IOC Report
JGKjBsQrMc.exe

loading gif

Files

File Path
Type
Category
Malicious
JGKjBsQrMc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\1000003002\e0dbbf79bf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\enter[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\1000002001\cda9e1cbbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingDBFHCGCGDA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingJDHCBAEHJJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
malicious
C:\ProgramData\AEGIJKEHCAKFCAKFHDAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BGHJEBKJEGHJKECAAKJK
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\CBKFIECBGDHJKECAKFBGDHJKEC
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\GCBGCGHDGIEGCBFIEGCBAKJJEB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HJJJECFIECBGDGCAAAEHIEGDGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KJDGDBFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\ProgramData\KJEHJKJEBGHJJKEBGIEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJJJDHDGDAAKECAKJDAEGCBKEH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKKJKEBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6ad2af4d-f886-4f63-bea2-62bb0b38e6e0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6ceed8aa-b02c-4356-9dce-5d44672e1e1e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\748b55f5-2c2b-4515-b865-ef4b7ecb1e83.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66A35A95-B4.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66A35A98-53C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\2f669603-f614-471c-aca2-1d4e41a8dff2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\47d816c4-ed1b-402e-93a7-a9be88a422d1.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\5c359156-94f8-41de-9769-a3e20979c7cc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9e6a15d2-3103-44b1-bd34-663113486568.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000004.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000005.ldb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\MediaDeviceSalts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 6, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\093e9658-bd15-484b-9672-eeb1a837b210.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\4864c830-9f41-4849-80bc-e4a9fd1c58cf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8265691b-7970-445f-a9a5-7c990f9ff2b8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF37deb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3cef9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3d4f5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a1b35ed1-c307-44f8-8c94-cb5d1d562236.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\c4ad7574-1a15-43ae-bc21-abf93bd8d1cf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e06d2d28-9777-407d-a988-9c0a4abd9ac0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF39fea.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3ca08.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF39cfc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3d811.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13366455194931339
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\24d8e4a0-801b-4963-860a-892a2b83c05d.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\81e35818-991b-4e9f-8ab2-6ba8f55fb3ec.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\869a8db9-43eb-4ebf-ba14-159a8bf34a3f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\9b224bbd-9292-4b1a-b909-2cdc042380bc.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF37d8e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3cef9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3d4f5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\f7bc8449-c72d-4d69-b51e-4c265d8752d6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 11, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b3277bc3-d4da-42c3-8f9c-31b5513c50e6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b7c9eb87-f6c1-4798-b0db-80f9be8c4e75.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\bddb1ace-204c-4e7c-a66f-fbd31af6847e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\c5344fb1-251b-4e47-8720-5c7783440adc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF34af4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF34b04.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF34d94.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37495.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38917.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3b094.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a0bf9d74-f94d-441a-9386-0489c2476eb0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e56c1fc4-d8eb-4a23-8c8a-d2c65d4d7362.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f564d0f4-7938-474f-935c-5a96c7386947.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f6d50314-8d3a-4b72-90c6-24a03412ae12.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\11c631d0-cde6-48b9-adcb-5cb9a428aa99.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\477b140c-8584-4c86-b768-41e884ec4a80.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\575aacfa-bdbd-476d-9d0f-44f483ec3000.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\738B.tmp\738C.tmp\738D.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\B8C2.tmp\B8C3.tmp\B8F3.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\d17739a7-9366-425e-bff2-655805bc76f2.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\efc0e1dc-0b52-4ea0-b6f5-77d3771d513a.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_194821102\575aacfa-bdbd-476d-9d0f-44f483ec3000.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_194821102\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_194821102\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_194821102\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_194821102\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1340_733906220\d17739a7-9366-425e-bff2-655805bc76f2.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 8, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 301 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 301 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
There are 274 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JGKjBsQrMc.exe
"C:\Users\user\Desktop\JGKjBsQrMc.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user~1\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user~1\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user~1\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\cda9e1cbbc.exe
"C:\Users\user~1\AppData\Local\Temp\1000002001\cda9e1cbbc.exe"
malicious
C:\Users\user\1000003002\e0dbbf79bf.exe
"C:\Users\user\1000003002\e0dbbf79bf.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000002001\cda9e1cbbc.exe
"C:\Users\user~1\AppData\Local\Temp\1000002001\cda9e1cbbc.exe"
malicious
C:\Users\user\1000003002\e0dbbf79bf.exe
"C:\Users\user\1000003002\e0dbbf79bf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\738B.tmp\738C.tmp\738D.bat C:\Users\user\1000003002\e0dbbf79bf.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1924,i,8622372328878266711,8392942459092133944,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2244 --field-trial-handle=2156,i,341108890584334873,10938886739958985081,262144 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://www.youtube.com/account
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2728 --field-trial-handle=2492,i,7938649738080737182,642918647248851128,262144 /prefetch:3
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a97c0989-9dbf-48c2-9f5d-758311f95aef} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" 1f3ef56af10 socket
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1924,i,8622372328878266711,8392942459092133944,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4488 -parentBuildID 20230927232528 -prefsHandle 1068 -prefMapHandle 3468 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbe57e93-4224-4c4c-a56e-574ee6529207} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" 1f401a2df10 rdd
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7036 --field-trial-handle=2492,i,7938649738080737182,642918647248851128,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=7220 --field-trial-handle=2492,i,7938649738080737182,642918647248851128,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7936 --field-trial-handle=2492,i,7938649738080737182,642918647248851128,262144 /prefetch:3
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\B8C2.tmp\B8C3.tmp\B8F3.bat C:\Users\user\1000003002\e0dbbf79bf.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://185.215.113.16/cost/random.exe
unknown
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
unknown
https://static.adsafeprotected.com/firefox-etp-jsSHUTDOWN_PHASE_DURATION_TICKS_PROFILE_BEFORE_CHANGE
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureRequest
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://www.amazon.com/exec/obidos/external-search/extension/pictureinpicture
unknown
https://gpuweb.github.io/gpuweb/browser.newtab.feature-tour
unknown
https://ac.duckduckgo.com/ac/getElementForAttrInheritance
unknown
http://85.28.47.70/
85.28.47.70
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://truecolors.firefox.combrowser.handlers.migrationsmigrateXULAttributeToStylehttps://monitor.f
unknown
http://exslt.org/common
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsThe
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/accountservices.sync.log.logger.browsertoolkit/branding/accounts.ftlsendTabC
unknown
http://i.pki.goog/wr2.crt0
unknown
https://www.google.com/favicon.ico
142.250.81.228
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://www.youtube.com/accountC:
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://json-schema.org/draft/2019-09/schema27fb6245-bd08-4de6-8f4d-2ece3f597752%2528not%2Bset%2529%
unknown
https://email.seznam.cz/newMessageScreen?mailto=%sMust
unknown
https://www.youtube.com/accountapp.update.lastUpdateTime.%ID%
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://ip-api.com/json
208.95.112.1
https://monitor.firefox.com/about
unknown
https://www.google.com/complete/searchcb8e7210-9f0b-48fa-8708-b9a03df79eeaupdateFromRemoteSettings/p
unknown
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryptiondocument.requestSto
unknown
https://www.zhihu.com/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://mozilla-hub.atlassian.net/browse/SDK-405
unknown
https://addons.mozilla.orgaccount-connection-disconnectedshowBadgeOnlyNotificationpictureinpicture.s
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://apis.google.com
unknown
https://firefox.settings.services.mozilla.com/v1AIzaSyC7jsptDS3am4tPx4r3nxis7IMjBc5Dovo
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://firefox-source-docs.mozilla.org/remote/Security.html
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingTrying
unknown
https://www.olx.pl/
unknown
https://xhr.spec.whatwg.org/#sync-warningThe
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://youtube.comhighValueCOOP
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
http://85.28.47.31/5499d72b3a3e55be.phposition:
unknown
http://mozilla.org/#/properties/appId
unknown
http://85.28.47.70/c10a74a0c2f42c12/sqlite3.dll
85.28.47.70
https://webextensions.settings.services.mozilla.com/v1
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://addons.mozilla.org/%LOCALE%/firefox/
unknown
https://getpocket.com/firefox/new_tab_learn_morediscoverystream.personalization.enabled
unknown
http://85.28.47.31/5499d72b3a3e55be.php9
unknown
https://github.com/mozilla-services/screenshotsshims/microsoftVirtualAssistant.jsshims/private-brows
unknown
http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
unknown
https://developers.google.com/safe-browsing/v4/advisory
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
unknown
http://poczta.interia.pl/mh/?mailto=%s
unknown
https://smartblock.firefox.etp/play.svg
unknown
https://firefox.settings.services.mozilla.com
unknown
https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
unknown
https://mail.inbox.lv/compose?to=%s_finalizeInternal/this._finalizePromise
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
spocs.getpocket.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
firefox.settings.services.mozilla.com
unknown
malicious
push.services.mozilla.com
unknown
malicious
www.youtube.com
unknown
malicious
detectportal.firefox.com
unknown
malicious
bzib.nelreports.net
unknown
malicious
o.pki.goog
unknown
malicious
shavar.services.mozilla.com
unknown
malicious
example.org
93.184.215.14
chrome.cloudflare-dns.com
172.64.41.3
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
raw.githubusercontent.com
185.199.109.133
restores.name
65.0.21.192
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
mitmdetection.services.mozilla.com
13.32.99.17
pki-goog.l.google.com
142.250.185.163
sni1gl.wpc.nucdn.net
152.199.21.175
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.74.206
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
ip-api.com
208.95.112.1
coe.com.vn
103.28.36.182
There are 18 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.19
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
142.251.35.161
unknown
United States
216.58.212.142
unknown
United States
142.250.74.206
youtube-ui.l.google.com
United States
152.195.19.97
unknown
United States
192.168.2.7
unknown
unknown
142.250.176.206
unknown
United States
162.159.61.3
unknown
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.65.238
unknown
United States
142.250.80.3
unknown
United States
142.250.185.163
pki-goog.l.google.com
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
13.107.21.237
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
142.250.81.228
unknown
United States
216.58.206.46
unknown
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
13.32.99.17
mitmdetection.services.mozilla.com
United States
239.255.255.250
unknown
Reserved
142.250.186.142
unknown
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
172.217.165.142
unknown
United States
127.0.0.1
unknown
unknown
There are 19 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
cda9e1cbbc.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
e0dbbf79bf.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Width
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Height
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Flags
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|CssToDevPixelScaling
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SearchbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66640
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
There are 140 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4D1000
unkown
page execute and read and write
malicious
4A30000
direct allocation
page read and write
malicious
EA1000
unkown
page execute and read and write
malicious
4DB0000
direct allocation
page read and write
malicious
5470000
direct allocation
page read and write
malicious
4D00000
direct allocation
page read and write
malicious
25EA000
heap
page read and write
malicious
2607000
heap
page read and write
malicious
EA1000
unkown
page execute and read and write
malicious
EA1000
unkown
page execute and read and write
malicious
230D0000
heap
page read and write
1F3FAB90000
trusted library allocation
page read and write
1F401139000
trusted library allocation
page read and write
21F9B448000
trusted library allocation
page read and write
1F3FF071000
trusted library allocation
page read and write
27667380000
heap
page read and write
20BC883D000
trusted library allocation
page read and write
1F3FB2DF000
trusted library allocation
page read and write
1F3FB1C1000
trusted library allocation
page read and write
21F9B481000
trusted library allocation
page read and write
1F3FB186000
trusted library allocation
page read and write
1F401E07000
trusted library allocation
page read and write
22D68000
heap
page read and write
1F3FB51B000
trusted library allocation
page read and write
1F3FF7FC000
trusted library allocation
page read and write
1F4016DD000
trusted library allocation
page read and write
E9E000
stack
page read and write
1F3FF457000
trusted library allocation
page read and write
1F3FF4B7000
trusted library allocation
page read and write
2F9E000
stack
page read and write
1F3FD1FE000
trusted library allocation
page read and write
1F401891000
trusted library allocation
page read and write
1F401686000
trusted library allocation
page read and write
1F4019CF000
trusted library allocation
page read and write
1F3FF0E8000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FFCFE000
trusted library allocation
page read and write
1F3FC547000
heap
page read and write
1F401A98000
trusted library allocation
page read and write
1F401EE5000
trusted library allocation
page read and write
1F407715000
trusted library allocation
page read and write
1F3FEE25000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
1F401019000
trusted library allocation
page read and write
1F401AF6000
trusted library allocation
page read and write
1F407775000
trusted library allocation
page read and write
20E1240A000
trusted library allocation
page read and write
1F3FF076000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
994000
heap
page read and write
1F40010D000
trusted library allocation
page read and write
1F4019F8000
trusted library allocation
page read and write
1F4002F7000
trusted library allocation
page read and write
1F40288C000
trusted library allocation
page read and write
22D5D000
heap
page read and write
1F3FC2BB000
trusted library allocation
page read and write
1F3FFC71000
trusted library allocation
page read and write
1F3FB2AA000
trusted library allocation
page read and write
1F3FC3DF000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1F403497000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
61ED0000
direct allocation
page read and write
1F400293000
trusted library allocation
page read and write
1F3FC36A000
trusted library allocation
page read and write
1F3FEB30000
trusted library allocation
page read and write
1F3FF73F000
trusted library allocation
page read and write
22EC0000
heap
page read and write
1F407732000
trusted library allocation
page read and write
1C92E000
stack
page read and write
1F401AF6000
trusted library allocation
page read and write
4ED0000
direct allocation
page execute and read and write
1F3FEE36000
trusted library allocation
page read and write
21D0000
heap
page read and write
1F401672000
trusted library allocation
page read and write
1764000
heap
page read and write
1F400443000
trusted library allocation
page read and write
22DA0000
heap
page read and write
1F3FF7D6000
trusted library allocation
page read and write
A34260E000
stack
page read and write
1F4028DC000
trusted library allocation
page read and write
1F3FC56C000
heap
page read and write
1F3FABCE000
trusted library allocation
page read and write
1F3FFCEE000
trusted library allocation
page read and write
2A9F000
stack
page read and write
1F401ABC000
trusted library allocation
page read and write
3323BFC000
stack
page read and write
1F3FC55C000
heap
page read and write
1F40285B000
trusted library allocation
page read and write
1F3FF0CA000
trusted library allocation
page read and write
B54000
heap
page read and write
507E000
stack
page read and write
1F401653000
trusted library allocation
page read and write
1F401663000
trusted library allocation
page read and write
1F401000000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
1F3FC540000
heap
page read and write
1F4019EA000
trusted library allocation
page read and write
6CB2D000
unkown
page readonly
230E4000
heap
page read and write
2FCC000
stack
page read and write
1F3FF963000
trusted library allocation
page read and write
20BC84A2000
unclassified section
page read and write
4861000
heap
page read and write
4591000
heap
page read and write
1F3FF0D0000
trusted library allocation
page read and write
1F4019FA000
trusted library allocation
page read and write
231E000
stack
page read and write
1F3FF503000
trusted library allocation
page read and write
1F40BF5D000
trusted library allocation
page read and write
1F3FB282000
trusted library allocation
page read and write
1F4002F2000
trusted library allocation
page read and write
1F3FABB8000
trusted library allocation
page read and write
1F401A36000
trusted library allocation
page read and write
1F400415000
trusted library allocation
page read and write
1F3FD409000
trusted library allocation
page read and write
1F3FB1BE000
trusted library allocation
page read and write
1F3FC543000
heap
page read and write
1F3FF066000
trusted library allocation
page read and write
1F4028CD000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FC563000
heap
page read and write
38CF000
stack
page read and write
1F3FF4D5000
trusted library allocation
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F3FEE3B000
trusted library allocation
page read and write
1F4013B7000
trusted library allocation
page read and write
27667472000
heap
page read and write
1F3FF4D5000
trusted library allocation
page read and write
C80000
direct allocation
page read and write
4591000
heap
page read and write
1F3FEFA3000
trusted library allocation
page read and write
1F3FB186000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FD900000
trusted library allocation
page read and write
21F9C27B000
heap
page read and write
21F9C1A0000
heap
page read and write
1F3FC552000
heap
page read and write
2C00000
direct allocation
page read and write
4E80000
direct allocation
page execute and read and write
1F3FF083000
trusted library allocation
page read and write
1F3FD169000
trusted library allocation
page read and write
1F3FAC67000
trusted library allocation
page read and write
4861000
heap
page read and write
994000
heap
page read and write
1F4028C9000
trusted library allocation
page read and write
1F3FC39D000
trusted library allocation
page read and write
21F9C19F000
heap
page read and write
21F9C284000
heap
page read and write
1F401AC8000
trusted library allocation
page read and write
3AEE000
stack
page read and write
1F401A79000
trusted library allocation
page read and write
21F9C1A9000
heap
page read and write
4591000
heap
page read and write
1F3FEE6B000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
1F3FEEBB000
trusted library allocation
page read and write
A3436AC000
stack
page read and write
1F3FD1FE000
trusted library allocation
page read and write
82F0000
heap
page read and write
F03000
heap
page read and write
1F3FC2F9000
trusted library allocation
page read and write
4190000
heap
page read and write
1F401058000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FC24F000
trusted library allocation
page read and write
1F3FEE72000
trusted library allocation
page read and write
1F3FF630000
unclassified section
page read and write
3D5E000
stack
page read and write
1F3FD1C8000
trusted library allocation
page read and write
1F402897000
trusted library allocation
page read and write
396F000
stack
page read and write
309F000
stack
page read and write
55E0000
direct allocation
page execute and read and write
1F3FD150000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1F3FEC8F000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
1F3FD1F7000
trusted library allocation
page read and write
546E000
stack
page read and write
194000
stack
page read and write
1F401EC9000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
57EC000
stack
page read and write
1F3FD1CF000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
A3447EF000
stack
page read and write
1F4016A8000
trusted library allocation
page read and write
1F3FF0AE000
trusted library allocation
page read and write
1F3FF089000
trusted library allocation
page read and write
1F401672000
trusted library allocation
page read and write
EB3000
heap
page read and write
4B90000
direct allocation
page execute and read and write
1F3FD17F000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
1F403443000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
1F3FFCE5000
trusted library allocation
page read and write
9BE000
stack
page read and write
1F3FF0D0000
trusted library allocation
page read and write
1F3FC530000
heap
page read and write
1F3FC241000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FF085000
trusted library allocation
page read and write
1F3FB3B0000
trusted library section
page read and write
21F9C22E000
heap
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F3FCFBF000
trusted library allocation
page read and write
21F9C231000
heap
page read and write
1F4028BE000
trusted library allocation
page read and write
27668FAE000
heap
page read and write
1F3FAC86000
trusted library allocation
page read and write
1F3FD18D000
trusted library allocation
page read and write
22A0000
heap
page read and write
4591000
heap
page read and write
1F401074000
trusted library allocation
page read and write
1F3FFC54000
trusted library allocation
page read and write
1F3FF003000
trusted library allocation
page read and write
1F402857000
trusted library allocation
page read and write
1F3FFC51000
trusted library allocation
page read and write
4861000
heap
page read and write
B54000
heap
page read and write
1F403495000
trusted library allocation
page read and write
1F3FD1CF000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
1F3FB1C3000
trusted library allocation
page read and write
1F4019FA000
trusted library allocation
page read and write
1F3FD15B000
trusted library allocation
page read and write
1345000
unkown
page execute and write copy
22D9E000
heap
page read and write
192000
stack
page read and write
43C000
unkown
page execute and read and write
1F3FC600000
trusted library allocation
page read and write
1F3FEE3F000
trusted library allocation
page read and write
1F401686000
trusted library allocation
page read and write
1F401103000
trusted library allocation
page read and write
1F3FC543000
heap
page read and write
1764000
heap
page read and write
46AF000
stack
page read and write
20BC8360000
heap
page read and write
1F3FEC00000
trusted library allocation
page read and write
1F401E67000
trusted library allocation
page read and write
1F3FEFD2000
trusted library allocation
page read and write
43AE000
stack
page read and write
2E8F000
stack
page read and write
1F3FEED6000
trusted library allocation
page read and write
21D7000
heap
page read and write
1F402885000
trusted library allocation
page read and write
1F3FF7DF000
trusted library allocation
page read and write
1F3FFC54000
trusted library allocation
page read and write
1F401844000
trusted library allocation
page read and write
11AA000
unkown
page execute and read and write
22DA0000
heap
page read and write
2C8F000
stack
page read and write
1F3FF4E6000
trusted library allocation
page read and write
1F3FF4AD000
trusted library allocation
page read and write
1344000
unkown
page execute and read and write
230D0000
heap
page read and write
1F4028DC000
trusted library allocation
page read and write
1F400499000
trusted library allocation
page read and write
1F3FF52B000
trusted library allocation
page read and write
1F401663000
trusted library allocation
page read and write
4A20000
direct allocation
page read and write
11AA000
unkown
page execute and read and write
27667707000
trusted library allocation
page read and write
1F3FEF03000
trusted library allocation
page read and write
1F3FC217000
trusted library allocation
page read and write
22D5F000
heap
page read and write
46A000
unkown
page execute and read and write
A342E0E000
stack
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F402987000
trusted library allocation
page read and write
1F3FC217000
trusted library allocation
page read and write
1F4096E6000
trusted library allocation
page read and write
1F3FABC4000
trusted library allocation
page read and write
1F402889000
trusted library allocation
page read and write
8FD000
stack
page read and write
230E2000
heap
page read and write
456F000
stack
page read and write
3CAF000
stack
page read and write
1F3FC398000
trusted library allocation
page read and write
1F400F62000
trusted library allocation
page read and write
340E000
stack
page read and write
1F3FC225000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
1F40286E000
trusted library allocation
page read and write
1F401199000
trusted library allocation
page read and write
1F3FEE63000
trusted library allocation
page read and write
1F3EF594000
trusted library allocation
page read and write
1F401365000
trusted library allocation
page read and write
1F4003E0000
trusted library allocation
page read and write
1F3FD1C4000
trusted library allocation
page read and write
1764000
heap
page read and write
20E12249000
heap
page read and write
4580000
direct allocation
page read and write
1F4019B1000
trusted library allocation
page read and write
1F3FF096000
trusted library allocation
page read and write
20E12300000
trusted library allocation
page read and write
3BAE000
stack
page read and write
CD5000
heap
page read and write
1F3FF4F7000
trusted library allocation
page read and write
1F3FC53C000
heap
page read and write
1F40164C000
trusted library allocation
page read and write
189E000
heap
page read and write
1F3FB1F6000
trusted library allocation
page read and write
1F3FEE87000
trusted library allocation
page read and write
1F3FFC91000
trusted library allocation
page read and write
22EC1000
heap
page read and write
1F401659000
trusted library allocation
page read and write
E9E000
stack
page read and write
1F401663000
trusted library allocation
page read and write
1F3FEE91000
trusted library allocation
page read and write
1F401AB4000
trusted library allocation
page read and write
1F3FEEB6000
trusted library allocation
page read and write
1F3FCFBC000
trusted library allocation
page read and write
23103000
heap
page read and write
1F40166D000
trusted library allocation
page read and write
1F4002EB000
trusted library allocation
page read and write
1F401AE2000
trusted library allocation
page read and write
1764000
heap
page read and write
22DE0000
heap
page read and write
65D000
heap
page read and write
1F3FCFBA000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
1F3EF503000
trusted library allocation
page read and write
1F3FB1C5000
trusted library allocation
page read and write
1F400F72000
trusted library allocation
page read and write
1F401EA6000
trusted library allocation
page read and write
1F4028CA000
trusted library allocation
page read and write
1750000
heap
page read and write
406E000
stack
page read and write
1F40050A000
trusted library allocation
page read and write
230CB000
heap
page read and write
1F3FC49B000
trusted library allocation
page read and write
1F3FEF87000
trusted library allocation
page read and write
230DE000
heap
page read and write
44DE000
stack
page read and write
1F401AA8000
trusted library allocation
page read and write
21F9B522000
unclassified section
page read and write
1F3FEE79000
trusted library allocation
page read and write
1F401666000
trusted library allocation
page read and write
1F3FC541000
heap
page read and write
1F4019B1000
trusted library allocation
page read and write
A343AE1000
stack
page read and write
1F401663000
trusted library allocation
page read and write
1F402897000
trusted library allocation
page read and write
230DF000
heap
page read and write
1F3FF824000
trusted library allocation
page read and write
A341DFE000
stack
page read and write
1F3FC2F2000
trusted library allocation
page read and write
1F4019EA000
trusted library allocation
page read and write
1764000
heap
page read and write
F28000
heap
page read and write
1F3FC341000
trusted library allocation
page read and write
400000
unkown
page readonly
1F3FEE25000
trusted library allocation
page read and write
4861000
heap
page read and write
994000
heap
page read and write
1F401114000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
1F3FB161000
trusted library allocation
page read and write
6960000
heap
page read and write
1F4010B4000
trusted library allocation
page read and write
1F3FD1A9000
trusted library allocation
page read and write
8318000
heap
page read and write
22EFF000
heap
page read and write
1F40185A000
trusted library allocation
page read and write
42DE000
stack
page read and write
95A89FE000
unkown
page readonly
1F3FF43F000
trusted library allocation
page read and write
22DE5000
heap
page read and write
F2F000
heap
page read and write
61ECC000
direct allocation
page read and write
1F3FD14D000
trusted library allocation
page read and write
5A7000
unkown
page execute and read and write
21D4000
heap
page read and write
1F3FC2CA000
trusted library allocation
page read and write
1F3FF4A8000
trusted library allocation
page read and write
1F3FC24D000
trusted library allocation
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F4029B9000
trusted library allocation
page read and write
9D0000
heap
page read and write
1F401493000
trusted library allocation
page read and write
4591000
heap
page read and write
1F40165C000
trusted library allocation
page read and write
1F3FC542000
heap
page read and write
1F3FD189000
trusted library allocation
page read and write
1F401DC9000
trusted library allocation
page read and write
1F401954000
trusted library allocation
page read and write
2F0E000
stack
page read and write
1F402859000
trusted library allocation
page read and write
1F40773C000
trusted library allocation
page read and write
1F3FEE61000
trusted library allocation
page read and write
1F4028B1000
trusted library allocation
page read and write
45EF000
stack
page read and write
1CCE2000
heap
page read and write
21F9B2C0000
heap
page read and write
1163000
unkown
page execute and read and write
1F401670000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
1F3FF0A1000
trusted library allocation
page read and write
1F40169B000
trusted library allocation
page read and write
A33FD7D000
stack
page read and write
994000
heap
page read and write
4591000
heap
page read and write
1F3FF49F000
trusted library allocation
page read and write
F03000
heap
page read and write
1F3FEEBF000
trusted library allocation
page read and write
445E000
stack
page read and write
1F3FEE79000
trusted library allocation
page read and write
1F3FB213000
trusted library allocation
page read and write
22DA0000
heap
page read and write
1F403094000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FF06B000
trusted library allocation
page read and write
8311000
heap
page read and write
1F3FF0AE000
trusted library allocation
page read and write
1F3FC557000
heap
page read and write
1F401ED9000
trusted library allocation
page read and write
1F3FC3AA000
trusted library allocation
page read and write
6CD30000
unkown
page read and write
1F401508000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
2FC0000
heap
page read and write
1F400400000
trusted library allocation
page read and write
230D0000
heap
page read and write
23105000
heap
page read and write
1F4030E1000
trusted library allocation
page read and write
1F3FF05A000
trusted library allocation
page read and write
22D9F000
heap
page read and write
994000
heap
page read and write
1F402897000
trusted library allocation
page read and write
1F3FFACD000
trusted library allocation
page read and write
435F000
stack
page read and write
27667290000
heap
page read and write
A89000
heap
page read and write
A347F6C000
stack
page read and write
1F3FC560000
heap
page read and write
1F3FC541000
heap
page read and write
1F401D43000
trusted library allocation
page read and write
1F3FF0CA000
trusted library allocation
page read and write
20C0000
heap
page read and write
2C00000
direct allocation
page read and write
1F3FF9AF000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
4591000
heap
page read and write
1F3FF0B7000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
230E8000
heap
page read and write
2EEF000
stack
page read and write
1F401EF8000
trusted library allocation
page read and write
1F40109C000
trusted library allocation
page read and write
1F3FF083000
trusted library allocation
page read and write
E1E000
stack
page read and write
1F40296E000
trusted library allocation
page read and write
1C75760A000
trusted library allocation
page read and write
1F3FC21C000
trusted library allocation
page read and write
1F3FB5AB000
trusted library allocation
page read and write
1F3FF8EB000
trusted library allocation
page read and write
416E000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
1F3FB1A7000
trusted library allocation
page read and write
1F3FF4D5000
trusted library allocation
page read and write
2690000
heap
page read and write
1F401935000
trusted library allocation
page read and write
42D3000
heap
page read and write
2C00000
direct allocation
page read and write
1F400E7E000
trusted library allocation
page read and write
276673A0000
heap
page read and write
1F3FB297000
trusted library allocation
page read and write
1F3FEE79000
trusted library allocation
page read and write
1F3FCF7A000
trusted library allocation
page read and write
10BBE3A1000
trusted library allocation
page execute read
1F3FCFDC000
trusted library allocation
page read and write
1F3FC3BE000
trusted library allocation
page read and write
21F9C26A000
heap
page read and write
1F3FF48E000
trusted library allocation
page read and write
1F3FEF75000
trusted library allocation
page read and write
1F3FF459000
trusted library allocation
page read and write
1F3FF48E000
trusted library allocation
page read and write
6CB3E000
unkown
page read and write
1F3FEB89000
trusted library allocation
page read and write
1F3FF06A000
trusted library allocation
page read and write
1F401688000
trusted library allocation
page read and write
4591000
heap
page read and write
C90000
heap
page read and write
D1BF1FF000
stack
page read and write
1F401AB0000
trusted library allocation
page read and write
1F3FD909000
trusted library allocation
page read and write
1F3FF1AF000
heap
page read and write
27668FB9000
heap
page read and write
318E000
stack
page read and write
60CF000
stack
page read and write
21F9B467000
trusted library allocation
page read and write
1F3FB1F6000
trusted library allocation
page read and write
1F3FEE19000
trusted library allocation
page read and write
1F40169E000
trusted library allocation
page read and write
1F3FC465000
trusted library allocation
page read and write
F03000
heap
page read and write
1F3FF460000
trusted library allocation
page read and write
1F40114A000
trusted library allocation
page read and write
1F401ADA000
trusted library allocation
page read and write
1F4028A5000
trusted library allocation
page read and write
1F402812000
trusted library allocation
page read and write
1F4003F2000
trusted library allocation
page read and write
1F3FC376000
trusted library allocation
page read and write
1F3FF4C5000
trusted library allocation
page read and write
1F401A86000
trusted library allocation
page read and write
20BC8300000
heap
page read and write
1F4028B2000
trusted library allocation
page read and write
1F400FFC000
trusted library allocation
page read and write
1F3FC36A000
trusted library allocation
page read and write
1F3FF454000
trusted library allocation
page read and write
1F3FFCF4000
trusted library allocation
page read and write
2535000
heap
page read and write
1F40777A000
trusted library allocation
page read and write
1F3FD1F2000
trusted library allocation
page read and write
41EE000
stack
page read and write
26C6000
heap
page read and write
26C5000
heap
page read and write
21F9C1AC000
heap
page read and write
1F3FF48E000
trusted library allocation
page read and write
1F401666000
trusted library allocation
page read and write
1F3FC2D4000
trusted library allocation
page read and write
F47000
heap
page read and write
4C10000
direct allocation
page execute and read and write
22DE0000
heap
page read and write
A34364E000
stack
page read and write
21F9C221000
heap
page read and write
1F3FC3F9000
trusted library allocation
page read and write
420000
heap
page read and write
1F3FEE0D000
trusted library allocation
page read and write
5BC000
stack
page read and write
21F9C1F8000
heap
page read and write
382F000
stack
page read and write
1F40150F000
trusted library allocation
page read and write
1F40040F000
trusted library allocation
page read and write
1F3FC341000
trusted library allocation
page read and write
1F401E7C000
trusted library allocation
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F4019EE000
trusted library allocation
page read and write
1F401679000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
974000
unkown
page execute and read and write
1F3FF813000
trusted library allocation
page read and write
1F3FB672000
trusted library allocation
page read and write
423000
unkown
page readonly
1F400431000
trusted library allocation
page read and write
1F3FC212000
trusted library allocation
page read and write
1F4028CA000
trusted library allocation
page read and write
1F3FCF33000
trusted library allocation
page read and write
1F3FC283000
trusted library allocation
page read and write
1F3FC2F7000
trusted library allocation
page read and write
321E000
stack
page read and write
1F3FEE8B000
trusted library allocation
page read and write
4A20000
direct allocation
page read and write
4591000
heap
page read and write
5B30000
heap
page read and write
A33FA7E000
stack
page read and write
EA1000
unkown
page execute and write copy
1F3FF700000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
1F3FF073000
trusted library allocation
page read and write
1F3FF451000
trusted library allocation
page read and write
1F4003C3000
trusted library allocation
page read and write
1F401A6F000
trusted library allocation
page read and write
1F3FEE3A000
trusted library allocation
page read and write
401000
unkown
page execute read
1CB6E000
stack
page read and write
1C7575D4000
heap
page read and write
C60000
direct allocation
page read and write
A347FEC000
stack
page read and write
1F4014E8000
trusted library allocation
page read and write
1C757400000
trusted library allocation
page read and write
1F40128E000
trusted library allocation
page read and write
1F3FC546000
heap
page read and write
E60000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
1F3FD163000
trusted library allocation
page read and write
1F3FC2F9000
trusted library allocation
page read and write
26C9000
heap
page read and write
1F401E3F000
trusted library allocation
page read and write
F26000
heap
page read and write
1F3FF4EA000
trusted library allocation
page read and write
1F401A66000
trusted library allocation
page read and write
1F400F78000
trusted library allocation
page read and write
1F3FC359000
trusted library allocation
page read and write
21F9B46F000
trusted library allocation
page read and write
1F3FD1CE000
trusted library allocation
page read and write
1F401EAC000
trusted library allocation
page read and write
1F3FF4D2000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FC324000
trusted library allocation
page read and write
10BBE2E1000
trusted library allocation
page execute read
1F401525000
trusted library allocation
page read and write
1F40152A000
trusted library allocation
page read and write
1F3FF4F6000
trusted library allocation
page read and write
1F3FCFBD000
trusted library allocation
page read and write
B54000
heap
page read and write
22DA0000
heap
page read and write
4861000
heap
page read and write
1F401660000
trusted library allocation
page read and write
1F3FF475000
trusted library allocation
page read and write
21F9B478000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
1F4028AF000
trusted library allocation
page read and write
1F3FC8E2000
trusted library allocation
page read and write
2690000
heap
page read and write
22EC1000
heap
page read and write
1F3FC552000
heap
page read and write
1F3FFB00000
trusted library section
page readonly
328F000
stack
page read and write
4870000
heap
page read and write
3A0F000
stack
page read and write
1F3FCFF6000
trusted library allocation
page read and write
22DA0000
heap
page read and write
1F402857000
trusted library allocation
page read and write
1F3FF428000
trusted library allocation
page read and write
42F0000
heap
page read and write
1F3FCFBF000
trusted library allocation
page read and write
316258E000
unkown
page readonly
1F3FCFBF000
trusted library allocation
page read and write
21F9B4F5000
trusted library allocation
page read and write
1F3FD1F7000
trusted library allocation
page read and write
1F40183C000
trusted library allocation
page read and write
1F3FFE0D000
trusted library allocation
page read and write
1F3FEE39000
trusted library allocation
page read and write
4591000
heap
page read and write
366F000
stack
page read and write
3A2F000
stack
page read and write
1F3FD1F3000
trusted library allocation
page read and write
1F3FEE9B000
trusted library allocation
page read and write
1F3FD1C9000
trusted library allocation
page read and write
381F000
stack
page read and write
4861000
heap
page read and write
21F9C228000
heap
page read and write
B10000
heap
page read and write
1F3FF46F000
trusted library allocation
page read and write
4F00000
direct allocation
page execute and read and write
1F4028DC000
trusted library allocation
page read and write
2766770A000
trusted library allocation
page read and write
1F401679000
trusted library allocation
page read and write
1F3FEE7F000
trusted library allocation
page read and write
22DE1000
heap
page read and write
1F3FB490000
unclassified section
page read and write
1F40195E000
trusted library allocation
page read and write
1F40166F000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
1F3FF486000
trusted library allocation
page read and write
4861000
heap
page read and write
1F0000
heap
page read and write
54AE000
stack
page read and write
1F3FC283000
trusted library allocation
page read and write
1F4016D7000
trusted library allocation
page read and write
1F4030D7000
trusted library allocation
page read and write
21F9C298000
heap
page read and write
1F3FEE72000
trusted library allocation
page read and write
1F3FED37000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
EA0000
unkown
page readonly
1F3FC604000
trusted library allocation
page read and write
1F409A00000
trusted library allocation
page read and write
1F400F00000
trusted library allocation
page read and write
22DA0000
heap
page read and write
1F4011F8000
trusted library allocation
page read and write
1CA2F000
stack
page read and write
31AE000
stack
page read and write
1F3FF02C000
trusted library allocation
page read and write
1F40165A000
trusted library allocation
page read and write
1F3FB2F0000
trusted library allocation
page read and write
1F3FEF4A000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401EB8000
trusted library allocation
page read and write
994000
heap
page read and write
1F402897000
trusted library allocation
page read and write
4591000
heap
page read and write
4F30000
direct allocation
page execute and read and write
1F3FC33F000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401AD8000
trusted library allocation
page read and write
21F9C19F000
heap
page read and write
1F401683000
trusted library allocation
page read and write
1F401767000
trusted library allocation
page read and write
1F3FB2AF000
trusted library allocation
page read and write
1F400300000
trusted library allocation
page read and write
DDF000
stack
page read and write
1F3FFB32000
unclassified section
page read and write
1F40105D000
trusted library allocation
page read and write
1F401EF6000
trusted library allocation
page read and write
1F3EF350000
heap
page readonly
230DF000
heap
page read and write
1342000
unkown
page execute and read and write
1F3FCF63000
trusted library allocation
page read and write
1F4016A8000
trusted library allocation
page read and write
3D88AD624000
trusted library allocation
page read and write
1F3FF8C5000
trusted library allocation
page read and write
21F9B13D000
remote allocation
page execute read
1F3FB226000
trusted library allocation
page read and write
1F3FEF57000
trusted library allocation
page read and write
1342000
unkown
page execute and read and write
33CF000
stack
page read and write
3D2F000
stack
page read and write
21F9C298000
heap
page read and write
400000
unkown
page execute and read and write
1F3FC557000
heap
page read and write
1F4002EB000
trusted library allocation
page read and write
3D6E000
stack
page read and write
1F401E5F000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
61EB4000
direct allocation
page read and write
1F401AAC000
trusted library allocation
page read and write
27667482000
heap
page read and write
230E5000
heap
page read and write
1F3FFB20000
unclassified section
page read and write
4591000
heap
page read and write
1F3FAB00000
trusted library allocation
page read and write
1F3FB2A0000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FC543000
heap
page read and write
4D70000
trusted library allocation
page read and write
6CB42000
unkown
page readonly
1F400FF2000
trusted library allocation
page read and write
F4F000
heap
page read and write
D1BC9FA000
stack
page read and write
1344000
unkown
page execute and read and write
61E00000
direct allocation
page execute and read and write
1F3FC363000
trusted library allocation
page read and write
22D70000
heap
page read and write
1F3FF0C9000
trusted library allocation
page read and write
F0B000
unkown
page execute and read and write
1F3FC3DA000
trusted library allocation
page read and write
B40000
heap
page read and write
7C5000
heap
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F403074000
trusted library allocation
page read and write
1F3FF47A000
trusted library allocation
page read and write
40A0000
direct allocation
page execute and read and write
1F3FEE3A000
trusted library allocation
page read and write
1F4016A0000
trusted library allocation
page read and write
1F40043C000
trusted library allocation
page read and write
1F401947000
trusted library allocation
page read and write
1F3FF99A000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
1F3FF0A7000
trusted library allocation
page read and write
22F42000
heap
page read and write
1F3FEF9C000
trusted library allocation
page read and write
13FE000
stack
page read and write
3B4F000
stack
page read and write
1F402859000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
7DA000
unkown
page execute and write copy
22D5D000
heap
page read and write
A347E2A000
stack
page read and write
1F3FCF35000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FEC6A000
trusted library allocation
page read and write
1F3EF55D000
trusted library allocation
page read and write
55F0000
direct allocation
page execute and read and write
4861000
heap
page read and write
1F400494000
trusted library allocation
page read and write
1F4003E0000
trusted library allocation
page read and write
1F3FC494000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401364000
trusted library allocation
page read and write
2334000
heap
page read and write
20BC8618000
trusted library allocation
page read and write
22E8A000
heap
page read and write
47EF000
stack
page read and write
1F3FF86F000
trusted library allocation
page read and write
10BBE32B000
trusted library allocation
page execute read
31625CB000
stack
page read and write
502B000
stack
page read and write
1F401A6B000
trusted library allocation
page read and write
1F4095D7000
trusted library allocation
page read and write
1F401DE3000
trusted library allocation
page read and write
1F3FFD0F000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
1F3FC3DE000
trusted library allocation
page read and write
22DEB000
heap
page read and write
3162FD8000
stack
page read and write
1C7EE000
stack
page read and write
E9DED00000
trusted library allocation
page read and write
1F3FEE32000
trusted library allocation
page read and write
2BF0000
heap
page read and write
1F3FC376000
trusted library allocation
page read and write
1F3EF645000
heap
page read and write
2C1D000
heap
page read and write
C60000
direct allocation
page read and write
4591000
heap
page read and write
26C8000
heap
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F4010BC000
trusted library allocation
page read and write
4591000
heap
page read and write
C60000
direct allocation
page read and write
4CA0000
trusted library allocation
page read and write
1F3FF214000
heap
page read and write
4B0000
heap
page read and write
1F3FC55C000
heap
page read and write
4580000
direct allocation
page read and write
1F3FB21E000
trusted library allocation
page read and write
336E000
stack
page read and write
1F402859000
trusted library allocation
page read and write
1F401A1A000
trusted library allocation
page read and write
B54000
heap
page read and write
1F4013BB000
trusted library allocation
page read and write
1F3FF64D000
unclassified section
page read and write
230E3000
heap
page read and write
1F3FF0E5000
trusted library allocation
page read and write
20BC8320000
heap
page read and write
49EE000
stack
page read and write
1F3FB1F0000
trusted library allocation
page read and write
1F4029B0000
trusted library allocation
page read and write
95A57DE000
stack
page read and write
1F40288C000
trusted library allocation
page read and write
23102000
heap
page read and write
EA1000
unkown
page execute and write copy
1F3FFBC0000
unclassified section
page read and write
1F3FEEBD000
trusted library allocation
page read and write
230E9000
heap
page read and write
1730000
direct allocation
page read and write
1F3FF4D6000
trusted library allocation
page read and write
4A6E000
stack
page read and write
1F401300000
trusted library allocation
page read and write
1F401683000
trusted library allocation
page read and write
1F3FEB60000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
4580000
direct allocation
page read and write
1F3FEE20000
trusted library allocation
page read and write
40E0000
direct allocation
page read and write
1F3FED00000
trusted library allocation
page read and write
620E000
stack
page read and write
1F4019EA000
trusted library allocation
page read and write
A34147A000
stack
page read and write
F3C000
heap
page read and write
285E000
stack
page read and write
1F3FC33E000
trusted library allocation
page read and write
23103000
heap
page read and write
1F4003F5000
trusted library allocation
page read and write
21F9C23C000
heap
page read and write
1F401652000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401E4E000
trusted library allocation
page read and write
1F3FF5FC000
trusted library allocation
page read and write
A34898E000
stack
page read and write
1C4EF000
stack
page read and write
1F3FF43D000
trusted library allocation
page read and write
1F400476000
trusted library allocation
page read and write
27668FBB000
heap
page read and write
1F3FFB52000
unclassified section
page read and write
4D64000
heap
page read and write
1F40110B000
trusted library allocation
page read and write
A347FAF000
stack
page read and write
4861000
heap
page read and write
1F3FEE79000
trusted library allocation
page read and write
418F000
stack
page read and write
1345000
unkown
page execute and write copy
1F403460000
trusted library allocation
page read and write
1F401803000
trusted library allocation
page read and write
1F3FC271000
trusted library allocation
page read and write
1F4016F0000
trusted library allocation
page read and write
1F401A98000
trusted library allocation
page read and write
1F40169A000
trusted library allocation
page read and write
1F3FF0E8000
trusted library allocation
page read and write
1F3FFC69000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
1F3FEE20000
trusted library allocation
page read and write
1F4014EB000
trusted library allocation
page read and write
1F402877000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FC3BE000
trusted library allocation
page read and write
1F3FEEA2000
trusted library allocation
page read and write
5610000
direct allocation
page execute and read and write
1F3FC552000
heap
page read and write
1F407793000
trusted library allocation
page read and write
1F4010B4000
trusted library allocation
page read and write
2D8E000
stack
page read and write
25D1000
heap
page execute and read and write
1F3FF632000
unclassified section
page read and write
1F3FF500000
trusted library allocation
page read and write
A3463EB000
stack
page read and write
1F4004D5000
trusted library allocation
page read and write
1F3FC200000
trusted library allocation
page read and write
1F401088000
trusted library allocation
page read and write
230E4000
heap
page read and write
1F3FB5D6000
trusted library allocation
page read and write
1F402869000
trusted library allocation
page read and write
1F3FC56C000
heap
page read and write
1F3FFC15000
trusted library allocation
page read and write
1F3FED52000
trusted library allocation
page read and write
3EAE000
stack
page read and write
20BC865D000
trusted library allocation
page read and write
1F401659000
trusted library allocation
page read and write
1F4095D7000
trusted library allocation
page read and write
4FEF000
stack
page read and write
1F3FF9A3000
trusted library allocation
page read and write
1F3FC3F6000
trusted library allocation
page read and write
1F3FEEB6000
trusted library allocation
page read and write
413E000
stack
page read and write
45AE000
stack
page read and write
1F3FEE6B000
trusted library allocation
page read and write
1F3FF096000
trusted library allocation
page read and write
23103000
heap
page read and write
1F3FB1A2000
trusted library allocation
page read and write
F26000
heap
page read and write
1F3FC3A3000
trusted library allocation
page read and write
1F3EF3A0000
trusted library allocation
page execute read
230E1000
heap
page read and write
4931000
heap
page read and write
1F3FF8C2000
trusted library allocation
page read and write
1F3FB659000
trusted library allocation
page read and write
E57000
heap
page read and write
1F401A61000
trusted library allocation
page read and write
52FE000
stack
page read and write
22DB0000
heap
page read and write
4591000
heap
page read and write
1F4013F7000
trusted library allocation
page read and write
1F400274000
trusted library allocation
page read and write
1F401663000
trusted library allocation
page read and write
1F3FC3BE000
trusted library allocation
page read and write
20BC8696000
trusted library allocation
page read and write
1F4013BB000
trusted library allocation
page read and write
1F4028FE000
trusted library allocation
page read and write
1F3FFA03000
trusted library allocation
page read and write
431E000
stack
page read and write
1F3FB19D000
trusted library allocation
page read and write
1F401EFD000
trusted library allocation
page read and write
3B8E000
stack
page read and write
1F3FEEB8000
trusted library allocation
page read and write
1F3FF8BD000
trusted library allocation
page read and write
1F3FC400000
trusted library allocation
page read and write
1F401ABC000
trusted library allocation
page read and write
1F401496000
trusted library allocation
page read and write
4861000
heap
page read and write
20BC880C000
trusted library allocation
page read and write
21F9C262000
heap
page read and write
1F401EE5000
trusted library allocation
page read and write
1F400FE6000
trusted library allocation
page read and write
1F40040B000
trusted library allocation
page read and write
539000
unkown
page read and write
1F3FB492000
unclassified section
page read and write
1F4095E6000
trusted library allocation
page read and write
F46000
heap
page read and write
994000
heap
page read and write
4193000
heap
page read and write
1F4014C2000
trusted library allocation
page read and write
A3486EC000
stack
page read and write
1F3FEED4000
trusted library allocation
page read and write
1F40037F000
trusted library allocation
page read and write
4591000
heap
page read and write
A341E0F000
stack
page read and write
27668FBD000
heap
page read and write
1F3FB1FB000
trusted library allocation
page read and write
1764000
heap
page read and write
1F3FD15B000
trusted library allocation
page read and write
1F3FB2DF000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FD1D5000
trusted library allocation
page read and write
1F4028BE000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
21F9C22E000
heap
page read and write
1F3EF130000
unclassified section
page readonly
22DE0000
heap
page read and write
486F000
stack
page read and write
1F3FEF68000
trusted library allocation
page read and write
1F4016D7000
trusted library allocation
page read and write
22DA0000
heap
page read and write
429F000
stack
page read and write
21F9C22E000
heap
page read and write
1F40285B000
trusted library allocation
page read and write
20BC8623000
trusted library allocation
page read and write
1F3FF782000
trusted library allocation
page read and write
22EC7000
heap
page read and write
1F402897000
trusted library allocation
page read and write
4FF1000
heap
page read and write
D1BC9FF000
stack
page read and write
1F402859000
trusted library allocation
page read and write
1F402F27000
trusted library allocation
page read and write
276676D0000
heap
page read and write
1F3FEE63000
trusted library allocation
page read and write
1F3FC277000
trusted library allocation
page read and write
1720000
heap
page read and write
1F3FF42D000
trusted library allocation
page read and write
1F4004AC000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FF43D000
trusted library allocation
page read and write
1F3F0F20000
heap
page read and write
1F3FFB50000
unclassified section
page read and write
1F4014B5000
trusted library allocation
page read and write
A34366E000
stack
page read and write
4591000
heap
page read and write
1F3FC536000
heap
page read and write
1F3FF046000
trusted library allocation
page read and write
1F3FB69E000
trusted library allocation
page read and write
1F3FC398000
trusted library allocation
page read and write
1F3FC463000
trusted library allocation
page read and write
1F3FD157000
trusted library allocation
page read and write
1F3FCF09000
trusted library allocation
page read and write
1F3FFCFB000
trusted library allocation
page read and write
1F3FF48F000
trusted library allocation
page read and write
1C3AF000
stack
page read and write
EDF000
heap
page read and write
1F400B00000
trusted library allocation
page read and write
1F4019F0000
trusted library allocation
page read and write
1CBE1000
heap
page read and write
21F9B300000
trusted library allocation
page read and write
1F3FCFBF000
trusted library allocation
page read and write
3B6F000
stack
page read and write
994000
heap
page read and write
1F3FB215000
trusted library allocation
page read and write
3A6E000
stack
page read and write
1F4029A7000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FC3C7000
trusted library allocation
page read and write
1F3FF4ED000
trusted library allocation
page read and write
6CCEF000
unkown
page readonly
350F000
stack
page read and write
1F4014C6000
trusted library allocation
page read and write
21F9B474000
trusted library allocation
page read and write
37AF000
stack
page read and write
1F3FF076000
trusted library allocation
page read and write
1F3FF096000
trusted library allocation
page read and write
1F3FEE61000
trusted library allocation
page read and write
1F3FF946000
trusted library allocation
page read and write
1F3FC3C4000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
1F4019F8000
trusted library allocation
page read and write
2D3F94403000
trusted library allocation
page read and write
10BBE358000
trusted library allocation
page execute read
1F3FC556000
heap
page read and write
1F3FFD18000
trusted library allocation
page read and write
1F3FB2A5000
trusted library allocation
page read and write
1F3EF5F7000
trusted library allocation
page read and write
21F9B410000
trusted library allocation
page read and write
D1C000
stack
page read and write
994000
heap
page read and write
1730000
direct allocation
page read and write
471F000
stack
page read and write
1F3F0E5C000
heap
page read and write
E6E000
heap
page read and write
532000
unkown
page execute and read and write
1F3FF0D2000
trusted library allocation
page read and write
A340BEE000
stack
page read and write
EC0000
heap
page read and write
3C2E000
stack
page read and write
1F4028A5000
trusted library allocation
page read and write
1F401AB4000
trusted library allocation
page read and write
1F3FC39D000
trusted library allocation
page read and write
1F3FC8B4000
heap
page read and write
1730000
direct allocation
page read and write
26C4000
heap
page read and write
1F3FB2CD000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
1F3FF43D000
trusted library allocation
page read and write
20BC881E000
trusted library allocation
page read and write
B54000
heap
page read and write
1F3FFC69000
trusted library allocation
page read and write
1F3FC404000
trusted library allocation
page read and write
1F3FC366000
trusted library allocation
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F401A21000
trusted library allocation
page read and write
1F3FC530000
heap
page read and write
1F3FF457000
trusted library allocation
page read and write
1F3FAC3C000
trusted library allocation
page read and write
10BBE471000
trusted library allocation
page execute read
1F3FC3DF000
trusted library allocation
page read and write
1F3FCFBC000
trusted library allocation
page read and write
21F9BD33000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
20BC8818000
trusted library allocation
page read and write
21F9B495000
trusted library allocation
page read and write
26C7000
heap
page read and write
1F3FC376000
trusted library allocation
page read and write
1F400910000
trusted library allocation
page read and write
1F401655000
trusted library allocation
page read and write
1F4030FC000
trusted library allocation
page read and write
1F401698000
trusted library allocation
page read and write
1F3FFC91000
trusted library allocation
page read and write
1F3FF4D5000
trusted library allocation
page read and write
95A579E000
unkown
page readonly
1F3FC3B9000
trusted library allocation
page read and write
4861000
heap
page read and write
1F0000
heap
page read and write
4591000
heap
page read and write
4861000
heap
page read and write
1F3FEDD6000
trusted library allocation
page read and write
20BC8610000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
1F40142A000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FFC54000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FF690000
trusted library section
page readonly
1F401119000
trusted library allocation
page read and write
1F3FF703000
trusted library allocation
page read and write
55AD000
stack
page read and write
1F401ED9000
trusted library allocation
page read and write
1F3FFA40000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
A345FE9000
stack
page read and write
42D0000
heap
page read and write
20BC8683000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
1764000
heap
page read and write
1F3FF77C000
trusted library allocation
page read and write
1F3FC54D000
heap
page read and write
49F000
unkown
page execute and read and write
1F401668000
trusted library allocation
page read and write
21F9C298000
heap
page read and write
1F3FF9C7000
trusted library allocation
page read and write
F2F000
heap
page read and write
1F3FD1FB000
trusted library allocation
page read and write
2547000
heap
page read and write
4591000
heap
page read and write
1F402FE1000
trusted library allocation
page read and write
1F40020C000
trusted library allocation
page read and write
1F3FCF9B000
trusted library allocation
page read and write
1F3FABEF000
trusted library allocation
page read and write
1F3FEF6C000
trusted library allocation
page read and write
994000
heap
page read and write
1F401656000
trusted library allocation
page read and write
22D5D000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
1F3FD169000
trusted library allocation
page read and write
21F9B4FB000
trusted library allocation
page read and write
1F3FEEBD000
trusted library allocation
page read and write
1F401E26000
trusted library allocation
page read and write
1F3FEEBE000
trusted library allocation
page read and write
1F3FF0E6000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FEE33000
trusted library allocation
page read and write
1F3FABF7000
trusted library allocation
page read and write
6970000
heap
page read and write
1F3FB2FE000
trusted library allocation
page read and write
1F3FC2AE000
trusted library allocation
page read and write
42DC000
heap
page read and write
21F9B580000
heap
page read and write
1F3FC530000
heap
page read and write
4A20000
direct allocation
page read and write
1F402FFD000
trusted library allocation
page read and write
1F3FFCFB000
trusted library allocation
page read and write
352F000
stack
page read and write
1F401668000
trusted library allocation
page read and write
1F3FEE85000
trusted library allocation
page read and write
1F3FD933000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FB6A3000
trusted library allocation
page read and write
1F4016EF000
trusted library allocation
page read and write
1F3FC536000
heap
page read and write
1F3FAB03000
trusted library allocation
page read and write
AD1000
heap
page read and write
432E000
stack
page read and write
316254E000
stack
page read and write
25DE000
heap
page read and write
1F3F0DF0000
heap
page read and write
1F3FF478000
trusted library allocation
page read and write
28FF000
stack
page read and write
1F3FD1FE000
trusted library allocation
page read and write
22EFF000
heap
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F3FCFBC000
trusted library allocation
page read and write
10BBE35F000
trusted library allocation
page execute read
1F401A5E000
trusted library allocation
page read and write
1F40118B000
trusted library allocation
page read and write
585000
heap
page read and write
32EE000
stack
page read and write
1F3FF428000
trusted library allocation
page read and write
230ED000
heap
page read and write
9E0000
heap
page read and write
1F3EF2F0000
heap
page read and write
C60000
direct allocation
page read and write
1F3FAC00000
trusted library allocation
page read and write
1F3FB275000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401692000
trusted library allocation
page read and write
4F1000
unkown
page execute and read and write
6CD35000
unkown
page readonly
1F3FC421000
trusted library allocation
page read and write
F4F000
heap
page read and write
1F4012B0000
trusted library allocation
page read and write
1F3FEE7F000
trusted library allocation
page read and write
1F3FEE79000
trusted library allocation
page read and write
994000
heap
page read and write
1F4002EB000
trusted library allocation
page read and write
1F401A49000
trusted library allocation
page read and write
1F3FD308000
trusted library allocation
page read and write
1F3FC324000
trusted library allocation
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F40020F000
trusted library allocation
page read and write
1F403499000
trusted library allocation
page read and write
1F3FF0D2000
trusted library allocation
page read and write
1F3FEEA2000
trusted library allocation
page read and write
22EC2000
heap
page read and write
1F401E75000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FF2DD000
heap
page read and write
1F3FCF22000
trusted library allocation
page read and write
230DC000
heap
page read and write
1F3FFB42000
unclassified section
page read and write
2547000
heap
page read and write
1F3FD300000
trusted library allocation
page read and write
1F407793000
trusted library allocation
page read and write
1F3FFC6E000
trusted library allocation
page read and write
4591000
heap
page read and write
1F4013D2000
trusted library allocation
page read and write
1F400303000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
10BBE301000
trusted library allocation
page execute read
1F3FEE91000
trusted library allocation
page read and write
230F9000
heap
page read and write
1F3FEC44000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
26C6000
heap
page read and write
1F3FEF9C000
trusted library allocation
page read and write
2E1F000
stack
page read and write
21F9BD00000
trusted library allocation
page read and write
11AB000
unkown
page execute and write copy
1F3FF14A000
heap
page read and write
1F4003FA000
trusted library allocation
page read and write
1F3FEBA1000
trusted library allocation
page read and write
26BF000
heap
page read and write
4591000
heap
page read and write
1F3FF0E8000
trusted library allocation
page read and write
517F000
stack
page read and write
10BBE36A000
trusted library allocation
page execute read
1F3FB2DA000
trusted library allocation
page read and write
1F3FF400000
trusted library allocation
page read and write
1F3FF437000
trusted library allocation
page read and write
1F3FC3F6000
trusted library allocation
page read and write
1F3F0EAB000
heap
page read and write
1F402F23000
trusted library allocation
page read and write
1F402F1F000
trusted library allocation
page read and write
A343F6B000
stack
page read and write
21F9C23C000
heap
page read and write
1F3FB5FE000
trusted library allocation
page read and write
1C63F000
stack
page read and write
1F40289F000
trusted library allocation
page read and write
3E2E000
stack
page read and write
401000
unkown
page execute read
19D000
stack
page read and write
1F3FC250000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FED79000
trusted library allocation
page read and write
2980000
heap
page read and write
21F9C240000
heap
page read and write
1F3FEDF3000
trusted library allocation
page read and write
1F3FC54D000
heap
page read and write
1F3FFCE5000
trusted library allocation
page read and write
7A9000
heap
page read and write
1F402828000
trusted library allocation
page read and write
1F400E0F000
trusted library allocation
page read and write
21F9B42F000
trusted library allocation
page read and write
1F3FC536000
heap
page read and write
1F4002D6000
trusted library allocation
page read and write
230E5000
heap
page read and write
1F3FB440000
trusted library section
page read and write
1F401663000
trusted library allocation
page read and write
1F4019F0000
trusted library allocation
page read and write
1F400100000
trusted library allocation
page read and write
1F3FFC10000
trusted library allocation
page read and write
1CBE1000
heap
page read and write
4861000
heap
page read and write
4F10000
direct allocation
page execute and read and write
230E3000
heap
page read and write
1F4016F0000
trusted library allocation
page read and write
2DEF000
stack
page read and write
4861000
heap
page read and write
1F3FC3AA000
trusted library allocation
page read and write
1CBF0000
heap
page read and write
186F000
stack
page read and write
2C0F000
stack
page read and write
6CD2E000
unkown
page read and write
1F401189000
trusted library allocation
page read and write
1F3FF43D000
trusted library allocation
page read and write
1F3FC39B000
trusted library allocation
page read and write
1F4028CA000
trusted library allocation
page read and write
1F402878000
trusted library allocation
page read and write
1F3FEEA2000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
25C0000
heap
page read and write
20BC862E000
trusted library allocation
page read and write
1F3FABBF000
trusted library allocation
page read and write
1F3FF4C3000
trusted library allocation
page read and write
1F3FF4FA000
trusted library allocation
page read and write
1CBE1000
heap
page read and write
1F3FF30A000
trusted library allocation
page read and write
1F3FC563000
heap
page read and write
1F402962000
trusted library allocation
page read and write
25C7000
heap
page read and write
1F3FC274000
trusted library allocation
page read and write
730000
heap
page read and write
C9B000
heap
page read and write
2ECF000
stack
page read and write
1F3FEE6B000
trusted library allocation
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F3FF6C0000
trusted library section
page readonly
1F400221000
trusted library allocation
page read and write
1F400502000
trusted library allocation
page read and write
1F3FEF89000
trusted library allocation
page read and write
1F40047F000
trusted library allocation
page read and write
1F3FB152000
trusted library allocation
page read and write
1F3FC3DF000
trusted library allocation
page read and write
1F3FC53C000
heap
page read and write
4591000
heap
page read and write
95A9ABE000
unkown
page readonly
1F3FC3B9000
trusted library allocation
page read and write
26C6000
heap
page read and write
1F4028CA000
trusted library allocation
page read and write
38EF000
stack
page read and write
EC2000
heap
page read and write
1F400485000
trusted library allocation
page read and write
7E3B000
stack
page read and write
1F3FD208000
trusted library allocation
page read and write
11AB000
unkown
page execute and write copy
1F401ED2000
trusted library allocation
page read and write
1F40303E000
trusted library allocation
page read and write
F4F000
heap
page read and write
1F401DC5000
trusted library allocation
page read and write
21F9B417000
trusted library allocation
page read and write
5620000
direct allocation
page execute and read and write
1F402869000
trusted library allocation
page read and write
1F3FD182000
trusted library allocation
page read and write
A347DAD000
stack
page read and write
1F40166F000
trusted library allocation
page read and write
1F3FCF63000
trusted library allocation
page read and write
23103000
heap
page read and write
21F9C148000
heap
page read and write
1F401100000
trusted library allocation
page read and write
1F407700000
trusted library allocation
page read and write
7F7E000
stack
page read and write
22CF1000
heap
page read and write
973000
unkown
page execute and write copy
1F3FEE00000
trusted library allocation
page read and write
1F3FC3BB000
trusted library allocation
page read and write
1F4013B7000
trusted library allocation
page read and write
386E000
stack
page read and write
1F401668000
trusted library allocation
page read and write
807F000
stack
page read and write
21F9C231000
heap
page read and write
1760000
heap
page read and write
230E5000
heap
page read and write
1F4013BE000
trusted library allocation
page read and write
975000
unkown
page execute and write copy
1F40349F000
trusted library allocation
page read and write
1F401698000
trusted library allocation
page read and write
1F3FFC51000
trusted library allocation
page read and write
1F401760000
trusted library allocation
page read and write
1343000
unkown
page execute and write copy
1F401A55000
trusted library allocation
page read and write
1F40344A000
trusted library allocation
page read and write
1F3FC385000
trusted library allocation
page read and write
1F4019FC000
trusted library allocation
page read and write
1F3FEED4000
trusted library allocation
page read and write
1F3FEED6000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
1F3FC53C000
heap
page read and write
1F3FC53C000
heap
page read and write
31647FE000
unkown
page readonly
1F3FF0A1000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
1F3FC560000
heap
page read and write
1F401E86000
trusted library allocation
page read and write
1F3FC366000
trusted library allocation
page read and write
1F3FB14E000
trusted library allocation
page read and write
1F3FEB9D000
trusted library allocation
page read and write
21F9C1CA000
heap
page read and write
1F402839000
trusted library allocation
page read and write
1F3FCFBF000
trusted library allocation
page read and write
20BC8821000
trusted library allocation
page read and write
1F3FB198000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FCF9B000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FF43B000
trusted library allocation
page read and write
1F3FFC6B000
trusted library allocation
page read and write
1F401A5A000
trusted library allocation
page read and write
2545000
heap
page read and write
27667460000
heap
page read and write
1F3FF0E8000
trusted library allocation
page read and write
1F3FC380000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
1F3EF1B0000
heap
page read and write
1F3FFD27000
trusted library allocation
page read and write
2530000
heap
page read and write
1F3FF4CB000
trusted library allocation
page read and write
99E93FF000
stack
page read and write
1F4028CD000
trusted library allocation
page read and write
26C9000
heap
page read and write
E90000
heap
page read and write
230DC000
heap
page read and write
A34AD7B000
stack
page read and write
23105000
heap
page read and write
1F401679000
trusted library allocation
page read and write
400000
unkown
page readonly
1F3FC2BB000
trusted library allocation
page read and write
1F3FF0BD000
trusted library allocation
page read and write
2BDF000
stack
page read and write
3F9E000
stack
page read and write
1F402F65000
trusted library allocation
page read and write
A346BED000
stack
page read and write
1F3FB1A5000
trusted library allocation
page read and write
1F3FF891000
trusted library allocation
page read and write
A34892E000
stack
page read and write
1F3FED6C000
trusted library allocation
page read and write
1F401668000
trusted library allocation
page read and write
1F3EF5E7000
trusted library allocation
page read and write
21F9B4CF000
trusted library allocation
page read and write
1F3FEFD2000
trusted library allocation
page read and write
430000
heap
page read and write
972000
unkown
page execute and read and write
1F4004F7000
trusted library allocation
page read and write
2D8F000
stack
page read and write
45DF000
stack
page read and write
22DA0000
heap
page read and write
95A565D000
stack
page read and write
1F3FCFC2000
trusted library allocation
page read and write
1F401E03000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FC3AF000
trusted library allocation
page read and write
1F3FF48F000
trusted library allocation
page read and write
1F3FF824000
trusted library allocation
page read and write
1F3FC307000
trusted library allocation
page read and write
1F3FD1FA000
trusted library allocation
page read and write
411E000
stack
page read and write
4591000
heap
page read and write
1F3FC554000
heap
page read and write
1F3FC366000
trusted library allocation
page read and write
CD0000
heap
page read and write
21F9C284000
heap
page read and write
1F3FF8B3000
trusted library allocation
page read and write
26C2000
heap
page read and write
1F401891000
trusted library allocation
page read and write
1F3FEE63000
trusted library allocation
page read and write
21F9C1AC000
heap
page read and write
1F3FC530000
heap
page read and write
3CA000
stack
page read and write
335E000
stack
page read and write
1F401679000
trusted library allocation
page read and write
1F400115000
trusted library allocation
page read and write
4861000
heap
page read and write
1F4034FE000
trusted library allocation
page read and write
1C69E000
stack
page read and write
10BBE2EF000
trusted library allocation
page execute read
4AD000
stack
page read and write
10BBE310000
trusted library allocation
page execute read
1F3FC3B9000
trusted library allocation
page read and write
1F3FFCAB000
trusted library allocation
page read and write
1F401743000
trusted library allocation
page read and write
1F3FF956000
trusted library allocation
page read and write
1F3FC54D000
heap
page read and write
1F4010D0000
trusted library allocation
page read and write
1F3FC366000
trusted library allocation
page read and write
1F3FC2BB000
trusted library allocation
page read and write
1F401698000
trusted library allocation
page read and write
1F3FF903000
trusted library allocation
page read and write
1F4016D0000
trusted library allocation
page read and write
1F4028CD000
trusted library allocation
page read and write
1F3FEE72000
trusted library allocation
page read and write
1F3FB1EF000
trusted library allocation
page read and write
1F3FD1F0000
trusted library allocation
page read and write
1F3FC392000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
1F401686000
trusted library allocation
page read and write
21F9B423000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
1F3FC55C000
heap
page read and write
441F000
stack
page read and write
1342000
unkown
page execute and read and write
1F3FF4EC000
trusted library allocation
page read and write
1F400382000
trusted library allocation
page read and write
1F401040000
trusted library allocation
page read and write
1F3FCF63000
trusted library allocation
page read and write
25D0000
heap
page read and write
4591000
heap
page read and write
1F402F85000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
9DE000
stack
page read and write
1F3FD1F2000
trusted library allocation
page read and write
26C3000
heap
page read and write
419000
unkown
page readonly
1F4096DD000
trusted library allocation
page read and write
1C8ED000
stack
page read and write
1F3FD1FB000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
A34A575000
stack
page read and write
1F3FB5BA000
trusted library allocation
page read and write
1F3FC3A5000
trusted library allocation
page read and write
421F000
stack
page read and write
1F4016CF000
trusted library allocation
page read and write
1F3FEEB6000
trusted library allocation
page read and write
1F3FB17E000
trusted library allocation
page read and write
1F3FF04C000
trusted library allocation
page read and write
1F3FC497000
trusted library allocation
page read and write
1F401A2A000
trusted library allocation
page read and write
1F3FC536000
heap
page read and write
1F3FD1F7000
trusted library allocation
page read and write
EE3000
heap
page read and write
4F20000
direct allocation
page execute and read and write
1F401A49000
trusted library allocation
page read and write
1F3FF4EE000
trusted library allocation
page read and write
1F3FC8B0000
heap
page read and write
D1BD1FE000
stack
page read and write
10BBE381000
trusted library allocation
page execute read
2691000
heap
page read and write
230E9000
heap
page read and write
1F3FB198000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
1F3FF085000
trusted library allocation
page read and write
4861000
heap
page read and write
1F4095C7000
trusted library allocation
page read and write
21F9BD2F000
trusted library allocation
page read and write
1F400413000
trusted library allocation
page read and write
A95000
heap
page read and write
1F4004AC000
trusted library allocation
page read and write
26C7000
heap
page read and write
21F9B140000
unclassified section
page readonly
461E000
stack
page read and write
4591000
heap
page read and write
63E000
unkown
page execute and read and write
1F3FB1CF000
trusted library allocation
page read and write
1F3EF3E0000
trusted library section
page readonly
1F402839000
trusted library allocation
page read and write
20BC82E0000
heap
page read and write
1F3FF454000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FAD00000
trusted library allocation
page read and write
35AF000
stack
page read and write
21F9C22E000
heap
page read and write
1F3FFC61000
trusted library allocation
page read and write
314F000
stack
page read and write
316483E000
unkown
page readonly
1F402F2B000
trusted library allocation
page read and write
1F3FCF9B000
trusted library allocation
page read and write
4591000
heap
page read and write
F20000
heap
page read and write
1F4034CE000
trusted library allocation
page read and write
1F3FEEBD000
trusted library allocation
page read and write
1F3FF4C1000
trusted library allocation
page read and write
1F4010BC000
trusted library allocation
page read and write
4591000
heap
page read and write
316F000
stack
page read and write
21F9B0D0000
unclassified section
page readonly
4F00000
direct allocation
page execute and read and write
1F40286E000
trusted library allocation
page read and write
1F3FF0AE000
trusted library allocation
page read and write
1F4028B8000
trusted library allocation
page read and write
1F403070000
trusted library allocation
page read and write
1F3FB2F0000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
4861000
heap
page read and write
1F4003F8000
trusted library allocation
page read and write
230D6000
heap
page read and write
1F3FEF6A000
trusted library allocation
page read and write
1F401E3B000
trusted library allocation
page read and write
1F3FF0C9000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
11AA000
unkown
page execute and read and write
1F3FAC81000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
98E000
stack
page read and write
1F40779B000
trusted library allocation
page read and write
4591000
heap
page read and write
9C000
stack
page read and write
1F401EAC000
trusted library allocation
page read and write
1F4030CA000
trusted library allocation
page read and write
1F4016F0000
trusted library allocation
page read and write
230CB000
heap
page read and write
1F3FFAE2000
trusted library allocation
page read and write
21F9C298000
heap
page read and write
1F3FEE36000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FC341000
trusted library allocation
page read and write
1F401AF8000
trusted library allocation
page read and write
1F40294E000
trusted library allocation
page read and write
1F3FC385000
trusted library allocation
page read and write
1F400F54000
trusted library allocation
page read and write
1F401672000
trusted library allocation
page read and write
1F3FCF00000
trusted library allocation
page read and write
1F3FC52F000
heap
page read and write
1F401EC9000
trusted library allocation
page read and write
1F407735000
trusted library allocation
page read and write
1F400235000
trusted library allocation
page read and write
6CAB0000
unkown
page readonly
22DA0000
heap
page read and write
1F403497000
trusted library allocation
page read and write
1F3FAD9C000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
1F3FF0C6000
trusted library allocation
page read and write
1F4029D8000
trusted library allocation
page read and write
1F40037B000
trusted library allocation
page read and write
1F401E3F000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
1F3FCFBC000
trusted library allocation
page read and write
20E12400000
trusted library allocation
page read and write
A33F9FE000
stack
page read and write
34AE000
stack
page read and write
1F401660000
trusted library allocation
page read and write
1F3FC3C7000
trusted library allocation
page read and write
1F3FB19D000
trusted library allocation
page read and write
1F3FF0D0000
trusted library allocation
page read and write
1F3FF9DF000
trusted library allocation
page read and write
1F3FD150000
trusted library allocation
page read and write
422F000
stack
page read and write
3FDE000
stack
page read and write
1F3EF5DD000
trusted library allocation
page read and write
1F401A8B000
trusted library allocation
page read and write
A34812C000
stack
page read and write
B54000
heap
page read and write
1F3FC3BC000
trusted library allocation
page read and write
22DDF000
heap
page read and write
1F401656000
trusted library allocation
page read and write
1F40196B000
trusted library allocation
page read and write
2D4F000
stack
page read and write
1F3FC316000
trusted library allocation
page read and write
22EC1000
heap
page read and write
1F3FB198000
trusted library allocation
page read and write
2530000
heap
page read and write
1F401EAE000
trusted library allocation
page read and write
21F9C261000
heap
page read and write
1F3FF0E8000
trusted library allocation
page read and write
22EC1000
heap
page read and write
1F3FFD03000
trusted library allocation
page read and write
1F3FC396000
trusted library allocation
page read and write
20BC8672000
trusted library allocation
page read and write
21F9C229000
heap
page read and write
1F4030B9000
trusted library allocation
page read and write
1C7575D0000
heap
page read and write
1F3FCF75000
trusted library allocation
page read and write
1F3FEEB9000
trusted library allocation
page read and write
1F3FF836000
trusted library allocation
page read and write
1F4018F2000
trusted library allocation
page read and write
420000
heap
page read and write
1F3FF4F6000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FD1C7000
trusted library allocation
page read and write
423000
unkown
page readonly
1F3FEEB6000
trusted library allocation
page read and write
1F3FD1FA000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
1F4002F2000
trusted library allocation
page read and write
404F000
stack
page read and write
1F3FD1FE000
trusted library allocation
page read and write
1F3FF0E5000
trusted library allocation
page read and write
300E000
stack
page read and write
1F3FEB11000
trusted library allocation
page read and write
21F9C1BD000
heap
page read and write
A3415FB000
stack
page read and write
1F3FF083000
trusted library allocation
page read and write
1F401686000
trusted library allocation
page read and write
1F3FCFB5000
trusted library allocation
page read and write
1F401998000
trusted library allocation
page read and write
1F401EB0000
trusted library allocation
page read and write
56AD000
stack
page read and write
1F401E00000
trusted library allocation
page read and write
1F3FEE63000
trusted library allocation
page read and write
1F3FC3BC000
trusted library allocation
page read and write
1F3FF04B000
trusted library allocation
page read and write
1F4003F8000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
33EF000
stack
page read and write
1F3FEC96000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
1F3FB5D4000
trusted library allocation
page read and write
1F3FC168000
trusted library allocation
page read and write
1F3FD157000
trusted library allocation
page read and write
21F9C27B000
heap
page read and write
1F3FC550000
heap
page read and write
4CA0000
heap
page read and write
1F3EF120000
unclassified section
page readonly
1F3FC311000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
20BC82C0000
unclassified section
page readonly
1F4002F2000
trusted library allocation
page read and write
1C757607000
trusted library allocation
page read and write
1F4014D4000
trusted library allocation
page read and write
1F3FB410000
heap
page read and write
1F401ADA000
trusted library allocation
page read and write
4861000
heap
page read and write
6CD2F000
unkown
page write copy
1F3FB1F6000
trusted library allocation
page read and write
1F3FAB81000
trusted library allocation
page read and write
1F3FC530000
heap
page read and write
1F402885000
trusted library allocation
page read and write
2E5F000
stack
page read and write
354E000
stack
page read and write
4591000
heap
page read and write
1F40167B000
trusted library allocation
page read and write
22DE0000
heap
page read and write
4E11000
direct allocation
page read and write
1F40187D000
trusted library allocation
page read and write
22F41000
heap
page read and write
21F9B45F000
trusted library allocation
page read and write
2580000
heap
page read and write
1F3FC554000
heap
page read and write
994000
heap
page read and write
994000
heap
page read and write
1F3FEE12000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
1F3FF4B8000
trusted library allocation
page read and write
1F402859000
trusted library allocation
page read and write
1F3FC36A000
trusted library allocation
page read and write
1F402F72000
trusted library allocation
page read and write
21F9C18D000
heap
page read and write
1F3FCF04000
trusted library allocation
page read and write
1F3FB123000
trusted library allocation
page read and write
20BC86A0000
trusted library allocation
page read and write
1F40BF09000
trusted library allocation
page read and write
230C0000
heap
page read and write
740000
heap
page read and write
1F3FEF68000
trusted library allocation
page read and write
1F40BF28000
trusted library allocation
page read and write
4591000
heap
page read and write
994000
heap
page read and write
352EC000
stack
page read and write
353EC000
stack
page read and write
419000
unkown
page readonly
1F3FEF84000
trusted library allocation
page read and write
1F3FF3A0000
trusted library allocation
page read and write
1F3FC531000
heap
page read and write
1F3F0EDF000
heap
page read and write
1F400200000
trusted library allocation
page read and write
1F401A86000
trusted library allocation
page read and write
1F3FEE25000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
1F3FF7E1000
trusted library allocation
page read and write
1F3FEEB8000
trusted library allocation
page read and write
1F3FC563000
heap
page read and write
22F08000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
1F40195E000
trusted library allocation
page read and write
1CBE1000
heap
page read and write
1F40023F000
trusted library allocation
page read and write
1F401E95000
trusted library allocation
page read and write
1F4018E1000
trusted library allocation
page read and write
95A8A7E000
stack
page read and write
1F401E9E000
trusted library allocation
page read and write
4861000
heap
page read and write
1F401D9C000
trusted library allocation
page read and write
230E1000
heap
page read and write
1F401A43000
trusted library allocation
page read and write
1F3FC359000
trusted library allocation
page read and write
26C3000
heap
page read and write
F30000
heap
page read and write
1F3FEF3B000
trusted library allocation
page read and write
1F4012B0000
trusted library allocation
page read and write
19C000
stack
page read and write
1F401E0D000
trusted library allocation
page read and write
22EFF000
heap
page read and write
1F3FC3BB000
trusted library allocation
page read and write
F2D000
heap
page read and write
1F401E31000
trusted library allocation
page read and write
1F3FD1F2000
trusted library allocation
page read and write
1F3FF0C3000
trusted library allocation
page read and write
1F401AF6000
trusted library allocation
page read and write
1F3FEE8B000
trusted library allocation
page read and write
1F400ED7000
trusted library allocation
page read and write
1F3FB2A5000
trusted library allocation
page read and write
1F4002F2000
trusted library allocation
page read and write
1F3FCF0D000
trusted library allocation
page read and write
540000
heap
page read and write
1F401203000
trusted library allocation
page read and write
1F4019F4000
trusted library allocation
page read and write
171E000
stack
page read and write
4861000
heap
page read and write
1F3FAC6C000
trusted library allocation
page read and write
1F40196B000
trusted library allocation
page read and write
1F40295C000
trusted library allocation
page read and write
1F4015C3000
trusted library allocation
page read and write
7EF000
stack
page read and write
22EFE000
heap
page read and write
1F3FFCF4000
trusted library allocation
page read and write
9B000
stack
page read and write
1F4028A4000
trusted library allocation
page read and write
1F3FB12F000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
A34157B000
stack
page read and write
1F3FD186000
trusted library allocation
page read and write
1F3FF7D6000
trusted library allocation
page read and write
1F3FAC8A000
trusted library allocation
page read and write
1F402879000
trusted library allocation
page read and write
1F3FCFBF000
trusted library allocation
page read and write
1F4028A4000
trusted library allocation
page read and write
1F4034D7000
trusted library allocation
page read and write
1F401679000
trusted library allocation
page read and write
1F3FC277000
trusted library allocation
page read and write
1F401D81000
trusted library allocation
page read and write
1F3FC536000
heap
page read and write
1F4002FD000
trusted library allocation
page read and write
21F9BD03000
trusted library allocation
page read and write
4861000
heap
page read and write
EA1000
unkown
page execute and write copy
1C62F000
stack
page read and write
1F3FC39A000
trusted library allocation
page read and write
21F9BA46000
unkown
page execute read
1F3FF076000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
1F3FAB9E000
trusted library allocation
page read and write
1F401E18000
trusted library allocation
page read and write
1F3FCF63000
trusted library allocation
page read and write
1F3FC563000
heap
page read and write
1F401DAF000
trusted library allocation
page read and write
1F401EDF000
trusted library allocation
page read and write
25ED000
heap
page execute and read and write
A3481EE000
stack
page read and write
1F401096000
trusted library allocation
page read and write
95A569E000
unkown
page readonly
E4E000
stack
page read and write
21F9B584000
heap
page read and write
1F401200000
trusted library allocation
page read and write
1F4002B8000
trusted library allocation
page read and write
1F401DB3000
trusted library allocation
page read and write
1F400471000
trusted library allocation
page read and write
1F4028BE000
trusted library allocation
page read and write
1F3FB300000
unclassified section
page read and write
4591000
heap
page read and write
1F3FC39A000
trusted library allocation
page read and write
3CCE000
stack
page read and write
1F3FED03000
trusted library allocation
page read and write
4861000
heap
page read and write
1F40166D000
trusted library allocation
page read and write
1F3FB50B000
trusted library allocation
page read and write
1F3FC554000
heap
page read and write
1F3FEF9C000
trusted library allocation
page read and write
41AF000
stack
page read and write
46EE000
stack
page read and write
1F3FC3DE000
trusted library allocation
page read and write
1F3FF060000
trusted library allocation
page read and write
297E000
stack
page read and write
4591000
heap
page read and write
1F40137E000
trusted library allocation
page read and write
1F3FC571000
heap
page read and write
316250E000
unkown
page readonly
4FF1000
heap
page read and write
1F3FC55C000
heap
page read and write
2E9C000
stack
page read and write
1F3FFC67000
trusted library allocation
page read and write
1F3FB1F6000
trusted library allocation
page read and write
1F3FFCC2000
trusted library allocation
page read and write
4B6F000
stack
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F3FCF03000
trusted library allocation
page read and write
1F3FC271000
trusted library allocation
page read and write
1F3FF0A1000
trusted library allocation
page read and write
26BF000
heap
page read and write
22DA0000
heap
page read and write
1F3FAD03000
trusted library allocation
page read and write
21F9C298000
heap
page read and write
A348D7E000
stack
page read and write
1F3FD181000
trusted library allocation
page read and write
1F40166F000
trusted library allocation
page read and write
1F3FB2E4000
trusted library allocation
page read and write
1F3FB557000
trusted library allocation
page read and write
1F3FEE1E000
trusted library allocation
page read and write
A343FAE000
stack
page read and write
1F3FF714000
trusted library allocation
page read and write
1F401503000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
1F4017D2000
trusted library allocation
page read and write
1F3FF0D1000
trusted library allocation
page read and write
1F3FF4EA000
trusted library allocation
page read and write
230F4000
heap
page read and write
1F400F03000
trusted library allocation
page read and write
1F3FEE72000
trusted library allocation
page read and write
20BC8C40000
heap
page read and write
1F3FAD0C000
trusted library allocation
page read and write
1F401E9D000
trusted library allocation
page read and write
1F400409000
trusted library allocation
page read and write
1F40288C000
trusted library allocation
page read and write
A347CEE000
stack
page read and write
1F4095C3000
trusted library allocation
page read and write
1F3FF089000
trusted library allocation
page read and write
1F3F0EBB000
heap
page read and write
A347D2C000
stack
page read and write
21F9BA3F000
unkown
page execute read
1F4034E7000
trusted library allocation
page read and write
F03000
heap
page read and write
1F3FF8E7000
trusted library allocation
page read and write
1F401A9C000
trusted library allocation
page read and write
2690000
heap
page read and write
1F402890000
trusted library allocation
page read and write
4D61000
direct allocation
page read and write
1F3FAD1C000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FF41A000
trusted library allocation
page read and write
1F3FB2FE000
trusted library allocation
page read and write
1F40152D000
trusted library allocation
page read and write
2547000
heap
page read and write
1F4003F8000
trusted library allocation
page read and write
1CBE1000
heap
page read and write
587000
unkown
page execute and read and write
22D5D000
heap
page read and write
1F3FB0D2000
unclassified section
page read and write
1F3FF0AF000
trusted library allocation
page read and write
1F3FEE72000
trusted library allocation
page read and write
1F403499000
trusted library allocation
page read and write
3323BFF000
stack
page read and write
1F3FAD16000
trusted library allocation
page read and write
1F3FEE10000
trusted library allocation
page read and write
A343FEE000
stack
page read and write
1F40183D000
trusted library allocation
page read and write
55AF000
stack
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F4011DE000
trusted library allocation
page read and write
1F3FF083000
trusted library allocation
page read and write
4861000
heap
page read and write
31DF000
stack
page read and write
23103000
heap
page read and write
1F402869000
trusted library allocation
page read and write
95A5718000
stack
page read and write
1F3FC554000
heap
page read and write
21F9C223000
heap
page read and write
1F3FB176000
trusted library allocation
page read and write
1F3FC546000
heap
page read and write
4861000
heap
page read and write
1F3FB171000
trusted library allocation
page read and write
1F40344D000
trusted library allocation
page read and write
1F40166D000
trusted library allocation
page read and write
A3465ED000
stack
page read and write
4861000
heap
page read and write
994000
heap
page read and write
1F3FF4D5000
trusted library allocation
page read and write
2330000
heap
page read and write
1F3FEF63000
trusted library allocation
page read and write
1F3FEE10000
trusted library allocation
page read and write
409F000
stack
page read and write
1F400F39000
trusted library allocation
page read and write
99E93FC000
stack
page read and write
C80000
direct allocation
page read and write
22D7A000
heap
page read and write
4591000
heap
page read and write
1F3FC530000
heap
page read and write
1F40047F000
trusted library allocation
page read and write
1F402879000
trusted library allocation
page read and write
1F3FF08D000
trusted library allocation
page read and write
1F400B00000
trusted library allocation
page read and write
1F3FD1F2000
trusted library allocation
page read and write
2448000
unkown
page readonly
1F3FC396000
trusted library allocation
page read and write
1F3FF0E6000
trusted library allocation
page read and write
1F3FFA6C000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FC54D000
heap
page read and write
1F4015AD000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
1F400F56000
trusted library allocation
page read and write
4C6E000
stack
page read and write
1F3FF4ED000
trusted library allocation
page read and write
21F9C228000
heap
page read and write
1F3FEB2A000
trusted library allocation
page read and write
1F401758000
trusted library allocation
page read and write
1F40181A000
trusted library allocation
page read and write
1F3FC283000
trusted library allocation
page read and write
1F3FF48E000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
1F3FC359000
trusted library allocation
page read and write
1F407715000
trusted library allocation
page read and write
E5E000
stack
page read and write
1F3FEEBF000
trusted library allocation
page read and write
21F9B4BE000
trusted library allocation
page read and write
1F3FCFBA000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FFC91000
trusted library allocation
page read and write
1F4018D3000
trusted library allocation
page read and write
1F3FC536000
heap
page read and write
230DE000
heap
page read and write
1F401AD4000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
55E0000
direct allocation
page execute and read and write
DDF000
stack
page read and write
1F3FD1CD000
trusted library allocation
page read and write
1F3FCF51000
trusted library allocation
page read and write
1F4016D0000
trusted library allocation
page read and write
1F3FFE08000
trusted library allocation
page read and write
1F3FC3B9000
trusted library allocation
page read and write
1F3FEE36000
trusted library allocation
page read and write
1F3FC4EB000
trusted library allocation
page read and write
1F3FEE38000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
5640000
direct allocation
page execute and read and write
1F3FB297000
trusted library allocation
page read and write
1F3FB0D0000
unclassified section
page read and write
95AAABE000
unkown
page readonly
1F4028B3000
trusted library allocation
page read and write
630F000
stack
page read and write
1F3FFCFE000
trusted library allocation
page read and write
1F3FCF35000
trusted library allocation
page read and write
1F3FEE6B000
trusted library allocation
page read and write
21F9B2A0000
heap
page read and write
1F3FC54D000
heap
page read and write
1F4028A5000
trusted library allocation
page read and write
1F3FF4E6000
trusted library allocation
page read and write
1F3FF7F5000
trusted library allocation
page read and write
1F4096D4000
trusted library allocation
page read and write
1F3FF491000
trusted library allocation
page read and write
20E12407000
trusted library allocation
page read and write
449F000
stack
page read and write
1F3FFC6E000
trusted library allocation
page read and write
1F3FF772000
trusted library allocation
page read and write
1F402F8F000
trusted library allocation
page read and write
1F3FACB2000
trusted library allocation
page read and write
1F3EF591000
trusted library allocation
page read and write
1F3EF58F000
trusted library allocation
page read and write
1F4028B2000
trusted library allocation
page read and write
21F9B41B000
trusted library allocation
page read and write
1F3FD131000
trusted library allocation
page read and write
10BBE481000
trusted library allocation
page execute read
1F4016D8000
trusted library allocation
page read and write
1F401EA1000
trusted library allocation
page read and write
1F40165C000
trusted library allocation
page read and write
1F3FF0BD000
trusted library allocation
page read and write
5650000
direct allocation
page execute and read and write
1163000
unkown
page execute and read and write
99E9BFF000
stack
page read and write
1F3FC569000
heap
page read and write
2BEE000
stack
page read and write
1F4095F4000
trusted library allocation
page read and write
1F3FCFF6000
trusted library allocation
page read and write
1F40148B000
trusted library allocation
page read and write
1F3FF7A8000
trusted library allocation
page read and write
1F3FC2BB000
trusted library allocation
page read and write
22EFF000
heap
page read and write
4F50000
direct allocation
page execute and read and write
1F40166F000
trusted library allocation
page read and write
20BC82A0000
remote allocation
page read and write
1F3FB300000
trusted library allocation
page read and write
1F3FC3DB000
trusted library allocation
page read and write
4861000
heap
page read and write
21F9C232000
heap
page read and write
1F3FC319000
trusted library allocation
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F3FEE91000
trusted library allocation
page read and write
1F4011F2000
trusted library allocation
page read and write
26C5000
heap
page read and write
1F3FC560000
heap
page read and write
21F9BA20000
trusted library allocation
page read and write
276676D4000
heap
page read and write
2F5F000
stack
page read and write
1F401A18000
trusted library allocation
page read and write
1F4028D5000
trusted library allocation
page read and write
1F401670000
trusted library allocation
page read and write
1F4030B0000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
1F3FC324000
trusted library allocation
page read and write
1F4002F5000
trusted library allocation
page read and write
1870000
direct allocation
page read and write
1F40BF7C000
trusted library allocation
page read and write
21F9C1BF000
heap
page read and write
1F3FB2E1000
trusted library allocation
page read and write
2448000
unkown
page readonly
27668FAB000
heap
page read and write
42CE000
stack
page read and write
1F402890000
trusted library allocation
page read and write
1F3FB103000
trusted library allocation
page read and write
994000
heap
page read and write
5EC5000
heap
page read and write
1F40166D000
trusted library allocation
page read and write
1F3FF4F2000
trusted library allocation
page read and write
1F401146000
trusted library allocation
page read and write
1F3FEE61000
trusted library allocation
page read and write
4860000
heap
page read and write
C60000
direct allocation
page read and write
21F9B476000
trusted library allocation
page read and write
4FF0000
heap
page read and write
1F3FB699000
trusted library allocation
page read and write
21F9C1E8000
heap
page read and write
4F20000
direct allocation
page execute and read and write
C60000
direct allocation
page read and write
1764000
heap
page read and write
20BC8600000
trusted library allocation
page read and write
990000
heap
page read and write
1F3FEEA1000
trusted library allocation
page read and write
371E000
stack
page read and write
25DA000
heap
page read and write
1F3FC3C7000
trusted library allocation
page read and write
1F401903000
trusted library allocation
page read and write
4861000
heap
page read and write
419000
unkown
page readonly
1F3FC306000
trusted library allocation
page read and write
1F400F69000
trusted library allocation
page read and write
21F9C220000
heap
page read and write
1F3FAB9A000
trusted library allocation
page read and write
4591000
heap
page read and write
425E000
stack
page read and write
2340000
heap
page read and write
4877000
heap
page read and write
4861000
heap
page read and write
1F409583000
trusted library allocation
page read and write
4110000
heap
page read and write
1F3FAB2D000
trusted library allocation
page read and write
1F3FF05C000
trusted library allocation
page read and write
1F401E6F000
trusted library allocation
page read and write
1F3FF7DF000
trusted library allocation
page read and write
1F3FEEA2000
trusted library allocation
page read and write
1F3FCFBB000
trusted library allocation
page read and write
4591000
heap
page read and write
230CB000
heap
page read and write
3CEE000
stack
page read and write
230E2000
heap
page read and write
1C7EE000
stack
page read and write
1F3FC311000
trusted library allocation
page read and write
1C53E000
stack
page read and write
1F3FF9BF000
trusted library allocation
page read and write
1F401EB8000
trusted library allocation
page read and write
1F402F29000
trusted library allocation
page read and write
40AE000
stack
page read and write
1F40164E000
trusted library allocation
page read and write
1F3FEE20000
trusted library allocation
page read and write
1F3FCF51000
trusted library allocation
page read and write
1F3FF096000
trusted library allocation
page read and write
20BC84AF000
unclassified section
page read and write
1F3FD154000
trusted library allocation
page read and write
1F3FCF9B000
trusted library allocation
page read and write
13AE000
stack
page read and write
1F4016F2000
trusted library allocation
page read and write
1F4019FC000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
EB5000
heap
page read and write
1F3FC557000
heap
page read and write
22F41000
heap
page read and write
1F3FEA70000
trusted library section
page readonly
1F400438000
trusted library allocation
page read and write
3C1E000
stack
page read and write
1F401365000
trusted library allocation
page read and write
1F407775000
trusted library allocation
page read and write
21F9B4CB000
trusted library allocation
page read and write
2987000
heap
page read and write
1F3FD1D5000
trusted library allocation
page read and write
1F3FF0A7000
trusted library allocation
page read and write
1F401646000
trusted library allocation
page read and write
293E000
stack
page read and write
2D5E000
stack
page read and write
1F403452000
trusted library allocation
page read and write
1F3FF4B0000
trusted library allocation
page read and write
1F40349F000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FC571000
heap
page read and write
1F3FB171000
trusted library allocation
page read and write
27CE000
stack
page read and write
47E000
stack
page read and write
3324BFF000
stack
page read and write
1F3FF9E3000
trusted library allocation
page read and write
346F000
stack
page read and write
401000
unkown
page execute read
1F4095E4000
trusted library allocation
page read and write
21F9B4AB000
trusted library allocation
page read and write
1F40102E000
trusted library allocation
page read and write
345F000
stack
page read and write
20BC8665000
trusted library allocation
page read and write
1F3FD17F000
trusted library allocation
page read and write
1F401E09000
trusted library allocation
page read and write
1F3FC30D000
trusted library allocation
page read and write
1F3FF600000
heap
page read and write
20BC832A000
heap
page read and write
1CBE1000
heap
page read and write
5EC6000
heap
page read and write
1F3FF7DC000
trusted library allocation
page read and write
1F3EF300000
heap
page read and write
95A79FE000
unkown
page readonly
1F3FC543000
heap
page read and write
1F400265000
trusted library allocation
page read and write
1F3FD15F000
trusted library allocation
page read and write
1F3FC54D000
heap
page read and write
4C2F000
stack
page read and write
994000
heap
page read and write
A3481AE000
stack
page read and write
1F402F92000
trusted library allocation
page read and write
B54000
heap
page read and write
304E000
stack
page read and write
1F3FEEBF000
trusted library allocation
page read and write
1F401E3B000
trusted library allocation
page read and write
1F401686000
trusted library allocation
page read and write
1F402FD8000
trusted library allocation
page read and write
1F40349D000
trusted library allocation
page read and write
1F3FCF06000
trusted library allocation
page read and write
1F4028B0000
trusted library allocation
page read and write
446E000
stack
page read and write
4861000
heap
page read and write
1F3FF0E8000
trusted library allocation
page read and write
1F402890000
trusted library allocation
page read and write
1F40349B000
trusted library allocation
page read and write
1F3FFA0B000
trusted library allocation
page read and write
1F401E7C000
trusted library allocation
page read and write
1F3FC53B000
heap
page read and write
1C4CF000
stack
page read and write
1F3FC560000
heap
page read and write
26C6000
heap
page read and write
1F3FD1F2000
trusted library allocation
page read and write
1F3FEB6F000
trusted library allocation
page read and write
1F402877000
trusted library allocation
page read and write
390E000
stack
page read and write
1F401148000
trusted library allocation
page read and write
1F3FB19D000
trusted library allocation
page read and write
476E000
stack
page read and write
56ED000
stack
page read and write
21F9B412000
trusted library allocation
page read and write
1F40043C000
trusted library allocation
page read and write
B54000
heap
page read and write
1F3FF078000
trusted library allocation
page read and write
1F401659000
trusted library allocation
page read and write
1F40287F000
trusted library allocation
page read and write
1F3FC531000
heap
page read and write
1F3FEE63000
trusted library allocation
page read and write
27667459000
heap
page read and write
1F4004F7000
trusted library allocation
page read and write
48AE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
1F3FB090000
trusted library section
page readonly
1F3FF4F4000
trusted library allocation
page read and write
1F40138E000
trusted library allocation
page read and write
1F4019FA000
trusted library allocation
page read and write
21F9BA30000
unkown
page execute read
53FF000
stack
page read and write
1F3FB49D000
unclassified section
page read and write
1F3FCFDA000
trusted library allocation
page read and write
316244B000
stack
page read and write
EA0000
unkown
page read and write
4861000
heap
page read and write
230CB000
heap
page read and write
1F4014F1000
trusted library allocation
page read and write
1F401679000
trusted library allocation
page read and write
1F3FF0A9000
trusted library allocation
page read and write
640000
heap
page read and write
1F400FF9000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
1F4011E2000
trusted library allocation
page read and write
4861000
heap
page read and write
A3473EE000
stack
page read and write
1F3FCFBF000
trusted library allocation
page read and write
230F5000
heap
page read and write
EA0000
unkown
page read and write
1F4003F8000
trusted library allocation
page read and write
1F3FC536000
heap
page read and write
22EC1000
heap
page read and write
1F40BF30000
trusted library allocation
page read and write
1F3FF0C2000
trusted library allocation
page read and write
1F4028B8000
trusted library allocation
page read and write
22D5D000
heap
page read and write
1F3FC103000
trusted library allocation
page read and write
475E000
stack
page read and write
1F400491000
trusted library allocation
page read and write
1F4013D2000
trusted library allocation
page read and write
1F401AAC000
trusted library allocation
page read and write
1F3FC547000
heap
page read and write
A34A179000
stack
page read and write
22D9F000
heap
page read and write
230CB000
heap
page read and write
1F3FD131000
trusted library allocation
page read and write
1F3FF062000
trusted library allocation
page read and write
21F9C284000
heap
page read and write
2ADE000
stack
page read and write
1F3FB226000
trusted library allocation
page read and write
1F3FF203000
heap
page read and write
A347F2E000
stack
page read and write
1F402881000
trusted library allocation
page read and write
1F3FAB98000
trusted library allocation
page read and write
A33FAFF000
stack
page read and write
1F3FEE36000
trusted library allocation
page read and write
696E000
heap
page read and write
1F3FF877000
trusted library allocation
page read and write
20BC8832000
trusted library allocation
page read and write
3AAF000
stack
page read and write
68F000
stack
page read and write
1F3FC547000
heap
page read and write
1F4011F2000
trusted library allocation
page read and write
20BC8647000
trusted library allocation
page read and write
A3409FF000
stack
page read and write
A347EEF000
stack
page read and write
10BBE30E000
trusted library allocation
page execute read
4591000
heap
page read and write
1F3FC33D000
trusted library allocation
page read and write
2ECC000
stack
page read and write
21F9B52F000
unclassified section
page read and write
1F403452000
trusted library allocation
page read and write
21F9B48D000
trusted library allocation
page read and write
2547000
heap
page read and write
230D9000
heap
page read and write
21F9B45C000
trusted library allocation
page read and write
99EA3FF000
stack
page read and write
22DE0000
heap
page read and write
4591000
heap
page read and write
1F400505000
trusted library allocation
page read and write
276673F0000
heap
page read and write
1F3FCF63000
trusted library allocation
page read and write
1F3FED35000
trusted library allocation
page read and write
1F3FEE63000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FF5EF000
trusted library allocation
page read and write
1F3FCFBF000
trusted library allocation
page read and write
1F3FD1C4000
trusted library allocation
page read and write
21F9C261000
heap
page read and write
1F3FCF12000
trusted library allocation
page read and write
1F401660000
trusted library allocation
page read and write
1F3FB17E000
trusted library allocation
page read and write
1F3FF478000
trusted library allocation
page read and write
1F4019EE000
trusted library allocation
page read and write
44EE000
stack
page read and write
1F401603000
trusted library allocation
page read and write
1F3FF1E3000
heap
page read and write
1F4011F8000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
4A91000
direct allocation
page read and write
1F401500000
trusted library allocation
page read and write
1F3FB266000
trusted library allocation
page read and write
1F3FEB79000
trusted library allocation
page read and write
54D1000
direct allocation
page read and write
20BC8810000
trusted library allocation
page read and write
1F3FFE1D000
trusted library allocation
page read and write
1F401E1A000
trusted library allocation
page read and write
10BBE47A000
trusted library allocation
page read and write
1F3FEE10000
trusted library allocation
page read and write
1F3FF0D0000
trusted library allocation
page read and write
1F3FC4AF000
trusted library allocation
page read and write
1CB3E000
stack
page read and write
1F401672000
trusted library allocation
page read and write
19D000
stack
page read and write
1F3FC54D000
heap
page read and write
1F3FC54D000
heap
page read and write
3D88AD61E000
trusted library allocation
page read and write
A34806A000
stack
page read and write
A345BDE000
stack
page read and write
1F3FF95A000
trusted library allocation
page read and write
1F3FAD11000
trusted library allocation
page read and write
2C4E000
stack
page read and write
22DA0000
heap
page read and write
1F402890000
trusted library allocation
page read and write
1F3FEE87000
trusted library allocation
page read and write
1F3FEE61000
trusted library allocation
page read and write
26BF000
heap
page read and write
1F4016AC000
trusted library allocation
page read and write
400000
unkown
page readonly
1F3FC560000
heap
page read and write
1F3FB21A000
trusted library allocation
page read and write
4591000
heap
page read and write
21F9C1EA000
heap
page read and write
417000
unkown
page write copy
4C00000
direct allocation
page execute and read and write
1F402953000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FEEA1000
trusted library allocation
page read and write
1F402FC1000
trusted library allocation
page read and write
1F3FEF7E000
trusted library allocation
page read and write
1F3FF0C3000
trusted library allocation
page read and write
1F3FAAC0000
trusted library section
page read and write
27668FB9000
heap
page read and write
C80000
direct allocation
page read and write
4591000
heap
page read and write
1F40343D000
trusted library allocation
page read and write
1F3FEEFE000
trusted library allocation
page read and write
1F403040000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
1F3FB1A9000
trusted library allocation
page read and write
1F400F28000
trusted library allocation
page read and write
1F400439000
trusted library allocation
page read and write
1F3FAC24000
trusted library allocation
page read and write
1F3FF4D0000
trusted library allocation
page read and write
1F3FC33B000
trusted library allocation
page read and write
342E000
stack
page read and write
1F3FC359000
trusted library allocation
page read and write
1F402893000
trusted library allocation
page read and write
22DA0000
heap
page read and write
1F3FB297000
trusted library allocation
page read and write
1F3FFCEE000
trusted library allocation
page read and write
1F3FF4EA000
trusted library allocation
page read and write
1F3FC552000
heap
page read and write
42CF000
stack
page read and write
1F3FC341000
trusted library allocation
page read and write
86C000
stack
page read and write
1F40349B000
trusted library allocation
page read and write
1F3FF680000
trusted library section
page readonly
1F40167B000
trusted library allocation
page read and write
2C10000
heap
page read and write
1F3FFCC3000
trusted library allocation
page read and write
417000
unkown
page write copy
1CBE0000
heap
page read and write
21F9C1A9000
heap
page read and write
1F400E04000
trusted library allocation
page read and write
1F3FF95E000
trusted library allocation
page read and write
417000
unkown
page read and write
1F3FF048000
trusted library allocation
page read and write
1F3FB380000
trusted library section
page read and write
6CB51000
unkown
page execute read
1F40776F000
trusted library allocation
page read and write
1F3FFCFB000
trusted library allocation
page read and write
560000
heap
page read and write
1F400481000
trusted library allocation
page read and write
1F3FFCDC000
trusted library allocation
page read and write
1F401E37000
trusted library allocation
page read and write
1F3EF640000
heap
page read and write
1730000
direct allocation
page read and write
1F3FC2C8000
trusted library allocation
page read and write
1F402F25000
trusted library allocation
page read and write
1F401E6F000
trusted library allocation
page read and write
1F401AFA000
trusted library allocation
page read and write
1F3FEE7F000
trusted library allocation
page read and write
1F3FCFFE000
trusted library allocation
page read and write
1F3FB2AF000
trusted library allocation
page read and write
1F401E95000
trusted library allocation
page read and write
1F3FC54D000
heap
page read and write
1F401199000
trusted library allocation
page read and write
230DE000
heap
page read and write
1F3FEEBA000
trusted library allocation
page read and write
1F40037D000
trusted library allocation
page read and write
82EC000
stack
page read and write
1F40779B000
trusted library allocation
page read and write
32AF000
stack
page read and write
1F401A00000
trusted library allocation
page read and write
4D1000
unkown
page execute and write copy
1F402859000
trusted library allocation
page read and write
A341573000
stack
page read and write
2448000
unkown
page readonly
1730000
direct allocation
page read and write
19D000
stack
page read and write
1F3FF0E6000
trusted library allocation
page read and write
20BC86AA000
trusted library allocation
page read and write
1F3FF3AA000
trusted library allocation
page read and write
1F3FC359000
trusted library allocation
page read and write
1F3FFAD8000
trusted library allocation
page read and write
1F3FD008000
trusted library allocation
page read and write
1F3FEE7F000
trusted library allocation
page read and write
B0E000
stack
page read and write
1F3FCE08000
trusted library allocation
page read and write
21F9B570000
trusted library allocation
page read and write
1F401668000
trusted library allocation
page read and write
1F3FF45F000
trusted library allocation
page read and write
1F3FD154000
trusted library allocation
page read and write
1F40138F000
trusted library allocation
page read and write
5FE000
heap
page read and write
1F3FF428000
trusted library allocation
page read and write
1F401EFA000
trusted library allocation
page read and write
1F3FFCCB000
trusted library allocation
page read and write
1F3FC2BB000
trusted library allocation
page read and write
1F3FF039000
trusted library allocation
page read and write
1F3FEC66000
trusted library allocation
page read and write
1F3EF3D0000
trusted library section
page read and write
4591000
heap
page read and write
1F4018A9000
trusted library allocation
page read and write
11AA000
unkown
page execute and write copy
1F3FEE8B000
trusted library allocation
page read and write
1F3FCFBD000
trusted library allocation
page read and write
E80000
heap
page read and write
1F3FF6B0000
trusted library section
page readonly
20E12240000
heap
page read and write
1F3FF735000
trusted library allocation
page read and write
1F3FFA00000
trusted library allocation
page read and write
1C757250000
heap
page read and write
1F400363000
trusted library allocation
page read and write
1F401779000
trusted library allocation
page read and write
1F3FC100000
trusted library allocation
page read and write
4861000
heap
page read and write
1F400117000
trusted library allocation
page read and write
1F409663000
trusted library allocation
page read and write
1F3FFCF1000
trusted library allocation
page read and write
1F3FC359000
trusted library allocation
page read and write
4591000
heap
page read and write
11AA000
unkown
page execute and write copy
1F3FC530000
heap
page read and write
4591000
heap
page read and write
37CE000
stack
page read and write
1F3FC3B7000
trusted library allocation
page read and write
1F3FCFF4000
trusted library allocation
page read and write
1F3FCFC2000
trusted library allocation
page read and write
1F3FC484000
trusted library allocation
page read and write
1F3FED00000
trusted library allocation
page read and write
3E0E000
stack
page read and write
359F000
stack
page read and write
1F40BF11000
trusted library allocation
page read and write
1F4019FA000
trusted library allocation
page read and write
A6E000
heap
page read and write
1F4011DD000
trusted library allocation
page read and write
1F401199000
trusted library allocation
page read and write
1F400443000
trusted library allocation
page read and write
4591000
heap
page read and write
1F4028FE000
trusted library allocation
page read and write
1F3FEED4000
trusted library allocation
page read and write
1F3FF46F000
trusted library allocation
page read and write
1F3FF4C1000
trusted library allocation
page read and write
1F40165A000
trusted library allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
1F3FC557000
heap
page read and write
1F401A98000
trusted library allocation
page read and write
A34822E000
stack
page read and write
1F3FC547000
heap
page read and write
1F3FCF0F000
trusted library allocation
page read and write
1F3FB123000
trusted library allocation
page read and write
1F3FC3DD000
trusted library allocation
page read and write
1F401833000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FFCCB000
trusted library allocation
page read and write
1F3FB603000
trusted library allocation
page read and write
2DCE000
stack
page read and write
1F401426000
trusted library allocation
page read and write
1F3FF4EE000
trusted library allocation
page read and write
1F3FF79D000
trusted library allocation
page read and write
1F3FEED6000
trusted library allocation
page read and write
316583E000
unkown
page readonly
119C000
unkown
page execute and read and write
1F3FB6AF000
trusted library allocation
page read and write
1F401D03000
trusted library allocation
page read and write
A3467ED000
stack
page read and write
95A71FE000
stack
page read and write
26BF000
heap
page read and write
F4F000
heap
page read and write
27667700000
trusted library allocation
page read and write
1F3FC3A7000
trusted library allocation
page read and write
4B2E000
stack
page read and write
994000
heap
page read and write
1F4028B1000
trusted library allocation
page read and write
1F3FEEDA000
trusted library allocation
page read and write
4591000
heap
page read and write
1345000
unkown
page execute and write copy
1F3FF077000
trusted library allocation
page read and write
A345DEB000
stack
page read and write
1F3FC4E3000
trusted library allocation
page read and write
1F4016D8000
trusted library allocation
page read and write
1F3FEB00000
trusted library allocation
page read and write
1F4011DD000
trusted library allocation
page read and write
1F3FF4F1000
trusted library allocation
page read and write
1F3FF4D5000
trusted library allocation
page read and write
1F3FF0E6000
trusted library allocation
page read and write
258E000
stack
page read and write
1F400471000
trusted library allocation
page read and write
1F3FEFD2000
trusted library allocation
page read and write
20BC867B000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
4930000
heap
page read and write
36EF000
stack
page read and write
1F3FC3DF000
trusted library allocation
page read and write
2A8F000
stack
page read and write
B54000
heap
page read and write
21F9C1A3000
heap
page read and write
22EFE000
heap
page read and write
1F4002C0000
trusted library allocation
page read and write
1F3FF48E000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
4D3B000
stack
page read and write
1F3FB505000
trusted library allocation
page read and write
2540000
heap
page read and write
1F4019F8000
trusted library allocation
page read and write
1F3FF6A0000
trusted library section
page readonly
61E01000
direct allocation
page execute read
1F4002D5000
trusted library allocation
page read and write
1F3FD91C000
trusted library allocation
page read and write
A34856E000
stack
page read and write
1F3FF0E8000
trusted library allocation
page read and write
A33E7FC000
stack
page read and write
1F3FB12F000
trusted library allocation
page read and write
1F3FB218000
trusted library allocation
page read and write
1F3FCF0E000
trusted library allocation
page read and write
20BC82B8000
remote allocation
page execute read
1F403491000
trusted library allocation
page read and write
26C4000
heap
page read and write
1F3FEB3C000
trusted library allocation
page read and write
1F409668000
trusted library allocation
page read and write
20BC83C0000
heap
page read and write
1F402F50000
trusted library allocation
page read and write
2690000
heap
page read and write
1F401EA9000
trusted library allocation
page read and write
1F3FF82D000
trusted library allocation
page read and write
1F40286E000
trusted library allocation
page read and write
400000
unkown
page readonly
4580000
direct allocation
page read and write
1F401EF2000
trusted library allocation
page read and write
1F3FB0DF000
unclassified section
page read and write
1F3FD508000
trusted library allocation
page read and write
1F3FD189000
trusted library allocation
page read and write
1F3FABB4000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FF43D000
trusted library allocation
page read and write
1F400FC8000
trusted library allocation
page read and write
1F402869000
trusted library allocation
page read and write
26C5000
heap
page read and write
1F3FC536000
heap
page read and write
1F40308E000
trusted library allocation
page read and write
1F3FD1C4000
trusted library allocation
page read and write
4591000
heap
page read and write
1F4002FA000
trusted library allocation
page read and write
21F9C26A000
heap
page read and write
1F401A56000
trusted library allocation
page read and write
1F401642000
trusted library allocation
page read and write
F09000
unkown
page write copy
37EE000
stack
page read and write
1F3EF5ED000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
4FC0000
direct allocation
page execute and read and write
1F3FC394000
trusted library allocation
page read and write
1F3FC543000
heap
page read and write
1F3FF8F3000
trusted library allocation
page read and write
1F3FF0E8000
trusted library allocation
page read and write
22EC1000
heap
page read and write
4591000
heap
page read and write
3C8F000
stack
page read and write
1F3FF0CA000
trusted library allocation
page read and write
1F400E38000
trusted library allocation
page read and write
1F3FB1A5000
trusted library allocation
page read and write
1F4019B1000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
1F402877000
trusted library allocation
page read and write
21F9C27B000
heap
page read and write
230D6000
heap
page read and write
1F3FF4EF000
trusted library allocation
page read and write
2350000
heap
page read and write
1F3FEE6B000
trusted library allocation
page read and write
21F9C223000
heap
page read and write
1F3FC556000
heap
page read and write
3DCF000
stack
page read and write
1F3FC3C6000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
1F3FB2F0000
trusted library allocation
page read and write
21F9C2A7000
heap
page read and write
1F4030B0000
trusted library allocation
page read and write
1F3FAD09000
trusted library allocation
page read and write
1F3FD1FB000
trusted library allocation
page read and write
395F000
stack
page read and write
1C3CF000
stack
page read and write
1F401EAE000
trusted library allocation
page read and write
1F401E67000
trusted library allocation
page read and write
1F3FB275000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
1F3FF4EA000
trusted library allocation
page read and write
1F3FF475000
trusted library allocation
page read and write
1F4002D4000
trusted library allocation
page read and write
21F9B400000
trusted library allocation
page read and write
1F3EF2C0000
heap
page read and write
1F3FEF85000
trusted library allocation
page read and write
1F3FC39A000
trusted library allocation
page read and write
3FEE000
stack
page read and write
1F3FCFBF000
trusted library allocation
page read and write
1F402F7F000
trusted library allocation
page read and write
A1B000
heap
page read and write
1F40BF28000
trusted library allocation
page read and write
B54000
heap
page read and write
1F3FC277000
trusted library allocation
page read and write
21F9C1A9000
heap
page read and write
1F3FC3F9000
trusted library allocation
page read and write
1F3FB17E000
trusted library allocation
page read and write
1F4016D0000
trusted library allocation
page read and write
1F402890000
trusted library allocation
page read and write
1F3FF077000
trusted library allocation
page read and write
189A000
heap
page read and write
1F3FEE3A000
trusted library allocation
page read and write
1F3FB080000
trusted library section
page readonly
1F4002D0000
trusted library allocation
page read and write
1F3FEB6D000
trusted library allocation
page read and write
1F3FF0D0000
trusted library allocation
page read and write
20BC866E000
trusted library allocation
page read and write
1F403493000
trusted library allocation
page read and write
1F40040A000
trusted library allocation
page read and write
1F3FC8C4000
trusted library allocation
page read and write
1F3FF07A000
trusted library allocation
page read and write
1F3FF0E8000
trusted library allocation
page read and write
1F3FF55D000
trusted library allocation
page read and write
1F407703000
trusted library allocation
page read and write
1F401043000
trusted library allocation
page read and write
1F3FF6F0000
trusted library section
page readonly
1F3FD100000
trusted library allocation
page read and write
1F4013B0000
trusted library allocation
page read and write
1F402859000
trusted library allocation
page read and write
1F3FEED9000
trusted library allocation
page read and write
1F3FFC61000
trusted library allocation
page read and write
1F40165A000
trusted library allocation
page read and write
1F3FEE25000
trusted library allocation
page read and write
1C757600000
trusted library allocation
page read and write
1F3FD500000
trusted library allocation
page read and write
1F401660000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
A34816C000
stack
page read and write
400000
unkown
page readonly
1F40107B000
trusted library allocation
page read and write
F46000
heap
page read and write
1C3EE000
stack
page read and write
1F3FC541000
heap
page read and write
1F401AE8000
trusted library allocation
page read and write
1F4017CD000
trusted library allocation
page read and write
1F3FF996000
trusted library allocation
page read and write
21F9C229000
heap
page read and write
1F3FC556000
heap
page read and write
49D0000
trusted library allocation
page read and write
21F9B530000
trusted library section
page readonly
1F3FD1F2000
trusted library allocation
page read and write
1F3FEF32000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
1F3FF48E000
trusted library allocation
page read and write
1F3FFCAE000
trusted library allocation
page read and write
4280000
heap
page read and write
1C8F0000
heap
page read and write
A348B3E000
stack
page read and write
2547000
heap
page read and write
20BC8612000
trusted library allocation
page read and write
1F3FEE85000
trusted library allocation
page read and write
1F3FB198000
trusted library allocation
page read and write
42EF000
stack
page read and write
1F3FC536000
heap
page read and write
442F000
stack
page read and write
B54000
heap
page read and write
1F4029D8000
trusted library allocation
page read and write
21F9C1E1000
heap
page read and write
1F3FF0E6000
trusted library allocation
page read and write
1F3FD1F7000
trusted library allocation
page read and write
21F9C2A7000
heap
page read and write
6CAB1000
unkown
page execute read
1F4016CF000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
1F3FC4C2000
trusted library allocation
page read and write
4861000
heap
page read and write
4591000
heap
page read and write
1F3FC543000
heap
page read and write
1F3FC543000
heap
page read and write
426F000
stack
page read and write
1F401AE8000
trusted library allocation
page read and write
1F4018D3000
trusted library allocation
page read and write
1F3FD123000
trusted library allocation
page read and write
1F3FCFC2000
trusted library allocation
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F3FEE79000
trusted library allocation
page read and write
1764000
heap
page read and write
1F3FEE7D000
trusted library allocation
page read and write
1F3FC36C000
trusted library allocation
page read and write
1F3FC376000
trusted library allocation
page read and write
1F3EF500000
trusted library allocation
page read and write
21F9C1A0000
heap
page read and write
1F3FEEBD000
trusted library allocation
page read and write
4591000
heap
page read and write
E1C000
stack
page read and write
1F4028CB000
trusted library allocation
page read and write
1F3FADA7000
trusted library allocation
page read and write
1F4004D6000
trusted library allocation
page read and write
1F4028CB000
trusted library allocation
page read and write
1F402831000
trusted library allocation
page read and write
788000
heap
page read and write
1F402FC6000
trusted library allocation
page read and write
20BC86BA000
trusted library allocation
page read and write
1F401AAC000
trusted library allocation
page read and write
1F401659000
trusted library allocation
page read and write
A347D6D000
stack
page read and write
1F401ED2000
trusted library allocation
page read and write
21F9B160000
heap
page read and write
1F3FEE1E000
trusted library allocation
page read and write
1F3FB470000
trusted library section
page read and write
1F40773C000
trusted library allocation
page read and write
1F400E88000
trusted library allocation
page read and write
500000
unkown
page execute and read and write
F1A000
heap
page read and write
1F3FC2F9000
trusted library allocation
page read and write
1F4003FC000
trusted library allocation
page read and write
5CE000
stack
page read and write
1764000
heap
page read and write
119C000
unkown
page execute and read and write
1F3FEB06000
trusted library allocation
page read and write
2CEF000
stack
page read and write
1F400241000
trusted library allocation
page read and write
302F000
stack
page read and write
A10000
heap
page read and write
1F3FC4FB000
trusted library allocation
page read and write
472F000
stack
page read and write
1F3FB2AF000
trusted library allocation
page read and write
1F3FB6E0000
trusted library allocation
page read and write
1F3FC552000
heap
page read and write
1F3FFC15000
trusted library allocation
page read and write
A3485AE000
stack
page read and write
21F9C2A7000
heap
page read and write
1F3FFB30000
unclassified section
page read and write
1F400F0D000
trusted library allocation
page read and write
1F3FC53B000
heap
page read and write
1F3FC376000
trusted library allocation
page read and write
4AEF000
stack
page read and write
1F3FC359000
trusted library allocation
page read and write
1F401A3E000
trusted library allocation
page read and write
1F3FF4FB000
trusted library allocation
page read and write
22D0000
heap
page read and write
1F4028B0000
trusted library allocation
page read and write
1F400FC5000
trusted library allocation
page read and write
27668FB6000
heap
page read and write
4580000
direct allocation
page read and write
1F3FB1F6000
trusted library allocation
page read and write
F0B000
unkown
page execute and read and write
1F3FF1CA000
heap
page read and write
1F401AE2000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
1F3FF640000
unclassified section
page read and write
1F401D84000
trusted library allocation
page read and write
1F3FB6DD000
trusted library allocation
page read and write
1F4002EB000
trusted library allocation
page read and write
1F401E91000
trusted library allocation
page read and write
1F3FF4EE000
trusted library allocation
page read and write
1C52E000
stack
page read and write
1F3FEF9C000
trusted library allocation
page read and write
994000
heap
page read and write
4C50000
direct allocation
page execute and read and write
1F402F92000
trusted library allocation
page read and write
1F401686000
trusted library allocation
page read and write
1F4002DB000
trusted library allocation
page read and write
20BC84B0000
heap
page read and write
1F403454000
trusted library allocation
page read and write
2547000
heap
page read and write
1F3FC213000
trusted library allocation
page read and write
1F3FC2F6000
trusted library allocation
page read and write
51BE000
stack
page read and write
1F401E82000
trusted library allocation
page read and write
368E000
stack
page read and write
1F4019FC000
trusted library allocation
page read and write
1F3FCFF6000
trusted library allocation
page read and write
1F40153F000
trusted library allocation
page read and write
1F3FEC33000
trusted library allocation
page read and write
2645000
heap
page read and write
30DE000
stack
page read and write
4861000
heap
page read and write
4591000
heap
page read and write
B54000
heap
page read and write
2ACF000
stack
page read and write
1F3FB370000
trusted library section
page read and write
1F400452000
trusted library allocation
page read and write
1F401424000
trusted library allocation
page read and write
1F3FF4B2000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
1F3FFB3D000
unclassified section
page read and write
1F3FC376000
trusted library allocation
page read and write
B50000
heap
page read and write
20BC8800000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
1F3FF0AE000
trusted library allocation
page read and write
10BBE381000
trusted library allocation
page execute read
1F401686000
trusted library allocation
page read and write
1F3FF45A000
trusted library allocation
page read and write
1F40137E000
trusted library allocation
page read and write
1F3FB2FE000
trusted library allocation
page read and write
1F3FC56A000
heap
page read and write
1CBE1000
heap
page read and write
4CF0000
direct allocation
page read and write
1F3FF4E6000
trusted library allocation
page read and write
1F4011E4000
trusted library allocation
page read and write
95A81FE000
stack
page read and write
1F3FEED6000
trusted library allocation
page read and write
1F3FEEBF000
trusted library allocation
page read and write
1F3FFC6B000
trusted library allocation
page read and write
1F4028DC000
trusted library allocation
page read and write
1F401E86000
trusted library allocation
page read and write
4E8C000
stack
page read and write
1F3FC3BE000
trusted library allocation
page read and write
1F3FF8F5000
trusted library allocation
page read and write
1F401428000
trusted library allocation
page read and write
4861000
heap
page read and write
4D0000
unkown
page read and write
21F9B0C0000
unclassified section
page readonly
492F000
stack
page read and write
1F3FEEBD000
trusted library allocation
page read and write
1F3FC543000
heap
page read and write
10BBE421000
trusted library allocation
page execute read
1F3FC543000
heap
page read and write
1F3FF7AC000
trusted library allocation
page read and write
1F3FF7AC000
trusted library allocation
page read and write
1F3FC543000
heap
page read and write
C60000
direct allocation
page read and write
1F401659000
trusted library allocation
page read and write
1F3FF46F000
trusted library allocation
page read and write
1F3FCFBA000
trusted library allocation
page read and write
F18000
heap
page read and write
310F000
stack
page read and write
1F3FCFD3000
trusted library allocation
page read and write
2E5E000
stack
page read and write
1F3FB27E000
trusted library allocation
page read and write
830000
heap
page read and write
4F90000
direct allocation
page execute and read and write
316503E000
stack
page read and write
1F3FC3F6000
trusted library allocation
page read and write
1F402FB2000
trusted library allocation
page read and write
1F3FC3F6000
trusted library allocation
page read and write
22D5D000
heap
page read and write
1F401703000
trusted library allocation
page read and write
1F3FFB22000
unclassified section
page read and write
1F3FC560000
heap
page read and write
1F401AA0000
trusted library allocation
page read and write
353F0000
trusted library allocation
page read and write
1194000
unkown
page execute and read and write
1F401AA0000
trusted library allocation
page read and write
1F3FFCCF000
trusted library allocation
page read and write
1C8EE000
stack
page read and write
22D5D000
heap
page read and write
1F402897000
trusted library allocation
page read and write
1F3F0F24000
heap
page read and write
22E91000
heap
page read and write
1F401A5E000
trusted library allocation
page read and write
1F400FDC000
trusted library allocation
page read and write
1F40043C000
trusted library allocation
page read and write
21F9C1CA000
heap
page read and write
4861000
heap
page read and write
1F401ADA000
trusted library allocation
page read and write
1CA6E000
stack
page read and write
95A61D8000
stack
page read and write
21F9B19A000
heap
page read and write
1F4019EE000
trusted library allocation
page read and write
21F9C299000
heap
page read and write
10BBE3B1000
trusted library allocation
page execute read
1F3FEE95000
trusted library allocation
page read and write
4861000
heap
page read and write
C5F000
stack
page read and write
316248E000
unkown
page readonly
27667480000
heap
page read and write
1F3FC300000
trusted library allocation
page read and write
1F4013BB000
trusted library allocation
page read and write
44AF000
stack
page read and write
1F402F59000
trusted library allocation
page read and write
1F3FD17D000
trusted library allocation
page read and write
21F9C141000
heap
page read and write
40DF000
stack
page read and write
1C78D000
stack
page read and write
1F3FF0E8000
trusted library allocation
page read and write
994000
heap
page read and write
1F40288F000
trusted library allocation
page read and write
21F9C228000
heap
page read and write
1F40115F000
trusted library allocation
page read and write
1F401692000
trusted library allocation
page read and write
1F401165000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
26C3000
heap
page read and write
1F4029B4000
trusted library allocation
page read and write
1F4010A9000
trusted library allocation
page read and write
1F4019EA000
trusted library allocation
page read and write
1F3FC3BE000
trusted library allocation
page read and write
4861000
heap
page read and write
1F4019F0000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FEE85000
trusted library allocation
page read and write
1F3FCFC9000
trusted library allocation
page read and write
26C2000
heap
page read and write
31624CC000
stack
page read and write
1F3FF4EE000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
1F3FFC03000
trusted library allocation
page read and write
1F402F7F000
trusted library allocation
page read and write
1F3FB2FE000
trusted library allocation
page read and write
230E5000
heap
page read and write
1F60003F000
trusted library allocation
page read and write
1F402857000
trusted library allocation
page read and write
1F3FEE1A000
trusted library allocation
page read and write
1F3FF4E6000
trusted library allocation
page read and write
21F9C19F000
heap
page read and write
1F4010D0000
trusted library allocation
page read and write
1F3FEE1A000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FF0AF000
trusted library allocation
page read and write
1F3FEE79000
trusted library allocation
page read and write
1F3FC536000
heap
page read and write
21F9C2A9000
heap
page read and write
4D6F000
stack
page read and write
22CF0000
heap
page read and write
1F3FFC6B000
trusted library allocation
page read and write
1F3FEE87000
trusted library allocation
page read and write
21F9C284000
heap
page read and write
1F3FB1F2000
trusted library allocation
page read and write
22DA0000
heap
page read and write
21F9B520000
unclassified section
page read and write
230E5000
heap
page read and write
3ADE000
stack
page read and write
1F3FB19D000
trusted library allocation
page read and write
230E3000
heap
page read and write
1F4095F0000
trusted library allocation
page read and write
4861000
heap
page read and write
1F40167B000
trusted library allocation
page read and write
1F3FFCC2000
trusted library allocation
page read and write
1F401698000
trusted library allocation
page read and write
1F3FC53C000
heap
page read and write
1F3FAB4A000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
1F40187D000
trusted library allocation
page read and write
21F9C231000
heap
page read and write
5EBE000
stack
page read and write
1F4004F7000
trusted library allocation
page read and write
1F40021E000
trusted library allocation
page read and write
1F401E5F000
trusted library allocation
page read and write
1757000
heap
page read and write
1F3FF437000
trusted library allocation
page read and write
1F3FC366000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
1F3FCF72000
trusted library allocation
page read and write
1F3FEBDF000
trusted library allocation
page read and write
231C9000
heap
page read and write
1F40165C000
trusted library allocation
page read and write
1F4095E4000
trusted library allocation
page read and write
20BC8240000
unclassified section
page readonly
1F3FD18C000
trusted library allocation
page read and write
1F3FCFF6000
trusted library allocation
page read and write
2547000
heap
page read and write
1F3FCFBF000
trusted library allocation
page read and write
1F3FC880000
trusted library section
page readonly
2CB000
stack
page read and write
1F3FC39A000
trusted library allocation
page read and write
7D00000
heap
page read and write
4591000
heap
page read and write
230D6000
heap
page read and write
268F000
heap
page read and write
1F3FC3B9000
trusted library allocation
page read and write
1F401A23000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FF4E6000
trusted library allocation
page read and write
22F08000
heap
page read and write
1F4028CD000
trusted library allocation
page read and write
21F9C140000
heap
page read and write
4861000
heap
page read and write
42D0000
heap
page read and write
1F3FC4F2000
trusted library allocation
page read and write
1F400F2B000
trusted library allocation
page read and write
3F9F000
stack
page read and write
1F40286E000
trusted library allocation
page read and write
10BBE328000
trusted library allocation
page execute read
1F3FC3BB000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
1F4014D8000
trusted library allocation
page read and write
9B000
stack
page read and write
22EFF000
heap
page read and write
1F3FB3C0000
trusted library section
page read and write
4591000
heap
page read and write
1F3FEE10000
trusted library allocation
page read and write
1F3FC4DB000
trusted library allocation
page read and write
1F400F12000
trusted library allocation
page read and write
1F40190C000
trusted library allocation
page read and write
1F3FEF00000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
5680000
direct allocation
page execute and read and write
994000
heap
page read and write
5670000
direct allocation
page execute and read and write
55B0000
direct allocation
page execute and read and write
417E000
stack
page read and write
6B3000
unkown
page execute and read and write
1F3FFA30000
trusted library allocation
page read and write
40EF000
stack
page read and write
1F3FD1C8000
trusted library allocation
page read and write
7C4000
unkown
page execute and read and write
1F4095F8000
trusted library allocation
page read and write
1F3FC385000
trusted library allocation
page read and write
1F3FCF9B000
trusted library allocation
page read and write
F3B000
heap
page read and write
A3413FD000
stack
page read and write
1F3FF0A4000
trusted library allocation
page read and write
1F3FF7CD000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
1F3FEE87000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401144000
trusted library allocation
page read and write
1F400283000
trusted library allocation
page read and write
1F3FF0D1000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
1F401891000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
25C0000
heap
page read and write
4F30000
direct allocation
page execute and read and write
1F401844000
trusted library allocation
page read and write
1C757230000
heap
page read and write
20E120A0000
heap
page read and write
1F401600000
trusted library allocation
page read and write
6340000
heap
page read and write
1F3FFB5D000
unclassified section
page read and write
4861000
heap
page read and write
1F3FF088000
trusted library allocation
page read and write
1F3FFC15000
trusted library allocation
page read and write
1F3FF79A000
trusted library allocation
page read and write
1F3FEED6000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
1F3FC561000
heap
page read and write
1F3FADD4000
trusted library allocation
page read and write
1F3FB6A8000
trusted library allocation
page read and write
1F3FF07F000
trusted library allocation
page read and write
1F401672000
trusted library allocation
page read and write
4D0000
unkown
page readonly
1F3FEB6B000
trusted library allocation
page read and write
2F18F000
stack
page read and write
1F3FF076000
trusted library allocation
page read and write
1F3FEE04000
trusted library allocation
page read and write
1194000
unkown
page execute and read and write
A33FA3B000
stack
page read and write
1F3FC30F000
trusted library allocation
page read and write
22DE0000
heap
page read and write
1F3FC49E000
trusted library allocation
page read and write
32CE000
stack
page read and write
1764000
heap
page read and write
1F3FC3BE000
trusted library allocation
page read and write
A3457EB000
stack
page read and write
1F3FC2F9000
trusted library allocation
page read and write
1F3FB2B0000
trusted library allocation
page read and write
1F3FF082000
trusted library allocation
page read and write
1F3FF7D3000
trusted library allocation
page read and write
1F407723000
trusted library allocation
page read and write
1F3FF6D0000
trusted library section
page readonly
1F4019CF000
trusted library allocation
page read and write
1F3FEEFE000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
1F4028CD000
trusted library allocation
page read and write
1F3FC3B9000
trusted library allocation
page read and write
1F3FF7F7000
trusted library allocation
page read and write
21F9BA95000
heap
page read and write
1F3FEFA3000
trusted library allocation
page read and write
1F401E24000
trusted library allocation
page read and write
1F401A9C000
trusted library allocation
page read and write
1F401DF7000
trusted library allocation
page read and write
1F3FD800000
trusted library allocation
page read and write
F09000
unkown
page write copy
4C4000
unkown
page execute and read and write
27BF000
stack
page read and write
62C000
unkown
page execute and read and write
1F40047C000
trusted library allocation
page read and write
1F4002CC000
trusted library allocation
page read and write
1F3FF7F5000
trusted library allocation
page read and write
49AF000
stack
page read and write
2C00000
direct allocation
page read and write
1F400FE9000
trusted library allocation
page read and write
1F3FFC10000
trusted library allocation
page read and write
793000
unkown
page execute and read and write
1F3FC543000
heap
page read and write
1F3FEE03000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
1F401294000
trusted library allocation
page read and write
1F3FEEBA000
trusted library allocation
page read and write
1F3F0E31000
heap
page read and write
2C00000
direct allocation
page read and write
1F401E1F000
trusted library allocation
page read and write
1F4004BF000
trusted library allocation
page read and write
356E000
stack
page read and write
1F3FC554000
heap
page read and write
1F3FF000000
trusted library allocation
page read and write
1F4034CB000
trusted library allocation
page read and write
1F3FF0E6000
trusted library allocation
page read and write
95A571B000
stack
page read and write
1F3FC398000
trusted library allocation
page read and write
1F3FD103000
trusted library allocation
page read and write
21F9C22E000
heap
page read and write
1F4002FB000
trusted library allocation
page read and write
A3415BE000
stack
page read and write
B54000
heap
page read and write
A34153C000
stack
page read and write
4861000
heap
page read and write
1F3FEE63000
trusted library allocation
page read and write
1F3FADBA000
trusted library allocation
page read and write
23103000
heap
page read and write
1F3FCF35000
trusted library allocation
page read and write
1F3FC341000
trusted library allocation
page read and write
1F3FF8DE000
trusted library allocation
page read and write
1F3FCFBD000
trusted library allocation
page read and write
1F4028A5000
trusted library allocation
page read and write
1F401AE2000
trusted library allocation
page read and write
385E000
stack
page read and write
21F9B190000
heap
page read and write
4931000
heap
page read and write
1F4002FC000
trusted library allocation
page read and write
1F40048D000
trusted library allocation
page read and write
1F3FEF57000
trusted library allocation
page read and write
1F3FB6C3000
trusted library allocation
page read and write
26C5000
heap
page read and write
1F3FF4F2000
trusted library allocation
page read and write
1F3FC53C000
heap
page read and write
994000
heap
page read and write
1F3FC537000
heap
page read and write
1F400411000
trusted library allocation
page read and write
1F4003F7000
trusted library allocation
page read and write
1890000
heap
page read and write
1F3FF43A000
trusted library allocation
page read and write
4591000
heap
page read and write
1F40105D000
trusted library allocation
page read and write
20BC8679000
trusted library allocation
page read and write
1F401663000
trusted library allocation
page read and write
1F4028C7000
trusted library allocation
page read and write
413000
unkown
page readonly
2C00000
direct allocation
page read and write
1F4034CB000
trusted library allocation
page read and write
A34872B000
stack
page read and write
1F403491000
trusted library allocation
page read and write
2BEF000
stack
page read and write
1F3FD16E000
trusted library allocation
page read and write
1F3FCFDC000
trusted library allocation
page read and write
1F400494000
trusted library allocation
page read and write
1C640000
heap
page read and write
1F3FF0CA000
trusted library allocation
page read and write
22D0000
heap
page read and write
1F3FC304000
trusted library allocation
page read and write
1F3FF4D2000
trusted library allocation
page read and write
1F402990000
trusted library allocation
page read and write
1F3FB203000
trusted library allocation
page read and write
1F3FABB3000
trusted library allocation
page read and write
3F2F000
stack
page read and write
1F3FC55C000
heap
page read and write
1F3FF451000
trusted library allocation
page read and write
10BBE3F1000
trusted library allocation
page execute read
1F3FC559000
heap
page read and write
1F3FC3A0000
trusted library allocation
page read and write
1F3FC283000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
1F40109C000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FC560000
heap
page read and write
22EFE000
heap
page read and write
22DA0000
heap
page read and write
20BC8230000
unclassified section
page readonly
1F400F36000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
5630000
direct allocation
page execute and read and write
1F402863000
trusted library allocation
page read and write
1F3FB5B6000
trusted library allocation
page read and write
1F401643000
trusted library allocation
page read and write
1F3FADFB000
trusted library allocation
page read and write
1F3FCF35000
trusted library allocation
page read and write
1F3FF6E0000
trusted library section
page readonly
4591000
heap
page read and write
1F3FF4B2000
trusted library allocation
page read and write
850000
heap
page read and write
1F3FD157000
trusted library allocation
page read and write
1F3FC2D2000
trusted library allocation
page read and write
1F3FAC60000
trusted library allocation
page read and write
1F3FC53F000
heap
page read and write
1F401998000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
21F9C1BD000
heap
page read and write
1F3EF547000
trusted library allocation
page read and write
1F3FADE4000
trusted library allocation
page read and write
1F3FB1DA000
trusted library allocation
page read and write
E6A000
heap
page read and write
1F3FF7DC000
trusted library allocation
page read and write
1C68E000
stack
page read and write
1F3FFCCF000
trusted library allocation
page read and write
1F403454000
trusted library allocation
page read and write
2B0E000
stack
page read and write
1F3FEEBD000
trusted library allocation
page read and write
10BBE2C1000
trusted library allocation
page execute read
9FE000
stack
page read and write
1F4004BF000
trusted library allocation
page read and write
263E000
heap
page read and write
3BEF000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
1F4030B5000
trusted library allocation
page read and write
1F3FC36C000
trusted library allocation
page read and write
1F3FF07F000
trusted library allocation
page read and write
1F407703000
trusted library allocation
page read and write
20BC86B7000
trusted library allocation
page read and write
1F3FC4D3000
trusted library allocation
page read and write
1F401E33000
trusted library allocation
page read and write
1F3FC380000
trusted library allocation
page read and write
1F40040D000
trusted library allocation
page read and write
1F3FF303000
trusted library allocation
page read and write
1F3FF45C000
trusted library allocation
page read and write
1F3F0E62000
heap
page read and write
1F3FC556000
heap
page read and write
40B0000
direct allocation
page execute and read and write
1F4096D1000
trusted library allocation
page read and write
20BC86C7000
trusted library allocation
page read and write
B54000
heap
page read and write
1F3FF05A000
trusted library allocation
page read and write
1F40011C000
trusted library allocation
page read and write
1F3FC3BA000
trusted library allocation
page read and write
1F3FAD1A000
trusted library allocation
page read and write
1F3FF800000
trusted library allocation
page read and write
1F401AA0000
trusted library allocation
page read and write
1F3FCFF6000
trusted library allocation
page read and write
96D000
stack
page read and write
556F000
stack
page read and write
1F3FF437000
trusted library allocation
page read and write
1F3FC36C000
trusted library allocation
page read and write
1F40185A000
trusted library allocation
page read and write
4EEF000
stack
page read and write
1F4028A8000
trusted library allocation
page read and write
20E125E0000
heap
page read and write
2690000
heap
page read and write
1F3FC54D000
heap
page read and write
A3474AE000
stack
page read and write
A343EDF000
stack
page read and write
20BC865B000
trusted library allocation
page read and write
2620000
heap
page read and write
1F3FEE33000
trusted library allocation
page read and write
1F3FF0E8000
trusted library allocation
page read and write
1F4018E3000
trusted library allocation
page read and write
994000
heap
page read and write
1F401E4E000
trusted library allocation
page read and write
1F3FB5F2000
trusted library allocation
page read and write
3BDF000
stack
page read and write
4F30000
direct allocation
page execute and read and write
1F4019F4000
trusted library allocation
page read and write
1F401AC8000
trusted library allocation
page read and write
1F3FC554000
heap
page read and write
306E000
stack
page read and write
1F409661000
trusted library allocation
page read and write
1F4014DD000
trusted library allocation
page read and write
1F3FCE00000
trusted library allocation
page read and write
2F2E000
stack
page read and write
4591000
heap
page read and write
230E1000
heap
page read and write
1F3FC39A000
trusted library allocation
page read and write
1F3FFD38000
trusted library allocation
page read and write
462D000
stack
page read and write
1F401AE8000
trusted library allocation
page read and write
1F3FB350000
trusted library section
page read and write
994000
heap
page read and write
1F3FF4EE000
trusted library allocation
page read and write
1F3FABDF000
trusted library allocation
page read and write
22DE0000
heap
page read and write
21F9B463000
trusted library allocation
page read and write
1F3FB463000
trusted library section
page read and write
1F3FD400000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401096000
trusted library allocation
page read and write
21F9C23C000
heap
page read and write
1F4004AD000
trusted library allocation
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
1F3FC4C9000
trusted library allocation
page read and write
EA0000
unkown
page readonly
1F3FEFD2000
trusted library allocation
page read and write
1F3FEE08000
trusted library allocation
page read and write
1F400F6E000
trusted library allocation
page read and write
1F400281000
trusted library allocation
page read and write
1F3FF8FB000
trusted library allocation
page read and write
1F3FC365000
trusted library allocation
page read and write
1F4096E9000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FEF7E000
trusted library allocation
page read and write
26C6000
heap
page read and write
1F401700000
trusted library allocation
page read and write
F02000
unkown
page execute and read and write
1F401AD8000
trusted library allocation
page read and write
427000
unkown
page write copy
1F402857000
trusted library allocation
page read and write
1F3FC16C000
trusted library allocation
page read and write
1F3F0E6B000
heap
page read and write
1F3FC2D2000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
1F4016F0000
trusted library allocation
page read and write
5EC0000
heap
page read and write
1F3FC543000
heap
page read and write
21F9C231000
heap
page read and write
21F9C2A7000
heap
page read and write
539000
unkown
page write copy
1F40128E000
trusted library allocation
page read and write
1F401A03000
trusted library allocation
page read and write
1F3FFC7D000
trusted library allocation
page read and write
1083000
unkown
page execute and read and write
4591000
heap
page read and write
1F4016CF000
trusted library allocation
page read and write
1F3FC3E2000
trusted library allocation
page read and write
1F3FC39A000
trusted library allocation
page read and write
1F3FB19F000
trusted library allocation
page read and write
1F400366000
trusted library allocation
page read and write
1F3FC283000
trusted library allocation
page read and write
1F400F08000
trusted library allocation
page read and write
1F3FEED9000
trusted library allocation
page read and write
1F3FF07F000
trusted library allocation
page read and write
1CCE0000
trusted library allocation
page read and write
1F4002D7000
trusted library allocation
page read and write
2F9C000
stack
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F3FEFD2000
trusted library allocation
page read and write
A347E6B000
stack
page read and write
1F3FB17E000
trusted library allocation
page read and write
1F3FC36A000
trusted library allocation
page read and write
1F3FC4B7000
trusted library allocation
page read and write
1F3FEE20000
trusted library allocation
page read and write
263A000
heap
page read and write
1F400437000
trusted library allocation
page read and write
994000
heap
page read and write
1F401294000
trusted library allocation
page read and write
1F4019C2000
trusted library allocation
page read and write
1F4015AC000
trusted library allocation
page read and write
1F401A58000
trusted library allocation
page read and write
1F3FC52F000
heap
page read and write
4580000
direct allocation
page read and write
994000
heap
page read and write
1F3FEE39000
trusted library allocation
page read and write
1F3FF300000
trusted library allocation
page read and write
1F4028DC000
trusted library allocation
page read and write
1F3FF03B000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
1F3FC530000
heap
page read and write
1F40196B000
trusted library allocation
page read and write
39AE000
stack
page read and write
1F3FC324000
trusted library allocation
page read and write
1F401679000
trusted library allocation
page read and write
22F01000
heap
page read and write
10BBE308000
trusted library allocation
page execute read
1F401169000
trusted library allocation
page read and write
1F3FB1F6000
trusted library allocation
page read and write
1F401668000
trusted library allocation
page read and write
21F9C26D000
heap
page read and write
1F401AA8000
trusted library allocation
page read and write
1F40777A000
trusted library allocation
page read and write
2C1E000
stack
page read and write
1F40289A000
trusted library allocation
page read and write
40D0000
heap
page read and write
1F401020000
trusted library allocation
page read and write
1F401932000
trusted library allocation
page read and write
10BBE34F000
trusted library allocation
page execute read
1F3FC557000
heap
page read and write
1F40776F000
trusted library allocation
page read and write
1F400456000
trusted library allocation
page read and write
1F4019F8000
trusted library allocation
page read and write
1C757210000
heap
page read and write
1F3FCFBA000
trusted library allocation
page read and write
1F3FF4E6000
trusted library allocation
page read and write
1F4095F0000
trusted library allocation
page read and write
1F3FFC10000
trusted library allocation
page read and write
1F3EF330000
trusted library allocation
page read and write
1F3FC3AA000
trusted library allocation
page read and write
1F40142C000
trusted library allocation
page read and write
1F402F8F000
trusted library allocation
page read and write
5AD000
unkown
page execute and read and write
20BC8803000
trusted library allocation
page read and write
1F3FC554000
heap
page read and write
1F401EF6000
trusted library allocation
page read and write
22D74000
heap
page read and write
1F3FC3C4000
trusted library allocation
page read and write
1F3FFC6E000
trusted library allocation
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F401151000
trusted library allocation
page read and write
1F4028A5000
trusted library allocation
page read and write
1F40286E000
trusted library allocation
page read and write
1F3FEE1A000
trusted library allocation
page read and write
427000
unkown
page write copy
A3400FE000
stack
page read and write
21F9C231000
heap
page read and write
1F3FC556000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
1F3FEE72000
trusted library allocation
page read and write
1F3FC431000
trusted library allocation
page read and write
1F3FF4C5000
trusted library allocation
page read and write
6CE000
stack
page read and write
1F400203000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FEFA3000
trusted library allocation
page read and write
4EEE000
stack
page read and write
1F3FB226000
trusted library allocation
page read and write
105F000
stack
page read and write
22D5D000
heap
page read and write
1F3FB575000
trusted library allocation
page read and write
1F3FCFBC000
trusted library allocation
page read and write
21F9C1F2000
heap
page read and write
1F3FC546000
heap
page read and write
1F3FF096000
trusted library allocation
page read and write
22D5D000
heap
page read and write
1F400E00000
trusted library allocation
page read and write
1F401088000
trusted library allocation
page read and write
230E3000
heap
page read and write
3DEF000
stack
page read and write
1F401AC0000
trusted library allocation
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F3FF07F000
trusted library allocation
page read and write
1F3FC535000
heap
page read and write
1F401E86000
trusted library allocation
page read and write
1F4015B3000
trusted library allocation
page read and write
1F3FF492000
trusted library allocation
page read and write
2140000
heap
page read and write
1F3FF403000
trusted library allocation
page read and write
1F401663000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FCFB3000
trusted library allocation
page read and write
1F3EF190000
unclassified section
page readonly
1F3FEFA3000
trusted library allocation
page read and write
1F4010C6000
trusted library allocation
page read and write
413000
unkown
page readonly
1F3FEF89000
trusted library allocation
page read and write
1F3FC52F000
heap
page read and write
1F3FF261000
heap
page read and write
1F400ED2000
trusted library allocation
page read and write
1F401668000
trusted library allocation
page read and write
1F401686000
trusted library allocation
page read and write
1F401AFD000
trusted library allocation
page read and write
1F3FF45A000
trusted library allocation
page read and write
1F4010DB000
trusted library allocation
page read and write
26BF000
heap
page read and write
1F3FF8D0000
trusted library allocation
page read and write
1F3FF94E000
trusted library allocation
page read and write
1F3FEBFB000
trusted library allocation
page read and write
1F3FFB40000
unclassified section
page read and write
1F3FF7E1000
trusted library allocation
page read and write
1F402839000
trusted library allocation
page read and write
1C7571F0000
heap
page read and write
1F4002F5000
trusted library allocation
page read and write
26C6000
heap
page read and write
1F3FC556000
heap
page read and write
1F3FF54C000
trusted library allocation
page read and write
4861000
heap
page read and write
22D5D000
heap
page read and write
1F3FC535000
heap
page read and write
A34A37E000
stack
page read and write
1F3FFB2D000
unclassified section
page read and write
230E1000
heap
page read and write
4861000
heap
page read and write
21CF000
stack
page read and write
4591000
heap
page read and write
26BF000
heap
page read and write
6970000
heap
page read and write
1F3FC2F2000
trusted library allocation
page read and write
994000
heap
page read and write
1F400507000
trusted library allocation
page read and write
1F3FF0A7000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
413000
unkown
page readonly
1F3FC55C000
heap
page read and write
1F401478000
trusted library allocation
page read and write
1F3FC3C7000
trusted library allocation
page read and write
1F400E0C000
trusted library allocation
page read and write
20BC8720000
unclassified section
page readonly
1F407732000
trusted library allocation
page read and write
7DA000
unkown
page execute and read and write
1F40167B000
trusted library allocation
page read and write
A33FABB000
stack
page read and write
4591000
heap
page read and write
1F402970000
trusted library allocation
page read and write
1F4018A1000
trusted library allocation
page read and write
1F3FC213000
trusted library allocation
page read and write
A3480ED000
stack
page read and write
4591000
heap
page read and write
1F3FC560000
heap
page read and write
1F3FEE6B000
trusted library allocation
page read and write
F09000
unkown
page read and write
4591000
heap
page read and write
257E000
stack
page read and write
1F401403000
trusted library allocation
page read and write
1F4016A2000
trusted library allocation
page read and write
1F3FD1FE000
trusted library allocation
page read and write
1F4019FC000
trusted library allocation
page read and write
1F401659000
trusted library allocation
page read and write
1F3FC36C000
trusted library allocation
page read and write
1764000
heap
page read and write
4F40000
direct allocation
page execute and read and write
1F3FFCDC000
trusted library allocation
page read and write
1F3FF7FC000
trusted library allocation
page read and write
2547000
heap
page read and write
22EFF000
heap
page read and write
A3484ED000
stack
page read and write
1F3FC3DC000
trusted library allocation
page read and write
1F4013D2000
trusted library allocation
page read and write
1F3F0DF9000
heap
page read and write
1F4014A3000
trusted library allocation
page read and write
1F3FC33F000
trusted library allocation
page read and write
95AA2BE000
stack
page read and write
2D1F000
stack
page read and write
364F000
stack
page read and write
1F3FD1FA000
trusted library allocation
page read and write
4FD000
unkown
page execute and read and write
1F4028CB000
trusted library allocation
page read and write
1F402857000
trusted library allocation
page read and write
22DE0000
heap
page read and write
378F000
stack
page read and write
1F403460000
trusted library allocation
page read and write
1F3FC537000
heap
page read and write
1194000
unkown
page execute and read and write
22EC8000
heap
page read and write
1F401793000
trusted library allocation
page read and write
1F3FFBCF000
unclassified section
page read and write
1F3FC563000
heap
page read and write
21F9C23C000
heap
page read and write
4E60000
direct allocation
page execute and read and write
1F3FF4D4000
trusted library allocation
page read and write
1F4004BF000
trusted library allocation
page read and write
1F4018A1000
trusted library allocation
page read and write
1F4019EC000
trusted library allocation
page read and write
A34852C000
stack
page read and write
1F401EE5000
trusted library allocation
page read and write
230DE000
heap
page read and write
1F3FB320000
trusted library section
page read and write
1F40137E000
trusted library allocation
page read and write
1F401303000
trusted library allocation
page read and write
1F3FC434000
trusted library allocation
page read and write
1F4013B7000
trusted library allocation
page read and write
1F3FCF13000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1F3FACDD000
trusted library allocation
page read and write
27668FA0000
heap
page read and write
1F3FC2F9000
trusted library allocation
page read and write
1F4002EB000
trusted library allocation
page read and write
1F4002F2000
trusted library allocation
page read and write
119C000
unkown
page execute and read and write
20E121B0000
heap
page read and write
417000
unkown
page read and write
1F3FC394000
trusted library allocation
page read and write
F02000
unkown
page execute and read and write
95A8A3E000
unkown
page readonly
22EFE000
heap
page read and write
1F3FC36A000
trusted library allocation
page read and write
994000
heap
page read and write
20BC86E7000
trusted library allocation
page read and write
B54000
heap
page read and write
994000
heap
page read and write
1F401574000
trusted library allocation
page read and write
1F3FEEFE000
trusted library allocation
page read and write
22EFF000
heap
page read and write
F09000
unkown
page write copy
1F401685000
trusted library allocation
page read and write
1F3FACAD000
trusted library allocation
page read and write
1F401633000
trusted library allocation
page read and write
1F3FC324000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
27667500000
trusted library allocation
page read and write
F09000
unkown
page read and write
4861000
heap
page read and write
A33FB7E000
stack
page read and write
1F3FEC03000
trusted library allocation
page read and write
230D6000
heap
page read and write
27667450000
heap
page read and write
622000
heap
page read and write
DCE000
stack
page read and write
1F3FEEBD000
trusted library allocation
page read and write
1F40167B000
trusted library allocation
page read and write
1F4002EB000
trusted library allocation
page read and write
1F4013F7000
trusted library allocation
page read and write
1F4011E2000
trusted library allocation
page read and write
1F4016D1000
trusted library allocation
page read and write
1F3FF74E000
trusted library allocation
page read and write
1F3FFA74000
trusted library allocation
page read and write
1F407723000
trusted library allocation
page read and write
1F3EF530000
trusted library allocation
page read and write
55D0000
direct allocation
page execute and read and write
1F401003000
trusted library allocation
page read and write
1F402875000
trusted library allocation
page read and write
401000
unkown
page execute read
399E000
stack
page read and write
295E000
stack
page read and write
1F3FC316000
trusted library allocation
page read and write
485F000
stack
page read and write
1F401B00000
trusted library allocation
page read and write
1F3FC55E000
heap
page read and write
1F3FF723000
trusted library allocation
page read and write
1F402FBD000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
1F3FF1C7000
heap
page read and write
22CBE000
stack
page read and write
1F3FEF9C000
trusted library allocation
page read and write
1CA3E000
stack
page read and write
1F403493000
trusted library allocation
page read and write
1F401955000
trusted library allocation
page read and write
1F3FEE6B000
trusted library allocation
page read and write
20BC8500000
trusted library allocation
page read and write
1F4002F2000
trusted library allocation
page read and write
1F40168B000
trusted library allocation
page read and write
1F3FC33F000
trusted library allocation
page read and write
F09000
unkown
page read and write
1764000
heap
page read and write
1F4002F5000
trusted library allocation
page read and write
1F3FCF9B000
trusted library allocation
page read and write
1F4019F4000
trusted library allocation
page read and write
10BBE30C000
trusted library allocation
page execute read
61CF000
stack
page read and write
EA0000
unkown
page read and write
1F3FC569000
heap
page read and write
1F401E7C000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
1F3FEEBA000
trusted library allocation
page read and write
1F3FFCC2000
trusted library allocation
page read and write
1F402872000
trusted library allocation
page read and write
1F400902000
trusted library allocation
page read and write
1163000
unkown
page execute and read and write
21F9B500000
heap
page readonly
1F401AA8000
trusted library allocation
page read and write
1F3FF7F7000
trusted library allocation
page read and write
1F3FF45A000
trusted library allocation
page read and write
A34802B000
stack
page read and write
1F40193E000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
1F3FD1FB000
trusted library allocation
page read and write
1F4018D3000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
1F3FB360000
trusted library section
page read and write
780000
heap
page read and write
1F3FB2A5000
trusted library allocation
page read and write
1F3FF0B7000
trusted library allocation
page read and write
1F3FF03B000
trusted library allocation
page read and write
5F0000
heap
page read and write
27668FAD000
heap
page read and write
4FF1000
heap
page read and write
A348B7C000
stack
page read and write
1CBD0000
heap
page read and write
20BC83B0000
heap
page readonly
1F3FC556000
heap
page read and write
1F3FB2FE000
trusted library allocation
page read and write
1C900000
heap
page read and write
23105000
heap
page read and write
1F3FFC00000
trusted library allocation
page read and write
1F4004E1000
trusted library allocation
page read and write
A348463000
stack
page read and write
4861000
heap
page read and write
1F3FEE1A000
trusted library allocation
page read and write
1F402F8F000
trusted library allocation
page read and write
1F3FCF0E000
trusted library allocation
page read and write
1F402F1D000
trusted library allocation
page read and write
A34957E000
stack
page read and write
F02000
unkown
page execute and read and write
1F3FCFF6000
trusted library allocation
page read and write
3D1F000
stack
page read and write
1F3FFCB6000
trusted library allocation
page read and write
A34360F000
stack
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F3FF05E000
trusted library allocation
page read and write
1F3FD1D5000
trusted library allocation
page read and write
21F9B40C000
trusted library allocation
page read and write
1F3FCF39000
trusted library allocation
page read and write
1F3FB147000
trusted library allocation
page read and write
4591000
heap
page read and write
1F401ED9000
trusted library allocation
page read and write
1F40138F000
trusted library allocation
page read and write
1F4095E6000
trusted library allocation
page read and write
1F3FF4E6000
trusted library allocation
page read and write
1F3FEE33000
trusted library allocation
page read and write
1F40139D000
trusted library allocation
page read and write
1F3FCFC2000
trusted library allocation
page read and write
20BC8603000
trusted library allocation
page read and write
1F3EF2A0000
heap
page read and write
1F3FADED000
trusted library allocation
page read and write
1F40166D000
trusted library allocation
page read and write
1F401DCF000
trusted library allocation
page read and write
1F3FF8D4000
trusted library allocation
page read and write
1F3FD14B000
trusted library allocation
page read and write
230E4000
heap
page read and write
1F3FC541000
heap
page read and write
1F3FC556000
heap
page read and write
1F3FF0E3000
trusted library allocation
page read and write
1F4002D7000
trusted library allocation
page read and write
1F3FC2C2000
trusted library allocation
page read and write
4861000
heap
page read and write
81EB000
stack
page read and write
4591000
heap
page read and write
1343000
unkown
page execute and write copy
1F401EA6000
trusted library allocation
page read and write
1F3EF5D7000
trusted library allocation
page read and write
1F3FC3DF000
trusted library allocation
page read and write
1F3FEE84000
trusted library allocation
page read and write
1F401670000
trusted library allocation
page read and write
1F3FCF33000
trusted library allocation
page read and write
1F401900000
trusted library allocation
page read and write
1F4002DC000
trusted library allocation
page read and write
4591000
heap
page read and write
349E000
stack
page read and write
1F3FC543000
heap
page read and write
1F3FEEBD000
trusted library allocation
page read and write
1F3FC560000
heap
page read and write
1F401EF8000
trusted library allocation
page read and write
1F401AFD000
trusted library allocation
page read and write
4591000
heap
page read and write
C60000
direct allocation
page read and write
1F401EAE000
trusted library allocation
page read and write
1F400494000
trusted library allocation
page read and write
1F3FF451000
trusted library allocation
page read and write
400000
unkown
page readonly
1F3FF845000
trusted library allocation
page read and write
1F402857000
trusted library allocation
page read and write
22DBC000
heap
page read and write
1F3FB200000
trusted library allocation
page read and write
1F409683000
trusted library allocation
page read and write
1F3FEE91000
trusted library allocation
page read and write
1F40136F000
trusted library allocation
page read and write
1F401AB0000
trusted library allocation
page read and write
1F3FC540000
heap
page read and write
20BC86C9000
trusted library allocation
page read and write
1F401752000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FC376000
trusted library allocation
page read and write
4861000
heap
page read and write
1F401A68000
trusted library allocation
page read and write
7DB000
unkown
page execute and write copy
1F3FC536000
heap
page read and write
994000
heap
page read and write
CDE000
stack
page read and write
1F3FF80A000
trusted library allocation
page read and write
1F40169A000
trusted library allocation
page read and write
7CC000
unkown
page execute and read and write
1F4018A1000
trusted library allocation
page read and write
1F3FFA13000
trusted library allocation
page read and write
1F401679000
trusted library allocation
page read and write
1343000
unkown
page execute and write copy
1F3FC398000
trusted library allocation
page read and write
4861000
heap
page read and write
4580000
direct allocation
page read and write
1F3FD608000
trusted library allocation
page read and write
1F4002EB000
trusted library allocation
page read and write
1F402F5B000
trusted library allocation
page read and write
1F3FB302000
unclassified section
page read and write
1F3FD1FE000
trusted library allocation
page read and write
1F3FEE3B000
trusted library allocation
page read and write
1F3FF089000
trusted library allocation
page read and write
1F3FC532000
heap
page read and write
1F3FCFBF000
trusted library allocation
page read and write
26C8000
heap
page read and write
1F400387000
trusted library allocation
page read and write
22E98000
heap
page read and write
1F3FEE61000
trusted library allocation
page read and write
5600000
direct allocation
page execute and read and write
1F3FC3B7000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FC333000
trusted library allocation
page read and write
1F401646000
trusted library allocation
page read and write
1F4002F7000
trusted library allocation
page read and write
230DB000
heap
page read and write
1F3FC560000
heap
page read and write
1F3FEB4A000
trusted library allocation
page read and write
1F3FAC71000
trusted library allocation
page read and write
1F3FF207000
heap
page read and write
1F3FC3BB000
trusted library allocation
page read and write
1F4030F3000
trusted library allocation
page read and write
1F3FC2CA000
trusted library allocation
page read and write
21F9BA60000
heap
page read and write
1F401D6B000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
1F3EF5FC000
trusted library allocation
page read and write
1F4028D5000
trusted library allocation
page read and write
1F40048D000
trusted library allocation
page read and write
21F9C1A9000
heap
page read and write
1F40298D000
trusted library allocation
page read and write
1F4010D8000
trusted library allocation
page read and write
1F3EF400000
trusted library allocation
page read and write
21F9B403000
trusted library allocation
page read and write
1F3FB27D000
trusted library allocation
page read and write
11AA000
unkown
page execute and write copy
1F4002EB000
trusted library allocation
page read and write
1F3FB2E1000
trusted library allocation
page read and write
1F3FB161000
trusted library allocation
page read and write
4591000
heap
page read and write
1F409685000
trusted library allocation
page read and write
A343CE2000
stack
page read and write
1F4013BE000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FC3A3000
trusted library allocation
page read and write
1F3FB161000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FC3A0000
trusted library allocation
page read and write
1F3FF068000
trusted library allocation
page read and write
1F3FB3A0000
trusted library section
page read and write
E9DEDB5000
trusted library allocation
page read and write
1F401881000
trusted library allocation
page read and write
1F3FF9D7000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FF7D3000
trusted library allocation
page read and write
230D6000
heap
page read and write
A57000
heap
page read and write
1F401881000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
4590000
heap
page read and write
1F3FEEBB000
trusted library allocation
page read and write
1F3EF2F9000
heap
page read and write
1F40143C000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
1F3FB1FE000
trusted library allocation
page read and write
1F3FFCFB000
trusted library allocation
page read and write
22EC5000
heap
page read and write
22DA0000
heap
page read and write
4591000
heap
page read and write
1F3FC3F9000
trusted library allocation
page read and write
1F3FB2AF000
trusted library allocation
page read and write
3FAE000
stack
page read and write
1F402F21000
trusted library allocation
page read and write
1F401E37000
trusted library allocation
page read and write
1F3FD30D000
trusted library allocation
page read and write
1F3FFBC2000
unclassified section
page read and write
5660000
direct allocation
page execute and read and write
1F4014CD000
trusted library allocation
page read and write
1F3FC613000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
20BC84A0000
unclassified section
page read and write
1F3FC3B7000
trusted library allocation
page read and write
1C79D000
stack
page read and write
3E9D000
stack
page read and write
A3469ED000
stack
page read and write
4591000
heap
page read and write
1F3FC3A5000
trusted library allocation
page read and write
1F400500000
heap
page read and write
21F9C1AC000
heap
page read and write
20E12190000
heap
page read and write
419000
unkown
page readonly
A347DEA000
stack
page read and write
10BBE36D000
trusted library allocation
page execute read
A3438E5000
stack
page read and write
1F4028DC000
trusted library allocation
page read and write
41CE000
stack
page read and write
4591000
heap
page read and write
1F3FEF87000
trusted library allocation
page read and write
1F402868000
trusted library allocation
page read and write
1F3FAD7B000
trusted library allocation
page read and write
1F3FF901000
trusted library allocation
page read and write
1F3FFB4D000
unclassified section
page read and write
1F40117D000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
994000
heap
page read and write
82F3000
heap
page read and write
21F9C26A000
heap
page read and write
1F3FF4B2000
trusted library allocation
page read and write
22F42000
heap
page read and write
1F3FC217000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FEEB8000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
1F3FD185000
trusted library allocation
page read and write
36AE000
stack
page read and write
F30000
heap
page read and write
994000
heap
page read and write
22EC1000
heap
page read and write
1F4002D4000
trusted library allocation
page read and write
21F9C19F000
heap
page read and write
1F401195000
trusted library allocation
page read and write
1F3FF784000
trusted library allocation
page read and write
1F4002F5000
trusted library allocation
page read and write
1F401788000
trusted library allocation
page read and write
1F40169A000
trusted library allocation
page read and write
580000
heap
page read and write
1F3FF41A000
trusted library allocation
page read and write
1F3FEB71000
trusted library allocation
page read and write
1F40107B000
trusted library allocation
page read and write
4931000
heap
page read and write
1F401136000
trusted library allocation
page read and write
1F3FEE34000
trusted library allocation
page read and write
45A1000
heap
page read and write
EA0000
unkown
page readonly
2B8F000
stack
page read and write
1F3FEF69000
trusted library allocation
page read and write
1F3FF9CF000
trusted library allocation
page read and write
2766746D000
heap
page read and write
4591000
heap
page read and write
1F3FFD00000
trusted library allocation
page read and write
1F3FB2F0000
trusted library allocation
page read and write
413000
unkown
page readonly
1730000
direct allocation
page read and write
1F3FC45A000
trusted library allocation
page read and write
1F401E33000
trusted library allocation
page read and write
1F3FC341000
trusted library allocation
page read and write
1F3FB500000
trusted library allocation
page read and write
40AF000
stack
page read and write
1F4019F4000
trusted library allocation
page read and write
1F3FF47A000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
5430000
trusted library allocation
page read and write
1F3FFC51000
trusted library allocation
page read and write
1F401A32000
trusted library allocation
page read and write
21F9C1A4000
heap
page read and write
1F3FB600000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FEB03000
trusted library allocation
page read and write
21F9BC40000
heap
page read and write
1F3FF0E6000
trusted library allocation
page read and write
1F3FC56C000
heap
page read and write
1F400374000
trusted library allocation
page read and write
1F40289A000
trusted library allocation
page read and write
A34746D000
stack
page read and write
1F401679000
trusted library allocation
page read and write
21F9C1F8000
heap
page read and write
1F3FB210000
trusted library allocation
page read and write
230D7000
heap
page read and write
4861000
heap
page read and write
1F401EE1000
trusted library allocation
page read and write
1F3FC24D000
trusted library allocation
page read and write
1F3FEED6000
trusted library allocation
page read and write
436F000
stack
page read and write
8316000
heap
page read and write
1764000
heap
page read and write
21F9C2A7000
heap
page read and write
372E000
stack
page read and write
440000
heap
page read and write
4591000
heap
page read and write
1F3FC3F3000
trusted library allocation
page read and write
53E000
stack
page read and write
1F3FCFB9000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FF63F000
unclassified section
page read and write
1F3EF2E0000
trusted library allocation
page read and write
1F4002B5000
trusted library allocation
page read and write
1F3FF42D000
trusted library allocation
page read and write
1F3FF089000
trusted library allocation
page read and write
1F3FB29E000
trusted library allocation
page read and write
1083000
unkown
page execute and read and write
1F3FCF72000
trusted library allocation
page read and write
2337000
heap
page read and write
22E92000
heap
page read and write
1F3FEE91000
trusted library allocation
page read and write
1F3FAD9F000
trusted library allocation
page read and write
10BBE343000
trusted library allocation
page execute read
1F40349D000
trusted library allocation
page read and write
35EE000
stack
page read and write
455F000
stack
page read and write
4CF0000
direct allocation
page read and write
1F40116D000
trusted library allocation
page read and write
1F401D00000
trusted library allocation
page read and write
1F3FF547000
trusted library allocation
page read and write
1F3FCF07000
trusted library allocation
page read and write
1F4015C3000
trusted library allocation
page read and write
1F3FF1B2000
heap
page read and write
401000
unkown
page execute read
994000
heap
page read and write
A3414F4000
stack
page read and write
1F400290000
trusted library allocation
page read and write
1F3FEF9C000
trusted library allocation
page read and write
3A9F000
stack
page read and write
1F3FEE96000
trusted library allocation
page read and write
26C6000
heap
page read and write
1F4002EB000
trusted library allocation
page read and write
4591000
heap
page read and write
3F0F000
stack
page read and write
20BC8710000
heap
page read and write
10BBE451000
trusted library allocation
page execute read
1F3FEEA2000
trusted library allocation
page read and write
3E5F000
stack
page read and write
1F401A1C000
trusted library allocation
page read and write
1F3FC3AE000
trusted library allocation
page read and write
E1D000
stack
page read and write
1F3FACE1000
trusted library allocation
page read and write
1F3FC39E000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
11AB000
unkown
page execute and write copy
4591000
heap
page read and write
1F3FC571000
heap
page read and write
21F9C298000
heap
page read and write
1F401663000
trusted library allocation
page read and write
F2F000
heap
page read and write
1083000
unkown
page execute and read and write
1F403092000
trusted library allocation
page read and write
401000
unkown
page execute read
6961000
heap
page read and write
1F3FB2FE000
trusted library allocation
page read and write
1F3FEEA2000
trusted library allocation
page read and write
4861000
heap
page read and write
22D62000
heap
page read and write
1F3FD1C8000
trusted library allocation
page read and write
6CB50000
unkown
page readonly
E0E000
stack
page read and write
412E000
stack
page read and write
482E000
stack
page read and write
1F3FC4CB000
trusted library allocation
page read and write
1F401EC0000
trusted library allocation
page read and write
230E4000
heap
page read and write
2654000
heap
page read and write
1F3FB1CD000
trusted library allocation
page read and write
211E000
stack
page read and write
1F402897000
trusted library allocation
page read and write
1F3FB186000
trusted library allocation
page read and write
1F3FD16E000
trusted library allocation
page read and write
1F40113F000
trusted library allocation
page read and write
A3474EC000
stack
page read and write
1F4028FE000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FED73000
trusted library allocation
page read and write
D1BE1FF000
stack
page read and write
C60000
direct allocation
page read and write
1F3FCFBC000
trusted library allocation
page read and write
1F3FC376000
trusted library allocation
page read and write
1F3FC3A3000
trusted library allocation
page read and write
1F4002DA000
trusted library allocation
page read and write
1F3FF962000
trusted library allocation
page read and write
1F401657000
trusted library allocation
page read and write
EEC000
heap
page read and write
1F3FCF9B000
trusted library allocation
page read and write
1F400485000
trusted library allocation
page read and write
A34143E000
stack
page read and write
230E5000
heap
page read and write
1F3FF05A000
trusted library allocation
page read and write
1F3FC2CA000
trusted library allocation
page read and write
1F4002C9000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
1F40164E000
trusted library allocation
page read and write
1F401123000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FB663000
trusted library allocation
page read and write
1F401E95000
trusted library allocation
page read and write
4D60000
heap
page read and write
1F401A32000
trusted library allocation
page read and write
F46000
heap
page read and write
1F3FF43A000
trusted library allocation
page read and write
A347EAB000
stack
page read and write
1F3FC380000
trusted library allocation
page read and write
920000
heap
page read and write
F03000
heap
page read and write
4861000
heap
page read and write
21F9BA70000
heap
page read and write
1CBE1000
heap
page read and write
1F401B00000
trusted library allocation
page read and write
1F3FC2F8000
trusted library allocation
page read and write
1F400104000
trusted library allocation
page read and write
4591000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4E3F000
stack
page read and write
1870000
direct allocation
page read and write
53B000
unkown
page execute and read and write
1F3FEE9D000
trusted library allocation
page read and write
21F9BA39000
unkown
page execute read
1F3FC2C2000
trusted library allocation
page read and write
23105000
heap
page read and write
1F3FFD20000
trusted library allocation
page read and write
4861000
heap
page read and write
A34826C000
stack
page read and write
4861000
heap
page read and write
3A4E000
stack
page read and write
1F401142000
trusted library allocation
page read and write
230F4000
heap
page read and write
22DA0000
heap
page read and write
1F3FCFF6000
trusted library allocation
page read and write
1F3EF50D000
trusted library allocation
page read and write
1F3FC55C000
heap
page read and write
1F402890000
trusted library allocation
page read and write
1F40154A000
trusted library allocation
page read and write
2D1F000
stack
page read and write
1F3FEB09000
trusted library allocation
page read and write
1F3FFA72000
trusted library allocation
page read and write
1F3FEED4000
trusted library allocation
page read and write
1F401A9C000
trusted library allocation
page read and write
2547000
heap
page read and write
55E0000
direct allocation
page execute and read and write
1870000
direct allocation
page read and write
1F3FFE03000
trusted library allocation
page read and write
1F3FF8C8000
trusted library allocation
page read and write
A344FEF000
stack
page read and write
4DAE000
stack
page read and write
1F3FF056000
trusted library allocation
page read and write
22DE0000
heap
page read and write
1F3FFA88000
trusted library allocation
page read and write
1F3FFCA1000
trusted library allocation
page read and write
1F3FB30D000
unclassified section
page read and write
4EAF000
stack
page read and write
1F401657000
trusted library allocation
page read and write
1F3FEEBF000
trusted library allocation
page read and write
1F3FEE3A000
trusted library allocation
page read and write
2448000
unkown
page readonly
1F40143E000
trusted library allocation
page read and write
1F3FF0D1000
trusted library allocation
page read and write
4861000
heap
page read and write
392E000
stack
page read and write
1F3FEE34000
trusted library allocation
page read and write
332F000
stack
page read and write
1F3FC500000
heap
page read and write
21F9B492000
trusted library allocation
page read and write
26BF000
heap
page read and write
3F4E000
stack
page read and write
230DF000
heap
page read and write
3F6E000
stack
page read and write
230D9000
heap
page read and write
4861000
heap
page read and write
8300000
heap
page read and write
1F3FD1F7000
trusted library allocation
page read and write
490000
heap
page read and write
994000
heap
page read and write
1F4019D1000
trusted library allocation
page read and write
1F3FEB73000
trusted library allocation
page read and write
1F3FF4E6000
trusted library allocation
page read and write
1F401AB0000
trusted library allocation
page read and write
1F3FF9A3000
trusted library allocation
page read and write
1F3FEF81000
trusted library allocation
page read and write
1C757259000
heap
page read and write
1F3FF85F000
trusted library allocation
page read and write
D1BE9FF000
stack
page read and write
1F4028B3000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
300F000
stack
page read and write
1F3FCF0E000
trusted library allocation
page read and write
1F400212000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
29CE000
stack
page read and write
22E89000
heap
page read and write
5FA000
heap
page read and write
1F3FC3B9000
trusted library allocation
page read and write
1F3FC36C000
trusted library allocation
page read and write
1F3FC2C2000
trusted library allocation
page read and write
408E000
stack
page read and write
1F4011E3000
trusted library allocation
page read and write
1F402865000
trusted library allocation
page read and write
7D03000
heap
page read and write
1F402890000
trusted library allocation
page read and write
1F3FEF1A000
trusted library allocation
page read and write
1F3FC33D000
trusted library allocation
page read and write
1F401DB7000
trusted library allocation
page read and write
21F9C19F000
heap
page read and write
1F401663000
trusted library allocation
page read and write
A33F1D8000
stack
page read and write
1F3FD1F7000
trusted library allocation
page read and write
1F3FCFF5000
trusted library allocation
page read and write
1F4010A9000
trusted library allocation
page read and write
1F4028B8000
trusted library allocation
page read and write
21F9C220000
heap
page read and write
1F3FEF81000
trusted library allocation
page read and write
E50000
heap
page read and write
A3461EA000
stack
page read and write
1F3FFB10000
trusted library section
page readonly
1F4002EB000
trusted library allocation
page read and write
1F3FF062000
trusted library allocation
page read and write
1F3FCFBF000
trusted library allocation
page read and write
F0B000
unkown
page execute and read and write
20BC83C3000
heap
page read and write
2C17000
heap
page read and write
1F3FB390000
trusted library section
page read and write
10BBE323000
trusted library allocation
page execute read
1F3FEE40000
trusted library allocation
page read and write
1F3FEF66000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
1F40966F000
trusted library allocation
page read and write
1F3FD80A000
trusted library allocation
page read and write
EE5000
heap
page read and write
1F4028A5000
trusted library allocation
page read and write
1F401E6F000
trusted library allocation
page read and write
36DF000
stack
page read and write
4B80000
direct allocation
page execute and read and write
331F000
stack
page read and write
1F3FFCA3000
trusted library allocation
page read and write
A3480AB000
stack
page read and write
1F401DBD000
trusted library allocation
page read and write
21F9C1A0000
heap
page read and write
1F3FB291000
trusted library allocation
page read and write
1F401E31000
trusted library allocation
page read and write
4880000
heap
page read and write
198000
stack
page read and write
1F3FC55C000
heap
page read and write
1F3FF791000
trusted library allocation
page read and write
1F3FB330000
trusted library section
page read and write
9B000
stack
page read and write
1F401800000
trusted library allocation
page read and write
230D6000
heap
page read and write
1F3FF475000
trusted library allocation
page read and write
1F3FFE00000
trusted library allocation
page read and write
1F4034DC000
trusted library allocation
page read and write
1F401DB1000
trusted library allocation
page read and write
1F4017AC000
trusted library allocation
page read and write
5E7E000
stack
page read and write
4560000
heap
page read and write
1F407735000
trusted library allocation
page read and write
1F40299C000
trusted library allocation
page read and write
22CE000
stack
page read and write
1F400407000
trusted library allocation
page read and write
E5B000
stack
page read and write
22EC1000
heap
page read and write
27668FAA000
heap
page read and write
22EFF000
heap
page read and write
EC2000
heap
page read and write
1F3FC516000
heap
page read and write
1F402857000
trusted library allocation
page read and write
1F3FF4C0000
trusted library allocation
page read and write
22EC1000
heap
page read and write
55E0000
direct allocation
page execute and read and write
21F9C220000
heap
page read and write
1F4017AE000
trusted library allocation
page read and write
1F3FEE7F000
trusted library allocation
page read and write
1F407700000
trusted library allocation
page read and write
1F4018FE000
trusted library allocation
page read and write
1F3FFC61000
trusted library allocation
page read and write
1F3FF7A8000
trusted library allocation
page read and write
4861000
heap
page read and write
1F401064000
trusted library allocation
page read and write
1F3FF642000
unclassified section
page read and write
1F400443000
trusted library allocation
page read and write
1F4028D5000
trusted library allocation
page read and write
439E000
stack
page read and write
1F3FC556000
heap
page read and write
1F3FC1F8000
trusted library allocation
page read and write
1F401998000
trusted library allocation
page read and write
1F4010D4000
trusted library allocation
page read and write
1F3FFC67000
trusted library allocation
page read and write
1F3FEE16000
trusted library allocation
page read and write
4591000
heap
page read and write
1F4028CA000
trusted library allocation
page read and write
1F402879000
trusted library allocation
page read and write
20BC8716000
heap
page read and write
1F4095F4000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
40E0000
direct allocation
page read and write
1F3FC536000
heap
page read and write
1F3EF600000
trusted library section
page read and write
52BF000
stack
page read and write
1F3FAB34000
trusted library allocation
page read and write
1F401EC9000
trusted library allocation
page read and write
1F4004E1000
trusted library allocation
page read and write
1F3FC548000
heap
page read and write
EDC000
heap
page read and write
322F000
stack
page read and write
1F4029A3000
trusted library allocation
page read and write
1F40119D000
trusted library allocation
page read and write
1F3FCFF6000
trusted library allocation
page read and write
C60000
direct allocation
page read and write
95A8ABE000
unkown
page readonly
1F3FF475000
trusted library allocation
page read and write
1F40167B000
trusted library allocation
page read and write
21F9C228000
heap
page read and write
4861000
heap
page read and write
1F40166F000
trusted library allocation
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F3FC366000
trusted library allocation
page read and write
1CBE1000
heap
page read and write
1F3FAB98000
trusted library allocation
page read and write
1F4030A4000
trusted library allocation
page read and write
1F3FD1F7000
trusted library allocation
page read and write
230D7000
heap
page read and write
1764000
heap
page read and write
1F3FC55C000
heap
page read and write
1F3FD200000
trusted library allocation
page read and write
1F401074000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
22EFE000
heap
page read and write
1F3FF0E6000
trusted library allocation
page read and write
1F3FF100000
heap
page read and write
1F3FAC0C000
trusted library allocation
page read and write
1F3FCF63000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
A340BFE000
stack
page read and write
4861000
heap
page read and write
1F3FB186000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
1F3FF4F6000
trusted library allocation
page read and write
1F3FF1AA000
heap
page read and write
1F4010C3000
trusted library allocation
page read and write
1F3FEFA3000
trusted library allocation
page read and write
F21000
heap
page read and write
1F4018E9000
trusted library allocation
page read and write
65A000
heap
page read and write
1F3FC53F000
heap
page read and write
1F400EDC000
trusted library allocation
page read and write
1F401668000
trusted library allocation
page read and write
1F3FC556000
heap
page read and write
A3484AE000
stack
page read and write
1F4013F7000
trusted library allocation
page read and write
1F4011E1000
trusted library allocation
page read and write
1F401490000
trusted library allocation
page read and write
1F4018E3000
trusted library allocation
page read and write
1F4013BE000
trusted library allocation
page read and write
1F401EFA000
trusted library allocation
page read and write
1F3FEE72000
trusted library allocation
page read and write
1F402F5E000
trusted library allocation
page read and write
1F40047C000
trusted library allocation
page read and write
1F3FEE40000
trusted library allocation
page read and write
1F4002C8000
trusted library allocation
page read and write
1F3FD1F3000
trusted library allocation
page read and write
1F4002D7000
trusted library allocation
page read and write
1CBE1000
heap
page read and write
1F4019EC000
trusted library allocation
page read and write
33243FF000
stack
page read and write
1F3FF670000
trusted library section
page readonly
994000
heap
page read and write
1F4019CF000
trusted library allocation
page read and write
1F3FF9FB000
trusted library allocation
page read and write
230C2000
heap
page read and write
1F40167B000
trusted library allocation
page read and write
D1BD9FF000
stack
page read and write
430000
heap
page read and write
1F3FEFD2000
trusted library allocation
page read and write
1F3FC3DF000
trusted library allocation
page read and write
21F9C2A7000
heap
page read and write
1F3FC554000
heap
page read and write
1F401400000
trusted library allocation
page read and write
1F3FF9A7000
trusted library allocation
page read and write
1F3FD1CF000
trusted library allocation
page read and write
21F9C22E000
heap
page read and write
1F3FC560000
heap
page read and write
1F4002C5000
trusted library allocation
page read and write
1F40BF00000
trusted library allocation
page read and write
1F3FB12F000
trusted library allocation
page read and write
4861000
heap
page read and write
26C8000
heap
page read and write
1F401652000
trusted library allocation
page read and write
1F3FC32C000
trusted library allocation
page read and write
994000
heap
page read and write
1F3FC203000
trusted library allocation
page read and write
1F3FF460000
trusted library allocation
page read and write
1F4028DC000
trusted library allocation
page read and write
4861000
heap
page read and write
1F3FC341000
trusted library allocation
page read and write
4591000
heap
page read and write
1F3FC3F3000
trusted library allocation
page read and write
230E0000
heap
page read and write
1F402897000
trusted library allocation
page read and write
1F4028A5000
trusted library allocation
page read and write
1F40288C000
trusted library allocation
page read and write
1F403084000
trusted library allocation
page read and write
1F4012B0000
trusted library allocation
page read and write
1F3FB3D0000
trusted library section
page read and write
1F3FEF61000
trusted library allocation
page read and write
1F401668000
trusted library allocation
page read and write
35DE000
stack
page read and write
3E6F000
stack
page read and write
1F3FC33F000
trusted library allocation
page read and write
22CE0000
heap
page read and write
1F403495000
trusted library allocation
page read and write
3163FFE000
stack
page read and write
1F40118B000
trusted library allocation
page read and write
1F3FC54D000
heap
page read and write
4861000
heap
page read and write
1344000
unkown
page execute and read and write
1F3FF4E6000
trusted library allocation
page read and write
426E000
stack
page read and write
4B5000
heap
page read and write
4591000
heap
page read and write
1F3FF0B7000
trusted library allocation
page read and write
1F3FF9F3000
trusted library allocation
page read and write
95A92BE000
stack
page read and write
2547000
heap
page read and write
1F4002C3000
trusted library allocation
page read and write
21F9BA10000
trusted library allocation
page read and write
1F3FCFBF000
trusted library allocation
page read and write
1F3FEF86000
trusted library allocation
page read and write
1F3FF4AD000
trusted library allocation
page read and write
1F3FD600000
trusted library allocation
page read and write
1F3FEB42000
trusted library allocation
page read and write
1F3FC546000
heap
page read and write
299E000
stack
page read and write
1F402994000
trusted library allocation
page read and write
3FAF000
stack
page read and write
1F3FF48F000
trusted library allocation
page read and write
A349D7E000
stack
page read and write
1F3FF4EE000
trusted library allocation
page read and write
20BC8714000
heap
page read and write
1F3FD1F7000
trusted library allocation
page read and write
4D1000
unkown
page execute and read and write
994000
heap
page read and write
1F3FC310000
trusted library allocation
page read and write
1F3FAC51000
trusted library allocation
page read and write
1F3FB100000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
7F3C000
stack
page read and write
1F3FEE9E000
trusted library allocation
page read and write
1F3FC530000
heap
page read and write
82F1000
heap
page read and write
1F3FF0AF000
trusted library allocation
page read and write
4DEE000
stack
page read and write
There are 4398 hidden memdumps, click here to show them.