255.57.88/7550b1c08332241a/nss3.dllLocal
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bl
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://post-to-me.com/track_prt.php?sub=&cc=DE
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icop
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-3.corp.googlPW
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.phpl
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.phpg
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
https://www.google.com/tools/feedback/chrome/__submitl
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DE9
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://176.113.115.37/ScreenUpdateSync.exe2
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DE
172.67.179.207
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://92.255.57.88632c0de8dc88bf952d9fd39b81048567e366cf44255b67866c03
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
post-to-me.com
172.67.179.207
www.google.com
142.250.181.100

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
92.255.57.88
unknown
Russian Federation
malicious
176.113.115.37
unknown
Russian Federation
172.67.179.207
post-to-me.com
United States
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\prtscreen
Enabled
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
ProgramId
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
FileId
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
LowerCaseLongPath
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
LongPathHash
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
Name
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
OriginalFileName
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
Publisher
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
Version
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
BinFileVersion
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
BinaryType
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
ProductName
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
ProductVersion
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
LinkDate
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
BinProductVersion
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
AppxPackageFullName
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
AppxPackageRelativeId
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
Size
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
Language
\REGISTRY\A\{db404f01-e1bc-de81-e468-832f11289f81}\Root\InventoryApplicationFile\795f.tmp.exe|92e211f038094d50
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
22F0000
direct allocation
page read and write
malicious
85E000
heap
page read and write
malicious
810000
direct allocation
page execute and read and write
malicious
6C4002F1C000
trusted library allocation
page read and write
75C400294000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C40025A8000
trusted library allocation
page read and write
D15F7F9000
stack
page read and write
6C4004C18000
trusted library allocation
page read and write
25489CDE000
trusted library section
page read and write
6C4004F44000
trusted library allocation
page read and write
6C40028BC000
trusted library allocation
page read and write
20F9E000
stack
page read and write
6C4003178000
trusted library allocation
page read and write
6C4003188000
trusted library allocation
page read and write
6C40022A8000
trusted library allocation
page read and write
6C4004950000
trusted library allocation
page read and write
1A72F000
stack
page read and write
693C00310000
trusted library allocation
page read and write
6C400523C000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254830B6000
heap
page read and write
6C4004B10000
trusted library allocation
page read and write
693C00620000
trusted library allocation
page read and write
254830AA000
heap
page read and write
75C400270000
trusted library allocation
page read and write
4D4000
unkown
page execute and read and write
D1587FE000
stack
page read and write
2B7400220000
direct allocation
page read and write
6C4003148000
trusted library allocation
page read and write
1A62F000
stack
page read and write
254836A3000
heap
page read and write
254830A2000
heap
page read and write
6C4004F44000
trusted library allocation
page read and write
6C40023B4000
trusted library allocation
page read and write
6C4002628000
trusted library allocation
page read and write
6C400307C000
trusted library allocation
page read and write
6C40030D8000
trusted library allocation
page read and write
254830AA000
heap
page read and write
75C4002C4000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
6C4002E18000
trusted library allocation
page read and write
254F9113000
heap
page read and write
6C4004FBC000
trusted library allocation
page read and write
6C4004B8C000
trusted library allocation
page read and write
20D4F000
heap
page read and write
6C4003034000
trusted library allocation
page read and write
D14E7FD000
stack
page read and write
2E49000
heap
page read and write
6C4002F54000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C0F1000
unkown
page execute read
20D85000
heap
page read and write
254830B6000
heap
page read and write
254830AF000
heap
page read and write
254830A4000
heap
page read and write
6C4004DC8000
trusted library allocation
page read and write
254830AA000
heap
page read and write
254830A4000
heap
page read and write
6C40048F8000
trusted library allocation
page read and write
4F5E000
stack
page read and write
254830AF000
heap
page read and write
2B7400234000
direct allocation
page read and write
25483616000
heap
page read and write
254830B7000
heap
page read and write
D1467FD000
stack
page read and write
254830B3000
heap
page read and write
6C40024B4000
trusted library allocation
page read and write
6C4002AA8000
trusted library allocation
page read and write
6C4004530000
trusted library allocation
page read and write
75C400235000
trusted library allocation
page read and write
20D3D000
heap
page read and write
6C40024FF000
trusted library allocation
page read and write
2548A520000
trusted library section
page read and write
6C4004DD0000
trusted library allocation
page read and write
485E000
stack
page read and write
6C4003F7A000
trusted library allocation
page read and write
6C4004B54000
trusted library allocation
page read and write
6C4004D44000
trusted library allocation
page read and write
6C4004ADC000
trusted library allocation
page read and write
D13B7FA000
stack
page read and write
254830B6000
heap
page read and write
254F8FC0000
heap
page read and write
2548A0EE000
trusted library section
page read and write
254835FC000
heap
page read and write
D14EFFE000
unkown
page readonly
6C4002E6C000
trusted library allocation
page read and write
8C1000
heap
page read and write
6C4003094000
trusted library allocation
page read and write
6C40050C4000
trusted library allocation
page read and write
693C0060C000
trusted library allocation
page read and write
6C4005058000
trusted library allocation
page read and write
20E30000
heap
page read and write
693C0025C000
trusted library allocation
page read and write
25483099000
heap
page read and write
254830AA000
heap
page read and write
D159FFE000
unkown
page readonly
6C400259C000
trusted library allocation
page read and write
6C4004F28000
trusted library allocation
page read and write
6C4002DD4000
trusted library allocation
page read and write
400000
unkown
page readonly
254830B6000
heap
page read and write
6C400507C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
693C00684000
trusted library allocation
page read and write
6C4000601000
trusted library allocation
page read and write
6C4004CB8000
trusted library allocation
page read and write
6C400335C000
trusted library allocation
page read and write
693C00788000
trusted library allocation
page read and write
254F90DB000
heap
page read and write
254830AB000
heap
page read and write
254830B6000
heap
page read and write
254830D1000
heap
page read and write
6C40048FC000
trusted library allocation
page read and write
6C4005128000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4003EC8000
trusted library allocation
page read and write
1ADD0000
trusted library allocation
page read and write
6C4005028000
trusted library allocation
page read and write
6C4005178000
trusted library allocation
page read and write
6C400254C000
trusted library allocation
page read and write
25483095000
heap
page read and write
6C4003248000
trusted library allocation
page read and write
6C4002DD4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4003118000
trusted library allocation
page read and write
6C4003218000
trusted library allocation
page read and write
254830B3000
heap
page read and write
6C40029F8000
trusted library allocation
page read and write
6C4004CCC000
trusted library allocation
page read and write
1AB5E000
stack
page read and write
6C4002E90000
trusted library allocation
page read and write
254835D2000
heap
page read and write
6C4002F74000
trusted library allocation
page read and write
241E000
stack
page read and write
693C00658000
trusted library allocation
page read and write
254830B3000
heap
page read and write
254F9010000
trusted library allocation
page read and write
254F8FF0000
heap
page read and write
6C400326C000
trusted library allocation
page read and write
25489F80000
trusted library section
page read and write
254830B6000
heap
page read and write
254830B6000
heap
page read and write
254830B0000
heap
page read and write
693C006AC000
trusted library allocation
page read and write
6C40050E4000
trusted library allocation
page read and write
6C4004534000
trusted library allocation
page read and write
6C40030DC000
trusted library allocation
page read and write
6C400254C000
trusted library allocation
page read and write
560C000
heap
page read and write
254830B6000
heap
page read and write
9B000
stack
page read and write
254F9020000
heap
page read and write
2548309E000
heap
page read and write
D15BFFE000
unkown
page readonly
2D9A000
heap
page read and write
693C0078C000
trusted library allocation
page read and write
6C4003510000
trusted library allocation
page read and write
254830AF000
heap
page read and write
20D70000
heap
page read and write
2B7400215000
direct allocation
page read and write
2C1E000
stack
page read and write
254830AA000
heap
page read and write
6C4003588000
trusted library allocation
page read and write
20D70000
heap
page read and write
6C4002FC0000
trusted library allocation
page read and write
6C4004984000
trusted library allocation
page read and write
75C4002A0000
trusted library allocation
page read and write
2548A2E2000
trusted library section
page read and write
693C006C4000
trusted library allocation
page read and write
465000
unkown
page readonly
254830B6000
heap
page read and write
2E54000
heap
page read and write
D1527FC000
stack
page read and write
D132FFE000
unkown
page readonly
2E08000
heap
page read and write
6C4004CC4000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4000801000
trusted library allocation
page read and write
1F0000
heap
page read and write
55B0000
heap
page read and write
2B7400303000
direct allocation
page read and write
693C002F2000
trusted library allocation
page read and write
20D41000
heap
page read and write
6C4005294000
trusted library allocation
page read and write
75C400250000
trusted library allocation
page read and write
2B74002D0000
direct allocation
page read and write
6C4005258000
trusted library allocation
page read and write
1A8BE000
stack
page read and write
2C80000
heap
page read and write
D1597FA000
stack
page read and write
2E82000
heap
page read and write
254830B6000
heap
page read and write
254830CA000
heap
page read and write
6C4004F90000
trusted library allocation
page read and write
6C40024F7000
trusted library allocation
page read and write
254830AB000
heap
page read and write
6C4002D88000
trusted library allocation
page read and write
6C4004470000
trusted library allocation
page read and write
6C40023F0000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002A01000
trusted library allocation
page read and write
6C40030DC000
trusted library allocation
page read and write
6C4003118000
trusted library allocation
page read and write
2420000
heap
page read and write
6C4004B1C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254836A3000
heap
page read and write
254830AA000
heap
page read and write
254F9295000
heap
page read and write
75C4002F0000
trusted library allocation
page read and write
20D5F000
heap
page read and write
6C190000
unkown
page readonly
D15FFFE000
unkown
page readonly
20D65000
heap
page read and write
20ED5000
heap
page read and write
6C40023EC000
trusted library allocation
page read and write
254830AF000
heap
page read and write
20D65000
heap
page read and write
6C4002F4C000
trusted library allocation
page read and write
52DF000
stack
page read and write
6C40032B8000
trusted library allocation
page read and write
693C00320000
trusted library allocation
page read and write
D15CFFE000
unkown
page readonly
6C4005001000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C40025A8000
trusted library allocation
page read and write
6C4005094000
trusted library allocation
page read and write
6C4004FB0000
trusted library allocation
page read and write
D157FFE000
unkown
page readonly
6C4002494000
trusted library allocation
page read and write
6C4004F68000
trusted library allocation
page read and write
75C400264000
trusted library allocation
page read and write
6C4003EB9000
trusted library allocation
page read and write
254830AF000
heap
page read and write
254830AA000
heap
page read and write
254830C0000
heap
page read and write
6C4002B9C000
trusted library allocation
page read and write
6C400260C000
trusted library allocation
page read and write
7B5000
heap
page read and write
6C4003158000
trusted library allocation
page read and write
D13C7FE000
stack
page read and write
505F000
stack
page read and write
6C4002C01000
trusted library allocation
page read and write
6C400352D000
trusted library allocation
page read and write
693C00201000
trusted library allocation
page read and write
6C4003510000
trusted library allocation
page read and write
D1387FA000
stack
page read and write
6C4004FC0000
trusted library allocation
page read and write
6C4003148000
trusted library allocation
page read and write
85A000
heap
page read and write
20D5A000
heap
page read and write
75C4002C4000
trusted library allocation
page read and write
25489257000
unclassified section
page read and write
6C4003ED7000
trusted library allocation
page read and write
6C4004AC0000
trusted library allocation
page read and write
D1577FD000
stack
page read and write
20D30000
trusted library allocation
page read and write
6C4003164000
trusted library allocation
page read and write
254830B3000
heap
page read and write
254830AA000
heap
page read and write
2A95000
unkown
page readonly
6C16D000
unkown
page readonly
6C4003350000
trusted library allocation
page read and write
254830AA000
heap
page read and write
2E4E000
heap
page read and write
2548309E000
heap
page read and write
6C4002EC8000
trusted library allocation
page read and write
254830BA000
heap
page read and write
6C4004D68000
trusted library allocation
page read and write
6C400254C000
trusted library allocation
page read and write
254830B3000
heap
page read and write
254830A2000
heap
page read and write
6C400254C000
trusted library allocation
page read and write
6C4002558000
trusted library allocation
page read and write
D147FFE000
unkown
page readonly
6C40030E8000
trusted library allocation
page read and write
D15D7FE000
stack
page read and write
6C4002BCC000
trusted library allocation
page read and write
6C40023AC000
trusted library allocation
page read and write
6C40028D4000
trusted library allocation
page read and write
6C4002788000
trusted library allocation
page read and write
6C4003118000
trusted library allocation
page read and write
254830AA000
heap
page read and write
D14DFFE000
unkown
page readonly
6C4002401000
trusted library allocation
page read and write
254877D8000
heap
page read and write
6C4003248000
trusted library allocation
page read and write
254F90BD000
heap
page read and write
6C40029C8000
trusted library allocation
page read and write
6C4004C74000
trusted library allocation
page read and write
D1397FB000
stack
page read and write
5460000
remote allocation
page read and write
6C4004B6C000
trusted library allocation
page read and write
254898F0000
trusted library section
page read and write
401000
unkown
page execute read
254830B6000
heap
page read and write
6C4002690000
trusted library allocation
page read and write
6C4004801000
trusted library allocation
page read and write
254830B6000
heap
page read and write
1F0000
heap
page read and write
20D70000
heap
page read and write
20D70000
heap
page read and write
6C4002B10000
trusted library allocation
page read and write
6C4003604000
trusted library allocation
page read and write
2B74002AC000
direct allocation
page read and write
6C400384F000
trusted library allocation
page read and write
2548A3E2000
trusted library section
page read and write
693C006EC000
trusted library allocation
page read and write
6C4003C4F000
trusted library allocation
page read and write
2548364C000
heap
page read and write
1A9BE000
stack
page read and write
6C400309C000
trusted library allocation
page read and write
20D57000
heap
page read and write
254830AF000
heap
page read and write
693C006FC000
trusted library allocation
page read and write
254830AF000
heap
page read and write
254830D1000
heap
page read and write
20D4A000
heap
page read and write
6C4004530000
trusted library allocation
page read and write
254830A2000
heap
page read and write
25483640000
heap
page read and write
254877EF000
heap
page read and write
D1307FE000
stack
page read and write
6C4002504000
trusted library allocation
page read and write
254836B0000
trusted library section
page read and write
6C4002CFC000
trusted library allocation
page read and write
6C400492C000
trusted library allocation
page read and write
254830A6000
heap
page read and write
6C4002E50000
trusted library allocation
page read and write
D1407FE000
stack
page read and write
6C4005090000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002801000
trusted library allocation
page read and write
6C4004D50000
trusted library allocation
page read and write
6C4002594000
trusted library allocation
page read and write
6C4005044000
trusted library allocation
page read and write
6C400259C000
trusted library allocation
page read and write
693C00320000
trusted library allocation
page read and write
25482230000
unkown
page read and write
D1607FE000
stack
page read and write
254830D1000
heap
page read and write
6C4002E70000
trusted library allocation
page read and write
6C40031C4000
trusted library allocation
page read and write
254830AF000
heap
page read and write
254830A4000
heap
page read and write
75C40020D000
trusted library allocation
page read and write
6C40026E0000
trusted library allocation
page read and write
6C4004938000
trusted library allocation
page read and write
6C400506C000
trusted library allocation
page read and write
20D57000
heap
page read and write
254830B6000
heap
page read and write
254830AF000
heap
page read and write
6C4004950000
trusted library allocation
page read and write
6C4002858000
trusted library allocation
page read and write
6C40025A8000
trusted library allocation
page read and write
6C400247C000
trusted library allocation
page read and write
519F000
stack
page read and write
6C4002494000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002580000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254830B6000
heap
page read and write
6C40030DC000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002EC8000
trusted library allocation
page read and write
6C4004CF8000
trusted library allocation
page read and write
245C000
heap
page read and write
20D70000
heap
page read and write
254830AF000
heap
page read and write
6C4002594000
trusted library allocation
page read and write
D14D7FB000
stack
page read and write
6C4002EE0000
trusted library allocation
page read and write
6C4004DCC000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C4002E34000
trusted library allocation
page read and write
6C4004E48000
trusted library allocation
page read and write
6C40023B4000
trusted library allocation
page read and write
254830B0000
heap
page read and write
6C4003230000
trusted library allocation
page read and write
93E000
heap
page read and write
254830AF000
heap
page read and write
6C4003E40000
trusted library allocation
page read and write
693C00750000
trusted library allocation
page read and write
6C4003148000
trusted library allocation
page read and write
6C40034BC000
trusted library allocation
page read and write
6C400320C000
trusted library allocation
page read and write
254830C1000
heap
page read and write
6C40025C8000
trusted library allocation
page read and write
2548309E000
heap
page read and write
6C40022D0000
trusted library allocation
page read and write
254830A2000
heap
page read and write
20D34000
heap
page read and write
6C4004474000
trusted library allocation
page read and write
6C4003F5E000
trusted library allocation
page read and write
2548A3ED000
trusted library section
page read and write
2B7400290000
direct allocation
page read and write
20D4F000
heap
page read and write
6C4004D84000
trusted library allocation
page read and write
693C00408000
trusted library allocation
page read and write
693C00784000
trusted library allocation
page read and write
2450000
heap
page read and write
75C4002A8000
trusted library allocation
page read and write
6C400316C000
trusted library allocation
page read and write
D13FFFE000
unkown
page readonly
20D5F000
heap
page read and write
693C002FC000
trusted library allocation
page read and write
6C4002244000
trusted library allocation
page read and write
D13DFFE000
unkown
page readonly
254830AA000
heap
page read and write
2B7400284000
direct allocation
page read and write
6C40029C8000
trusted library allocation
page read and write
6C40023E8000
trusted library allocation
page read and write
6C4003214000
trusted library allocation
page read and write
6C36F000
unkown
page write copy
6C400293C000
trusted library allocation
page read and write
6C4004450000
trusted library allocation
page read and write
6C4002BA8000
trusted library allocation
page read and write
6C40030F0000
trusted library allocation
page read and write
25483680000
heap
page read and write
6C4005250000
trusted library allocation
page read and write
6C4004C9C000
trusted library allocation
page read and write
75C400230000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254830A4000
heap
page read and write
6C4004D48000
trusted library allocation
page read and write
254830AF000
heap
page read and write
254835B8000
heap
page read and write
6C40034E8000
trusted library allocation
page read and write
6C400349C000
trusted library allocation
page read and write
D153FFE000
unkown
page readonly
693C00640000
trusted library allocation
page read and write
693C00374000
trusted library allocation
page read and write
6C4002978000
trusted library allocation
page read and write
6C4002D48000
trusted library allocation
page read and write
693C00320000
trusted library allocation
page read and write
6C40024BB000
trusted library allocation
page read and write
6C40034A0000
trusted library allocation
page read and write
20D4F000
heap
page read and write
254830AA000
heap
page read and write
20D70000
heap
page read and write
254830A6000
heap
page read and write
6C4004E40000
trusted library allocation
page read and write
400000
unkown
page readonly
6C4003088000
trusted library allocation
page read and write
20D53000
heap
page read and write
20D5F000
heap
page read and write
693C00288000
trusted library allocation
page read and write
943000
heap
page read and write
6C4002DC0000
trusted library allocation
page read and write
2113B000
heap
page read and write
582C000
stack
page read and write
6C400220C000
trusted library allocation
page read and write
6C400235C000
trusted library allocation
page read and write
6C4003060000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4003F11000
trusted library allocation
page read and write
6C40051B4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
693C007D0000
trusted library allocation
page read and write
6C4004944000
trusted library allocation
page read and write
6C4003198000
trusted library allocation
page read and write
410000
unkown
page execute read
2B7400201000
direct allocation
page read and write
254830AB000
heap
page read and write
75C4002B8000
trusted library allocation
page read and write
4E1F000
stack
page read and write
254830B6000
heap
page read and write
6C4002E40000
trusted library allocation
page read and write
2E1C000
heap
page read and write
6C400529C000
trusted library allocation
page read and write
6C4003FA0000
trusted library allocation
page read and write
6C400316C000
trusted library allocation
page read and write
6C400527C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
2548A062000
trusted library section
page read and write
6C4005078000
trusted library allocation
page read and write
6C4002EDE000
trusted library allocation
page read and write
6C40028E4000
trusted library allocation
page read and write
20D70000
heap
page read and write
693C00678000
trusted library allocation
page read and write
6C4003118000
trusted library allocation
page read and write
2113A000
heap
page read and write
6C4002DD4000
trusted library allocation
page read and write
6C4004C6C000
trusted library allocation
page read and write
D14F7FE000
stack
page read and write
254830B6000
heap
page read and write
254830AF000
heap
page read and write
2548368E000
heap
page read and write
6C4003548000
trusted library allocation
page read and write
6C40034B6000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C40048DC000
trusted library allocation
page read and write
6C400254C000
trusted library allocation
page read and write
75C4002F4000
trusted library allocation
page read and write
75C4002A8000
trusted library allocation
page read and write
6C4004BCC000
trusted library allocation
page read and write
6C4004F68000
trusted library allocation
page read and write
254830AF000
heap
page read and write
693C006B8000
trusted library allocation
page read and write
20D5F000
heap
page read and write
254830AA000
heap
page read and write
6C40023B4000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4003124000
trusted library allocation
page read and write
20D3E000
heap
page read and write
254830AA000
heap
page read and write
6C4003048000
trusted library allocation
page read and write
6C4004D00000
trusted library allocation
page read and write
2109F000
stack
page read and write
6C40051A4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4000201000
trusted library allocation
page read and write
6C4002AE8000
trusted library allocation
page read and write
693C0035C000
trusted library allocation
page read and write
20E7F000
heap
page read and write
194000
stack
page read and write
6C4004D1C000
trusted library allocation
page read and write
25483630000
heap
page read and write
254830B3000
heap
page read and write
6C4004E28000
trusted library allocation
page read and write
693C00754000
trusted library allocation
page read and write
D149FFE000
unkown
page readonly
6C40027E8000
trusted library allocation
page read and write
6C400440C000
trusted library allocation
page read and write
55F0000
heap
page read and write
1AC5E000
stack
page read and write
6C4002318000
trusted library allocation
page read and write
254830AA000
heap
page read and write
6C4002FB4000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254830AA000
heap
page read and write
6C4005230000
trusted library allocation
page read and write
2B7400250000
direct allocation
page read and write
6C4004C70000
trusted library allocation
page read and write
D1507FE000
stack
page read and write
25483689000
heap
page read and write
20D57000
heap
page read and write
20D4D000
heap
page read and write
23DE000
stack
page read and write
693C006E4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C40043E2000
trusted library allocation
page read and write
6C4005048000
trusted library allocation
page read and write
20D57000
heap
page read and write
2B74002EC000
direct allocation
page read and write
254830A4000
heap
page read and write
6C4005244000
trusted library allocation
page read and write
6C4003568000
trusted library allocation
page read and write
D15E7FD000
stack
page read and write
44D000
unkown
page readonly
6C4004C0C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254F90E0000
heap
page read and write
254830B6000
heap
page read and write
254830A4000
heap
page read and write
20D70000
heap
page read and write
6C370000
unkown
page read and write
25483080000
heap
page read and write
6C400254C000
trusted library allocation
page read and write
6C4005080000
trusted library allocation
page read and write
6C400316C000
trusted library allocation
page read and write
6C40025EC000
trusted library allocation
page read and write
6C4003E34000
trusted library allocation
page read and write
6C4002F0C000
trusted library allocation
page read and write
6C40046DC000
trusted library allocation
page read and write
25489313000
trusted library section
page read and write
6C4003FEF000
trusted library allocation
page read and write
693C00330000
trusted library allocation
page read and write
6C4003034000
trusted library allocation
page read and write
6C4002EC8000
trusted library allocation
page read and write
6C40023F4000
trusted library allocation
page read and write
254830B3000
heap
page read and write
2D90000
heap
page read and write
6C4004FA4000
trusted library allocation
page read and write
75C4002B8000
trusted library allocation
page read and write
6C40023C4000
trusted library allocation
page read and write
20E71000
heap
page read and write
D146FFE000
unkown
page readonly
6C4002694000
trusted library allocation
page read and write
6C40030F0000
trusted library allocation
page read and write
6C4002594000
trusted library allocation
page read and write
6C400325C000
trusted library allocation
page read and write
693C00404000
trusted library allocation
page read and write
6C4002504000
trusted library allocation
page read and write
6C40029CC000
trusted library allocation
page read and write
D13AFFE000
unkown
page readonly
20D30000
heap
page read and write
6C4005068000
trusted library allocation
page read and write
6C40024F4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4004264000
trusted library allocation
page read and write
6C4004C44000
trusted library allocation
page read and write
20D55000
heap
page read and write
2E4B000
heap
page read and write
6C40025A8000
trusted library allocation
page read and write
6C4002C24000
trusted library allocation
page read and write
254830A5000
heap
page read and write
25489107000
unclassified section
page read and write
2B80000
heap
page read and write
6C4002588000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254830AF000
heap
page read and write
75C400288000
trusted library allocation
page read and write
20E85000
heap
page read and write
6C400316C000
trusted library allocation
page read and write
6C4002F9C000
trusted library allocation
page read and write
6C40022F0000
trusted library allocation
page read and write
D1317FE000
stack
page read and write
6C400353C000
trusted library allocation
page read and write
254830B3000
heap
page read and write
D1557FE000
stack
page read and write
6C40032E0000
trusted library allocation
page read and write
2B7400270000
direct allocation
page read and write
6C4002870000
trusted library allocation
page read and write
254F90D9000
heap
page read and write
6C4002498000
trusted library allocation
page read and write
6C4004395000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4004B04000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C4002E2C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254830A4000
heap
page read and write
D1537FD000
stack
page read and write
254830A4000
heap
page read and write
6C4004D88000
trusted library allocation
page read and write
6C4004CA0000
trusted library allocation
page read and write
6C4004FC4000
trusted library allocation
page read and write
6C4004BB4000
trusted library allocation
page read and write
75C4002E4000
trusted library allocation
page read and write
D137FFE000
unkown
page readonly
6C4004FC8000
trusted library allocation
page read and write
D1327FE000
stack
page read and write
25483070000
heap
page read and write
6C40032A4000
trusted library allocation
page read and write
6C4002B2C000
trusted library allocation
page read and write
20D57000
heap
page read and write
6C4004BA4000
trusted library allocation
page read and write
6C40034B0000
trusted library allocation
page read and write
6C400423C000
trusted library allocation
page read and write
693C00610000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254835B4000
heap
page read and write
2B74002DC000
direct allocation
page read and write
254830AF000
heap
page read and write
25483697000
heap
page read and write
254830B3000
heap
page read and write
254830AF000
heap
page read and write
254830AF000
heap
page read and write
6C40042C2000
trusted library allocation
page read and write
6C400353E000
trusted library allocation
page read and write
6C40026FC000
trusted library allocation
page read and write
46DE000
stack
page read and write
6C4004D54000
trusted library allocation
page read and write
254830B6000
heap
page read and write
D14CFFE000
unkown
page readonly
6C4004C2C000
trusted library allocation
page read and write
6C4005201000
trusted library allocation
page read and write
D1517FD000
stack
page read and write
6C4005040000
trusted library allocation
page read and write
254830A4000
heap
page read and write
75C4002B8000
trusted library allocation
page read and write
1ACD1000
heap
page read and write
6C4002E01000
trusted library allocation
page read and write
6C4004F68000
trusted library allocation
page read and write
6C40025D8000
trusted library allocation
page read and write
254830B9000
heap
page read and write
6C4005198000
trusted library allocation
page read and write
D1417FE000
stack
page read and write
6C4003574000
trusted library allocation
page read and write
6C40023DC000
trusted library allocation
page read and write
6C4004601000
trusted library allocation
page read and write
D1487FC000
stack
page read and write
6C4004F8C000
trusted library allocation
page read and write
6C4004F68000
trusted library allocation
page read and write
20D5F000
heap
page read and write
6C4003EC8000
trusted library allocation
page read and write
D158FFE000
unkown
page readonly
6C4003124000
trusted library allocation
page read and write
6C40032F8000
trusted library allocation
page read and write
2B740020C000
direct allocation
page read and write
6C40026F0000
trusted library allocation
page read and write
6C40048E8000
trusted library allocation
page read and write
2B74002E4000
direct allocation
page read and write
254830B6000
heap
page read and write
6C400280C000
trusted library allocation
page read and write
55B2000
heap
page read and write
20D65000
heap
page read and write
25483099000
heap
page read and write
75C4002A0000
trusted library allocation
page read and write
6C4003FF2000
trusted library allocation
page read and write
693C00770000
trusted library allocation
page read and write
6C40023D8000
trusted library allocation
page read and write
6C4002F28000
trusted library allocation
page read and write
6C40025A8000
trusted library allocation
page read and write
254830B3000
heap
page read and write
6C4003EFC000
trusted library allocation
page read and write
2548A343000
trusted library section
page read and write
6C400518C000
trusted library allocation
page read and write
6C4004C58000
trusted library allocation
page read and write
6C4002201000
trusted library allocation
page read and write
D155FFE000
unkown
page readonly
6C4002C3C000
trusted library allocation
page read and write
6C4004B28000
trusted library allocation
page read and write
489E000
stack
page read and write
6C4002430000
trusted library allocation
page read and write
254830AB000
heap
page read and write
6C40024B0000
trusted library allocation
page read and write
254830AA000
heap
page read and write
5460000
remote allocation
page read and write
6C4002758000
trusted library allocation
page read and write
20E50000
heap
page read and write
6C4004EF8000
trusted library allocation
page read and write
6C4004DA0000
trusted library allocation
page read and write
25489CD0000
trusted library section
page read and write
6C375000
unkown
page readonly
6C4002A98000
trusted library allocation
page read and write
6C40050FC000
trusted library allocation
page read and write
6C4002494000
trusted library allocation
page read and write
6C4004B3C000
trusted library allocation
page read and write
693C00704000
trusted library allocation
page read and write
6C4003A04000
trusted library allocation
page read and write
254830AA000
heap
page read and write
254830B3000
heap
page read and write
254830B3000
heap
page read and write
6C4004C3C000
trusted library allocation
page read and write
6C4002601000
trusted library allocation
page read and write
75C400248000
trusted library allocation
page read and write
20E78000
heap
page read and write
254830B6000
heap
page read and write
D151FFE000
unkown
page readonly
254830B6000
heap
page read and write
2548A2EE000
trusted library section
page read and write
254830B3000
heap
page read and write
254830B3000
heap
page read and write
20D4D000
heap
page read and write
6C4004C40000
trusted library allocation
page read and write
6C400259C000
trusted library allocation
page read and write
6C4003568000
trusted library allocation
page read and write
6C4002394000
trusted library allocation
page read and write
254876F0000
trusted library section
page read and write
6C4002E76000
trusted library allocation
page read and write
254817E3000
heap
page read and write
6C4002D64000
trusted library allocation
page read and write
254830B7000
heap
page read and write
20D5F000
heap
page read and write
254830AF000
heap
page read and write
693C00380000
trusted library allocation
page read and write
6C400296C000
trusted library allocation
page read and write
2E39000
heap
page read and write
51DE000
stack
page read and write
80E000
stack
page read and write
D156FFE000
unkown
page readonly
1ACC0000
heap
page read and write
2B7400260000
direct allocation
page read and write
254830A4000
heap
page read and write
254830B6000
heap
page read and write
1ACD1000
heap
page read and write
D1367FB000
stack
page read and write
6C4003E34000
trusted library allocation
page read and write
6C4004944000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C400435B000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4005284000
trusted library allocation
page read and write
254830B3000
heap
page read and write
20ED2000
heap
page read and write
6C4004B20000
trusted library allocation
page read and write
5EE0000
heap
page read and write
6C4002274000
trusted library allocation
page read and write
6C4002410000
trusted library allocation
page read and write
6C4003568000
trusted library allocation
page read and write
254830D1000
heap
page read and write
6C4002A7C000
trusted library allocation
page read and write
6C40029DC000
trusted library allocation
page read and write
693C00330000
trusted library allocation
page read and write
6C400240C000
trusted library allocation
page read and write
6C40031A8000
trusted library allocation
page read and write
20D70000
heap
page read and write
6C40051D4000
trusted library allocation
page read and write
20D70000
heap
page read and write
6C4002EE0000
trusted library allocation
page read and write
6C40034F0000
trusted library allocation
page read and write
6C4004F44000
trusted library allocation
page read and write
6C4004C84000
trusted library allocation
page read and write
6C4004CC8000
trusted library allocation
page read and write
6C4004CA8000
trusted library allocation
page read and write
6C40043A8000
trusted library allocation
page read and write
25483694000
heap
page read and write
20D6A000
heap
page read and write
254830B3000
heap
page read and write
6C40052BC000
trusted library allocation
page read and write
20D65000
heap
page read and write
254830C0000
heap
page read and write
6C400296E000
trusted library allocation
page read and write
25483300000
heap
page read and write
6C4005088000
trusted library allocation
page read and write
6C4003EB9000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C40024C0000
trusted library allocation
page read and write
D15B7FE000
stack
page read and write
6C4004CA4000
trusted library allocation
page read and write
6C4004B5C000
trusted library allocation
page read and write
6C4003001000
trusted library allocation
page read and write
254830B3000
heap
page read and write
254830B6000
heap
page read and write
D134FFE000
unkown
page readonly
6C4002EC8000
trusted library allocation
page read and write
6C4002A0C000
trusted library allocation
page read and write
25489F91000
trusted library section
page read and write
20D4F000
heap
page read and write
6C4002B50000
trusted library allocation
page read and write
6C400480C000
trusted library allocation
page read and write
254F8FA0000
heap
page read and write
20D5F000
heap
page read and write
25489C07000
unclassified section
page read and write
254830B6000
heap
page read and write
254896F0000
trusted library section
page read and write
693C002CC000
trusted library allocation
page read and write
6C4002ED8000
trusted library allocation
page read and write
6C400509C000
trusted library allocation
page read and write
D13D7FE000
stack
page read and write
1A76E000
stack
page read and write
254830AA000
heap
page read and write
254830B6000
heap
page read and write
6C4002D6C000
trusted library allocation
page read and write
2B740023C000
direct allocation
page read and write
21140000
heap
page read and write
6C4004E1C000
trusted library allocation
page read and write
6C4002C0C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
75C4002D8000
trusted library allocation
page read and write
D154FFE000
unkown
page readonly
6C400421B000
trusted library allocation
page read and write
6C40050EC000
trusted library allocation
page read and write
6C4004CEC000
trusted library allocation
page read and write
21132000
heap
page read and write
6C400299E000
trusted library allocation
page read and write
254830B3000
heap
page read and write
254877ED000
heap
page read and write
6C4004BDC000
trusted library allocation
page read and write
254830AA000
heap
page read and write
254830AF000
heap
page read and write
254830AA000
heap
page read and write
6C400340C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
75C4002C8000
trusted library allocation
page read and write
254830B6000
heap
page read and write
2B7400294000
direct allocation
page read and write
693C006D0000
trusted library allocation
page read and write
6C4003E0C000
trusted library allocation
page read and write
254830AB000
heap
page read and write
6C40025A8000
trusted library allocation
page read and write
6C40029C4000
trusted library allocation
page read and write
20D4F000
heap
page read and write
693C0020C000
trusted library allocation
page read and write
D15AFFE000
unkown
page readonly
6C4004DD4000
trusted library allocation
page read and write
693C0027C000
trusted library allocation
page read and write
6C40025D8000
trusted library allocation
page read and write
6C4005230000
trusted library allocation
page read and write
254830B3000
heap
page read and write
20D65000
heap
page read and write
254830AA000
heap
page read and write
693C002B8000
trusted library allocation
page read and write
693C0040C000
trusted library allocation
page read and write
6C4004F8C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
1AB0D000
stack
page read and write
693C00624000
trusted library allocation
page read and write
693C00668000
trusted library allocation
page read and write
693C00230000
trusted library allocation
page read and write
6C4004B70000
trusted library allocation
page read and write
D13CFFE000
unkown
page readonly
6C4002CE8000
trusted library allocation
page read and write
55B1000
heap
page read and write
6C4002618000
trusted library allocation
page read and write
20D5F000
heap
page read and write
254830A6000
heap
page read and write
6C4003118000
trusted library allocation
page read and write
254830AF000
heap
page read and write
693C002EC000
trusted library allocation
page read and write
509E000
stack
page read and write
9B000
stack
page read and write
75C4002B8000
trusted library allocation
page read and write
254830B3000
heap
page read and write
2E54000
heap
page read and write
6C4002BB4000
trusted library allocation
page read and write
2548A06D000
trusted library section
page read and write
20D5F000
heap
page read and write
20D84000
heap
page read and write
20D65000
heap
page read and write
254830B6000
heap
page read and write
693C00248000
trusted library allocation
page read and write
254830AF000
heap
page read and write
254877BC000
heap
page read and write
D1477FC000
stack
page read and write
61EB7000
direct allocation
page readonly
254830B3000
heap
page read and write
20E73000
heap
page read and write
6C4002988000
trusted library allocation
page read and write
6C4002EB0000
trusted library allocation
page read and write
6C4004C24000
trusted library allocation
page read and write
6C40050E8000
trusted library allocation
page read and write
75C4002C4000
trusted library allocation
page read and write
6C4002F3C000
trusted library allocation
page read and write
254F9028000
heap
page read and write
254830B6000
heap
page read and write
254830D1000
heap
page read and write
75C4002F8000
trusted library allocation
page read and write
6C4002C2C000
trusted library allocation
page read and write
6C40032C8000
trusted library allocation
page read and write
693C00401000
trusted library allocation
page read and write
75C400238000
trusted library allocation
page read and write
6C40051C4000
trusted library allocation
page read and write
20D51000
heap
page read and write
2B7400274000
direct allocation
page read and write
6C4004DF0000
trusted library allocation
page read and write
6C4002FB9000
trusted library allocation
page read and write
254830B3000
heap
page read and write
6C4000A01000
trusted library allocation
page read and write
531E000
stack
page read and write
6C4002611000
trusted library allocation
page read and write
6C40050DC000
trusted library allocation
page read and write
4717000
heap
page read and write
D13E7FE000
stack
page read and write
541F000
stack
page read and write
6C4004B9C000
trusted library allocation
page read and write
6C40052B4000
trusted library allocation
page read and write
D14A7FC000
stack
page read and write
6C4002EC8000
trusted library allocation
page read and write
254830B3000
heap
page read and write
6C40023B4000
trusted library allocation
page read and write
254830A2000
heap
page read and write
254830B8000
heap
page read and write
6C4002BE8000
trusted library allocation
page read and write
21143000
heap
page read and write
254830B6000
heap
page read and write
6C4002C78000
trusted library allocation
page read and write
D14FFFE000
unkown
page readonly
254830AA000
heap
page read and write
42B000
unkown
page execute read
6C4004428000
trusted library allocation
page read and write
693C00664000
trusted library allocation
page read and write
6C4004B58000
trusted library allocation
page read and write
6C4002FB4000
trusted library allocation
page read and write
6C40050C0000
trusted library allocation
page read and write
6C4004201000
trusted library allocation
page read and write
D15A7FC000
stack
page read and write
D1437FE000
stack
page read and write
254830B3000
heap
page read and write
6C4004988000
trusted library allocation
page read and write
6C4002DD8000
trusted library allocation
page read and write
6C4004E01000
trusted library allocation
page read and write
20D4D000
heap
page read and write
20D65000
heap
page read and write
4F1F000
stack
page read and write
6C40034F8000
trusted library allocation
page read and write
25489F70000
trusted library section
page read and write
6C4004D4C000
trusted library allocation
page read and write
254830D1000
heap
page read and write
254F903E000
heap
page read and write
6C4002B7C000
trusted library allocation
page read and write
2B7400210000
direct allocation
page read and write
6C4003F78000
trusted library allocation
page read and write
6C4002490000
trusted library allocation
page read and write
6C400508C000
trusted library allocation
page read and write
693C00644000
trusted library allocation
page read and write
254830AF000
heap
page read and write
20D5F000
heap
page read and write
6C4004FD8000
trusted library allocation
page read and write
2C50000
heap
page read and write
20D51000
heap
page read and write
254830A6000
heap
page read and write
6C4000001000
trusted library allocation
page read and write
20D42000
heap
page read and write
20D4F000
heap
page read and write
6C4002884000
trusted library allocation
page read and write
20D3E000
heap
page read and write
6C4002494000
trusted library allocation
page read and write
254830A2000
heap
page read and write
6C40024A4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002684000
trusted library allocation
page read and write
6C4002AFC000
trusted library allocation
page read and write
6C400259C000
trusted library allocation
page read and write
75C4002A0000
trusted library allocation
page read and write
6C40046DC000
trusted library allocation
page read and write
6C40046E0000
trusted library allocation
page read and write
693C00330000
trusted library allocation
page read and write
254830AA000
heap
page read and write
254830AF000
heap
page read and write
20D4C000
heap
page read and write
693C0033C000
trusted library allocation
page read and write
6C40052C8000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254835C2000
heap
page read and write
254830AA000
heap
page read and write
6C4004C28000
trusted library allocation
page read and write
6C4002DD8000
trusted library allocation
page read and write
254830B6000
heap
page read and write
693C00250000
trusted library allocation
page read and write
693C00390000
trusted library allocation
page read and write
20D65000
heap
page read and write
6C4004CF4000
trusted library allocation
page read and write
6C40031A8000
trusted library allocation
page read and write
20D70000
heap
page read and write
7B7000
heap
page read and write
61ED4000
direct allocation
page readonly
730000
direct allocation
page execute and read and write
55DA000
heap
page read and write
6C4004F28000
trusted library allocation
page read and write
D138FFE000
unkown
page readonly
6C32F000
unkown
page readonly
254830B6000
heap
page read and write
6C4004380000
trusted library allocation
page read and write
2340000
heap
page read and write
75C4002A0000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4004C90000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
6C400445C000
trusted library allocation
page read and write
D150FFE000
unkown
page readonly
6C4004B40000
trusted library allocation
page read and write
6C400491B000
trusted library allocation
page read and write
20D84000
heap
page read and write
55B3000
heap
page read and write
6C4004274000
trusted library allocation
page read and write
25489380000
trusted library section
page read and write
2D8F000
stack
page read and write
6C40048F8000
trusted library allocation
page read and write
254830B3000
heap
page read and write
254877B0000
heap
page read and write
6C4004CB0000
trusted library allocation
page read and write
20D65000
heap
page read and write
61ED3000
direct allocation
page read and write
6C4002A2C000
trusted library allocation
page read and write
20D5F000
heap
page read and write
6C4005270000
trusted library allocation
page read and write
20D5F000
heap
page read and write
850000
heap
page read and write
6C4002D18000
trusted library allocation
page read and write
6C4002EFC000
trusted library allocation
page read and write
20D5F000
heap
page read and write
6C4004CFC000
trusted library allocation
page read and write
6C4004DB0000
trusted library allocation
page read and write
8A1000
heap
page read and write
458000
unkown
page write copy
2548A386000
trusted library section
page read and write
693C00694000
trusted library allocation
page read and write
1ACD0000
heap
page read and write
693C00760000
trusted library allocation
page read and write
254830AA000
heap
page read and write
6C4004F44000
trusted library allocation
page read and write
75C4002C4000
trusted library allocation
page read and write
6C4002971000
trusted library allocation
page read and write
6C4002D08000
trusted library allocation
page read and write
6C4003590000
trusted library allocation
page read and write
6C400269C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C40048EC000
trusted library allocation
page read and write
254892D2000
trusted library section
page read and write
6C40025B4000
trusted library allocation
page read and write
6C4003148000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C4004D64000
trusted library allocation
page read and write
6C0F0000
unkown
page readonly
6C4004AD8000
trusted library allocation
page read and write
6C40042B0000
trusted library allocation
page read and write
6C4005100000
trusted library allocation
page read and write
484000
unkown
page execute and read and write
6C4002F9F000
trusted library allocation
page read and write
20D70000
heap
page read and write
6C4004BC8000
trusted library allocation
page read and write
6C4003F24000
trusted library allocation
page read and write
D12FFFE000
unkown
page readonly
6C4003034000
trusted library allocation
page read and write
693C002B0000
trusted library allocation
page read and write
254830B0000
heap
page read and write
6C400496C000
trusted library allocation
page read and write
239E000
stack
page read and write
254830B3000
heap
page read and write
D133FFE000
unkown
page readonly
25483099000
heap
page read and write
6C4003248000
trusted library allocation
page read and write
20D30000
trusted library allocation
page read and write
D145FFE000
unkown
page readonly
6C4002568000
trusted library allocation
page read and write
6C4003401000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4002DE8000
trusted library allocation
page read and write
6C40050A0000
trusted library allocation
page read and write
20D4A000
heap
page read and write
6C4003E01000
trusted library allocation
page read and write
25483697000
heap
page read and write
6C4002B1C000
trusted library allocation
page read and write
75C4002A0000
trusted library allocation
page read and write
254830B6000
heap
page read and write
75C4002A0000
trusted library allocation
page read and write
254830B3000
heap
page read and write
6C40050E0000
trusted library allocation
page read and write
6C4004DAC000
trusted library allocation
page read and write
6C4005030000
trusted library allocation
page read and write
6C4003118000
trusted library allocation
page read and write
254830AA000
heap
page read and write
6C4004C48000
trusted library allocation
page read and write
75C400260000
trusted library allocation
page read and write
6C4004D10000
trusted library allocation
page read and write
6C400221C000
trusted library allocation
page read and write
6C4003054000
trusted library allocation
page read and write
693C0075C000
trusted library allocation
page read and write
6C4002A54000
trusted library allocation
page read and write
6C4004DF8000
trusted library allocation
page read and write
20D70000
heap
page read and write
693C00734000
trusted library allocation
page read and write
254830AA000
heap
page read and write
6C4005098000
trusted library allocation
page read and write
254830AA000
heap
page read and write
19D000
stack
page read and write
6C400241C000
trusted library allocation
page read and write
693C00210000
trusted library allocation
page read and write
6C4004436000
trusted library allocation
page read and write
254830AF000
heap
page read and write
20D57000
heap
page read and write
254830AF000
heap
page read and write
693C00758000
trusted library allocation
page read and write
254830AF000
heap
page read and write
2B74002A8000
direct allocation
page read and write
254830A4000
heap
page read and write
2E85000
heap
page read and write
254830AF000
heap
page read and write
693C006D4000
trusted library allocation
page read and write
20D4F000
heap
page read and write
6C40034B1000
trusted library allocation
page read and write
254830B7000
heap
page read and write
254F8FB0000
heap
page readonly
4D1F000
stack
page read and write
6C40024A4000
trusted library allocation
page read and write
D1377FC000
stack
page read and write
6C4005124000
trusted library allocation
page read and write
693C00614000
trusted library allocation
page read and write
6C40027A4000
trusted library allocation
page read and write
6C4004BE0000
trusted library allocation
page read and write
D143FFE000
unkown
page readonly
6C4004DC4000
trusted library allocation
page read and write
254830D1000
heap
page read and write
6C40035A4000
trusted library allocation
page read and write
6C400295C000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
6C4003014000
trusted library allocation
page read and write
20D4D000
heap
page read and write
6C4002494000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
6C400242C000
trusted library allocation
page read and write
6C4004D2C000
trusted library allocation
page read and write
6C4004908000
trusted library allocation
page read and write
6C4004EF8000
trusted library allocation
page read and write
693C006E8000
trusted library allocation
page read and write
59E0000
heap
page read and write
6C4004D3C000
trusted library allocation
page read and write
6C4003284000
trusted library allocation
page read and write
693C002DC000
trusted library allocation
page read and write
6C4004FF8000
trusted library allocation
page read and write
2E51000
heap
page read and write
25487803000
heap
page read and write
6C4004CAC000
trusted library allocation
page read and write
25487800000
heap
page read and write
592F000
stack
page read and write
6C400288C000
trusted library allocation
page read and write
6C4002F44000
trusted library allocation
page read and write
6C4002EF0000
trusted library allocation
page read and write
2548309E000
heap
page read and write
567000
unkown
page execute and read and write
6C4004CB4000
trusted library allocation
page read and write
693C0033C000
trusted library allocation
page read and write
254817E0000
heap
page read and write
254830B3000
heap
page read and write
254830B3000
heap
page read and write
2B7400280000
direct allocation
page read and write
6C400237C000
trusted library allocation
page read and write
6C400501C000
trusted library allocation
page read and write
D13BFFE000
unkown
page readonly
7A0000
heap
page read and write
254830A4000
heap
page read and write
401000
unkown
page execute read
25489C27000
unclassified section
page read and write
6C4004304000
trusted library allocation
page read and write
6C182000
unkown
page readonly
75C4002B8000
trusted library allocation
page read and write
254830B3000
heap
page read and write
6C400292C000
trusted library allocation
page read and write
6C40028C9000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254830A4000
heap
page read and write
20D57000
heap
page read and write
6C40024E0000
trusted library allocation
page read and write
2E39000
heap
page read and write
6C40050B0000
trusted library allocation
page read and write
64A000
unkown
page execute and read and write
6C400490D000
trusted library allocation
page read and write
6C40027D4000
trusted library allocation
page read and write
6C4005054000
trusted library allocation
page read and write
2C70000
heap
page read and write
D12F7FE000
unkown
page read and write
6C4003538000
trusted library allocation
page read and write
6C400229F000
trusted library allocation
page read and write
693C007C8000
trusted library allocation
page read and write
6C40029B8000
trusted library allocation
page read and write
6C4004349000
trusted library allocation
page read and write
6C4004994000
trusted library allocation
page read and write
D1547FE000
stack
page read and write
254830AA000
heap
page read and write
6C40034B8000
trusted library allocation
page read and write
6C17E000
unkown
page read and write
693C00730000
trusted library allocation
page read and write
6C4003530000
trusted library allocation
page read and write
20D84000
heap
page read and write
D140FFE000
unkown
page readonly
6C4004B24000
trusted library allocation
page read and write
6C400307C000
trusted library allocation
page read and write
6C40042AA000
trusted library allocation
page read and write
6C40031C4000
trusted library allocation
page read and write
2C85000
heap
page read and write
254830AB000
heap
page read and write
450000
unkown
page write copy
6C4004C54000
trusted library allocation
page read and write
2E06000
heap
page read and write
6C36E000
unkown
page read and write
6C4002264000
trusted library allocation
page read and write
75C4002A0000
trusted library allocation
page read and write
693C00698000
trusted library allocation
page read and write
254830B6000
heap
page read and write
D13EFFE000
unkown
page readonly
6C4004BF0000
trusted library allocation
page read and write
6C4004C94000
trusted library allocation
page read and write
6C4003198000
trusted library allocation
page read and write
6C40042DC000
trusted library allocation
page read and write
6C40028B8000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254830B6000
heap
page read and write
6C40030F0000
trusted library allocation
page read and write
6C4002EC8000
trusted library allocation
page read and write
D1567FE000
stack
page read and write
254830AF000
heap
page read and write
254830AA000
heap
page read and write
254830A4000
heap
page read and write
254830B6000
heap
page read and write
6C4000E01000
trusted library allocation
page read and write
6C4003F55000
trusted library allocation
page read and write
6C4002E0C000
trusted library allocation
page read and write
6C40034E0000
trusted library allocation
page read and write
6C4003FBC000
trusted library allocation
page read and write
6C40023E4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254830AF000
heap
page read and write
6C4004944000
trusted library allocation
page read and write
6C4004904000
trusted library allocation
page read and write
693C003EC000
trusted library allocation
page read and write
6C4003124000
trusted library allocation
page read and write
6C4004CF0000
trusted library allocation
page read and write
6C4004AE8000
trusted library allocation
page read and write
6C4003178000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254830B3000
heap
page read and write
254830B6000
heap
page read and write
6C4003148000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C40027B8000
trusted library allocation
page read and write
254830A3000
heap
page read and write
254877A6000
heap
page read and write
693C00348000
trusted library allocation
page read and write
75C4002A8000
trusted library allocation
page read and write
6C4004DC0000
trusted library allocation
page read and write
6C4004CDC000
trusted library allocation
page read and write
6C4003118000
trusted library allocation
page read and write
1A86F000
stack
page read and write
6C4003201000
trusted library allocation
page read and write
6C4004F0C000
trusted library allocation
page read and write
6C4004D8C000
trusted library allocation
page read and write
6C40023A0000
trusted library allocation
page read and write
75C400220000
trusted library allocation
page read and write
6C4004B80000
trusted library allocation
page read and write
6C4002D80000
trusted library allocation
page read and write
693C00700000
trusted library allocation
page read and write
254830A2000
heap
page read and write
7B0000
heap
page read and write
6C4002EC8000
trusted library allocation
page read and write
6C4004310000
trusted library allocation
page read and write
20D51000
heap
page read and write
6C4004ABC000
trusted library allocation
page read and write
693C006B0000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002EE0000
trusted library allocation
page read and write
693C00354000
trusted library allocation
page read and write
254892DE000
trusted library section
page read and write
254830B3000
heap
page read and write
254830D1000
heap
page read and write
6C4004B84000
trusted library allocation
page read and write
6C4004AC4000
trusted library allocation
page read and write
6C4002420000
trusted library allocation
page read and write
75C4002C4000
trusted library allocation
page read and write
6C4003EB1000
trusted library allocation
page read and write
254891F3000
heap
page read and write
75C4002A8000
trusted library allocation
page read and write
6C4002E7C000
trusted library allocation
page read and write
6C400225E000
trusted library allocation
page read and write
2E1C000
heap
page read and write
6C4002F8C000
trusted library allocation
page read and write
6C4002C54000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4003224000
trusted library allocation
page read and write
6C40023D0000
trusted library allocation
page read and write
6C4002FE8000
trusted library allocation
page read and write
20D4A000
heap
page read and write
6C4004F0C000
trusted library allocation
page read and write
4D0000
unkown
page execute and read and write
693C00310000
trusted library allocation
page read and write
254830B3000
heap
page read and write
693C007B4000
trusted library allocation
page read and write
6C400238C000
trusted library allocation
page read and write
254F91F0000
trusted library allocation
page read and write
638000
unkown
page execute and read and write
6C4002F6C000
trusted library allocation
page read and write
693C00744000
trusted library allocation
page read and write
6C4004944000
trusted library allocation
page read and write
1A52F000
stack
page read and write
6C4004960000
trusted library allocation
page read and write
6C4004E3C000
trusted library allocation
page read and write
6C4002990000
trusted library allocation
page read and write
20D70000
heap
page read and write
6C400259C000
trusted library allocation
page read and write
6C400440E000
trusted library allocation
page read and write
A4F000
stack
page read and write
20D54000
heap
page read and write
6C4003048000
trusted library allocation
page read and write
254857D0000
trusted library section
page read and write
254872F4000
trusted library allocation
page read and write
6C4004AEC000
trusted library allocation
page read and write
D1447FB000
stack
page read and write
D15EFFE000
unkown
page readonly
6C4002C98000
trusted library allocation
page read and write
6C4004434000
trusted library allocation
page read and write
48D0000
heap
page read and write
20D65000
heap
page read and write
6C4004ABC000
trusted library allocation
page read and write
254830A4000
heap
page read and write
254830AA000
heap
page read and write
6C4002DD8000
trusted library allocation
page read and write
693C006F0000
trusted library allocation
page read and write
254830AA000
heap
page read and write
25489F00000
trusted library section
page read and write
481F000
stack
page read and write
D148FFE000
unkown
page readonly
D14BFFE000
unkown
page readonly
254830B6000
heap
page read and write
254830AF000
heap
page read and write
6C4003078000
trusted library allocation
page read and write
2DEA000
heap
page read and write
254830B6000
heap
page read and write
6C4002568000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4002AD0000
trusted library allocation
page read and write
2B7400217000
direct allocation
page read and write
254830A5000
heap
page read and write
25487806000
heap
page read and write
D15C7FE000
stack
page read and write
6C40048EC000
trusted library allocation
page read and write
55B3000
heap
page read and write
D136FFE000
unkown
page readonly
6C4004F8C000
trusted library allocation
page read and write
6C4002E9C000
trusted library allocation
page read and write
6C4002574000
trusted library allocation
page read and write
6C40035C0000
trusted library allocation
page read and write
6C4004FE8000
trusted library allocation
page read and write
254F9290000
heap
page read and write
6C4002DD4000
trusted library allocation
page read and write
6C4002494000
trusted library allocation
page read and write
75C400201000
trusted library allocation
page read and write
6C40028CC000
trusted library allocation
page read and write
254830A3000
heap
page read and write
254830D1000
heap
page read and write
D139FFE000
unkown
page readonly
6C4003E40000
trusted library allocation
page read and write
254830B6000
heap
page read and write
D1427FE000
stack
page read and write
6C4004EF8000
trusted library allocation
page read and write
6C40029C8000
trusted library allocation
page read and write
254830AA000
heap
page read and write
693C00430000
trusted library allocation
page read and write
20D4D000
heap
page read and write
6C40025D8000
trusted library allocation
page read and write
693C006E0000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254830AF000
heap
page read and write
D15DFFE000
unkown
page readonly
6C400490F000
trusted library allocation
page read and write
4710000
heap
page read and write
6C4002494000
trusted library allocation
page read and write
D144FFE000
unkown
page readonly
254830C0000
heap
page read and write
6C40029C8000
trusted library allocation
page read and write
6C4004A01000
trusted library allocation
page read and write
20D65000
heap
page read and write
6C4004C01000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254830AF000
heap
page read and write
6C4004243000
trusted library allocation
page read and write
25487790000
heap
page read and write
6C4004343000
trusted library allocation
page read and write
6C4002D90000
trusted library allocation
page read and write
6C4003FA2000
trusted library allocation
page read and write
6C4005120000
trusted library allocation
page read and write
6C4002280000
trusted library allocation
page read and write
6C400349C000
trusted library allocation
page read and write
6C4003F94000
trusted library allocation
page read and write
20E8C000
heap
page read and write
6C4005110000
trusted library allocation
page read and write
79E000
stack
page read and write
6C4002778000
trusted library allocation
page read and write
254830D1000
heap
page read and write
254830B6000
heap
page read and write
D141FFE000
unkown
page readonly
254830A3000
heap
page read and write
6C4003EB1000
trusted library allocation
page read and write
6C4004938000
trusted library allocation
page read and write
254830B6000
heap
page read and write
D142FFE000
unkown
page readonly
6C4002334000
trusted library allocation
page read and write
6C4004919000
trusted library allocation
page read and write
20D5F000
heap
page read and write
4630000
direct allocation
page execute and read and write
693C0039C000
trusted library allocation
page read and write
6C4003568000
trusted library allocation
page read and write
6C40043DB000
trusted library allocation
page read and write
254835B0000
heap
page read and write
693C00724000
trusted library allocation
page read and write
6C40029D3000
trusted library allocation
page read and write
254830AB000
heap
page read and write
6C4004E2C000
trusted library allocation
page read and write
6C40023AC000
trusted library allocation
page read and write
2A95000
unkown
page readonly
6C4002494000
trusted library allocation
page read and write
D13A7FC000
stack
page read and write
6C40026E8000
trusted library allocation
page read and write
254830AF000
heap
page read and write
25489F11000
trusted library section
page read and write
6C4004950000
trusted library allocation
page read and write
6C400225A000
trusted library allocation
page read and write
2DAD000
heap
page execute and read and write
5460000
remote allocation
page read and write
2548A0A0000
trusted library section
page read and write
254830AF000
heap
page read and write
6C4002954000
trusted library allocation
page read and write
254830AF000
heap
page read and write
2453000
heap
page read and write
20D5F000
heap
page read and write
254830B6000
heap
page read and write
693C002C4000
trusted library allocation
page read and write
6C4004A0C000
trusted library allocation
page read and write
6C4002428000
trusted library allocation
page read and write
6C4004F68000
trusted library allocation
page read and write
6C4003194000
trusted library allocation
page read and write
6C4002E60000
trusted library allocation
page read and write
6C4004C5C000
trusted library allocation
page read and write
6C4004914000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4004FDC000
trusted library allocation
page read and write
6C40034D4000
trusted library allocation
page read and write
2B740024C000
direct allocation
page read and write
6C4002894000
trusted library allocation
page read and write
6C4003EC8000
trusted library allocation
page read and write
254858E0000
trusted library allocation
page read and write
6C4004FA0000
trusted library allocation
page read and write
693C00364000
trusted library allocation
page read and write
693C00220000
trusted library allocation
page read and write
D12E7EF000
stack
page read and write
254830B3000
heap
page read and write
254830AF000
heap
page read and write
254835F4000
heap
page read and write
6C400254C000
trusted library allocation
page read and write
19A000
stack
page read and write
559F000
stack
page read and write
6C4004F28000
trusted library allocation
page read and write
25483697000
heap
page read and write
6C4004944000
trusted library allocation
page read and write
6C4002498000
trusted library allocation
page read and write
6C4002CCC000
trusted library allocation
page read and write
693C00714000
trusted library allocation
page read and write
6C4000C01000
trusted library allocation
page read and write
6C40028F0000
trusted library allocation
page read and write
254830B3000
heap
page read and write
D13F7FD000
stack
page read and write
6C4004DF4000
trusted library allocation
page read and write
6C4003E34000
trusted library allocation
page read and write
6C4003EB9000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C4002F7C000
trusted library allocation
page read and write
D160FFE000
unkown
page readonly
6C40042E8000
trusted library allocation
page read and write
1ADD0000
heap
page read and write
6C4004FE0000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C4002418000
trusted library allocation
page read and write
6C4004219000
trusted library allocation
page read and write
6C400254C000
trusted library allocation
page read and write
D14B7FD000
stack
page read and write
254891F0000
heap
page read and write
20D57000
heap
page read and write
254830B0000
heap
page read and write
6C400306C000
trusted library allocation
page read and write
6C4002BDF000
trusted library allocation
page read and write
254830AF000
heap
page read and write
254830A4000
heap
page read and write
6C400228C000
trusted library allocation
page read and write
6C4004BC4000
trusted library allocation
page read and write
693C00424000
trusted library allocation
page read and write
6C4003EE9000
trusted library allocation
page read and write
254830B3000
heap
page read and write
D1497FB000
stack
page read and write
6C40029D1000
trusted library allocation
page read and write
6C4002DD4000
trusted library allocation
page read and write
6C400240C000
trusted library allocation
page read and write
6C40022E0000
trusted library allocation
page read and write
6C400236C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002588000
trusted library allocation
page read and write
D152FFE000
unkown
page readonly
6C4004D40000
trusted library allocation
page read and write
25483099000
heap
page read and write
6C4005070000
trusted library allocation
page read and write
D135FFE000
unkown
page readonly
6C4002880000
trusted library allocation
page read and write
254830B3000
heap
page read and write
2548309E000
heap
page read and write
25487312000
trusted library allocation
page read and write
6C4002220000
trusted library allocation
page read and write
6C400436D000
trusted library allocation
page read and write
693C00320000
trusted library allocation
page read and write
693C00801000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
6C40050BC000
trusted library allocation
page read and write
2548368E000
heap
page read and write
6C4002838000
trusted library allocation
page read and write
6C4002A5C000
trusted library allocation
page read and write
254830A4000
heap
page read and write
20D4F000
heap
page read and write
6C4003EB1000
trusted library allocation
page read and write
254830B6000
heap
page read and write
693C006CC000
trusted library allocation
page read and write
6C40052AC000
trusted library allocation
page read and write
6C4004F8C000
trusted library allocation
page read and write
6C40030CC000
trusted library allocation
page read and write
254830AA000
heap
page read and write
20D41000
heap
page read and write
6C40025C0000
trusted library allocation
page read and write
6C4003E40000
trusted library allocation
page read and write
6C4003044000
trusted library allocation
page read and write
6C4002768000
trusted library allocation
page read and write
6C40023AC000
trusted library allocation
page read and write
254877B6000
heap
page read and write
6C4004B60000
trusted library allocation
page read and write
6C4004D9C000
trusted library allocation
page read and write
6C40029C8000
trusted library allocation
page read and write
6C4002EBC000
trusted library allocation
page read and write
693C00630000
trusted library allocation
page read and write
6C4003225000
trusted library allocation
page read and write
46A0000
direct allocation
page read and write
6C400234C000
trusted library allocation
page read and write
6C40048DC000
trusted library allocation
page read and write
6C4004DA8000
trusted library allocation
page read and write
693C0035C000
trusted library allocation
page read and write
6C40051B4000
trusted library allocation
page read and write
6C400460C000
trusted library allocation
page read and write
6C4004B50000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4004AF0000
trusted library allocation
page read and write
20D3D000
heap
page read and write
254830AA000
heap
page read and write
6C40050C8000
trusted library allocation
page read and write
D1337FE000
stack
page read and write
693C00601000
trusted library allocation
page read and write
254817C0000
trusted library section
page readonly
D14C7FB000
stack
page read and write
6C4004CD0000
trusted library allocation
page read and write
254830AA000
heap
page read and write
254830AA000
heap
page read and write
75C400274000
trusted library allocation
page read and write
6C4004FE4000
trusted library allocation
page read and write
D14AFFE000
unkown
page readonly
6C400254C000
trusted library allocation
page read and write
6C40023AC000
trusted library allocation
page read and write
21120000
heap
page read and write
6C4004B30000
trusted library allocation
page read and write
75C400278000
trusted library allocation
page read and write
20D5F000
heap
page read and write
254877A8000
heap
page read and write
22EE000
stack
page read and write
6C4002504000
trusted library allocation
page read and write
693C00654000
trusted library allocation
page read and write
20D4F000
heap
page read and write
254830B3000
heap
page read and write
75C4002C4000
trusted library allocation
page read and write
6C400520C000
trusted library allocation
page read and write
693C0080C000
trusted library allocation
page read and write
6C4002424000
trusted library allocation
page read and write
6C400254C000
trusted library allocation
page read and write
25489357000
unclassified section
page read and write
254830B6000
heap
page read and write
6C4000401000
trusted library allocation
page read and write
25483099000
heap
page read and write
6C4003350000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
6C4004C98000
trusted library allocation
page read and write
6C4004BF8000
trusted library allocation
page read and write
693C00237000
trusted library allocation
page read and write
6C4004B88000
trusted library allocation
page read and write
549E000
stack
page read and write
693C00718000
trusted library allocation
page read and write
6C4003214000
trusted library allocation
page read and write
20D65000
heap
page read and write
D1347FD000
stack
page read and write
6C40023F8000
trusted library allocation
page read and write
75C4002C4000
trusted library allocation
page read and write
254830C0000
heap
page read and write
6C40023C8000
trusted library allocation
page read and write
6C4003028000
trusted library allocation
page read and write
6C4002E80000
trusted library allocation
page read and write
693C007CC000
trusted library allocation
page read and write
6C4004B00000
trusted library allocation
page read and write
6C4002D34000
trusted library allocation
page read and write
6C4005018000
trusted library allocation
page read and write
6C4002990000
trusted library allocation
page read and write
D1457FC000
stack
page read and write
2548A0E0000
trusted library section
page read and write
254830B3000
heap
page read and write
6C4004D98000
trusted library allocation
page read and write
6C40024F0000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C40029A8000
trusted library allocation
page read and write
6C4002E70000
trusted library allocation
page read and write
6C4002414000
trusted library allocation
page read and write
6C4004AD4000
trusted library allocation
page read and write
6C4004D28000
trusted library allocation
page read and write
6C40023D4000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
254830AA000
heap
page read and write
6C4004DB4000
trusted library allocation
page read and write
20D65000
heap
page read and write
6C191000
unkown
page execute read
6C40035E8000
trusted library allocation
page read and write
6C40028A4000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C400500C000
trusted library allocation
page read and write
6C4004BF4000
trusted library allocation
page read and write
6C40050D8000
trusted library allocation
page read and write
6C4004B2C000
trusted library allocation
page read and write
2B7400230000
direct allocation
page read and write
6C4003588000
trusted library allocation
page read and write
2BCE000
stack
page read and write
254830B6000
heap
page read and write
20D54000
heap
page read and write
1AA0E000
stack
page read and write
254830AA000
heap
page read and write
6C4002E63000
trusted library allocation
page read and write
254830AF000
heap
page read and write
6C4004B98000
trusted library allocation
page read and write
6C400300C000
trusted library allocation
page read and write
6C4004E0C000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C4002494000
trusted library allocation
page read and write
2548309E000
heap
page read and write
6C4001001000
trusted library allocation
page read and write
254830AA000
heap
page read and write
254830B9000
heap
page read and write
6C40025D8000
trusted library allocation
page read and write
254830AA000
heap
page read and write
6C400356C000
trusted library allocation
page read and write
6C4002328000
trusted library allocation
page read and write
2D9E000
heap
page read and write
720000
heap
page read and write
693C00418000
trusted library allocation
page read and write
6C4002ED8000
trusted library allocation
page read and write
693C006C8000
trusted library allocation
page read and write
25489280000
heap
page read and write
6C4004BA0000
trusted library allocation
page read and write
6C40025D8000
trusted library allocation
page read and write
6C400510C000
trusted library allocation
page read and write
D1357FB000
stack
page read and write
693C00688000
trusted library allocation
page read and write
254830D1000
heap
page read and write
75C4002A8000
trusted library allocation
page read and write
693C0069C000
trusted library allocation
page read and write
693C00368000
trusted library allocation
page read and write
6C4003520000
trusted library allocation
page read and write
254830AA000
heap
page read and write
6C4003248000
trusted library allocation
page read and write
6C40023E0000
trusted library allocation
page read and write
6C400502C000
trusted library allocation
page read and write
254830B6000
heap
page read and write
254830B3000
heap
page read and write
6C4004DA4000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
6C4002ED8000
trusted library allocation
page read and write
6C4004DD8000
trusted library allocation
page read and write
693C00354000
trusted library allocation
page read and write
254830D1000
heap
page read and write
254F90C1000
heap
page read and write
7B7000
heap
page read and write
693C006B4000
trusted library allocation
page read and write
254830A4000
heap
page read and write
6C40026BC000
trusted library allocation
page read and write
254830B6000
heap
page read and write
6C4002CBC000
trusted library allocation
page read and write
20D5F000
heap
page read and write
254F90DD000
heap
page read and write
6C4005074000
trusted library allocation
page read and write
254830D1000
heap
page read and write
6C4002FA8000
trusted library allocation
page read and write
6C4004BD8000
trusted library allocation
page read and write
6C4003148000
trusted library allocation
page read and write
693C00248000
trusted library allocation
page read and write
D131FFE000
unkown
page readonly
20D4A000
heap
page read and write
6C4004401000
trusted library allocation
page read and write
6C4005084000
trusted library allocation
page read and write
6C40050A4000
trusted library allocation
page read and write
20D4A000
heap
page read and write
There are 1719 hidden memdumps, click here to show them.