IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_dbd9219fa44134c8c4754432cfebc2aed07a462_864df792_1bdc16f2-ca7a-4c88-b010-498574d96344\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\1000003002\5aa32fec17.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\enter[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\7ca32398cd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingBKJEGDGIJE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingIJEGDBGDBF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\CBGCAFII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DAKEBAKFHCFHIEBFBAFBKFCAEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\DGCAAFBFBKFIDGDHJDBKECFBAF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBFBKFBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\EHCGIJDHDGDBGDGCGCFHJKKECG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FBFHDBKJEGHJJJKFIIJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEHJDHCBAEHJJJKKFID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KEBGHCBAEGDHIDGCBAEC
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\KEGIDHJKKJDGCBGCGIJKKECAAE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7ca32398cd.exe_1aed114a8c50f8843b71bcfd65b26aa9da0448_8ef63ed5_3ea33f0f-17d6-4952-9e90-304474d890cf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7ca32398cd.exe_1aed114a8c50f8843b71bcfd65b26aa9da0448_8ef63ed5_933b8ae6-d12c-4d9e-ab56-b8be4e94d0fc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5165.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 08:37:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5231.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5261.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BCE.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 08:37:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DB4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DE3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5A4.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 08:36:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA855.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA885.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_0050b7db-8e21-483e-bc3d-b92cf27b27cd.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_0050b7db-8e21-483e-bc3d-b92cf27b27cd.json.tmp
JSON data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\11863ca3-b1d9-4bf1-9df1-a29effd18c2b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\222d774b-f2df-487e-96a8-7e87dac8f659.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\334054eb-ad0d-4b82-b576-96a279b9f5ad.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\36ac101b-2417-43c4-bb2e-ed4f3a446335.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\83df92b6-4d8c-4459-ba6a-6dab41d5327a.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\88e12a75-d581-4702-8f29-9b21d2bddd42.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9455d1c5-06b7-401d-91ce-1a105e7e6083.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\a642c338-28dc-4833-9259-10d912e00d62.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1eabb982-6ecf-4de8-8275-2244f2236652.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\2a6265ff-481c-4a64-affb-51bbe300e5c4.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\32ff40f5-b53c-41be-9a98-711a012fce6c.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7ad5a6b0-612e-4290-bfb1-43ba263be7a6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7c52b885-f356-4cec-a98a-cca12a4a3478.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9fdb74a5-3bcb-459f-b720-c846b01a9c6a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000005.ldb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\15fde5e5-fd0b-4081-8d6d-3e06d8548e14.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\1a096147-7550-4bd6-b0dd-11c5539febb0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\1f17a082-a1fa-4d86-b4c4-d557be818edc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\513e906b-fd81-4bba-baf9-675388f79a76.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\6ea1cc12-64f0-4b96-a866-1dcb54a5de3b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\7ea6826e-8231-4975-8dcc-9f08a7b2bae8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8e766c8e-eb7a-4ce6-ab2e-a380724a5006.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF47db8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF5cac9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF4de27.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF54d8b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF5b84b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF602d1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\d139ba7e-7a7d-48cf-8389-c01ed0b48136.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\d1cf0f1f-2bf1-427b-853c-d121c83ce36a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\da44c840-2589-46ff-a7b6-334bd04d63a1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4a0a1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4eb95.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF560c5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF5babc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF654c9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF4a370.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF5be27.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF665f0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\1495a2dc-f29d-4230-86e6-57b1975f98bf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\5087d8a7-bbce-4dec-8766-ec2724b708e8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF5f95b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\df46bbef-786b-448c-b193-128eecc87651.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ce1d0e77-95a6-4dfe-83a3-fc80b6b8b04b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\dc12bd32-5078-4aee-a407-95fd1da8f9e0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f12faf5a-43ef-4923-9898-0f6023179f82.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f5fec3d3-9ecd-4c24-ba2d-4c08632dde1a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF44daf.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF44dbe.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4502f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF47684.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4921a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4b89e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4fbe1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF56067.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF5a7a1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF5d8c3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b9c0f26b-c49f-4345-94d3-6061a87dcc32.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c96c4c33-5c57-432d-be28-d9ad48c379fa.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ce8196a8-c810-4331-96dc-75a456bfa2dc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f9faf3e3-470b-4dd6-8523-2a113ffb78a9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\422f614c-1c66-4e02-9848-dc5c7b5186b7.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\5175.tmp\5176.tmp\5177.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\68d73d58-8526-4895-88a0-b17afa6d9219.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\987dc51e-01ae-4457-8596-b92e747ea0d5.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\b0f1e6c9-2651-445f-9f2b-d63470018e57.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_1532278944\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_1532278944\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_1532278944\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_1532278944\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_1532278944\b0f1e6c9-2651-445f-9f2b-d63470018e57.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\422f614c-1c66-4e02-9848-dc5c7b5186b7.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1952_2061651629\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 6884 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 6884 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 6884 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\xulstore.json.tmp
JSON data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 253
ASCII text, with very long lines (3870)
dropped
Chrome Cache Entry: 254
ASCII text, with very long lines (467)
dropped
Chrome Cache Entry: 255
ASCII text, with very long lines (777)
dropped
Chrome Cache Entry: 256
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
dropped
Chrome Cache Entry: 257
ASCII text, with very long lines (1694)
dropped
Chrome Cache Entry: 258
HTML document, ASCII text, with very long lines (687)
dropped
Chrome Cache Entry: 259
ASCII text, with very long lines (770)
dropped
Chrome Cache Entry: 260
ASCII text, with very long lines (777)
dropped
Chrome Cache Entry: 261
ASCII text, with very long lines (22718)
dropped
Chrome Cache Entry: 262
ASCII text, with very long lines (693)
dropped
Chrome Cache Entry: 263
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 264
ASCII text, with very long lines (405)
dropped
Chrome Cache Entry: 265
ASCII text, with very long lines (1192)
dropped
There are 283 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingBKJEGDGIJE.exe"
malicious
C:\Users\user\AppData\RoamingBKJEGDGIJE.exe
"C:\Users\user\AppData\RoamingBKJEGDGIJE.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingIJEGDBGDBF.exe"
malicious
C:\Users\user\AppData\RoamingIJEGDBGDBF.exe
"C:\Users\user\AppData\RoamingIJEGDBGDBF.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\7ca32398cd.exe
"C:\Users\user\AppData\Local\Temp\1000002001\7ca32398cd.exe"
malicious
C:\Users\user\1000003002\5aa32fec17.exe
"C:\Users\user\1000003002\5aa32fec17.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5175.tmp\5176.tmp\5177.bat C:\Users\user\1000003002\5aa32fec17.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1992,i,12986128645903836916,990054772978296775,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://www.youtube.com/account
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2332 --field-trial-handle=2272,i,17408015981924846693,9755921659909947626,262144 /prefetch:3
malicious
C:\Users\user\AppData\Local\Temp\1000002001\7ca32398cd.exe
"C:\Users\user\AppData\Local\Temp\1000002001\7ca32398cd.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7216 --field-trial-handle=2272,i,17408015981924846693,9755921659909947626,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=7368 --field-trial-handle=2272,i,17408015981924846693,9755921659909947626,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7884 --field-trial-handle=2272,i,17408015981924846693,9755921659909947626,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7884 --field-trial-handle=2272,i,17408015981924846693,9755921659909947626,262144 /prefetch:8
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2456
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8012 -s 1056
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1908,i,2461605866906430469,16426006232859990592,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2356 -parentBuildID 20230927232528 -prefsHandle 2256 -prefMapHandle 2248 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54a18292-6da0-4808-9925-4c7144e972d8} 3132 "\\.\pipe\gecko-crash-server-pipe.3132" 169b956bf10 socket
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 1328
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4380 -parentBuildID 20230927232528 -prefsHandle 4008 -prefMapHandle 4124 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4885320-d06e-4770-870c-611d160c432d} 3132 "\\.\pipe\gecko-crash-server-pipe.3132" 169cbbee210 rdd
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://185.215.113.16/stealc/random.exencoded
unknown
malicious
http://85.28.47.31/5499d72b3a3e55be.
unknown
malicious
http://185.215.113.19/238F-46AF-ADB4-6C85480369C7
unknown
malicious
http://185.215.113.19/ows
unknown
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://85.28.47.31silence
malicious
http://185.215.113.19/Vi9leo/index.phpsm
unknown
malicious
http://185.215.113.19/Vi9leo/index.phpEscape
unknown
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.phpsoft
unknown
malicious
http://185.215.113.19/Vi9leo/index.php00003002
unknown
malicious
http://185.215.113.19/Vi9leo/index.php&b~
unknown
malicious
http://185.215.113.19/Vi9leo/index.php(8)
unknown
malicious
http://85.28.47.31/5499d72b3a3e55be.phposition:
unknown
malicious
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://www.youtube.com/accountUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=e
unknown
https://www.youtube.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://85.28.47.31/7w
unknown
https://github.com/mozilla-services/screenshots
unknown
https://youtube.com/
unknown
http://185.215.113.16/cost/random.exe
unknown
https://apis.google.com/js/api.js
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
http://185.215.113.19/00003002
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
https://www.google.com/favicon.ico
142.250.80.36
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://MD8.mozilla.org/1/m
unknown
https://cdn.ep
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://bugzilla.mo
unknown
http://185.215.113.16/mine/enter.exera
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://spocs.getpocket.com/
unknown
https://www.iqiyi.com/
unknown
http://185.215.113.16/stealc/random.exerb
unknown
https://addons.mozilla.org/
unknown
http://185.215.113.16/mine/enter.exeM32
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
unknown
http://185.215.113.16/mine/enter.exe
185.215.113.16
http://a9.com/-/spec/opensearch/1.0/
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://185.215.113.16/cost/random.exeW
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
http://185.215.113.16/stealc/random.exe393d
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://identity.mozilla.com/apps/relay
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
172.217.18.14
https://twitter.com/
unknown
https://vk.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://support.mozilla.org/products/firefox
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://support.mozilla.org/
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
https://play.google.com/log?hasfast=true&authuser=0&format=json
142.250.184.206
http://185.215.113.19/c0f9c30b4baed74c61395d7fac00b58987e8e8fda7df30804042ba5ce902415450#1.
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://www.google.com/complete/search
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://getpocket.com/firefox/new_tab_learn_more/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.reddit.com
unknown
malicious
spocs.getpocket.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
support.mozilla.org
unknown
malicious
firefox.settings.services.mozilla.com
unknown
malicious
push.services.mozilla.com
unknown
malicious
www.youtube.com
unknown
malicious
www.facebook.com
unknown
malicious
detectportal.firefox.com
unknown
malicious
bzib.nelreports.net
unknown
malicious
accounts.youtube.com
unknown
malicious
shavar.services.mozilla.com
unknown
malicious
www.wikipedia.org
unknown
malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
chrome.cloudflare-dns.com
162.159.61.3
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
143.204.215.18
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.142
www3.l.google.com
142.250.184.238
play.google.com
172.217.18.14
reddit.map.fastly.net
151.101.193.140
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
www.google.com
216.58.206.68
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
There are 25 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.19
unknown
Portugal
malicious
23.200.0.42
unknown
United States
13.107.246.40
unknown
United States
172.253.63.84
unknown
United States
142.250.64.99
unknown
United States
192.168.2.6
unknown
unknown
162.159.61.3
chrome.cloudflare-dns.com
United States
23.200.0.9
unknown
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
172.217.16.142
unknown
United States
204.79.197.237
unknown
United States
142.250.80.36
unknown
United States
13.107.21.237
unknown
United States
185.215.113.16
unknown
Portugal
142.250.80.78
unknown
United States
142.251.40.142
unknown
United States
142.251.167.84
unknown
United States
239.255.255.250
unknown
Reserved
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
142.250.72.110
unknown
United States
127.0.0.1
unknown
unknown
143.204.215.18
services.addons.mozilla.org
United States
172.217.18.14
play.google.com
United States
152.195.19.97
unknown
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.184.206
unknown
United States
172.64.41.3
unknown
United States
142.251.179.84
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
142.250.81.225
unknown
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
142.250.80.99
unknown
United States
216.58.206.68
www.google.com
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
142.250.65.227
unknown
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
23.101.168.44
unknown
United States
142.251.35.163
unknown
United States
There are 30 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{f220b6a9-0a39-92b3-d167-d8d5d7244b9f}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
7ca32398cd.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
5aa32fec17.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
ProgramId
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
FileId
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
LowerCaseLongPath
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
LongPathHash
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
Name
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
OriginalFileName
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
Publisher
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
Version
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
BinFileVersion
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
BinaryType
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
ProductName
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
ProductVersion
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
LinkDate
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
BinProductVersion
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
AppxPackageFullName
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
AppxPackageRelativeId
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
Size
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
Language
\REGISTRY\A\{0a94b4fa-6fcc-5739-eed1-49ea06883ff7}\Root\InventoryApplicationFile\7ca32398cd.exe|2f95cf0cc5f4d9b0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\132190
WindowTabManagerFileMappingId
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Width
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Height
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Flags
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|CssToDevPixelScaling
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SearchbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 152 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
821000
unkown
page execute and read and write
malicious
2507000
heap
page read and write
malicious
5120000
direct allocation
page read and write
malicious
2A1000
unkown
page execute and read and write
malicious
61000
unkown
page execute and read and write
malicious
2698000
heap
page read and write
malicious
4F60000
direct allocation
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
4AF0000
direct allocation
page read and write
malicious
5130000
direct allocation
page read and write
malicious
C01000
unkown
page execute and read and write
malicious
4910000
direct allocation
page read and write
malicious
C01000
unkown
page execute and read and write
malicious
25BA000
heap
page read and write
malicious
4880000
direct allocation
page read and write
malicious
618F000
stack
page read and write
13F0000
direct allocation
page read and write
169C6A76000
heap
page read and write
169D375D000
trusted library allocation
page read and write
169D393C000
trusted library allocation
page read and write
169D99BF000
trusted library allocation
page read and write
169C91F1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C9794000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
169C689B000
trusted library allocation
page read and write
169D99B5000
trusted library allocation
page read and write
169CBEEA000
trusted library allocation
page read and write
169CCDD2000
trusted library allocation
page read and write
169CD899000
trusted library allocation
page read and write
4C40000
heap
page read and write
169D9EF5000
trusted library allocation
page read and write
9DC000
heap
page read and write
8A0000
heap
page read and write
169C6757000
trusted library allocation
page read and write
169CBEE7000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
169CDA56000
trusted library allocation
page read and write
820000
heap
page read and write
1A2AB169000
heap
page read and write
BC4000
heap
page read and write
ACB000
heap
page read and write
169CC1F7000
trusted library allocation
page read and write
169CCD2D000
trusted library allocation
page read and write
169CB4EA000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
1A2AB244000
heap
page read and write
38AF000
stack
page read and write
4F10000
direct allocation
page execute and read and write
169C988F000
trusted library allocation
page read and write
11D4000
heap
page read and write
4A20000
direct allocation
page execute and read and write
169C6A69000
heap
page read and write
169C5551000
trusted library allocation
page read and write
169C6A3A000
heap
page read and write
169D9CC9000
trusted library allocation
page read and write
169CD6EA000
trusted library allocation
page read and write
CB000
unkown
page execute and read and write
169D99FB000
trusted library allocation
page read and write
169C6FDB000
trusted library allocation
page read and write
AEF000
heap
page read and write
2ED7A000
heap
page read and write
50E0000
direct allocation
page execute and read and write
169CE4A4000
trusted library allocation
page read and write
4911000
heap
page read and write
169D9FD4000
trusted library allocation
page read and write
BC4000
heap
page read and write
12BB000
heap
page read and write
169CD68A000
trusted library allocation
page read and write
169D37FB000
trusted library allocation
page read and write
169CAAB3000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
F18000
unkown
page execute and write copy
B5223FA000
stack
page read and write
169CC1E1000
trusted library allocation
page read and write
169D5F73000
trusted library allocation
page read and write
169D9B3D000
trusted library allocation
page read and write
169C9894000
trusted library allocation
page read and write
169D9C4D000
trusted library allocation
page read and write
169C6A3A000
heap
page read and write
169C984B000
trusted library allocation
page read and write
640000
direct allocation
page read and write
169D984D000
trusted library allocation
page read and write
169C98E0000
trusted library allocation
page read and write
4090000
direct allocation
page execute and read and write
1154000
heap
page read and write
169CC2ED000
trusted library allocation
page read and write
120E000
heap
page read and write
169D97CD000
trusted library allocation
page read and write
169CD649000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
169CBE21000
trusted library allocation
page read and write
169D9FB4000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CA6E8000
trusted library allocation
page read and write
169D33FD000
trusted library allocation
page read and write
169CC22C000
trusted library allocation
page read and write
2196FF07000
trusted library allocation
page read and write
169CE4ED000
trusted library allocation
page read and write
169D97AA000
trusted library allocation
page read and write
2448000
unkown
page readonly
1256000
heap
page read and write
169C98CF000
trusted library allocation
page read and write
604F000
stack
page read and write
169CC1FA000
trusted library allocation
page read and write
C01000
unkown
page execute and write copy
169C6FF3000
trusted library allocation
page read and write
169CB0DC000
trusted library allocation
page read and write
169D5FC1000
trusted library allocation
page read and write
169D9B8B000
trusted library allocation
page read and write
169D9F8C000
trusted library allocation
page read and write
169CAC47000
trusted library allocation
page read and write
169CC323000
trusted library allocation
page read and write
169D36DC000
trusted library allocation
page read and write
11D4000
heap
page read and write
13F0000
direct allocation
page read and write
169CC1E1000
trusted library allocation
page read and write
169D37BB000
trusted library allocation
page read and write
4AC1000
heap
page read and write
6A30000
heap
page read and write
169D976D000
trusted library allocation
page read and write
169D9CF8000
trusted library allocation
page read and write
3FDF000
stack
page read and write
169D9EE0000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
169CBDA9000
trusted library allocation
page read and write
169C6F20000
trusted library allocation
page read and write
169D376F000
trusted library allocation
page read and write
169C6A2E000
heap
page read and write
640000
direct allocation
page read and write
BC4000
heap
page read and write
22B64000
heap
page read and write
169D3AA5000
trusted library allocation
page read and write
169D9FE7000
trusted library allocation
page read and write
169CAEA3000
trusted library allocation
page read and write
169CE47D000
trusted library allocation
page read and write
4AC2000
heap
page read and write
169D9BD4000
trusted library allocation
page read and write
169D9DFE000
trusted library allocation
page read and write
22B26000
heap
page read and write
169CBDA7000
trusted library allocation
page read and write
169CAA8B000
trusted library allocation
page read and write
169D9BFB000
trusted library allocation
page read and write
169D9EB9000
trusted library allocation
page read and write
169C98A6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CA6F6000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
526F000
stack
page read and write
BC4000
heap
page read and write
169D97ED000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
169CBD3C000
trusted library allocation
page read and write
4911000
heap
page read and write
169CBEDF000
trusted library allocation
page read and write
169D9C25000
trusted library allocation
page read and write
BC4000
heap
page read and write
AC4000
heap
page read and write
169C9767000
trusted library allocation
page read and write
169D9CEA000
trusted library allocation
page read and write
890000
direct allocation
page read and write
AC4000
heap
page read and write
BC4000
heap
page read and write
3BCE000
stack
page read and write
BC5000
heap
page read and write
169CC2E6000
trusted library allocation
page read and write
169D99B9000
trusted library allocation
page read and write
169CA668000
trusted library allocation
page read and write
4CA1000
heap
page read and write
2800000
heap
page read and write
169CC216000
trusted library allocation
page read and write
169C98E4000
trusted library allocation
page read and write
169D97A4000
trusted library allocation
page read and write
B3E000
unkown
page execute and write copy
169CADD2000
trusted library allocation
page read and write
169CBEC6000
trusted library allocation
page read and write
169CC1F7000
trusted library allocation
page read and write
169CB2A7000
trusted library allocation
page read and write
43BF000
stack
page read and write
169D98E2000
trusted library allocation
page read and write
169D3AC9000
trusted library allocation
page read and write
BC4000
heap
page read and write
4AC1000
heap
page read and write
169D98C4000
trusted library allocation
page read and write
169D9C1A000
trusted library allocation
page read and write
169D366A000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CE415000
trusted library allocation
page read and write
1C92E000
stack
page read and write
169CBDA2000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB4F6000
trusted library allocation
page read and write
169CAFB4000
trusted library allocation
page read and write
169CD614000
trusted library allocation
page read and write
16FF000
stack
page read and write
50B0000
direct allocation
page execute and read and write
169CD6B3000
trusted library allocation
page read and write
169CC343000
trusted library allocation
page read and write
169CAF81000
trusted library allocation
page read and write
3C3F000
stack
page read and write
169CD688000
trusted library allocation
page read and write
169D97DD000
trusted library allocation
page read and write
2196FBF9000
heap
page read and write
169D9F14000
trusted library allocation
page read and write
169CE4DC000
trusted library allocation
page read and write
169CAAC3000
trusted library allocation
page read and write
169CAEC6000
trusted library allocation
page read and write
169CD6F2000
trusted library allocation
page read and write
169CE480000
trusted library allocation
page read and write
169C9EE9000
trusted library allocation
page read and write
169C983B000
trusted library allocation
page read and write
169CADE6000
trusted library allocation
page read and write
169D9BD2000
trusted library allocation
page read and write
AC4000
heap
page read and write
169C6F25000
trusted library allocation
page read and write
169C916C000
trusted library allocation
page read and write
169C6F3A000
trusted library allocation
page read and write
169D9CE5000
trusted library allocation
page read and write
1C7CE000
stack
page read and write
4AC1000
heap
page read and write
169D3364000
trusted library allocation
page read and write
169D33C6000
trusted library allocation
page read and write
169D33C7000
trusted library allocation
page read and write
169C9ADA000
trusted library allocation
page read and write
169CBD9B000
trusted library allocation
page read and write
169CC207000
trusted library allocation
page read and write
169CD878000
trusted library allocation
page read and write
169D97D4000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CC282000
trusted library allocation
page read and write
169D3725000
trusted library allocation
page read and write
169D345E000
trusted library allocation
page read and write
169CC1F4000
trusted library allocation
page read and write
608E000
stack
page read and write
169D9EB7000
trusted library allocation
page read and write
650000
heap
page read and write
169D984D000
trusted library allocation
page read and write
169D376D000
trusted library allocation
page read and write
169CC3D9000
trusted library allocation
page read and write
154F000
stack
page read and write
169C985F000
trusted library allocation
page read and write
169CC2E8000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
169D9F8F000
trusted library allocation
page read and write
169D376D000
trusted library allocation
page read and write
169D9894000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9CC9000
trusted library allocation
page read and write
169CCD2D000
trusted library allocation
page read and write
F01000
unkown
page execute and read and write
169D9CE5000
trusted library allocation
page read and write
169CB0E4000
trusted library allocation
page read and write
169D3356000
trusted library allocation
page read and write
A0E000
heap
page read and write
169C6A56000
heap
page read and write
169CA6BD000
trusted library allocation
page read and write
169D98C4000
trusted library allocation
page read and write
169CD6FD000
trusted library allocation
page read and write
29FD4960000
heap
page read and write
169D9DE1000
trusted library allocation
page read and write
169C98EC000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
169CADBE000
trusted library allocation
page read and write
169CB4C6000
trusted library allocation
page read and write
169CD93D000
trusted library allocation
page read and write
169CB4BA000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169D9FE3000
trusted library allocation
page read and write
169D9E63000
trusted library allocation
page read and write
169D9874000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CAAE0000
trusted library allocation
page read and write
6AA0000
heap
page read and write
39FE000
stack
page read and write
BC4000
heap
page read and write
169D3AA0000
trusted library allocation
page read and write
169C9BE7000
trusted library allocation
page read and write
169C98F5000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9CEC000
trusted library allocation
page read and write
169D9F9B000
trusted library allocation
page read and write
169D9CEF000
trusted library allocation
page read and write
169CC3E1000
trusted library allocation
page read and write
108B000
stack
page read and write
169CC316000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D5FC9000
trusted library allocation
page read and write
169D9884000
trusted library allocation
page read and write
169C974A000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
169C6A2D000
heap
page read and write
25DE000
stack
page read and write
279F000
stack
page read and write
1C67F000
stack
page read and write
25A0000
heap
page execute and read and write
169CBEF2000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
169D9FBF000
trusted library allocation
page read and write
169CA3F6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CD636000
trusted library allocation
page read and write
169C55EE000
trusted library allocation
page read and write
169CBCF4000
trusted library allocation
page read and write
169D34CE000
trusted library allocation
page read and write
1345000
heap
page read and write
BC4000
heap
page read and write
169D9D77000
trusted library allocation
page read and write
169D98A3000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
169D96FA000
trusted library allocation
page read and write
169D9849000
trusted library allocation
page read and write
169D36DC000
trusted library allocation
page read and write
169D9818000
trusted library allocation
page read and write
169D9C2A000
trusted library allocation
page read and write
2F8E000
stack
page read and write
13DE000
stack
page read and write
169CC1F7000
trusted library allocation
page read and write
169C5576000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C9BC3000
trusted library allocation
page read and write
169CBD86000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
169CB12F000
trusted library allocation
page read and write
169D9FC3000
trusted library allocation
page read and write
169CDA20000
trusted library allocation
page read and write
169CAEE7000
trusted library allocation
page read and write
169C9BC5000
trusted library allocation
page read and write
169CBB58000
trusted library allocation
page read and write
11D4000
heap
page read and write
358F000
stack
page read and write
BC4000
heap
page read and write
5340000
direct allocation
page execute and read and write
43D0000
direct allocation
page read and write
1CA3E000
stack
page read and write
4AC1000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
4C70000
direct allocation
page read and write
120A000
heap
page read and write
169C974B000
trusted library allocation
page read and write
169D34B6000
trusted library allocation
page read and write
AB5000
heap
page read and write
169D98F0000
trusted library allocation
page read and write
169C9749000
trusted library allocation
page read and write
1320000
heap
page read and write
BC4000
heap
page read and write
169C9BA9000
trusted library allocation
page read and write
169CCD5B000
trusted library allocation
page read and write
169CE489000
trusted library allocation
page read and write
169D1B86000
trusted library allocation
page read and write
169CC37D000
trusted library allocation
page read and write
169C9817000
trusted library allocation
page read and write
169D9CFA000
trusted library allocation
page read and write
169C6A35000
heap
page read and write
1A2AB17D000
heap
page read and write
169CBCC1000
trusted library allocation
page read and write
763000
unkown
page execute and write copy
42AF000
stack
page read and write
11D4000
heap
page read and write
169D9DAB000
trusted library allocation
page read and write
169CCDED000
trusted library allocation
page read and write
169CAB07000
trusted library allocation
page read and write
411F000
stack
page read and write
169CC1CA000
trusted library allocation
page read and write
43EF000
stack
page read and write
169C567D000
trusted library allocation
page read and write
DF1000
unkown
page execute and read and write
11C0000
direct allocation
page read and write
169D9E6B000
trusted library allocation
page read and write
169CD6BA000
trusted library allocation
page read and write
169C9AB3000
trusted library allocation
page read and write
169C9B67000
trusted library allocation
page read and write
1154000
heap
page read and write
308F000
stack
page read and write
169C674C000
trusted library allocation
page read and write
1154000
heap
page read and write
5330000
direct allocation
page execute and read and write
169D9B5C000
trusted library allocation
page read and write
169CBD9B000
trusted library allocation
page read and write
169CD68A000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169D98A7000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CE419000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169CA6E8000
trusted library allocation
page read and write
169D9971000
trusted library allocation
page read and write
169D9952000
trusted library allocation
page read and write
1154000
heap
page read and write
169D97EA000
trusted library allocation
page read and write
169D9769000
trusted library allocation
page read and write
169CB373000
trusted library allocation
page read and write
169C91E8000
trusted library allocation
page read and write
169CB24D000
trusted library allocation
page read and write
722000
heap
page read and write
169D37EA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CDA2D000
trusted library allocation
page read and write
24DE000
heap
page read and write
43D0000
direct allocation
page read and write
169D377F000
trusted library allocation
page read and write
169D375D000
trusted library allocation
page read and write
169D9D3A000
trusted library allocation
page read and write
169D9ECD000
trusted library allocation
page read and write
169D370F000
trusted library allocation
page read and write
169D9CFB000
trusted library allocation
page read and write
169C6A3D000
heap
page read and write
169D9FE1000
trusted library allocation
page read and write
169D9CF8000
trusted library allocation
page read and write
287E000
stack
page read and write
169CAF7A000
trusted library allocation
page read and write
169CBDA9000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CD683000
trusted library allocation
page read and write
169CBEE1000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
1A2AB18A000
heap
page read and write
4AC2000
heap
page read and write
BC4000
heap
page read and write
169CD866000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
67BE000
heap
page read and write
169D9978000
trusted library allocation
page read and write
169D99EB000
trusted library allocation
page read and write
169D97F2000
trusted library allocation
page read and write
169CA695000
trusted library allocation
page read and write
192000
stack
page read and write
169C9A67000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D97CF000
trusted library allocation
page read and write
169D3675000
trusted library allocation
page read and write
169D37EE000
trusted library allocation
page read and write
169CBE5C000
trusted library allocation
page read and write
169C6F30000
trusted library allocation
page read and write
169C6A69000
heap
page read and write
169C9818000
trusted library allocation
page read and write
2FFE000
stack
page read and write
29FD482A000
heap
page read and write
169D9B99000
trusted library allocation
page read and write
169C986F000
trusted library allocation
page read and write
169CAAC3000
trusted library allocation
page read and write
169D3AC8000
trusted library allocation
page read and write
169C5666000
trusted library allocation
page read and write
169CBF00000
trusted library allocation
page read and write
169CAAC2000
trusted library allocation
page read and write
169CACE8000
trusted library allocation
page read and write
169CBF00000
trusted library allocation
page read and write
BC4000
heap
page read and write
2460000
heap
page read and write
169CCD71000
trusted library allocation
page read and write
1A2AB267000
heap
page read and write
169D9FEB000
trusted library allocation
page read and write
4AC1000
heap
page read and write
AC4000
heap
page read and write
52A0000
direct allocation
page execute and read and write
AC4000
heap
page read and write
169C97F5000
trusted library allocation
page read and write
169D9D3A000
trusted library allocation
page read and write
253C000
heap
page read and write
11D4000
heap
page read and write
BC5000
heap
page read and write
41AE000
stack
page read and write
4C70000
direct allocation
page read and write
169C9B59000
trusted library allocation
page read and write
169C98EF000
trusted library allocation
page read and write
68CF000
stack
page read and write
169CAEBC000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
1154000
heap
page read and write
169CC1C6000
trusted library allocation
page read and write
BC4000
heap
page read and write
4F10000
direct allocation
page execute and read and write
BC4000
heap
page read and write
169D9894000
trusted library allocation
page read and write
169CD6E6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C6A46000
heap
page read and write
169C6A72000
heap
page read and write
169D9FEA000
trusted library allocation
page read and write
169CADC6000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D99E5000
trusted library allocation
page read and write
169CBCB5000
trusted library allocation
page read and write
169CBEEA000
trusted library allocation
page read and write
1A2AB1FC000
heap
page read and write
27E0000
direct allocation
page read and write
4A00000
direct allocation
page execute and read and write
138E000
stack
page read and write
BC4000
heap
page read and write
169D9FEB000
trusted library allocation
page read and write
494E000
stack
page read and write
169CC2A6000
trusted library allocation
page read and write
169D97E0000
trusted library allocation
page read and write
169CADE8000
trusted library allocation
page read and write
169C6A35000
heap
page read and write
169C67AA000
trusted library allocation
page read and write
11D4000
heap
page read and write
2E8E000
stack
page read and write
476F000
stack
page read and write
BC4000
heap
page read and write
169D3356000
trusted library allocation
page read and write
169CC286000
trusted library allocation
page read and write
169C6A85000
heap
page read and write
169CB078000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
BC4000
heap
page read and write
28B80000
heap
page read and write
169D9776000
trusted library allocation
page read and write
BC4000
heap
page read and write
46A000
unkown
page execute and read and write
169CE4F4000
trusted library allocation
page read and write
169D3716000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9B99000
trusted library allocation
page read and write
169C6A6A000
heap
page read and write
169D37EE000
trusted library allocation
page read and write
169CC37D000
trusted library allocation
page read and write
169CB8F2000
trusted library allocation
page read and write
169D9FD4000
trusted library allocation
page read and write
22B35000
heap
page read and write
169D3745000
trusted library allocation
page read and write
169CC1F7000
trusted library allocation
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
169CC19F000
trusted library allocation
page read and write
169CB49B000
trusted library allocation
page read and write
169C9869000
trusted library allocation
page read and write
453E000
stack
page read and write
169CE48E000
trusted library allocation
page read and write
169D5FD9000
trusted library allocation
page read and write
169D9DFE000
trusted library allocation
page read and write
169C6A35000
heap
page read and write
169C9746000
trusted library allocation
page read and write
169D9EE6000
trusted library allocation
page read and write
169CC1CA000
trusted library allocation
page read and write
169D36CD000
trusted library allocation
page read and write
169D3628000
trusted library allocation
page read and write
169D1BBF000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
22B1B000
heap
page read and write
169C9EB5000
trusted library allocation
page read and write
169D39D8000
trusted library allocation
page read and write
169C9BBF000
trusted library allocation
page read and write
169D36DF000
trusted library allocation
page read and write
169C5523000
trusted library allocation
page read and write
169CC22C000
trusted library allocation
page read and write
169CE4BD000
trusted library allocation
page read and write
169CB4CC000
trusted library allocation
page read and write
169C67F7000
trusted library allocation
page read and write
169D9932000
trusted library allocation
page read and write
169CB081000
trusted library allocation
page read and write
169CE4C6000
trusted library allocation
page read and write
4CC0000
direct allocation
page execute and read and write
169CE4FD000
trusted library allocation
page read and write
169C6A46000
heap
page read and write
94E000
stack
page read and write
169CD653000
trusted library allocation
page read and write
BC4000
heap
page read and write
2FBF000
stack
page read and write
169CDA30000
trusted library allocation
page read and write
309000
unkown
page write copy
169C6A3A000
heap
page read and write
169D9CFA000
trusted library allocation
page read and write
169CD9BA000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
4911000
heap
page read and write
169CBD68000
trusted library allocation
page read and write
11D5000
heap
page read and write
169CBE51000
trusted library allocation
page read and write
169CACD6000
trusted library allocation
page read and write
169CD659000
trusted library allocation
page read and write
169C9747000
trusted library allocation
page read and write
169C9767000
trusted library allocation
page read and write
38BE000
stack
page read and write
169C6A89000
heap
page read and write
22B1B000
heap
page read and write
169CBD28000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CC3B1000
trusted library allocation
page read and write
169CBEE6000
trusted library allocation
page read and write
C69000
unkown
page write copy
7C8B000
stack
page read and write
169CAAB9000
trusted library allocation
page read and write
169CAFFE000
trusted library allocation
page read and write
169C6FC7000
trusted library allocation
page read and write
4A3E000
stack
page read and write
169D9EF0000
trusted library allocation
page read and write
4C2F000
stack
page read and write
3DBE000
stack
page read and write
1CAA0000
heap
page read and write
169D9FFA000
trusted library allocation
page read and write
290F000
stack
page read and write
A5F000
heap
page read and write
361000
unkown
page execute and read and write
169CD992000
trusted library allocation
page read and write
11D4000
heap
page read and write
4911000
heap
page read and write
BC4000
heap
page read and write
169D377F000
trusted library allocation
page read and write
169CADCA000
trusted library allocation
page read and write
169D9F9D000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C9AFE000
trusted library allocation
page read and write
169CB0D4000
trusted library allocation
page read and write
169D99EE000
trusted library allocation
page read and write
169CD69A000
trusted library allocation
page read and write
169C6A31000
heap
page read and write
1A2AB244000
heap
page read and write
3D5F000
stack
page read and write
1A2AB1E0000
heap
page read and write
169CC1EA000
trusted library allocation
page read and write
169D9FBF000
trusted library allocation
page read and write
169D37D2000
trusted library allocation
page read and write
1154000
heap
page read and write
169C986F000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D98E3000
trusted library allocation
page read and write
169CBD7F000
trusted library allocation
page read and write
169D9BB8000
trusted library allocation
page read and write
169CC3D4000
trusted library allocation
page read and write
169C98EC000
trusted library allocation
page read and write
169C9841000
trusted library allocation
page read and write
52F0000
direct allocation
page execute and read and write
169D169C000
trusted library allocation
page read and write
22B30000
heap
page read and write
169D7F40000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D166F000
trusted library allocation
page read and write
169CC33C000
trusted library allocation
page read and write
61DC000
stack
page read and write
169C6A2F000
heap
page read and write
169C98A6000
trusted library allocation
page read and write
11D4000
heap
page read and write
1A2AB14D000
heap
page read and write
169CAF69000
trusted library allocation
page read and write
169D992C000
trusted library allocation
page read and write
34BF000
stack
page read and write
169CB09D000
trusted library allocation
page read and write
169C9196000
trusted library allocation
page read and write
25CA000
heap
page read and write
169C5697000
trusted library allocation
page read and write
169CB4E1000
trusted library allocation
page read and write
169D98E3000
trusted library allocation
page read and write
169CE43B000
trusted library allocation
page read and write
169CBEA3000
trusted library allocation
page read and write
1A2AB1AA000
heap
page read and write
429E000
stack
page read and write
169D9E95000
trusted library allocation
page read and write
169CB045000
trusted library allocation
page read and write
4911000
heap
page read and write
169D3ABD000
trusted library allocation
page read and write
41DE000
stack
page read and write
169C9871000
trusted library allocation
page read and write
890000
direct allocation
page read and write
169CD87C000
trusted library allocation
page read and write
169D1BBF000
trusted library allocation
page read and write
BC5000
heap
page read and write
169C6A56000
heap
page read and write
169CAFCA000
trusted library allocation
page read and write
169D983F000
trusted library allocation
page read and write
169CB0F4000
trusted library allocation
page read and write
169D9E63000
trusted library allocation
page read and write
169C9A93000
trusted library allocation
page read and write
169C98AE000
trusted library allocation
page read and write
169CC1E1000
trusted library allocation
page read and write
169D3AC8000
trusted library allocation
page read and write
169C9842000
trusted library allocation
page read and write
546000
heap
page read and write
11D4000
heap
page read and write
4911000
heap
page read and write
169D33FD000
trusted library allocation
page read and write
1A2AB1B8000
heap
page read and write
169C6A3B000
heap
page read and write
169D9F9B000
trusted library allocation
page read and write
169D9B53000
trusted library allocation
page read and write
22B29000
heap
page read and write
169C986F000
trusted library allocation
page read and write
169D3630000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
169C9ADA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC28E000
trusted library allocation
page read and write
169C973B000
trusted library allocation
page read and write
169CE4BD000
trusted library allocation
page read and write
169C6A48000
heap
page read and write
3D7F000
stack
page read and write
169D34F8000
trusted library allocation
page read and write
169CC1E2000
trusted library allocation
page read and write
169CE49C000
trusted library allocation
page read and write
169CB07F000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
169C66DE000
trusted library allocation
page read and write
169CC2ED000
trusted library allocation
page read and write
169D1B9F000
trusted library allocation
page read and write
169C9707000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C4B90000
trusted library allocation
page read and write
169D9F9B000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
F18000
unkown
page execute and write copy
169CC1FA000
trusted library allocation
page read and write
C2000
unkown
page execute and read and write
55E000
stack
page read and write
BC4000
heap
page read and write
169C98F5000
trusted library allocation
page read and write
169CD696000
trusted library allocation
page read and write
B5223FF000
stack
page read and write
169C6A2F000
heap
page read and write
169D1BCA000
trusted library allocation
page read and write
22B4A000
heap
page read and write
169CB4BE000
trusted library allocation
page read and write
169CAB13000
trusted library allocation
page read and write
169CA60E000
trusted library allocation
page read and write
169D9878000
trusted library allocation
page read and write
169D9CF7000
trusted library allocation
page read and write
169D378D000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D985D000
trusted library allocation
page read and write
169CD625000
trusted library allocation
page read and write
169C674C000
trusted library allocation
page read and write
2ED60000
heap
page read and write
416C000
heap
page read and write
169D3A25000
trusted library allocation
page read and write
169CA6EE000
trusted library allocation
page read and write
4C81000
heap
page read and write
52C0000
direct allocation
page execute and read and write
169C9767000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169D9F20000
trusted library allocation
page read and write
22B46000
heap
page read and write
169D9ED6000
trusted library allocation
page read and write
169CBCB7000
trusted library allocation
page read and write
169C6A48000
heap
page read and write
169CA6F8000
trusted library allocation
page read and write
5A7000
unkown
page execute and read and write
169D9FE1000
trusted library allocation
page read and write
169D3332000
trusted library allocation
page read and write
169C6A3D000
heap
page read and write
169D3326000
trusted library allocation
page read and write
3A8F000
stack
page read and write
22B46000
heap
page read and write
169C9BCF000
trusted library allocation
page read and write
1154000
heap
page read and write
169D9FCB000
trusted library allocation
page read and write
169D370A000
trusted library allocation
page read and write
169D3630000
trusted library allocation
page read and write
169C6A3A000
heap
page read and write
6FD000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
6BD4000
heap
page read and write
169D9961000
trusted library allocation
page read and write
11D4000
heap
page read and write
2D7E000
stack
page read and write
169CB132000
trusted library allocation
page read and write
169D97B8000
trusted library allocation
page read and write
169CE4BC000
trusted library allocation
page read and write
169CB2C0000
trusted library allocation
page read and write
169CC33C000
trusted library allocation
page read and write
169CBDB3000
trusted library allocation
page read and write
169D9CC8000
trusted library allocation
page read and write
1C7BE000
stack
page read and write
169D39DC000
trusted library allocation
page read and write
31CF000
stack
page read and write
4AC2000
heap
page read and write
40C0000
direct allocation
page read and write
5BE000
unkown
page execute and read and write
169CAAFE000
trusted library allocation
page read and write
169CC063000
trusted library allocation
page read and write
4911000
heap
page read and write
169CBF09000
trusted library allocation
page read and write
169CD649000
trusted library allocation
page read and write
169CB8F0000
trusted library allocation
page read and write
BC5000
heap
page read and write
169D33C7000
trusted library allocation
page read and write
169CB07A000
trusted library allocation
page read and write
169C976F000
trusted library allocation
page read and write
169D9B71000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
399F000
stack
page read and write
169C68B5000
trusted library allocation
page read and write
169CA6D3000
trusted library allocation
page read and write
169CAA43000
trusted library allocation
page read and write
169CAAE0000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
169CB0ED000
trusted library allocation
page read and write
169D1A86000
trusted library allocation
page read and write
169D99FC000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9FEA000
trusted library allocation
page read and write
AE0000
heap
page read and write
169CD81D000
trusted library allocation
page read and write
1A2AB1F1000
heap
page read and write
1154000
heap
page read and write
1154000
heap
page read and write
169C9BD9000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
E9E000
stack
page read and write
169D9952000
trusted library allocation
page read and write
169D34FC000
trusted library allocation
page read and write
169CB4EE000
trusted library allocation
page read and write
169CB3F6000
trusted library allocation
page read and write
169CB3DE000
trusted library allocation
page read and write
169C6F33000
trusted library allocation
page read and write
169CAEB7000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
11D5000
heap
page read and write
11D4000
heap
page read and write
169CC3F1000
trusted library allocation
page read and write
169C98D1000
trusted library allocation
page read and write
169C9A76000
trusted library allocation
page read and write
169CAEB2000
trusted library allocation
page read and write
169D9FC5000
trusted library allocation
page read and write
2EBF000
stack
page read and write
169D96CD000
trusted library allocation
page read and write
169D9B53000
trusted library allocation
page read and write
169CBDD7000
trusted library allocation
page read and write
169C677B000
trusted library allocation
page read and write
169CAFB4000
trusted library allocation
page read and write
169CBEA6000
trusted library allocation
page read and write
169D9EA2000
trusted library allocation
page read and write
169CB043000
trusted library allocation
page read and write
169C672B000
trusted library allocation
page read and write
169CBEE2000
trusted library allocation
page read and write
169CB8EA000
trusted library allocation
page read and write
169C6A48000
heap
page read and write
169CBEEA000
trusted library allocation
page read and write
169C6A37000
heap
page read and write
25F2000
heap
page read and write
169C6FFD000
trusted library allocation
page read and write
169D9DEE000
trusted library allocation
page read and write
47BE000
stack
page read and write
169C6A2F000
heap
page read and write
169CAE5F000
trusted library allocation
page read and write
2196FE00000
trusted library allocation
page read and write
169CAEE4000
trusted library allocation
page read and write
169D9C82000
trusted library allocation
page read and write
169CB3CE000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C98DA000
trusted library allocation
page read and write
169D9D7B000
trusted library allocation
page read and write
169CCDDB000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
169D173C000
trusted library allocation
page read and write
169D9D71000
trusted library allocation
page read and write
5BE000
unkown
page execute and write copy
4911000
heap
page read and write
BC4000
heap
page read and write
169D9E74000
trusted library allocation
page read and write
169D9FEA000
trusted library allocation
page read and write
169D9B41000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
169CB4B1000
trusted library allocation
page read and write
169CDA28000
trusted library allocation
page read and write
169D99BF000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
169D1AD8000
trusted library allocation
page read and write
890000
direct allocation
page read and write
169D977A000
trusted library allocation
page read and write
169D9E95000
trusted library allocation
page read and write
169C6A56000
heap
page read and write
169C6763000
trusted library allocation
page read and write
169CAA9B000
trusted library allocation
page read and write
24ED000
heap
page execute and read and write
169D9BE1000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
169D9CF4000
trusted library allocation
page read and write
169D9FAB000
trusted library allocation
page read and write
169CC1C6000
trusted library allocation
page read and write
1C93E000
stack
page read and write
169D9FCB000
trusted library allocation
page read and write
169D36CD000
trusted library allocation
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
1CAA1000
heap
page read and write
169CC3E1000
trusted library allocation
page read and write
169CC3D9000
trusted library allocation
page read and write
820000
unkown
page read and write
169D98BC000
trusted library allocation
page read and write
169CCDED000
trusted library allocation
page read and write
169D9B9A000
trusted library allocation
page read and write
169C566D000
trusted library allocation
page read and write
169CD6B1000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
6F3B000
stack
page read and write
BC4000
heap
page read and write
169D98F6000
trusted library allocation
page read and write
169D9894000
trusted library allocation
page read and write
29FD481A000
heap
page read and write
169CCDA2000
trusted library allocation
page read and write
417000
unkown
page write copy
2A0000
unkown
page readonly
50E0000
direct allocation
page execute and read and write
11D4000
heap
page read and write
169C6A48000
heap
page read and write
1251000
heap
page read and write
169D99B3000
trusted library allocation
page read and write
51B000
unkown
page execute and write copy
169D9E94000
trusted library allocation
page read and write
AA0000
heap
page read and write
169CE47F000
trusted library allocation
page read and write
169C6854000
trusted library allocation
page read and write
169CD81B000
trusted library allocation
page read and write
4911000
heap
page read and write
1A2AB221000
heap
page read and write
401000
unkown
page execute read
169D97F7000
trusted library allocation
page read and write
169CCD4A000
trusted library allocation
page read and write
4F1000
unkown
page execute and read and write
169D9CEA000
trusted library allocation
page read and write
169D9FEA000
trusted library allocation
page read and write
169C55EC000
trusted library allocation
page read and write
BBC000
stack
page read and write
169D7F00000
trusted library allocation
page read and write
169CD6B9000
trusted library allocation
page read and write
169CC235000
trusted library allocation
page read and write
169CA6E8000
trusted library allocation
page read and write
169CC3C1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CBD36000
trusted library allocation
page read and write
169C6A87000
heap
page read and write
169CB4C9000
trusted library allocation
page read and write
169C552F000
trusted library allocation
page read and write
22B53000
heap
page read and write
169D97F7000
trusted library allocation
page read and write
169C9A65000
trusted library allocation
page read and write
169CD653000
trusted library allocation
page read and write
169C68F6000
trusted library allocation
page read and write
169CA6C9000
trusted library allocation
page read and write
169D3638000
trusted library allocation
page read and write
169D3707000
trusted library allocation
page read and write
169D361A000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D169E000
trusted library allocation
page read and write
F0A000
unkown
page execute and read and write
169CC316000
trusted library allocation
page read and write
169C6F9E000
trusted library allocation
page read and write
169CC1E1000
trusted library allocation
page read and write
169D981B000
trusted library allocation
page read and write
169CC277000
trusted library allocation
page read and write
7ECF000
stack
page read and write
169D96EA000
trusted library allocation
page read and write
169CD9C7000
trusted library allocation
page read and write
169C9A50000
trusted library allocation
page read and write
169D9FE1000
trusted library allocation
page read and write
169D9D82000
trusted library allocation
page read and write
169CAAAB000
trusted library allocation
page read and write
169CB097000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CB0AE000
trusted library allocation
page read and write
4AC1000
heap
page read and write
1F0000
heap
page read and write
11D4000
heap
page read and write
890000
direct allocation
page read and write
6A9E000
heap
page read and write
169D9B68000
trusted library allocation
page read and write
169D5F53000
trusted library allocation
page read and write
34BF000
stack
page read and write
4AC2000
heap
page read and write
4AC1000
heap
page read and write
169D96FD000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
169CA3F9000
trusted library allocation
page read and write
169D976F000
trusted library allocation
page read and write
169CBEA2000
trusted library allocation
page read and write
169D9EE5000
trusted library allocation
page read and write
990000
direct allocation
page read and write
35FF000
stack
page read and write
169D9EF1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C6A40000
heap
page read and write
BC4000
heap
page read and write
169D9FFA000
trusted library allocation
page read and write
29FD481E000
heap
page read and write
169CBBA5000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CB8FA000
trusted library allocation
page read and write
169CD9B2000
trusted library allocation
page read and write
169CD637000
trusted library allocation
page read and write
AC4000
heap
page read and write
13F0000
direct allocation
page read and write
169CC2E8000
trusted library allocation
page read and write
169D5FD1000
trusted library allocation
page read and write
B2F000
unkown
page execute and read and write
169C6FD1000
trusted library allocation
page read and write
169D373C000
trusted library allocation
page read and write
2EBE000
stack
page read and write
4AC1000
heap
page read and write
2564000
heap
page read and write
41BE000
stack
page read and write
1200000
heap
page read and write
169D9FCB000
trusted library allocation
page read and write
169CC3CD000
trusted library allocation
page read and write
169D9898000
trusted library allocation
page read and write
169D96A8000
trusted library allocation
page read and write
169CAEC9000
trusted library allocation
page read and write
169CBEE2000
trusted library allocation
page read and write
169C6FFD000
trusted library allocation
page read and write
169D3982000
trusted library allocation
page read and write
169D9F8B000
trusted library allocation
page read and write
500000
unkown
page execute and read and write
169D366A000
trusted library allocation
page read and write
169D9E07000
trusted library allocation
page read and write
169CC31C000
trusted library allocation
page read and write
169D97FE000
trusted library allocation
page read and write
169D9FDF000
trusted library allocation
page read and write
BC4000
heap
page read and write
43E1000
heap
page read and write
169CAF2A000
trusted library allocation
page read and write
11D4000
heap
page read and write
425F000
stack
page read and write
169C6A85000
heap
page read and write
169D3672000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
169C9B5D000
trusted library allocation
page read and write
169C9BC2000
trusted library allocation
page read and write
640000
direct allocation
page read and write
2555000
heap
page read and write
169CC286000
trusted library allocation
page read and write
169C6A3A000
heap
page read and write
22B2B000
heap
page read and write
169CC1E9000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169CDC02000
trusted library allocation
page read and write
169C9794000
trusted library allocation
page read and write
1A2AB1E0000
heap
page read and write
169D3765000
trusted library allocation
page read and write
169D9B95000
trusted library allocation
page read and write
2541000
heap
page read and write
427F000
stack
page read and write
4911000
heap
page read and write
169CB4D4000
trusted library allocation
page read and write
640000
direct allocation
page read and write
169CC357000
trusted library allocation
page read and write
3ADF000
stack
page read and write
4AC1000
heap
page read and write
169CDE00000
trusted library allocation
page read and write
BC4000
heap
page read and write
90E000
stack
page read and write
169CAAEA000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
11D4000
heap
page read and write
8C4000
heap
page read and write
169C68A0000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
169C98DA000
trusted library allocation
page read and write
169CD8FE000
trusted library allocation
page read and write
169D361A000
trusted library allocation
page read and write
169D9F81000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
1CA2F000
stack
page read and write
169C9AB0000
trusted library allocation
page read and write
169D98A3000
trusted library allocation
page read and write
169CBEEA000
trusted library allocation
page read and write
169D3AF5000
trusted library allocation
page read and write
BC4000
heap
page read and write
11E0000
direct allocation
page read and write
169CBDC1000
trusted library allocation
page read and write
169D375D000
trusted library allocation
page read and write
169C6A8F000
heap
page read and write
169C6A76000
heap
page read and write
169C6A34000
heap
page read and write
169D9E68000
trusted library allocation
page read and write
169CB0E5000
trusted library allocation
page read and write
169C6A46000
heap
page read and write
4A90000
direct allocation
page execute and read and write
678F000
stack
page read and write
169CE49E000
trusted library allocation
page read and write
2460000
heap
page read and write
169C6A3B000
heap
page read and write
169CC34E000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
29FD4829000
heap
page read and write
1A2AB258000
heap
page read and write
4911000
heap
page read and write
BC4000
heap
page read and write
169CC1E1000
trusted library allocation
page read and write
169C9BFE000
trusted library allocation
page read and write
169CD66C000
trusted library allocation
page read and write
169D9FF8000
trusted library allocation
page read and write
169D9DE6000
trusted library allocation
page read and write
169C55E1000
trusted library allocation
page read and write
169D9D9F000
trusted library allocation
page read and write
169D7F83000
trusted library allocation
page read and write
169D9F95000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
169C6A36000
heap
page read and write
BC4000
heap
page read and write
169C55F6000
trusted library allocation
page read and write
169D9962000
trusted library allocation
page read and write
169D9804000
trusted library allocation
page read and write
169CB132000
trusted library allocation
page read and write
4CA1000
heap
page read and write
169C6F35000
trusted library allocation
page read and write
169CAF85000
trusted library allocation
page read and write
169CBEDF000
trusted library allocation
page read and write
169D3AC8000
trusted library allocation
page read and write
169D3782000
trusted library allocation
page read and write
169C6A40000
heap
page read and write
BC5000
heap
page read and write
169D973E000
trusted library allocation
page read and write
169CB000000
trusted library allocation
page read and write
169C98AE000
trusted library allocation
page read and write
169CBEF2000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CD944000
trusted library allocation
page read and write
33BE000
stack
page read and write
169D9EF1000
trusted library allocation
page read and write
C00000
unkown
page readonly
415E000
stack
page read and write
4AC2000
heap
page read and write
169D37DA000
trusted library allocation
page read and write
169CAD1F000
trusted library allocation
page read and write
4911000
heap
page read and write
BC4000
heap
page read and write
169C68A0000
trusted library allocation
page read and write
169D97FE000
trusted library allocation
page read and write
169C9A93000
trusted library allocation
page read and write
169CBDCE000
trusted library allocation
page read and write
4911000
heap
page read and write
379000
unkown
page execute and write copy
4911000
heap
page read and write
169C98A5000
trusted library allocation
page read and write
169CB8F4000
trusted library allocation
page read and write
169CB2FE000
trusted library allocation
page read and write
169CAE00000
trusted library allocation
page read and write
169CB5D1000
trusted library allocation
page read and write
169CBCF4000
trusted library allocation
page read and write
169CBBD8000
trusted library allocation
page read and write
BC4000
heap
page read and write
4911000
heap
page read and write
169CC248000
trusted library allocation
page read and write
169CC286000
trusted library allocation
page read and write
2530000
heap
page read and write
169D7F6C000
trusted library allocation
page read and write
4BAB000
stack
page read and write
169CC1E1000
trusted library allocation
page read and write
169CD8E0000
trusted library allocation
page read and write
169D365B000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
169D9FEA000
trusted library allocation
page read and write
169C9B15000
trusted library allocation
page read and write
169C9890000
trusted library allocation
page read and write
22B1B000
heap
page read and write
AC4000
heap
page read and write
4911000
heap
page read and write
13F0000
direct allocation
page read and write
169C976F000
trusted library allocation
page read and write
169D3782000
trusted library allocation
page read and write
169D98D0000
trusted library allocation
page read and write
169D9D90000
trusted library allocation
page read and write
169D9FD4000
trusted library allocation
page read and write
169D98C0000
trusted library allocation
page read and write
260C000
heap
page read and write
169D97AA000
trusted library allocation
page read and write
169D9B45000
trusted library allocation
page read and write
169CCD4A000
trusted library allocation
page read and write
169CA62C000
trusted library allocation
page read and write
169C98F5000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169C6A3B000
heap
page read and write
169D9CD4000
trusted library allocation
page read and write
330F000
stack
page read and write
29FD2BC0000
heap
page read and write
67B0000
heap
page read and write
169CD80F000
trusted library allocation
page read and write
169CA668000
trusted library allocation
page read and write
12D3000
heap
page read and write
169C6A40000
heap
page read and write
BC4000
heap
page read and write
169D3767000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D1732000
trusted library allocation
page read and write
169CB4E1000
trusted library allocation
page read and write
169C9865000
trusted library allocation
page read and write
403E000
stack
page read and write
169CE4DC000
trusted library allocation
page read and write
169D9E23000
trusted library allocation
page read and write
1A2AB267000
heap
page read and write
169CC20D000
trusted library allocation
page read and write
169D99BD000
trusted library allocation
page read and write
169CBD32000
trusted library allocation
page read and write
169CD8FB000
trusted library allocation
page read and write
2196FBD0000
heap
page read and write
169CBCF4000
trusted library allocation
page read and write
169CBD44000
trusted library allocation
page read and write
169CA6D5000
trusted library allocation
page read and write
169D9BAA000
trusted library allocation
page read and write
169D9FBF000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CCD92000
trusted library allocation
page read and write
640000
direct allocation
page read and write
5320000
direct allocation
page execute and read and write
169CAAE0000
trusted library allocation
page read and write
169D16E7000
trusted library allocation
page read and write
169C9865000
trusted library allocation
page read and write
169CE4E1000
trusted library allocation
page read and write
169CBD29000
trusted library allocation
page read and write
169C6A41000
heap
page read and write
169CC28A000
trusted library allocation
page read and write
169D9CD6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CAF9C000
trusted library allocation
page read and write
169D9E95000
trusted library allocation
page read and write
169D9FE6000
trusted library allocation
page read and write
AC4000
heap
page read and write
52D0000
direct allocation
page execute and read and write
169C98E0000
trusted library allocation
page read and write
169D9CC6000
trusted library allocation
page read and write
169C67C7000
trusted library allocation
page read and write
169CDA4D000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
169C6FD1000
trusted library allocation
page read and write
169D9BEF000
trusted library allocation
page read and write
169CE4F0000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CCDF6000
trusted library allocation
page read and write
327E000
stack
page read and write
C69000
unkown
page write copy
169D1A64000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169CC3CD000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CCD06000
trusted library allocation
page read and write
169CD675000
trusted library allocation
page read and write
169D1AE0000
trusted library allocation
page read and write
1A2AB222000
heap
page read and write
4163000
heap
page read and write
169C6A34000
heap
page read and write
11D4000
heap
page read and write
49D0000
direct allocation
page execute and read and write
394F000
stack
page read and write
169D9E1E000
trusted library allocation
page read and write
169D9DF0000
trusted library allocation
page read and write
169D9898000
trusted library allocation
page read and write
169CE43E000
trusted library allocation
page read and write
169D3632000
trusted library allocation
page read and write
169D1699000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169D97E0000
trusted library allocation
page read and write
169D9E04000
trusted library allocation
page read and write
169D97ED000
trusted library allocation
page read and write
169D378D000
trusted library allocation
page read and write
169C561B000
trusted library allocation
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169CCDDB000
trusted library allocation
page read and write
169D9E74000
trusted library allocation
page read and write
169C98EC000
trusted library allocation
page read and write
169D9E92000
trusted library allocation
page read and write
169CC1FA000
trusted library allocation
page read and write
169CBE95000
trusted library allocation
page read and write
169CB4C9000
trusted library allocation
page read and write
2448000
unkown
page readonly
AC4000
heap
page read and write
169D37DA000
trusted library allocation
page read and write
29FD2F0A000
trusted library allocation
page read and write
1C78E000
stack
page read and write
169D9C8E000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9FCB000
trusted library allocation
page read and write
169CB0F3000
trusted library allocation
page read and write
169D9CE9000
trusted library allocation
page read and write
169C91E2000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
169C976F000
trusted library allocation
page read and write
169C6A46000
heap
page read and write
12C0000
direct allocation
page read and write
40C0000
direct allocation
page read and write
169D9762000
trusted library allocation
page read and write
12C8000
heap
page read and write
61ED3000
direct allocation
page read and write
169CE4B0000
trusted library allocation
page read and write
169C9BA7000
trusted library allocation
page read and write
169D9F92000
trusted library allocation
page read and write
BC5000
heap
page read and write
410E000
stack
page read and write
1A2AB258000
heap
page read and write
169D3AF6000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
169CE4D0000
trusted library allocation
page read and write
169D989D000
trusted library allocation
page read and write
169D9CFA000
trusted library allocation
page read and write
169CC37B000
trusted library allocation
page read and write
169CD6EC000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
169CC1F4000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169CD80C000
trusted library allocation
page read and write
169CE4D0000
trusted library allocation
page read and write
10B9000
unkown
page execute and read and write
169D9FD4000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D37D2000
trusted library allocation
page read and write
169D9FC0000
trusted library allocation
page read and write
8C4000
heap
page read and write
169C67FE000
trusted library allocation
page read and write
990000
direct allocation
page read and write
169D9DAB000
trusted library allocation
page read and write
169C91ED000
trusted library allocation
page read and write
169CD899000
trusted library allocation
page read and write
169C9AF0000
trusted library allocation
page read and write
169C9AB3000
trusted library allocation
page read and write
1A2AB267000
heap
page read and write
169CAAC3000
trusted library allocation
page read and write
169C67B6000
trusted library allocation
page read and write
169D9FD4000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
60000
unkown
page readonly
169D3745000
trusted library allocation
page read and write
169D9D71000
trusted library allocation
page read and write
169CBDA2000
trusted library allocation
page read and write
BC4000
heap
page read and write
22B35000
heap
page read and write
439F000
stack
page read and write
9C000
stack
page read and write
169D9F25000
trusted library allocation
page read and write
169C67F7000
trusted library allocation
page read and write
169D332F000
trusted library allocation
page read and write
169C9A97000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D3A9A000
trusted library allocation
page read and write
1400000
heap
page read and write
11D4000
heap
page read and write
890000
direct allocation
page read and write
169D1776000
trusted library allocation
page read and write
169D98A3000
trusted library allocation
page read and write
297F000
stack
page read and write
2196FD00000
heap
page read and write
169C6F9E000
trusted library allocation
page read and write
169D9D79000
trusted library allocation
page read and write
169C9AFE000
trusted library allocation
page read and write
169D37EA000
trusted library allocation
page read and write
169CCDDB000
trusted library allocation
page read and write
169CB12F000
trusted library allocation
page read and write
169D9B76000
trusted library allocation
page read and write
12B4000
heap
page read and write
169D9FF8000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CD6F0000
trusted library allocation
page read and write
23D0000
heap
page read and write
169C55E7000
trusted library allocation
page read and write
169D97DD000
trusted library allocation
page read and write
22B46000
heap
page read and write
4AC2000
heap
page read and write
169C91C5000
trusted library allocation
page read and write
22B3C000
heap
page read and write
378000
unkown
page execute and read and write
169D3619000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CA6AE000
trusted library allocation
page read and write
169D9C89000
trusted library allocation
page read and write
4911000
heap
page read and write
5120000
direct allocation
page read and write
169CE4C6000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
169CC25E000
trusted library allocation
page read and write
169C9BDC000
trusted library allocation
page read and write
12D3000
heap
page read and write
3D0E000
stack
page read and write
169CE4EE000
trusted library allocation
page read and write
4911000
heap
page read and write
169CCDD2000
trusted library allocation
page read and write
169CA6D7000
trusted library allocation
page read and write
168F000
stack
page read and write
169C67BA000
trusted library allocation
page read and write
169CAC56000
trusted library allocation
page read and write
C69000
unkown
page read and write
169CB0F7000
trusted library allocation
page read and write
169D98C2000
trusted library allocation
page read and write
169CD630000
trusted library allocation
page read and write
169C6F22000
trusted library allocation
page read and write
1A2AB1E8000
heap
page read and write
11D4000
heap
page read and write
2EC4E000
stack
page read and write
B5243FE000
stack
page read and write
169D3ABC000
trusted library allocation
page read and write
169D367D000
trusted library allocation
page read and write
169D393C000
trusted library allocation
page read and write
4911000
heap
page read and write
169D9FAA000
trusted library allocation
page read and write
C00000
unkown
page read and write
169D3AA5000
trusted library allocation
page read and write
169D3740000
trusted library allocation
page read and write
AE1000
heap
page read and write
348E000
stack
page read and write
169CD618000
trusted library allocation
page read and write
169CD656000
trusted library allocation
page read and write
6190000
heap
page read and write
4370000
heap
page read and write
169C6F25000
trusted library allocation
page read and write
AB4000
heap
page read and write
169D99B5000
trusted library allocation
page read and write
22B53000
heap
page read and write
1A2AB22D000
heap
page read and write
169CACDE000
trusted library allocation
page read and write
169D3716000
trusted library allocation
page read and write
1154000
heap
page read and write
BC4000
heap
page read and write
169C9BC2000
trusted library allocation
page read and write
169D34A9000
trusted library allocation
page read and write
169D7FA5000
trusted library allocation
page read and write
269E000
stack
page read and write
22B35000
heap
page read and write
169CAFEE000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C6A2D000
heap
page read and write
4B3F000
stack
page read and write
169D99B7000
trusted library allocation
page read and write
BC5000
heap
page read and write
169D9BCA000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
169D9FE1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CCD64000
trusted library allocation
page read and write
169CD644000
trusted library allocation
page read and write
169D9CFA000
trusted library allocation
page read and write
169CCD12000
trusted library allocation
page read and write
6CBD0000
unkown
page readonly
316E000
stack
page read and write
169CE4E3000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC1CA000
trusted library allocation
page read and write
48E1000
direct allocation
page read and write
169D37F7000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
1C5000
heap
page read and write
169C9A64000
trusted library allocation
page read and write
34DE000
stack
page read and write
169C98E0000
trusted library allocation
page read and write
72A0000
heap
page read and write
169C67E6000
trusted library allocation
page read and write
169C6A69000
heap
page read and write
169C6A3A000
heap
page read and write
2610000
heap
page read and write
169CE4FD000
trusted library allocation
page read and write
169CA6F8000
trusted library allocation
page read and write
169C6A76000
heap
page read and write
43D0000
direct allocation
page read and write
169C986B000
trusted library allocation
page read and write
169CAFF9000
trusted library allocation
page read and write
AC4000
heap
page read and write
169CD640000
trusted library allocation
page read and write
169D34A9000
trusted library allocation
page read and write
49EF000
stack
page read and write
169D9B79000
trusted library allocation
page read and write
169D9FD4000
trusted library allocation
page read and write
11D4000
heap
page read and write
BC4000
heap
page read and write
169D9FCB000
trusted library allocation
page read and write
169D3765000
trusted library allocation
page read and write
169CB0E4000
trusted library allocation
page read and write
169CC3B8000
trusted library allocation
page read and write
169C6A40000
heap
page read and write
169CAAC2000
trusted library allocation
page read and write
169C9A63000
trusted library allocation
page read and write
169CAAC2000
trusted library allocation
page read and write
169C98DA000
trusted library allocation
page read and write
169C569D000
trusted library allocation
page read and write
33AF000
stack
page read and write
169C68A0000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C9BE3000
trusted library allocation
page read and write
169CB4D4000
trusted library allocation
page read and write
169C6A2E000
heap
page read and write
1A2AB1F1000
heap
page read and write
11D4000
heap
page read and write
169CC25E000
trusted library allocation
page read and write
169D97CD000
trusted library allocation
page read and write
890000
direct allocation
page read and write
169D3A4B000
trusted library allocation
page read and write
1A2AB1EB000
heap
page read and write
169C56B3000
trusted library allocation
page read and write
169CBE76000
trusted library allocation
page read and write
2196FF00000
trusted library allocation
page read and write
820000
unkown
page readonly
169C9BBD000
trusted library allocation
page read and write
169CBB63000
trusted library allocation
page read and write
29FD2F07000
trusted library allocation
page read and write
169C9BC2000
trusted library allocation
page read and write
169CC31C000
trusted library allocation
page read and write
22B1F000
heap
page read and write
352E000
stack
page read and write
4671000
heap
page read and write
1A2AB258000
heap
page read and write
169CAB3C000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D99C1000
trusted library allocation
page read and write
12E1000
heap
page read and write
169D366B000
trusted library allocation
page read and write
169D96D8000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D362A000
trusted library allocation
page read and write
BC5000
heap
page read and write
169CC23F000
trusted library allocation
page read and write
4911000
heap
page read and write
169D9EF5000
trusted library allocation
page read and write
131E000
stack
page read and write
11D4000
heap
page read and write
169CC28E000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
169CB4C6000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
169D9FAE000
trusted library allocation
page read and write
169D97ED000
trusted library allocation
page read and write
169D369C000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
BC4000
heap
page read and write
169CC1F7000
trusted library allocation
page read and write
169CB0CC000
trusted library allocation
page read and write
169CC3E1000
trusted library allocation
page read and write
169D3A62000
trusted library allocation
page read and write
169C6FFD000
trusted library allocation
page read and write
169CD9C5000
trusted library allocation
page read and write
169D9890000
trusted library allocation
page read and write
640000
direct allocation
page read and write
169CBEE1000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
169C9137000
trusted library allocation
page read and write
D9F000
stack
page read and write
169C686B000
trusted library allocation
page read and write
11D4000
heap
page read and write
3F2E000
stack
page read and write
169C6A8F000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169C976F000
trusted library allocation
page read and write
169C9BBF000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9CD1000
trusted library allocation
page read and write
169D3AD9000
trusted library allocation
page read and write
4491000
heap
page read and write
169D3745000
trusted library allocation
page read and write
BC4000
heap
page read and write
2448000
unkown
page readonly
169C98BD000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
169CAE81000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C6A7D000
heap
page read and write
251000
unkown
page execute and read and write
169C9B1E000
trusted library allocation
page read and write
2AFE000
stack
page read and write
169C9AF0000
trusted library allocation
page read and write
169C67EF000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D9B97000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D3771000
trusted library allocation
page read and write
3C1F000
stack
page read and write
169CC1E1000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
1CBA7000
heap
page read and write
11D4000
heap
page read and write
4911000
heap
page read and write
BC4000
heap
page read and write
169CB4EE000
trusted library allocation
page read and write
169D9BC0000
trusted library allocation
page read and write
169D36DC000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CBDA5000
trusted library allocation
page read and write
44E0000
heap
page read and write
344F000
stack
page read and write
11D4000
heap
page read and write
3017000
heap
page read and write
4AC1000
heap
page read and write
169CAA6D000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC2ED000
trusted library allocation
page read and write
169CA6ED000
trusted library allocation
page read and write
4AC1000
heap
page read and write
3B1E000
stack
page read and write
29FD2C60000
heap
page read and write
169D984B000
trusted library allocation
page read and write
169D16F7000
trusted library allocation
page read and write
169CC3B1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C988F000
trusted library allocation
page read and write
70FE000
stack
page read and write
169D9CE5000
trusted library allocation
page read and write
169CD630000
trusted library allocation
page read and write
169C6FC5000
trusted library allocation
page read and write
169D9894000
trusted library allocation
page read and write
169C98FA000
trusted library allocation
page read and write
169CD9B3000
trusted library allocation
page read and write
169C976F000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
169D377F000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D3787000
trusted library allocation
page read and write
169CBD34000
trusted library allocation
page read and write
169C6FDC000
trusted library allocation
page read and write
3E4F000
stack
page read and write
169D9E6D000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CAEED000
trusted library allocation
page read and write
169C9767000
trusted library allocation
page read and write
169C9BC2000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
169D9DAB000
trusted library allocation
page read and write
3B2F000
stack
page read and write
169C6A76000
heap
page read and write
169CAB0D000
trusted library allocation
page read and write
169CADFC000
trusted library allocation
page read and write
19D000
stack
page read and write
169D33A3000
trusted library allocation
page read and write
169CB493000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
11D4000
heap
page read and write
169D3771000
trusted library allocation
page read and write
C00000
unkown
page readonly
BC4000
heap
page read and write
169CD6EC000
trusted library allocation
page read and write
169CBCC1000
trusted library allocation
page read and write
22B10000
heap
page read and write
169C686D000
trusted library allocation
page read and write
169CC3B0000
trusted library allocation
page read and write
169C91C7000
trusted library allocation
page read and write
169D37CA000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
1A2AB258000
heap
page read and write
11D4000
heap
page read and write
169D9CD6000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
169D9CF4000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9B71000
trusted library allocation
page read and write
169D9821000
trusted library allocation
page read and write
169CC3C6000
trusted library allocation
page read and write
169D37E6000
trusted library allocation
page read and write
169CD644000
trusted library allocation
page read and write
169CAAC2000
trusted library allocation
page read and write
29DE000
stack
page read and write
BC4000
heap
page read and write
169C9BED000
trusted library allocation
page read and write
169D98A0000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9FE6000
trusted library allocation
page read and write
169D9EFE000
trusted library allocation
page read and write
169CB07A000
trusted library allocation
page read and write
169CDA13000
trusted library allocation
page read and write
169CAFC6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D97E3000
trusted library allocation
page read and write
299E000
stack
page read and write
169C68F3000
trusted library allocation
page read and write
169D9B68000
trusted library allocation
page read and write
22B46000
heap
page read and write
169D9EE6000
trusted library allocation
page read and write
6E70000
heap
page read and write
169C6A40000
heap
page read and write
169CC1F7000
trusted library allocation
page read and write
169D9E68000
trusted library allocation
page read and write
7B52000
heap
page read and write
169CAF9C000
trusted library allocation
page read and write
169CE4FD000
trusted library allocation
page read and write
169D9858000
trusted library allocation
page read and write
1288000
heap
page read and write
169CC37D000
trusted library allocation
page read and write
169D3326000
trusted library allocation
page read and write
169CBCB5000
trusted library allocation
page read and write
169D3AC9000
trusted library allocation
page read and write
169D9FE7000
trusted library allocation
page read and write
169C9A67000
trusted library allocation
page read and write
169CA693000
trusted library allocation
page read and write
169D1BCA000
trusted library allocation
page read and write
62E0000
heap
page read and write
F0A000
unkown
page execute and read and write
9B000
stack
page read and write
169CB092000
trusted library allocation
page read and write
169D9878000
trusted library allocation
page read and write
3E8E000
stack
page read and write
169CBDCB000
trusted library allocation
page read and write
169D9BE2000
trusted library allocation
page read and write
169D9C89000
trusted library allocation
page read and write
169CB497000
trusted library allocation
page read and write
3C5E000
stack
page read and write
169C9856000
trusted library allocation
page read and write
169CD613000
trusted library allocation
page read and write
22B35000
heap
page read and write
3AFF000
stack
page read and write
BC4000
heap
page read and write
169D9D3D000
trusted library allocation
page read and write
169D3379000
trusted library allocation
page read and write
169C6F2D000
trusted library allocation
page read and write
169CAAF3000
trusted library allocation
page read and write
169D980A000
trusted library allocation
page read and write
169D994F000
trusted library allocation
page read and write
169CBDA2000
trusted library allocation
page read and write
169D97F7000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC1EA000
trusted library allocation
page read and write
169D38F0000
trusted library allocation
page read and write
169D3434000
trusted library allocation
page read and write
169D9FB5000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
516E000
stack
page read and write
11D5000
heap
page read and write
11D4000
heap
page read and write
169D37DA000
trusted library allocation
page read and write
2F002000
heap
page read and write
22B53000
heap
page read and write
11D5000
heap
page read and write
65A000
heap
page read and write
169CB3F3000
trusted library allocation
page read and write
AC4000
heap
page read and write
169CB2B0000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
169CC343000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
4911000
heap
page read and write
11D5000
heap
page read and write
423000
unkown
page readonly
169D9F32000
trusted library allocation
page read and write
169C6728000
trusted library allocation
page read and write
2C3E000
stack
page read and write
BC4000
heap
page read and write
300E000
stack
page read and write
11D4000
heap
page read and write
169CC3E6000
trusted library allocation
page read and write
3C7E000
stack
page read and write
169D9BEF000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169D3769000
trusted library allocation
page read and write
169D1A86000
trusted library allocation
page read and write
169CAA9B000
trusted library allocation
page read and write
169D9944000
trusted library allocation
page read and write
1A2AB221000
heap
page read and write
169C98B5000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
47AE000
stack
page read and write
169C98A8000
trusted library allocation
page read and write
3C3F000
stack
page read and write
169D37EE000
trusted library allocation
page read and write
169CD9BD000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CD6F0000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CC357000
trusted library allocation
page read and write
169C6A34000
heap
page read and write
169D9F20000
trusted library allocation
page read and write
7DCE000
stack
page read and write
169C6A2D000
heap
page read and write
11D4000
heap
page read and write
3F8F000
stack
page read and write
169CCD57000
trusted library allocation
page read and write
169D9939000
trusted library allocation
page read and write
B3D000
stack
page read and write
2BFF000
stack
page read and write
169CCD6B000
trusted library allocation
page read and write
25E0000
direct allocation
page execute and read and write
41F0000
heap
page read and write
169D3769000
trusted library allocation
page read and write
BC5000
heap
page read and write
169C9748000
trusted library allocation
page read and write
169CB0ED000
trusted library allocation
page read and write
4911000
heap
page read and write
169CAAB9000
trusted library allocation
page read and write
169CD618000
trusted library allocation
page read and write
169D1682000
trusted library allocation
page read and write
169D98C7000
trusted library allocation
page read and write
8C4000
heap
page read and write
169CC1CA000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D989A000
trusted library allocation
page read and write
169C981E000
trusted library allocation
page read and write
3AFF000
stack
page read and write
169D39CF000
trusted library allocation
page read and write
169D1773000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
169D989A000
trusted library allocation
page read and write
169D9858000
trusted library allocation
page read and write
169D97E3000
trusted library allocation
page read and write
169C9AFD000
trusted library allocation
page read and write
169C67C7000
trusted library allocation
page read and write
169C6A34000
heap
page read and write
1A2AB163000
heap
page read and write
169C9843000
trusted library allocation
page read and write
11D4000
heap
page read and write
424E000
stack
page read and write
169C9BE0000
trusted library allocation
page read and write
1154000
heap
page read and write
169D9C25000
trusted library allocation
page read and write
169D3AB9000
trusted library allocation
page read and write
1A2AB169000
heap
page read and write
349F000
stack
page read and write
169C9875000
trusted library allocation
page read and write
1262000
heap
page read and write
169D9C5B000
trusted library allocation
page read and write
169CA695000
trusted library allocation
page read and write
27DE000
stack
page read and write
4AC1000
heap
page read and write
169D3982000
trusted library allocation
page read and write
169C9A43000
trusted library allocation
page read and write
169C9794000
trusted library allocation
page read and write
169CC32D000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
1A2AB17F000
heap
page read and write
48AF000
stack
page read and write
169D98F0000
trusted library allocation
page read and write
169D9884000
trusted library allocation
page read and write
351BC000
stack
page read and write
169C55F6000
trusted library allocation
page read and write
169CCDE6000
trusted library allocation
page read and write
169D3765000
trusted library allocation
page read and write
169C6FD1000
trusted library allocation
page read and write
ACC000
heap
page read and write
169D377C000
trusted library allocation
page read and write
169D989A000
trusted library allocation
page read and write
43F1000
heap
page read and write
BC5000
heap
page read and write
C9000
unkown
page write copy
169D5FE1000
trusted library allocation
page read and write
169CBEEA000
trusted library allocation
page read and write
169C67D6000
trusted library allocation
page read and write
169D9E91000
trusted library allocation
page read and write
169CAFB4000
trusted library allocation
page read and write
169CE499000
trusted library allocation
page read and write
A0A000
heap
page read and write
2A4F000
stack
page read and write
169D9BCA000
trusted library allocation
page read and write
169CC39D000
trusted library allocation
page read and write
169D9B97000
trusted library allocation
page read and write
169D9FE4000
trusted library allocation
page read and write
11D4000
heap
page read and write
4AC1000
heap
page read and write
1C7FE000
stack
page read and write
1154000
heap
page read and write
169D362A000
trusted library allocation
page read and write
169D365B000
trusted library allocation
page read and write
42BE000
stack
page read and write
169CD644000
trusted library allocation
page read and write
169D376D000
trusted library allocation
page read and write
169D9E66000
trusted library allocation
page read and write
1154000
heap
page read and write
6A91000
heap
page read and write
169CE46A000
trusted library allocation
page read and write
169D98A3000
trusted library allocation
page read and write
169C98FA000
trusted library allocation
page read and write
1A2AB160000
heap
page read and write
169D3745000
trusted library allocation
page read and write
22B53000
heap
page read and write
169CB4CC000
trusted library allocation
page read and write
169D3638000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CA6BE000
trusted library allocation
page read and write
169C68F6000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169D3740000
trusted library allocation
page read and write
11D4000
heap
page read and write
384E000
stack
page read and write
169C6A40000
heap
page read and write
4911000
heap
page read and write
169D1AF6000
trusted library allocation
page read and write
C69000
unkown
page write copy
169CE4B6000
trusted library allocation
page read and write
169D9BDA000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
35CE000
stack
page read and write
169D9F8D000
trusted library allocation
page read and write
169CB269000
trusted library allocation
page read and write
169CB3D8000
trusted library allocation
page read and write
1A2AB22A000
heap
page read and write
169D373C000
trusted library allocation
page read and write
169D97E3000
trusted library allocation
page read and write
169D5F7F000
trusted library allocation
page read and write
1A2AB23B000
heap
page read and write
890000
direct allocation
page read and write
169CE460000
trusted library allocation
page read and write
11D4000
heap
page read and write
19D000
stack
page read and write
169D9C61000
trusted library allocation
page read and write
169CBE1D000
trusted library allocation
page read and write
22B30000
heap
page read and write
169C9176000
trusted library allocation
page read and write
12BD000
heap
page read and write
169CBD30000
trusted library allocation
page read and write
169CC28E000
trusted library allocation
page read and write
22B23000
heap
page read and write
169CB0EB000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169C6A56000
heap
page read and write
4AC2000
heap
page read and write
4AC1000
heap
page read and write
377E000
stack
page read and write
169CD6E6000
trusted library allocation
page read and write
169D3686000
trusted library allocation
page read and write
169D9971000
trusted library allocation
page read and write
11D4000
heap
page read and write
4911000
heap
page read and write
169D5F7F000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169D9CF7000
trusted library allocation
page read and write
8C0000
heap
page read and write
169CB4EE000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
CE3000
unkown
page execute and write copy
169CA6E8000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
267E000
heap
page execute and read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169D9FFA000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
AC4000
heap
page read and write
169D9CF8000
trusted library allocation
page read and write
169D9D77000
trusted library allocation
page read and write
169D98F6000
trusted library allocation
page read and write
169D9FCB000
trusted library allocation
page read and write
169C6A37000
heap
page read and write
169CAAE6000
trusted library allocation
page read and write
169CA65C000
trusted library allocation
page read and write
169D97CF000
trusted library allocation
page read and write
413F000
stack
page read and write
BC4000
heap
page read and write
24DA000
heap
page read and write
169C9BFD000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D3785000
trusted library allocation
page read and write
169C6FD1000
trusted library allocation
page read and write
169D9D97000
trusted library allocation
page read and write
169D34CF000
trusted library allocation
page read and write
29FD4825000
heap
page read and write
169D9F95000
trusted library allocation
page read and write
12BC000
heap
page read and write
169C91FA000
trusted library allocation
page read and write
169CA6F3000
trusted library allocation
page read and write
169D3330000
trusted library allocation
page read and write
169D9954000
trusted library allocation
page read and write
169C6A36000
heap
page read and write
169C9BB9000
trusted library allocation
page read and write
4490000
heap
page read and write
889000
unkown
page write copy
169C552F000
trusted library allocation
page read and write
62C000
unkown
page execute and read and write
442E000
stack
page read and write
81E000
stack
page read and write
BC4000
heap
page read and write
169C98B5000
trusted library allocation
page read and write
169D9FC3000
trusted library allocation
page read and write
169D9FC0000
trusted library allocation
page read and write
169CC2E6000
trusted library allocation
page read and write
29FD2C6E000
heap
page read and write
12C0000
direct allocation
page read and write
ED7000
unkown
page execute and read and write
169D9FE7000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
169D9ED2000
trusted library allocation
page read and write
169D1AE8000
trusted library allocation
page read and write
169D98C4000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CB4D4000
trusted library allocation
page read and write
169D36DF000
trusted library allocation
page read and write
169CC2F1000
trusted library allocation
page read and write
22B2E000
heap
page read and write
169CAAEA000
trusted library allocation
page read and write
169C9841000
trusted library allocation
page read and write
169C56A3000
trusted library allocation
page read and write
169CADBC000
trusted library allocation
page read and write
65E000
heap
page read and write
BC4000
heap
page read and write
169CE4D0000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
169D9FC8000
trusted library allocation
page read and write
169C6A8F000
heap
page read and write
169D9CAD000
trusted library allocation
page read and write
107C000
stack
page read and write
42FF000
stack
page read and write
169D9EE5000
trusted library allocation
page read and write
169CB081000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
4FD000
stack
page read and write
BC4000
heap
page read and write
12DE000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
52F0000
direct allocation
page execute and read and write
ACA000
heap
page read and write
169D5FE1000
trusted library allocation
page read and write
169D9EE0000
trusted library allocation
page read and write
1A2AB1F1000
heap
page read and write
169C9A45000
trusted library allocation
page read and write
169CE4DC000
trusted library allocation
page read and write
169C9BE0000
trusted library allocation
page read and write
169D3767000
trusted library allocation
page read and write
169CBEE7000
trusted library allocation
page read and write
11D4000
heap
page read and write
1A2AB244000
heap
page read and write
169D3629000
trusted library allocation
page read and write
6CBD1000
unkown
page execute read
169C9163000
trusted library allocation
page read and write
169CBDBC000
trusted library allocation
page read and write
1CA2E000
stack
page read and write
11D4000
heap
page read and write
169C6884000
trusted library allocation
page read and write
169D367A000
trusted library allocation
page read and write
169C6F1F000
trusted library allocation
page read and write
169D9C63000
trusted library allocation
page read and write
169CD992000
trusted library allocation
page read and write
6BD0000
heap
page read and write
AC4000
heap
page read and write
BC4000
heap
page read and write
169CE45C000
trusted library allocation
page read and write
169CAF65000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CD6AB000
trusted library allocation
page read and write
169D37EA000
trusted library allocation
page read and write
640000
direct allocation
page read and write
169CC3C8000
trusted library allocation
page read and write
169CB5D8000
trusted library allocation
page read and write
169D9EE5000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169CCD20000
trusted library allocation
page read and write
BC4000
heap
page read and write
4C70000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
302E000
stack
page read and write
169D9740000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
4A80000
direct allocation
page execute and read and write
AC4000
heap
page read and write
169D36DF000
trusted library allocation
page read and write
169D9EE2000
trusted library allocation
page read and write
169C4BEF000
trusted library allocation
page read and write
169D9BAC000
trusted library allocation
page read and write
169C55EC000
trusted library allocation
page read and write
169C5617000
trusted library allocation
page read and write
169CAAFC000
trusted library allocation
page read and write
169CCDD2000
trusted library allocation
page read and write
169CC254000
trusted library allocation
page read and write
169C6A35000
heap
page read and write
169C6FE1000
trusted library allocation
page read and write
169C919C000
trusted library allocation
page read and write
169CC2C9000
trusted library allocation
page read and write
2EFC000
stack
page read and write
BC4000
heap
page read and write
169C6F1C000
trusted library allocation
page read and write
169D1BC3000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
25CA000
heap
page read and write
169D3630000
trusted library allocation
page read and write
169CC3A7000
trusted library allocation
page read and write
169C98ED000
trusted library allocation
page read and write
169CAC8D000
trusted library allocation
page read and write
169C97F5000
trusted library allocation
page read and write
169D16C8000
trusted library allocation
page read and write
169CB3C7000
trusted library allocation
page read and write
1A2AB1A1000
heap
page read and write
169CD62E000
trusted library allocation
page read and write
2FFC000
stack
page read and write
169D36DF000
trusted library allocation
page read and write
13F0000
direct allocation
page read and write
22B2F000
heap
page read and write
169D9FC8000
trusted library allocation
page read and write
169C989A000
trusted library allocation
page read and write
169D9CEF000
trusted library allocation
page read and write
26EE000
heap
page read and write
169CBBBD000
trusted library allocation
page read and write
169C9A97000
trusted library allocation
page read and write
169CD600000
trusted library allocation
page read and write
169CCD06000
trusted library allocation
page read and write
169CC23F000
trusted library allocation
page read and write
169C6A71000
heap
page read and write
169CB2C0000
trusted library allocation
page read and write
169CC1F7000
trusted library allocation
page read and write
2F007000
heap
page read and write
169C6A7F000
heap
page read and write
BC4000
heap
page read and write
169D9EE6000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CC1EA000
trusted library allocation
page read and write
169D9825000
trusted library allocation
page read and write
1154000
heap
page read and write
169CB8F6000
trusted library allocation
page read and write
169CC3D4000
trusted library allocation
page read and write
22B53000
heap
page read and write
BC4000
heap
page read and write
169C6763000
trusted library allocation
page read and write
169CA3F1000
trusted library allocation
page read and write
169CE499000
trusted library allocation
page read and write
169D1BCA000
trusted library allocation
page read and write
169CB123000
trusted library allocation
page read and write
8D00000
heap
page read and write
169CB4AC000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
169C9BE0000
trusted library allocation
page read and write
169D9776000
trusted library allocation
page read and write
202007403000
trusted library allocation
page read and write
8C4000
heap
page read and write
169C55F0000
trusted library allocation
page read and write
515C000
stack
page read and write
169C9BCF000
trusted library allocation
page read and write
4911000
heap
page read and write
169D97DD000
trusted library allocation
page read and write
169C6A56000
heap
page read and write
36A000
unkown
page execute and read and write
169D97E7000
trusted library allocation
page read and write
24AE000
stack
page read and write
169CB0EB000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
B522BFE000
stack
page read and write
169CC1E1000
trusted library allocation
page read and write
169CCDEA000
trusted library allocation
page read and write
169CC364000
trusted library allocation
page read and write
169D1716000
trusted library allocation
page read and write
990000
direct allocation
page read and write
BC4000
heap
page read and write
169D5F5C000
trusted library allocation
page read and write
169D9CE5000
trusted library allocation
page read and write
6A90000
heap
page read and write
169CAABB000
trusted library allocation
page read and write
169CBE29000
trusted library allocation
page read and write
169C91BF000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D1BCA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB12E000
trusted library allocation
page read and write
169CAFF3000
trusted library allocation
page read and write
169CDAA5000
trusted library allocation
page read and write
169C9755000
trusted library allocation
page read and write
169CC22F000
trusted library allocation
page read and write
169CA65B000
trusted library allocation
page read and write
169CA6FE000
trusted library allocation
page read and write
169C9163000
trusted library allocation
page read and write
22B53000
heap
page read and write
169CBDA7000
trusted library allocation
page read and write
169CAEA8000
trusted library allocation
page read and write
169D9BCA000
trusted library allocation
page read and write
1A2AB1E1000
heap
page read and write
169CB4E5000
trusted library allocation
page read and write
169C6A39000
heap
page read and write
169D3685000
trusted library allocation
page read and write
169C6795000
trusted library allocation
page read and write
169D3A61000
trusted library allocation
page read and write
169CB132000
trusted library allocation
page read and write
169CB09A000
trusted library allocation
page read and write
169C98AE000
trusted library allocation
page read and write
400000
unkown
page readonly
169D9C25000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
169CC3D4000
trusted library allocation
page read and write
1C2FE000
stack
page read and write
169D34CF000
trusted library allocation
page read and write
169D5FF3000
trusted library allocation
page read and write
169D99B5000
trusted library allocation
page read and write
127D000
heap
page read and write
169D37EA000
trusted library allocation
page read and write
169C911C000
trusted library allocation
page read and write
169C9A6A000
trusted library allocation
page read and write
169D9FAE000
trusted library allocation
page read and write
BC4000
heap
page read and write
12C4000
heap
page read and write
169CDA40000
trusted library allocation
page read and write
169CE41E000
trusted library allocation
page read and write
169CC1C6000
trusted library allocation
page read and write
169C9869000
trusted library allocation
page read and write
1154000
heap
page read and write
169CC1EC000
trusted library allocation
page read and write
169CC364000
trusted library allocation
page read and write
169C687B000
trusted library allocation
page read and write
169D37BB000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
169C98B7000
trusted library allocation
page read and write
169CB07F000
trusted library allocation
page read and write
169D9B8B000
trusted library allocation
page read and write
169CAB05000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
169CAAE0000
trusted library allocation
page read and write
194000
stack
page read and write
169D9F9D000
trusted library allocation
page read and write
169D34AF000
trusted library allocation
page read and write
169C67F9000
trusted library allocation
page read and write
169CD87C000
trusted library allocation
page read and write
ED7000
unkown
page execute and read and write
4C40000
direct allocation
page execute and read and write
169CBDFE000
trusted library allocation
page read and write
169CCD92000
trusted library allocation
page read and write
169C9B6F000
trusted library allocation
page read and write
22B46000
heap
page read and write
4911000
heap
page read and write
4AC1000
heap
page read and write
169CC3F1000
trusted library allocation
page read and write
169D3478000
trusted library allocation
page read and write
BCF000
stack
page read and write
169CAC5E000
trusted library allocation
page read and write
169CA63C000
trusted library allocation
page read and write
4C81000
heap
page read and write
169D9E92000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C689B000
trusted library allocation
page read and write
169D9EE6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CD653000
trusted library allocation
page read and write
169CD69A000
trusted library allocation
page read and write
169C55E7000
trusted library allocation
page read and write
2448000
unkown
page readonly
C6B000
unkown
page execute and read and write
169C5561000
trusted library allocation
page read and write
169D9BDA000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D3685000
trusted library allocation
page read and write
169CCDD4000
trusted library allocation
page read and write
169D9FEB000
trusted library allocation
page read and write
169D9CEA000
trusted library allocation
page read and write
169C9879000
trusted library allocation
page read and write
169CA6C8000
trusted library allocation
page read and write
169D9EB5000
trusted library allocation
page read and write
169CC3C8000
trusted library allocation
page read and write
4911000
heap
page read and write
169C98E3000
trusted library allocation
page read and write
169CAA9B000
trusted library allocation
page read and write
169D9FBD000
trusted library allocation
page read and write
169D369C000
trusted library allocation
page read and write
28C5C000
heap
page read and write
169D36A8000
trusted library allocation
page read and write
169D3ABD000
trusted library allocation
page read and write
169D9BAC000
trusted library allocation
page read and write
169D9FCB000
trusted library allocation
page read and write
3EFE000
stack
page read and write
11D4000
heap
page read and write
169D37BB000
trusted library allocation
page read and write
43E1000
heap
page read and write
169D7F56000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D1B82000
trusted library allocation
page read and write
4C81000
heap
page read and write
169C91C7000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
169D3333000
trusted library allocation
page read and write
169D98D0000
trusted library allocation
page read and write
169C67C9000
trusted library allocation
page read and write
29FD2C81000
heap
page read and write
169CD68A000
trusted library allocation
page read and write
169CB0C3000
trusted library allocation
page read and write
169C6A40000
heap
page read and write
169D9D79000
trusted library allocation
page read and write
169C9BDC000
trusted library allocation
page read and write
2AFF000
stack
page read and write
169CC1FA000
trusted library allocation
page read and write
169D9E66000
trusted library allocation
page read and write
169CE4ED000
trusted library allocation
page read and write
169C9BBD000
trusted library allocation
page read and write
169C98E6000
trusted library allocation
page read and write
169CC2E6000
trusted library allocation
page read and write
169CB0CD000
trusted library allocation
page read and write
169CD6FB000
trusted library allocation
page read and write
12B5000
heap
page read and write
1C68E000
stack
page read and write
169CA6F8000
trusted library allocation
page read and write
1C8FD000
stack
page read and write
169C9BC3000
trusted library allocation
page read and write
169D9E95000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CCD3A000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
169D98FC000
trusted library allocation
page read and write
4AC2000
heap
page read and write
169CDA79000
trusted library allocation
page read and write
2FDE000
stack
page read and write
1C7EE000
stack
page read and write
AC4000
heap
page read and write
169C9BC2000
trusted library allocation
page read and write
169CD6EE000
trusted library allocation
page read and write
169CA613000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CD659000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
169D97AA000
trusted library allocation
page read and write
169CBD30000
trusted library allocation
page read and write
169CC277000
trusted library allocation
page read and write
169CC18D000
trusted library allocation
page read and write
4A90000
direct allocation
page execute and read and write
169C97F5000
trusted library allocation
page read and write
43C0000
heap
page read and write
169CC230000
trusted library allocation
page read and write
169CD9C9000
trusted library allocation
page read and write
169C67F3000
trusted library allocation
page read and write
169C687F000
trusted library allocation
page read and write
169CB4EE000
trusted library allocation
page read and write
640000
direct allocation
page read and write
169CAE6F000
trusted library allocation
page read and write
169D3769000
trusted library allocation
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169C6A3B000
heap
page read and write
169CE49E000
trusted library allocation
page read and write
169D9B86000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
28BD0000
heap
page read and write
3D4E000
stack
page read and write
169CC1E1000
trusted library allocation
page read and write
169CB0C8000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C6A56000
heap
page read and write
169CAFC0000
trusted library allocation
page read and write
169D9776000
trusted library allocation
page read and write
313E000
stack
page read and write
52A0000
direct allocation
page execute and read and write
169D9EF5000
trusted library allocation
page read and write
169D9E6B000
trusted library allocation
page read and write
169D3AF5000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
169D9EE4000
trusted library allocation
page read and write
169CB132000
trusted library allocation
page read and write
466F000
stack
page read and write
29E0000
heap
page read and write
169D378D000
trusted library allocation
page read and write
169D9FB4000
trusted library allocation
page read and write
169CE46A000
trusted library allocation
page read and write
169D9F1A000
trusted library allocation
page read and write
1A2AB1FC000
heap
page read and write
169C91BF000
trusted library allocation
page read and write
169CCDF6000
trusted library allocation
page read and write
169C9767000
trusted library allocation
page read and write
169CBDD1000
trusted library allocation
page read and write
BC4000
heap
page read and write
BC0000
heap
page read and write
169D3A9A000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CBD28000
trusted library allocation
page read and write
169D9F8F000
trusted library allocation
page read and write
169C56FE000
trusted library allocation
page read and write
169CA6E9000
trusted library allocation
page read and write
169C67FA000
trusted library allocation
page read and write
4491000
heap
page read and write
BC4000
heap
page read and write
169D9770000
trusted library allocation
page read and write
1C53F000
stack
page read and write
169C67C9000
trusted library allocation
page read and write
169C672B000
trusted library allocation
page read and write
169C9A70000
trusted library allocation
page read and write
169C6A4B000
heap
page read and write
169C6F20000
trusted library allocation
page read and write
169CBEB7000
trusted library allocation
page read and write
169CAB38000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC1CA000
trusted library allocation
page read and write
169CC282000
trusted library allocation
page read and write
169D34CE000
trusted library allocation
page read and write
29FD482B000
heap
page read and write
22B1F000
heap
page read and write
169C9B32000
trusted library allocation
page read and write
169C9BC2000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
BC4000
heap
page read and write
4911000
heap
page read and write
169C9BCD000
trusted library allocation
page read and write
169D9ECF000
trusted library allocation
page read and write
169D366A000
trusted library allocation
page read and write
169CAAC2000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CD8F2000
trusted library allocation
page read and write
22B38000
heap
page read and write
169D1AE8000
trusted library allocation
page read and write
169D98C7000
trusted library allocation
page read and write
169D3630000
trusted library allocation
page read and write
169D9BA5000
trusted library allocation
page read and write
169D37E6000
trusted library allocation
page read and write
169D33A3000
trusted library allocation
page read and write
169D9F32000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
169D9FE1000
trusted library allocation
page read and write
169C5561000
trusted library allocation
page read and write
169D9FB4000
trusted library allocation
page read and write
169C6FD9000
trusted library allocation
page read and write
169D99BB000
trusted library allocation
page read and write
169C91EB000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
169CC22C000
trusted library allocation
page read and write
169CC364000
trusted library allocation
page read and write
169D5FD9000
trusted library allocation
page read and write
169D99BD000
trusted library allocation
page read and write
420000
heap
page read and write
169CAB08000
trusted library allocation
page read and write
400000
unkown
page readonly
169CD6EE000
trusted library allocation
page read and write
761000
unkown
page execute and read and write
169CB074000
trusted library allocation
page read and write
169D9C8A000
trusted library allocation
page read and write
890000
direct allocation
page read and write
169CAEB1000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
169D9FA6000
trusted library allocation
page read and write
22B2F000
heap
page read and write
BC4000
heap
page read and write
169CADD2000
trusted library allocation
page read and write
1154000
heap
page read and write
169CAAE0000
trusted library allocation
page read and write
4911000
heap
page read and write
169D9D79000
trusted library allocation
page read and write
169D9FB8000
trusted library allocation
page read and write
1154000
heap
page read and write
24D0000
heap
page read and write
169CC1C6000
trusted library allocation
page read and write
169C6A34000
heap
page read and write
169CB4DE000
trusted library allocation
page read and write
4911000
heap
page read and write
169CC292000
trusted library allocation
page read and write
169CB4C9000
trusted library allocation
page read and write
169CD6A5000
trusted library allocation
page read and write
169CBB6E000
trusted library allocation
page read and write
169D1B86000
trusted library allocation
page read and write
169D9951000
trusted library allocation
page read and write
169C98B5000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D3A64000
trusted library allocation
page read and write
4AC2000
heap
page read and write
295F000
stack
page read and write
169C67F1000
trusted library allocation
page read and write
169CA024000
trusted library allocation
page read and write
169D3672000
trusted library allocation
page read and write
169CA68D000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
B3E000
unkown
page execute and read and write
1A2AB244000
heap
page read and write
169CBEE9000
trusted library allocation
page read and write
169D33A3000
trusted library allocation
page read and write
169D3472000
trusted library allocation
page read and write
11D4000
heap
page read and write
B3F000
unkown
page execute and write copy
169D3AC9000
trusted library allocation
page read and write
169D361F000
trusted library allocation
page read and write
169D9766000
trusted library allocation
page read and write
BC5000
heap
page read and write
820000
unkown
page readonly
169CDA98000
trusted library allocation
page read and write
BC4000
heap
page read and write
11D4000
heap
page read and write
169CADD2000
trusted library allocation
page read and write
169D16F1000
trusted library allocation
page read and write
4AC2000
heap
page read and write
169D9EFE000
trusted library allocation
page read and write
169D9966000
trusted library allocation
page read and write
169D9D9F000
trusted library allocation
page read and write
BC5000
heap
page read and write
4CA1000
heap
page read and write
11D4000
heap
page read and write
5BF000
unkown
page execute and write copy
169CC1F8000
trusted library allocation
page read and write
126A000
heap
page read and write
169C9BC2000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
4AC1000
heap
page read and write
169CB219000
trusted library allocation
page read and write
4911000
heap
page read and write
882000
unkown
page execute and read and write
169CC26B000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C6A71000
heap
page read and write
4911000
heap
page read and write
434F000
stack
page read and write
169CBB88000
trusted library allocation
page read and write
1C2AF000
stack
page read and write
BC4000
heap
page read and write
169C6F25000
trusted library allocation
page read and write
169D3765000
trusted library allocation
page read and write
1284000
heap
page read and write
169C97F5000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
493000
unkown
page execute and read and write
493000
unkown
page execute and read and write
169CBE35000
trusted library allocation
page read and write
169C9BE0000
trusted library allocation
page read and write
169D377F000
trusted library allocation
page read and write
169D9EA6000
trusted library allocation
page read and write
169D362C000
trusted library allocation
page read and write
28C6F000
heap
page read and write
22B53000
heap
page read and write
169C6737000
trusted library allocation
page read and write
169C985C000
trusted library allocation
page read and write
169C9851000
trusted library allocation
page read and write
38EE000
stack
page read and write
169C6A40000
heap
page read and write
13F0000
direct allocation
page read and write
169C6A34000
heap
page read and write
169C98A6000
trusted library allocation
page read and write
169CB09D000
trusted library allocation
page read and write
169D9C8E000
trusted library allocation
page read and write
587000
unkown
page execute and read and write
2A8E000
stack
page read and write
22B4A000
heap
page read and write
5110000
direct allocation
page read and write
169CC277000
trusted library allocation
page read and write
169C9BC9000
trusted library allocation
page read and write
169D9FCB000
trusted library allocation
page read and write
169CB4BE000
trusted library allocation
page read and write
169D37C1000
trusted library allocation
page read and write
169C9841000
trusted library allocation
page read and write
169CC323000
trusted library allocation
page read and write
169C9BBD000
trusted library allocation
page read and write
169D97CA000
trusted library allocation
page read and write
169C9794000
trusted library allocation
page read and write
169D9FC0000
trusted library allocation
page read and write
169C6FF2000
trusted library allocation
page read and write
2ED7A000
heap
page read and write
169D97CD000
trusted library allocation
page read and write
169CA6D7000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
169D9CAD000
trusted library allocation
page read and write
402F000
stack
page read and write
169CB383000
trusted library allocation
page read and write
169D9B45000
trusted library allocation
page read and write
2BEF000
stack
page read and write
11D4000
heap
page read and write
169CB2A7000
trusted library allocation
page read and write
169C976F000
trusted library allocation
page read and write
169D3630000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
169D9B35000
trusted library allocation
page read and write
BC5000
heap
page read and write
169CC1F7000
trusted library allocation
page read and write
29FD3060000
heap
page read and write
169C6A34000
heap
page read and write
169C9A97000
trusted library allocation
page read and write
169C6886000
trusted library allocation
page read and write
169CDA36000
trusted library allocation
page read and write
1A2AB258000
heap
page read and write
169C98B2000
trusted library allocation
page read and write
169CE4F0000
trusted library allocation
page read and write
22B33000
heap
page read and write
169D9DA7000
trusted library allocation
page read and write
67CE000
stack
page read and write
630000
heap
page read and write
169CB3C2000
trusted library allocation
page read and write
BC4000
heap
page read and write
6CDB0000
unkown
page read and write
37C000
stack
page read and write
169CB4C3000
trusted library allocation
page read and write
1A2AB22A000
heap
page read and write
11C0000
direct allocation
page read and write
169D3A69000
trusted library allocation
page read and write
169C6A39000
heap
page read and write
169C6FDB000
trusted library allocation
page read and write
4911000
heap
page read and write
BC4000
heap
page read and write
4A80000
direct allocation
page execute and read and write
1A2AB16C000
heap
page read and write
169CA6E8000
trusted library allocation
page read and write
169D9F7D000
trusted library allocation
page read and write
169D300C000
trusted library allocation
page read and write
169CA67D000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D98A3000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
169CAAC3000
trusted library allocation
page read and write
169C6F35000
trusted library allocation
page read and write
22B32000
heap
page read and write
169CB4E1000
trusted library allocation
page read and write
169CBD30000
trusted library allocation
page read and write
169D3A08000
trusted library allocation
page read and write
169D9D75000
trusted library allocation
page read and write
169CD9AA000
trusted library allocation
page read and write
169D34AF000
trusted library allocation
page read and write
169D3725000
trusted library allocation
page read and write
22B64000
heap
page read and write
169CBD24000
trusted library allocation
page read and write
169C6A30000
heap
page read and write
169D9D77000
trusted library allocation
page read and write
169D373C000
trusted library allocation
page read and write
169C9869000
trusted library allocation
page read and write
169C672B000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB4E1000
trusted library allocation
page read and write
169C6F25000
trusted library allocation
page read and write
169D3626000
trusted library allocation
page read and write
1C6AF000
stack
page read and write
169D9CF4000
trusted library allocation
page read and write
11D4000
heap
page read and write
1A2AB259000
heap
page read and write
169D36DF000
trusted library allocation
page read and write
169C9BB9000
trusted library allocation
page read and write
169D9FD4000
trusted library allocation
page read and write
169C6A3A000
heap
page read and write
11D4000
heap
page read and write
169D3A87000
trusted library allocation
page read and write
169D97B8000
trusted library allocation
page read and write
169CBCDF000
trusted library allocation
page read and write
169C9AB0000
trusted library allocation
page read and write
352BD000
stack
page read and write
169CC33C000
trusted library allocation
page read and write
169CB25B000
trusted library allocation
page read and write
22B35000
heap
page read and write
198BD3D1000
trusted library allocation
page execute read
169D9FFA000
trusted library allocation
page read and write
AE0000
heap
page read and write
198000
stack
page read and write
4911000
heap
page read and write
67C0000
heap
page read and write
169C6A7C000
heap
page read and write
169D97E0000
trusted library allocation
page read and write
39DE000
stack
page read and write
169CA6BE000
trusted library allocation
page read and write
169C98A1000
trusted library allocation
page read and write
3077000
heap
page read and write
7D8C000
stack
page read and write
4911000
heap
page read and write
AC4000
heap
page read and write
169C916F000
trusted library allocation
page read and write
169CE4E7000
trusted library allocation
page read and write
169C55E5000
trusted library allocation
page read and write
169CBCFA000
trusted library allocation
page read and write
169CBE7C000
trusted library allocation
page read and write
169C6A7F000
heap
page read and write
BC4000
heap
page read and write
4491000
heap
page read and write
169D37C1000
trusted library allocation
page read and write
169D5FD1000
trusted library allocation
page read and write
169CBCF4000
trusted library allocation
page read and write
169D3388000
trusted library allocation
page read and write
169CAAB3000
trusted library allocation
page read and write
169CAAC3000
trusted library allocation
page read and write
169C66FE000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
29FD2E00000
trusted library allocation
page read and write
169CC2F8000
trusted library allocation
page read and write
169CB043000
trusted library allocation
page read and write
169CE4FD000
trusted library allocation
page read and write
169D9CF4000
trusted library allocation
page read and write
169C9BBF000
trusted library allocation
page read and write
169D9FCB000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
169CCD8A000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C98E6000
trusted library allocation
page read and write
3CAE000
stack
page read and write
169CD625000
trusted library allocation
page read and write
29FD2BE0000
heap
page read and write
169CBD32000
trusted library allocation
page read and write
169D9FE3000
trusted library allocation
page read and write
169CB3D7000
trusted library allocation
page read and write
169D9FE1000
trusted library allocation
page read and write
169CBEE8000
trusted library allocation
page read and write
169D39D8000
trusted library allocation
page read and write
4C81000
heap
page read and write
169C9EF2000
trusted library allocation
page read and write
169D9ED3000
trusted library allocation
page read and write
169CE4E8000
trusted library allocation
page read and write
423000
unkown
page readonly
169C9EC1000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
169C98EC000
trusted library allocation
page read and write
169D9FB8000
trusted library allocation
page read and write
18C000
stack
page read and write
169C6A2F000
heap
page read and write
BC4000
heap
page read and write
169CCD64000
trusted library allocation
page read and write
169C9B5B000
trusted library allocation
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169CAAAB000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C9BDC000
trusted library allocation
page read and write
169D9CEF000
trusted library allocation
page read and write
169CBDF0000
trusted library allocation
page read and write
169CAABB000
trusted library allocation
page read and write
169D97FE000
trusted library allocation
page read and write
169CBE9E000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC2E8000
trusted library allocation
page read and write
30CE000
stack
page read and write
169C6A69000
heap
page read and write
169D393C000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
28C6F000
heap
page read and write
169C6A3B000
heap
page read and write
169C6A4B000
heap
page read and write
169D1A61000
trusted library allocation
page read and write
169C98E0000
trusted library allocation
page read and write
169D34B7000
trusted library allocation
page read and write
169D36DC000
trusted library allocation
page read and write
640000
direct allocation
page read and write
BC4000
heap
page read and write
4C4000
unkown
page execute and read and write
169C9767000
trusted library allocation
page read and write
169CC20B000
trusted library allocation
page read and write
169CAEB2000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9FBF000
trusted library allocation
page read and write
BC4000
heap
page read and write
3DAF000
stack
page read and write
169C9176000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9E74000
trusted library allocation
page read and write
12B4000
heap
page read and write
4AC1000
heap
page read and write
43D0000
direct allocation
page read and write
169D97FA000
trusted library allocation
page read and write
169D9FEB000
trusted library allocation
page read and write
169D7F20000
trusted library allocation
page read and write
169CA6E8000
trusted library allocation
page read and write
169CC344000
trusted library allocation
page read and write
10BB000
unkown
page execute and write copy
169CD8FB000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CA616000
trusted library allocation
page read and write
169D9BB8000
trusted library allocation
page read and write
169D1A49000
trusted library allocation
page read and write
169CAB45000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CCD18000
trusted library allocation
page read and write
169D9C8E000
trusted library allocation
page read and write
169D37D2000
trusted library allocation
page read and write
169C9A6E000
trusted library allocation
page read and write
28BB0000
heap
page read and write
169D9FFC000
trusted library allocation
page read and write
169D97C2000
trusted library allocation
page read and write
4911000
heap
page read and write
169D7F75000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CE4E1000
trusted library allocation
page read and write
169CB06D000
trusted library allocation
page read and write
169D3672000
trusted library allocation
page read and write
1C4AF000
stack
page read and write
169C6F7A000
trusted library allocation
page read and write
169D3629000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
2196FF0A000
trusted library allocation
page read and write
1C630000
heap
page read and write
169C981D000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
22B53000
heap
page read and write
169CBF72000
trusted library allocation
page read and write
169D3446000
trusted library allocation
page read and write
169D985D000
trusted library allocation
page read and write
169D9984000
trusted library allocation
page read and write
169CC19A000
trusted library allocation
page read and write
169C9A3E000
trusted library allocation
page read and write
169D9C18000
trusted library allocation
page read and write
169D34FD000
trusted library allocation
page read and write
169D9BAC000
trusted library allocation
page read and write
169C66CB000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
22B30000
heap
page read and write
169D9868000
trusted library allocation
page read and write
169CBD97000
trusted library allocation
page read and write
169D9924000
trusted library allocation
page read and write
169C6A76000
heap
page read and write
169CC28E000
trusted library allocation
page read and write
169D9CFA000
trusted library allocation
page read and write
169CA6B6000
trusted library allocation
page read and write
72A1000
heap
page read and write
29FD2C80000
heap
page read and write
AC1000
heap
page read and write
BC5000
heap
page read and write
169D9CF4000
trusted library allocation
page read and write
169CAAB3000
trusted library allocation
page read and write
1C8ED000
stack
page read and write
169D9B93000
trusted library allocation
page read and write
169C9B20000
trusted library allocation
page read and write
5350000
direct allocation
page execute and read and write
169C6737000
trusted library allocation
page read and write
2E4E000
stack
page read and write
48BE000
stack
page read and write
22B2E000
heap
page read and write
169D9CE5000
trusted library allocation
page read and write
C01000
unkown
page execute and write copy
169D97E0000
trusted library allocation
page read and write
169D1A82000
trusted library allocation
page read and write
12A1000
heap
page read and write
169C6A36000
heap
page read and write
285F000
stack
page read and write
169CD65D000
trusted library allocation
page read and write
169CE4FD000
trusted library allocation
page read and write
169D9D8C000
trusted library allocation
page read and write
B7E000
stack
page read and write
169CBE79000
trusted library allocation
page read and write
169CC3D9000
trusted library allocation
page read and write
169C98E0000
trusted library allocation
page read and write
169CE4E3000
trusted library allocation
page read and write
169CBD06000
trusted library allocation
page read and write
169CC3F1000
trusted library allocation
page read and write
169D332C000
trusted library allocation
page read and write
169D9FB4000
trusted library allocation
page read and write
169D3787000
trusted library allocation
page read and write
169CCDC0000
trusted library allocation
page read and write
169C98DA000
trusted library allocation
page read and write
169CC1F4000
trusted library allocation
page read and write
169CBD36000
trusted library allocation
page read and write
169D9F9B000
trusted library allocation
page read and write
169C9AB3000
trusted library allocation
page read and write
169C5675000
trusted library allocation
page read and write
1154000
heap
page read and write
169C5613000
trusted library allocation
page read and write
169D9EFE000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CAAE6000
trusted library allocation
page read and write
169CC1F8000
trusted library allocation
page read and write
169D9FF8000
trusted library allocation
page read and write
169CA3E0000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C673A000
trusted library allocation
page read and write
169CD6FD000
trusted library allocation
page read and write
169C55FE000
trusted library allocation
page read and write
169C6A37000
heap
page read and write
169D3AC6000
trusted library allocation
page read and write
169C9EA9000
trusted library allocation
page read and write
169D3632000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
4AC1000
heap
page read and write
302000
unkown
page execute and read and write
169C6737000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
169CBD43000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CD614000
trusted library allocation
page read and write
169CCD5B000
trusted library allocation
page read and write
169D9BAA000
trusted library allocation
page read and write
1A2AB1E9000
heap
page read and write
169C9AFE000
trusted library allocation
page read and write
169CB4DE000
trusted library allocation
page read and write
169D3638000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
169D9B95000
trusted library allocation
page read and write
1CBA0000
trusted library allocation
page read and write
169D97CD000
trusted library allocation
page read and write
169D3388000
trusted library allocation
page read and write
2EDA2000
heap
page read and write
169C985E000
trusted library allocation
page read and write
169C916F000
trusted library allocation
page read and write
169D97EA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9DE1000
trusted library allocation
page read and write
169D9C89000
trusted library allocation
page read and write
169D97FA000
trusted library allocation
page read and write
6CB31000
unkown
page execute read
169CD640000
trusted library allocation
page read and write
4AC2000
heap
page read and write
169D9E1E000
trusted library allocation
page read and write
8C4000
heap
page read and write
AF2000
heap
page read and write
169C9B38000
trusted library allocation
page read and write
169CAAE0000
trusted library allocation
page read and write
1154000
heap
page read and write
2550000
heap
page read and write
169C6A7C000
heap
page read and write
49F000
unkown
page execute and read and write
13F0000
direct allocation
page read and write
49FF000
stack
page read and write
169D34B7000
trusted library allocation
page read and write
337000
unkown
page execute and read and write
339E000
stack
page read and write
169C9A65000
trusted library allocation
page read and write
169C6A4B000
heap
page read and write
169CCD55000
trusted library allocation
page read and write
169CB3E3000
trusted library allocation
page read and write
169CCDED000
trusted library allocation
page read and write
169D9E7C000
trusted library allocation
page read and write
169CBE90000
trusted library allocation
page read and write
169C6833000
trusted library allocation
page read and write
169C6A6A000
heap
page read and write
169D9E64000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
169CD667000
trusted library allocation
page read and write
169D9E6E000
trusted library allocation
page read and write
4AC1000
heap
page read and write
52B0000
direct allocation
page execute and read and write
169CAFCA000
trusted library allocation
page read and write
169C678F000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D5F67000
trusted library allocation
page read and write
169D9DE6000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CE499000
trusted library allocation
page read and write
169C56A7000
trusted library allocation
page read and write
3EDE000
stack
page read and write
169CDA11000
trusted library allocation
page read and write
169CBF0D000
trusted library allocation
page read and write
4C81000
heap
page read and write
169D9FE7000
trusted library allocation
page read and write
169C9863000
trusted library allocation
page read and write
169C9B2E000
trusted library allocation
page read and write
169CB2B0000
trusted library allocation
page read and write
169D9C94000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D9966000
trusted library allocation
page read and write
169D99EB000
trusted library allocation
page read and write
49BF000
stack
page read and write
6AA0000
heap
page read and write
169C9BE5000
trusted library allocation
page read and write
BC4000
heap
page read and write
690E000
stack
page read and write
169D9B68000
trusted library allocation
page read and write
169D376F000
trusted library allocation
page read and write
169CAFF9000
trusted library allocation
page read and write
169CD98C000
trusted library allocation
page read and write
169CADEA000
trusted library allocation
page read and write
4911000
heap
page read and write
4A40000
direct allocation
page execute and read and write
4160000
heap
page read and write
2080000
heap
page read and write
169CD656000
trusted library allocation
page read and write
50C0000
heap
page read and write
169C6A37000
heap
page read and write
F18000
unkown
page execute and write copy
169D9CF7000
trusted library allocation
page read and write
169D9871000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
29FD2BA0000
heap
page read and write
169CB097000
trusted library allocation
page read and write
169C9161000
trusted library allocation
page read and write
169C9AB3000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C6849000
trusted library allocation
page read and write
169C677B000
trusted library allocation
page read and write
12B4000
heap
page read and write
169D9D97000
trusted library allocation
page read and write
30FF000
stack
page read and write
169D3AC6000
trusted library allocation
page read and write
169D9B5C000
trusted library allocation
page read and write
169D9C63000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9FE3000
trusted library allocation
page read and write
BC5000
heap
page read and write
169D9EBB000
trusted library allocation
page read and write
169CAF67000
trusted library allocation
page read and write
889000
unkown
page read and write
169CDCA8000
trusted library allocation
page read and write
169D9B8B000
trusted library allocation
page read and write
C9000
unkown
page read and write
169D9F95000
trusted library allocation
page read and write
169C6A40000
heap
page read and write
169CD6F2000
trusted library allocation
page read and write
169CC3B8000
trusted library allocation
page read and write
169D9EE7000
trusted library allocation
page read and write
169C9871000
trusted library allocation
page read and write
4AC1000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169CD649000
trusted library allocation
page read and write
169CBCB7000
trusted library allocation
page read and write
169C98ED000
trusted library allocation
page read and write
169CBE56000
trusted library allocation
page read and write
43BF000
stack
page read and write
169D9FFC000
trusted library allocation
page read and write
169D9B86000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169C6FFD000
trusted library allocation
page read and write
2FCC000
stack
page read and write
169CADDB000
trusted library allocation
page read and write
169CE477000
trusted library allocation
page read and write
4911000
heap
page read and write
169CA65C000
trusted library allocation
page read and write
169CE48E000
trusted library allocation
page read and write
169C6A7F000
heap
page read and write
169D9F9D000
trusted library allocation
page read and write
169C4B81000
trusted library allocation
page read and write
467E000
stack
page read and write
169CB3D9000
trusted library allocation
page read and write
169C67C2000
trusted library allocation
page read and write
169CAB02000
trusted library allocation
page read and write
169D9C8A000
trusted library allocation
page read and write
169C6A85000
heap
page read and write
4AC1000
heap
page read and write
398E000
stack
page read and write
169CBD7F000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C9BF9000
trusted library allocation
page read and write
169CBDEE000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
169C56BB000
trusted library allocation
page read and write
2ED78000
heap
page read and write
22B53000
heap
page read and write
169C55F6000
trusted library allocation
page read and write
376F000
stack
page read and write
169CB4C2000
trusted library allocation
page read and write
169D9F92000
trusted library allocation
page read and write
22B12000
heap
page read and write
4CA1000
heap
page read and write
169CAAE0000
trusted library allocation
page read and write
1A2AB15F000
heap
page read and write
169D97C7000
trusted library allocation
page read and write
4B7E000
stack
page read and write
169CC32D000
trusted library allocation
page read and write
169C9848000
trusted library allocation
page read and write
169D3787000
trusted library allocation
page read and write
169C6A42000
heap
page read and write
169D9FAE000
trusted library allocation
page read and write
169CCDE6000
trusted library allocation
page read and write
6F0000
heap
page read and write
169D375D000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
169D9B76000
trusted library allocation
page read and write
22B4D000
heap
page read and write
169D9804000
trusted library allocation
page read and write
4911000
heap
page read and write
169C6FC7000
trusted library allocation
page read and write
C62000
unkown
page execute and read and write
4AC1000
heap
page read and write
169CB05D000
trusted library allocation
page read and write
6CBAD000
unkown
page readonly
4911000
heap
page read and write
169CCD51000
trusted library allocation
page read and write
169D9884000
trusted library allocation
page read and write
169C55F6000
trusted library allocation
page read and write
169C686D000
trusted library allocation
page read and write
4911000
heap
page read and write
169D9CCE000
trusted library allocation
page read and write
21A000
stack
page read and write
39BF000
stack
page read and write
169CE49C000
trusted library allocation
page read and write
1C2BF000
stack
page read and write
169D9CC8000
trusted library allocation
page read and write
387F000
stack
page read and write
1154000
heap
page read and write
C00000
unkown
page read and write
169D9F9F000
trusted library allocation
page read and write
169D9FE7000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C9794000
trusted library allocation
page read and write
8C4000
heap
page read and write
169C976F000
trusted library allocation
page read and write
169D377C000
trusted library allocation
page read and write
BD0000
heap
page read and write
169CB078000
trusted library allocation
page read and write
169CE4B4000
trusted library allocation
page read and write
169CB4CC000
trusted library allocation
page read and write
169D34F8000
trusted library allocation
page read and write
169CBEF2000
trusted library allocation
page read and write
169D37CA000
trusted library allocation
page read and write
169D9FBD000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
169D98C0000
trusted library allocation
page read and write
169CB074000
trusted library allocation
page read and write
169CC230000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
6E0C000
stack
page read and write
169CC1C6000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169D37F2000
trusted library allocation
page read and write
1154000
heap
page read and write
BBF000
stack
page read and write
43D0000
direct allocation
page read and write
12C4000
heap
page read and write
169CB4B8000
trusted library allocation
page read and write
3C6F000
stack
page read and write
169CB06C000
trusted library allocation
page read and write
169C9B5D000
trusted library allocation
page read and write
2F00F000
heap
page read and write
169D9FD4000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
BC4000
heap
page read and write
13F0000
direct allocation
page read and write
12C9000
heap
page read and write
BC4000
heap
page read and write
4911000
heap
page read and write
169CADD3000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
169C98E3000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CAEF5000
trusted library allocation
page read and write
169D9ECC000
trusted library allocation
page read and write
43D3000
heap
page read and write
169D98C1000
trusted library allocation
page read and write
169C98CC000
trusted library allocation
page read and write
169D9FAE000
trusted library allocation
page read and write
169D9B44000
trusted library allocation
page read and write
1A2AB16C000
heap
page read and write
169D34AF000
trusted library allocation
page read and write
26D2000
heap
page read and write
169D9FC0000
trusted library allocation
page read and write
169CC2ED000
trusted library allocation
page read and write
169C9749000
trusted library allocation
page read and write
169D9FE1000
trusted library allocation
page read and write
9CB000
heap
page read and write
169CB034000
trusted library allocation
page read and write
169CAC51000
trusted library allocation
page read and write
169D99F2000
trusted library allocation
page read and write
169CB0ED000
trusted library allocation
page read and write
11D4000
heap
page read and write
3B3E000
stack
page read and write
169D3767000
trusted library allocation
page read and write
BC4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
169CE479000
trusted library allocation
page read and write
40D0000
heap
page read and write
169CCDF6000
trusted library allocation
page read and write
169D370F000
trusted library allocation
page read and write
169D9852000
trusted library allocation
page read and write
169CAA6D000
trusted library allocation
page read and write
169C6A9D000
heap
page read and write
169CC3C8000
trusted library allocation
page read and write
169D9F9D000
trusted library allocation
page read and write
169CE497000
trusted library allocation
page read and write
169CB0F7000
trusted library allocation
page read and write
169CC334000
trusted library allocation
page read and write
169CD84C000
trusted library allocation
page read and write
22B33000
heap
page read and write
169CCD20000
trusted library allocation
page read and write
169C9AFD000
trusted library allocation
page read and write
169C98B0000
trusted library allocation
page read and write
169C6A42000
heap
page read and write
7B57000
heap
page read and write
169CD669000
trusted library allocation
page read and write
169CBDEE000
trusted library allocation
page read and write
169C98B0000
trusted library allocation
page read and write
169CB4B1000
trusted library allocation
page read and write
259E000
stack
page read and write
13F0000
direct allocation
page read and write
169C9888000
trusted library allocation
page read and write
22B1A000
heap
page read and write
22B53000
heap
page read and write
169CBEF2000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
BC4000
heap
page read and write
9C000
stack
page read and write
169C6A7F000
heap
page read and write
169D9E6B000
trusted library allocation
page read and write
169C9B67000
trusted library allocation
page read and write
169D9CF4000
trusted library allocation
page read and write
169D3678000
trusted library allocation
page read and write
169CA6F3000
trusted library allocation
page read and write
140B000
heap
page read and write
4D1000
unkown
page execute and read and write
169D9FE6000
trusted library allocation
page read and write
169CBACF000
trusted library allocation
page read and write
169CC3A7000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
169CBEF2000
trusted library allocation
page read and write
169C9BBF000
trusted library allocation
page read and write
169CD8B1000
trusted library allocation
page read and write
22B35000
heap
page read and write
169CE49E000
trusted library allocation
page read and write
BC4000
heap
page read and write
413E000
stack
page read and write
169D9F8F000
trusted library allocation
page read and write
169D9CF8000
trusted library allocation
page read and write
7CE000
stack
page read and write
125D000
heap
page read and write
169D9E74000
trusted library allocation
page read and write
640000
direct allocation
page read and write
169D9EEB000
trusted library allocation
page read and write
169C97F5000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
169CA6D7000
trusted library allocation
page read and write
169CC1E1000
trusted library allocation
page read and write
169CB25E000
trusted library allocation
page read and write
169D9FD4000
trusted library allocation
page read and write
60000
unkown
page read and write
169CB5EE000
trusted library allocation
page read and write
4C44000
heap
page read and write
169D3AEC000
trusted library allocation
page read and write
257E000
stack
page read and write
BC4000
heap
page read and write
169CB12F000
trusted library allocation
page read and write
169C9894000
trusted library allocation
page read and write
169D9C22000
trusted library allocation
page read and write
169C9BED000
trusted library allocation
page read and write
169D9890000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
4AC1000
heap
page read and write
169C9BE5000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
169CCD77000
trusted library allocation
page read and write
169CDA00000
trusted library allocation
page read and write
169CD69C000
trusted library allocation
page read and write
169D985D000
trusted library allocation
page read and write
4971000
direct allocation
page read and write
169CE4F4000
trusted library allocation
page read and write
43D0000
heap
page read and write
169D9F1E000
trusted library allocation
page read and write
466E000
stack
page read and write
169CBDE1000
trusted library allocation
page read and write
44DF000
stack
page read and write
AC4000
heap
page read and write
12A1000
heap
page read and write
169D9E66000
trusted library allocation
page read and write
B524BFF000
stack
page read and write
169D9FFA000
trusted library allocation
page read and write
169C6F2D000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
169D1AF0000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CDA75000
trusted library allocation
page read and write
169CAE9F000
trusted library allocation
page read and write
169CACA1000
trusted library allocation
page read and write
169CAAC3000
trusted library allocation
page read and write
169C56BB000
trusted library allocation
page read and write
169D9BB8000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D3A87000
trusted library allocation
page read and write
169D9741000
trusted library allocation
page read and write
169D9998000
trusted library allocation
page read and write
169D9EC9000
trusted library allocation
page read and write
169D37D2000
trusted library allocation
page read and write
8C4000
heap
page read and write
169D34B0000
trusted library allocation
page read and write
169D98F0000
trusted library allocation
page read and write
41D0000
heap
page read and write
400000
unkown
page readonly
2DBE000
stack
page read and write
169D37C1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CCD22000
trusted library allocation
page read and write
169D9958000
trusted library allocation
page read and write
169C9B6F000
trusted library allocation
page read and write
169C9A6F000
trusted library allocation
page read and write
169BB256000
heap
page read and write
3FFF000
stack
page read and write
169CB0DC000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
169C91ED000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
169CBBAE000
trusted library allocation
page read and write
8C4000
heap
page read and write
169C9BD9000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9D75000
trusted library allocation
page read and write
169CB063000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D5F70000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
ED435FF000
stack
page read and write
22B46000
heap
page read and write
169CE4ED000
trusted library allocation
page read and write
169D349A000
trusted library allocation
page read and write
169D99FD000
trusted library allocation
page read and write
2BCE000
stack
page read and write
169D9BB8000
trusted library allocation
page read and write
419E000
stack
page read and write
ED445FF000
stack
page read and write
452F000
stack
page read and write
BC4000
heap
page read and write
169D995C000
trusted library allocation
page read and write
2F008000
heap
page read and write
61ECC000
direct allocation
page read and write
169CAABB000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CDAAB000
trusted library allocation
page read and write
4491000
heap
page read and write
11D4000
heap
page read and write
169C6A35000
heap
page read and write
22B46000
heap
page read and write
169D16D3000
trusted library allocation
page read and write
169D37EE000
trusted library allocation
page read and write
169C9817000
trusted library allocation
page read and write
169C9BE0000
trusted library allocation
page read and write
320E000
stack
page read and write
4671000
heap
page read and write
22B35000
heap
page read and write
169CB0EA000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
4AB0000
trusted library allocation
page read and write
169C9BB9000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9CC8000
trusted library allocation
page read and write
169CBEE1000
trusted library allocation
page read and write
280000
heap
page read and write
169CAD40000
trusted library allocation
page read and write
169D3446000
trusted library allocation
page read and write
169CC1F4000
trusted library allocation
page read and write
4911000
heap
page read and write
169D5F56000
trusted library allocation
page read and write
169CBDDD000
trusted library allocation
page read and write
169D37F2000
trusted library allocation
page read and write
169D3740000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9E6E000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
4C70000
direct allocation
page read and write
6A0000
heap
page read and write
2D0E000
stack
page read and write
ED43DFF000
stack
page read and write
169CD940000
trusted library allocation
page read and write
169CA65B000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
127C000
heap
page read and write
169D1A69000
trusted library allocation
page read and write
169C9A4C000
trusted library allocation
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
169D9874000
trusted library allocation
page read and write
1A2AB1EB000
heap
page read and write
169C9AB0000
trusted library allocation
page read and write
169C9808000
trusted library allocation
page read and write
438E000
stack
page read and write
3EFE000
stack
page read and write
12C4000
heap
page read and write
169D34F8000
trusted library allocation
page read and write
4A70000
direct allocation
page execute and read and write
169CB12F000
trusted library allocation
page read and write
169CC1F7000
trusted library allocation
page read and write
169C9AFD000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
169D9C61000
trusted library allocation
page read and write
326F000
stack
page read and write
169CC2F1000
trusted library allocation
page read and write
169CB06C000
trusted library allocation
page read and write
169CB045000
trusted library allocation
page read and write
169CCDE2000
trusted library allocation
page read and write
169D9FE6000
trusted library allocation
page read and write
169C689D000
trusted library allocation
page read and write
169D9EE5000
trusted library allocation
page read and write
169C9A65000
trusted library allocation
page read and write
169CC25E000
trusted library allocation
page read and write
463F000
stack
page read and write
4A08000
stack
page read and write
169C689D000
trusted library allocation
page read and write
4491000
heap
page read and write
5300000
direct allocation
page execute and read and write
169D9D71000
trusted library allocation
page read and write
BC4000
heap
page read and write
4090000
direct allocation
page execute and read and write
169D9894000
trusted library allocation
page read and write
169D9966000
trusted library allocation
page read and write
169C9BDC000
trusted library allocation
page read and write
169D98D0000
trusted library allocation
page read and write
169CBEF2000
trusted library allocation
page read and write
169CD9C7000
trusted library allocation
page read and write
AC4000
heap
page read and write
2617000
heap
page read and write
169CE4A4000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CA0FC000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB0CD000
trusted library allocation
page read and write
13F0000
direct allocation
page read and write
169D9962000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9DA7000
trusted library allocation
page read and write
169CC1FA000
trusted library allocation
page read and write
169CCDEA000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
169D3726000
trusted library allocation
page read and write
169D3630000
trusted library allocation
page read and write
169D9F9D000
trusted library allocation
page read and write
AC4000
heap
page read and write
BC4000
heap
page read and write
169D9E68000
trusted library allocation
page read and write
169C6A30000
heap
page read and write
169D3AEC000
trusted library allocation
page read and write
1F0000
heap
page read and write
169D9CFA000
trusted library allocation
page read and write
169C68E7000
trusted library allocation
page read and write
169D3632000
trusted library allocation
page read and write
378000
unkown
page execute and write copy
640000
direct allocation
page read and write
169CA6D7000
trusted library allocation
page read and write
169CC335000
trusted library allocation
page read and write
6CDB5000
unkown
page readonly
169D9F25000
trusted library allocation
page read and write
169CB074000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
169D34FC000
trusted library allocation
page read and write
2F4F000
stack
page read and write
169CBE28000
trusted library allocation
page read and write
BC4000
heap
page read and write
890000
direct allocation
page read and write
BC4000
heap
page read and write
169CD69E000
trusted library allocation
page read and write
4911000
heap
page read and write
373F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
169CBEF1000
trusted library allocation
page read and write
370E000
stack
page read and write
5280000
direct allocation
page execute and read and write
169C6A3D000
heap
page read and write
169CA6AE000
trusted library allocation
page read and write
5F4F000
stack
page read and write
169D3787000
trusted library allocation
page read and write
169C685A000
trusted library allocation
page read and write
169CE4C6000
trusted library allocation
page read and write
4AC1000
heap
page read and write
890000
direct allocation
page read and write
169CA61B000
trusted library allocation
page read and write
2590000
heap
page read and write
401E000
stack
page read and write
169D98E2000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
2E0F000
stack
page read and write
169D9FEB000
trusted library allocation
page read and write
169D3A69000
trusted library allocation
page read and write
169CBB07000
trusted library allocation
page read and write
169CAD97000
trusted library allocation
page read and write
169C9BA9000
trusted library allocation
page read and write
169C6F72000
trusted library allocation
page read and write
169D9CF7000
trusted library allocation
page read and write
169CBD32000
trusted library allocation
page read and write
22B21000
heap
page read and write
169CC3C6000
trusted library allocation
page read and write
169CB0F3000
trusted library allocation
page read and write
890000
direct allocation
page read and write
2807000
heap
page read and write
169C9767000
trusted library allocation
page read and write
169D3671000
trusted library allocation
page read and write
4911000
heap
page read and write
169CB040000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169C6A37000
heap
page read and write
169CB4E1000
trusted library allocation
page read and write
169CC323000
trusted library allocation
page read and write
7E7000
heap
page read and write
169C6A4B000
heap
page read and write
22B38000
heap
page read and write
169CC2E8000
trusted library allocation
page read and write
169C6F22000
trusted library allocation
page read and write
AC4000
heap
page read and write
169C6A89000
heap
page read and write
169D7F88000
trusted library allocation
page read and write
169C98F5000
trusted library allocation
page read and write
169CBD3C000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
169D99E5000
trusted library allocation
page read and write
27EF000
stack
page read and write
169D3ABC000
trusted library allocation
page read and write
169C9BCF000
trusted library allocation
page read and write
BC5000
heap
page read and write
169C98E0000
trusted library allocation
page read and write
22B37000
heap
page read and write
169C9794000
trusted library allocation
page read and write
23A0000
heap
page read and write
169CAAEA000
trusted library allocation
page read and write
6FA000
heap
page read and write
BC4000
heap
page read and write
169C9A6E000
trusted library allocation
page read and write
169C9BC5000
trusted library allocation
page read and write
169CBBD3000
trusted library allocation
page read and write
198BD3E1000
trusted library allocation
page execute read
169CC1F4000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
640000
direct allocation
page read and write
3DEE000
stack
page read and write
169D36DF000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
169CB07F000
trusted library allocation
page read and write
169D7F8A000
trusted library allocation
page read and write
169CD640000
trusted library allocation
page read and write
43E1000
heap
page read and write
169CC25E000
trusted library allocation
page read and write
169D3638000
trusted library allocation
page read and write
169CAAFC000
trusted library allocation
page read and write
169D34B6000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
169CB49F000
trusted library allocation
page read and write
169CB063000
trusted library allocation
page read and write
169CC31C000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
169D9ED1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9FB1000
trusted library allocation
page read and write
4AC1000
heap
page read and write
4B51000
direct allocation
page read and write
169CB5EB000
trusted library allocation
page read and write
169D9756000
trusted library allocation
page read and write
4911000
heap
page read and write
401000
unkown
page execute read
169D37CA000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
22B30000
heap
page read and write
BC4000
heap
page read and write
19D000
stack
page read and write
169CD9C5000
trusted library allocation
page read and write
2DEF000
stack
page read and write
169C91EC000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D99B9000
trusted library allocation
page read and write
43DE000
stack
page read and write
169D98C7000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
169CCD22000
trusted library allocation
page read and write
169D983D000
trusted library allocation
page read and write
11D4000
heap
page read and write
C6B000
unkown
page execute and read and write
194000
stack
page read and write
2CEF000
stack
page read and write
4FD000
unkown
page execute and read and write
169D37E6000
trusted library allocation
page read and write
169D9890000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
169CCD7D000
trusted library allocation
page read and write
169D9FCB000
trusted library allocation
page read and write
169D99B7000
trusted library allocation
page read and write
169D9E1F000
trusted library allocation
page read and write
F01000
unkown
page execute and read and write
169CDA00000
trusted library allocation
page read and write
169D3632000
trusted library allocation
page read and write
2448000
unkown
page readonly
169C9ECD000
trusted library allocation
page read and write
169D34F8000
trusted library allocation
page read and write
169CAF70000
trusted library allocation
page read and write
169CC28A000
trusted library allocation
page read and write
169CB132000
trusted library allocation
page read and write
169C9ADA000
trusted library allocation
page read and write
169D348A000
trusted library allocation
page read and write
169D391A000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CAAE0000
trusted library allocation
page read and write
169D3AC6000
trusted library allocation
page read and write
A51000
heap
page read and write
169D9FCB000
trusted library allocation
page read and write
169D9CEC000
trusted library allocation
page read and write
4CA0000
heap
page read and write
169CE000000
trusted library allocation
page read and write
169D9E7C000
trusted library allocation
page read and write
169D9D7B000
trusted library allocation
page read and write
169C4BBF000
trusted library allocation
page read and write
169CC1FA000
trusted library allocation
page read and write
169D99BB000
trusted library allocation
page read and write
169CA6BE000
trusted library allocation
page read and write
169D177B000
trusted library allocation
page read and write
26F5000
heap
page read and write
1A2AB16C000
heap
page read and write
1A2AB1EB000
heap
page read and write
169CAEC1000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CCDE6000
trusted library allocation
page read and write
361E000
stack
page read and write
417E000
stack
page read and write
169CCD12000
trusted library allocation
page read and write
169C9ADA000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
169C55F0000
trusted library allocation
page read and write
169C98B0000
trusted library allocation
page read and write
169D37CA000
trusted library allocation
page read and write
169CA638000
trusted library allocation
page read and write
29BE000
stack
page read and write
40CF000
stack
page read and write
169C68E0000
trusted library allocation
page read and write
22B53000
heap
page read and write
169CA6C5000
trusted library allocation
page read and write
169CDA39000
trusted library allocation
page read and write
29E7000
heap
page read and write
169D9DEF000
trusted library allocation
page read and write
169D3617000
trusted library allocation
page read and write
40E0000
heap
page read and write
1154000
heap
page read and write
1A2AB1F1000
heap
page read and write
78E000
stack
page read and write
169D3639000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
169CC28A000
trusted library allocation
page read and write
169CBDE3000
trusted library allocation
page read and write
BC4000
heap
page read and write
40D3000
heap
page read and write
169CBD7F000
trusted library allocation
page read and write
169CBEE7000
trusted library allocation
page read and write
4C7F000
stack
page read and write
169CB12F000
trusted library allocation
page read and write
4100000
heap
page read and write
169C55E1000
trusted library allocation
page read and write
169CAC6D000
trusted library allocation
page read and write
169CAEB7000
trusted library allocation
page read and write
169CA638000
trusted library allocation
page read and write
169CAF6D000
trusted library allocation
page read and write
169CB26A000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
169CAD43000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C6F2D000
trusted library allocation
page read and write
4911000
heap
page read and write
169CBCD9000
trusted library allocation
page read and write
169CAC81000
trusted library allocation
page read and write
169CA6EE000
trusted library allocation
page read and write
169CC3CD000
trusted library allocation
page read and write
169D16B7000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169CC1F7000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
169D97DD000
trusted library allocation
page read and write
169CC254000
trusted library allocation
page read and write
169D37FB000
trusted library allocation
page read and write
1A2AB164000
heap
page read and write
427000
unkown
page write copy
169C9A76000
trusted library allocation
page read and write
169D9DA7000
trusted library allocation
page read and write
22B46000
heap
page read and write
BC4000
heap
page read and write
169D9C37000
trusted library allocation
page read and write
169D349F000
trusted library allocation
page read and write
3F7E000
stack
page read and write
169CBD9B000
trusted library allocation
page read and write
169D9F9B000
trusted library allocation
page read and write
50C4000
heap
page read and write
169CBEEA000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
169D9E07000
trusted library allocation
page read and write
169D9858000
trusted library allocation
page read and write
2ABF000
stack
page read and write
169D37F7000
trusted library allocation
page read and write
169CAF9C000
trusted library allocation
page read and write
1A2AB1F1000
heap
page read and write
407F000
stack
page read and write
169CC3E7000
trusted library allocation
page read and write
2610000
direct allocation
page read and write
169CD8D6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB3DE000
trusted library allocation
page read and write
BC4000
heap
page read and write
500000
heap
page read and write
169C6A3F000
heap
page read and write
169CA3E4000
trusted library allocation
page read and write
169D983D000
trusted library allocation
page read and write
169CC22F000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CE447000
trusted library allocation
page read and write
169CB486000
trusted library allocation
page read and write
312F000
stack
page read and write
169C68FA000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
366E000
stack
page read and write
169D99B3000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169C6A3A000
heap
page read and write
169C98E6000
trusted library allocation
page read and write
11D4000
heap
page read and write
2150000
heap
page read and write
4C70000
direct allocation
page read and write
4911000
heap
page read and write
169C55E5000
trusted library allocation
page read and write
169CAAAB000
trusted library allocation
page read and write
169D9CAD000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CBD86000
trusted library allocation
page read and write
4911000
heap
page read and write
169D366A000
trusted library allocation
page read and write
169C55E5000
trusted library allocation
page read and write
169C9851000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D36A8000
trusted library allocation
page read and write
169CAA9B000
trusted library allocation
page read and write
890000
direct allocation
page read and write
BC4000
heap
page read and write
169D9D3E000
trusted library allocation
page read and write
169C916F000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C67FE000
trusted library allocation
page read and write
88B000
unkown
page execute and read and write
169D9FD4000
trusted library allocation
page read and write
169D97B8000
trusted library allocation
page read and write
169C9867000
trusted library allocation
page read and write
169C6A76000
heap
page read and write
169C974D000
trusted library allocation
page read and write
169D97E0000
trusted library allocation
page read and write
169D16F4000
trusted library allocation
page read and write
169CC241000
trusted library allocation
page read and write
1A2AB258000
heap
page read and write
26CC000
heap
page read and write
4911000
heap
page read and write
169D9FDF000
trusted library allocation
page read and write
169CA638000
trusted library allocation
page read and write
169C6FA3000
trusted library allocation
page read and write
423000
unkown
page readonly
2EFFA000
heap
page read and write
44FF000
stack
page read and write
169D9978000
trusted library allocation
page read and write
11D4000
heap
page read and write
477F000
stack
page read and write
169CA6AE000
trusted library allocation
page read and write
169CCD35000
trusted library allocation
page read and write
305E000
stack
page read and write
BFE000
stack
page read and write
61000
unkown
page execute and write copy
1A2AB1E3000
heap
page read and write
4911000
heap
page read and write
169D1AD0000
trusted library allocation
page read and write
169CB4C9000
trusted library allocation
page read and write
BC5000
heap
page read and write
4C70000
direct allocation
page read and write
BC4000
heap
page read and write
169D9E66000
trusted library allocation
page read and write
169D3767000
trusted library allocation
page read and write
169D9757000
trusted library allocation
page read and write
169C55F0000
trusted library allocation
page read and write
169C9BE8000
trusted library allocation
page read and write
169D99B9000
trusted library allocation
page read and write
62DC000
stack
page read and write
169D3AA0000
trusted library allocation
page read and write
169D9874000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
169C98FA000
trusted library allocation
page read and write
AC4000
heap
page read and write
2124000
heap
page read and write
61E00000
direct allocation
page execute and read and write
169D9998000
trusted library allocation
page read and write
4C81000
heap
page read and write
169D9B71000
trusted library allocation
page read and write
4A2E000
stack
page read and write
169C6A2F000
heap
page read and write
169C68F0000
trusted library allocation
page read and write
432000
unkown
page read and write
169CC19A000
trusted library allocation
page read and write
169D9D97000
trusted library allocation
page read and write
169CB0FA000
trusted library allocation
page read and write
401000
unkown
page execute read
169CA6F7000
trusted library allocation
page read and write
169D9FBD000
trusted library allocation
page read and write
169D1A3F000
trusted library allocation
page read and write
169D16EE000
trusted library allocation
page read and write
169D97DD000
trusted library allocation
page read and write
169D9C2A000
trusted library allocation
page read and write
7B50000
heap
page read and write
169CC32D000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CE477000
trusted library allocation
page read and write
301E000
stack
page read and write
169D9EC5000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
169CC1F0000
trusted library allocation
page read and write
1300000
heap
page read and write
169D9F83000
trusted library allocation
page read and write
169D9FE6000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
169C68B5000
trusted library allocation
page read and write
169CA3EB000
trusted library allocation
page read and write
169CBEE7000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CA6C3000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
1A2AB1F2000
heap
page read and write
169D97B8000
trusted library allocation
page read and write
169C9767000
trusted library allocation
page read and write
1154000
heap
page read and write
4C80000
heap
page read and write
8C4000
heap
page read and write
4911000
heap
page read and write
169CAC89000
trusted library allocation
page read and write
323F000
stack
page read and write
169CC3C8000
trusted library allocation
page read and write
169D9845000
trusted library allocation
page read and write
169C6A3A000
heap
page read and write
169D9FC9000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CA3F5000
trusted library allocation
page read and write
169D34FC000
trusted library allocation
page read and write
169C9A54000
trusted library allocation
page read and write
C69000
unkown
page read and write
169D39D6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D98A7000
trusted library allocation
page read and write
BC5000
heap
page read and write
169CAE50000
trusted library allocation
page read and write
169CC215000
trusted library allocation
page read and write
6CBBE000
unkown
page read and write
375E000
stack
page read and write
169D9D75000
trusted library allocation
page read and write
169C9ADA000
trusted library allocation
page read and write
169CA63F000
trusted library allocation
page read and write
6CD6F000
unkown
page readonly
401000
unkown
page execute read
3FFF000
stack
page read and write
169C6A42000
heap
page read and write
3E0000
heap
page read and write
169C9BBF000
trusted library allocation
page read and write
3D9E000
stack
page read and write
169D9FE1000
trusted library allocation
page read and write
BC4000
heap
page read and write
81D58A1E000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
169C9BD9000
trusted library allocation
page read and write
169CBEE7000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C9749000
trusted library allocation
page read and write
169CC1FA000
trusted library allocation
page read and write
169CAABB000
trusted library allocation
page read and write
169C91EE000
trusted library allocation
page read and write
3070000
heap
page read and write
406E000
stack
page read and write
169CACB6000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CD68A000
trusted library allocation
page read and write
1A2AB1E8000
heap
page read and write
427000
unkown
page write copy
11D4000
heap
page read and write
169D9CEC000
trusted library allocation
page read and write
169D3A87000
trusted library allocation
page read and write
169C67F3000
trusted library allocation
page read and write
889000
unkown
page write copy
169C5626000
trusted library allocation
page read and write
11D4000
heap
page read and write
12BD000
heap
page read and write
169CB4D4000
trusted library allocation
page read and write
1154000
heap
page read and write
169D9FEB000
trusted library allocation
page read and write
169CA6D3000
trusted library allocation
page read and write
169C6A76000
heap
page read and write
43E1000
heap
page read and write
169D1AD8000
trusted library allocation
page read and write
169D9FA7000
trusted library allocation
page read and write
427F000
stack
page read and write
169CC1CE000
trusted library allocation
page read and write
169CD890000
trusted library allocation
page read and write
169CAAE6000
trusted library allocation
page read and write
169CD8A1000
trusted library allocation
page read and write
169CC3E1000
trusted library allocation
page read and write
BC4000
heap
page read and write
4AC1000
heap
page read and write
169C68F2000
trusted library allocation
page read and write
169CA6D4000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9FF8000
trusted library allocation
page read and write
169D9776000
trusted library allocation
page read and write
169D9E64000
trusted library allocation
page read and write
169CB4DE000
trusted library allocation
page read and write
22B4D000
heap
page read and write
22B53000
heap
page read and write
49F0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
169C67B2000
trusted library allocation
page read and write
169C9196000
trusted library allocation
page read and write
169D3771000
trusted library allocation
page read and write
169D9E66000
trusted library allocation
page read and write
169D9B86000
trusted library allocation
page read and write
1154000
heap
page read and write
169C55F6000
trusted library allocation
page read and write
169CE4C4000
trusted library allocation
page read and write
890000
direct allocation
page read and write
321F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
169CB043000
trusted library allocation
page read and write
169D9F9B000
trusted library allocation
page read and write
4911000
heap
page read and write
169D3AA0000
trusted library allocation
page read and write
169D994F000
trusted library allocation
page read and write
169CA65B000
trusted library allocation
page read and write
169D9E66000
trusted library allocation
page read and write
169D983C000
trusted library allocation
page read and write
169CBE88000
trusted library allocation
page read and write
169C6763000
trusted library allocation
page read and write
169C68FA000
trusted library allocation
page read and write
169C9B55000
trusted library allocation
page read and write
169CAAE0000
trusted library allocation
page read and write
380F000
stack
page read and write
2F9F000
stack
page read and write
BC4000
heap
page read and write
420F000
stack
page read and write
169C98A1000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C6A90000
heap
page read and write
169CAA8F000
trusted library allocation
page read and write
169D9CFE000
trusted library allocation
page read and write
169CC357000
trusted library allocation
page read and write
4911000
heap
page read and write
ACA000
heap
page read and write
4AC1000
heap
page read and write
34FE000
stack
page read and write
169CBEBA000
trusted library allocation
page read and write
169D1AFC000
trusted library allocation
page read and write
413F000
stack
page read and write
169D9ED4000
trusted library allocation
page read and write
169D9B93000
trusted library allocation
page read and write
5D40000
heap
page read and write
4911000
heap
page read and write
169CC277000
trusted library allocation
page read and write
169D9FA7000
trusted library allocation
page read and write
169D9F25000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169D9F9D000
trusted library allocation
page read and write
169D9CD4000
trusted library allocation
page read and write
278F000
stack
page read and write
169CBD68000
trusted library allocation
page read and write
1C7AE000
stack
page read and write
39FD000
stack
page read and write
169CBD97000
trusted library allocation
page read and write
129D000
heap
page read and write
5120000
direct allocation
page read and write
169CB4BA000
trusted library allocation
page read and write
35FF000
stack
page read and write
AC4000
heap
page read and write
169C68A2000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
BC4000
heap
page read and write
2448000
unkown
page readonly
169D989F000
trusted library allocation
page read and write
39EF000
stack
page read and write
48FE000
stack
page read and write
22B4D000
heap
page read and write
169CD9C1000
trusted library allocation
page read and write
169CAAE0000
trusted library allocation
page read and write
169D5FEF000
trusted library allocation
page read and write
169D9F32000
trusted library allocation
page read and write
169CB2CE000
trusted library allocation
page read and write
169CAF69000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
3010000
heap
page read and write
BC4000
heap
page read and write
169D378D000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
BC4000
heap
page read and write
169D3686000
trusted library allocation
page read and write
22B53000
heap
page read and write
169CE493000
trusted library allocation
page read and write
169C6FA3000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
169C6F0E000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C6A36000
heap
page read and write
1154000
heap
page read and write
169C97F5000
trusted library allocation
page read and write
169D3657000
trusted library allocation
page read and write
169C674C000
trusted library allocation
page read and write
169CAE43000
trusted library allocation
page read and write
169C976F000
trusted library allocation
page read and write
169D9CF8000
trusted library allocation
page read and write
1A2AB1E8000
heap
page read and write
169CCD26000
trusted library allocation
page read and write
169CE446000
trusted library allocation
page read and write
169CBE8F000
trusted library allocation
page read and write
1C92E000
stack
page read and write
169CCDF0000
trusted library allocation
page read and write
169CA6D3000
trusted library allocation
page read and write
4911000
heap
page read and write
BC4000
heap
page read and write
169D9EE5000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169D7FAB000
trusted library allocation
page read and write
169CADDD000
trusted library allocation
page read and write
169D391A000
trusted library allocation
page read and write
5D45000
heap
page read and write
169D9878000
trusted library allocation
page read and write
169D3716000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C98E6000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169C6FF3000
trusted library allocation
page read and write
3B6E000
stack
page read and write
169D96B3000
trusted library allocation
page read and write
169C561E000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CBDFE000
trusted library allocation
page read and write
169C98BA000
trusted library allocation
page read and write
169CB4EE000
trusted library allocation
page read and write
BC5000
heap
page read and write
169CC37B000
trusted library allocation
page read and write
33EE000
stack
page read and write
F18000
unkown
page execute and read and write
169C9ADA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C98A6000
trusted library allocation
page read and write
169C9BC2000
trusted library allocation
page read and write
169C9176000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
169D9FD4000
trusted library allocation
page read and write
169CBDC1000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
169CC2C9000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C6A2F000
heap
page read and write
11D4000
heap
page read and write
169D3632000
trusted library allocation
page read and write
A1A000
unkown
page execute and read and write
169CAFC6000
trusted library allocation
page read and write
225F000
stack
page read and write
1154000
heap
page read and write
11D4000
heap
page read and write
169C6A34000
heap
page read and write
169C6A36000
heap
page read and write
169CBDA5000
trusted library allocation
page read and write
4D4E000
stack
page read and write
169D9FE4000
trusted library allocation
page read and write
169D1B82000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D98FD000
trusted library allocation
page read and write
169CBCD6000
trusted library allocation
page read and write
169CB8C6000
trusted library allocation
page read and write
2C3F000
stack
page read and write
169D9CAD000
trusted library allocation
page read and write
4AC1000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169CCDEA000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
5290000
direct allocation
page execute and read and write
3ACD000
stack
page read and write
F19000
unkown
page execute and write copy
169D9CD1000
trusted library allocation
page read and write
13F0000
direct allocation
page read and write
295F000
stack
page read and write
22B1E000
heap
page read and write
1A2AB1E0000
heap
page read and write
3EBF000
stack
page read and write
419000
unkown
page readonly
65F000
stack
page read and write
401000
unkown
page execute read
169D97FB000
trusted library allocation
page read and write
169D9F25000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
169D3AA5000
trusted library allocation
page read and write
BC4000
heap
page read and write
4A80000
direct allocation
page execute and read and write
AC4000
heap
page read and write
169CBE90000
trusted library allocation
page read and write
BC5000
heap
page read and write
BC4000
heap
page read and write
15FF000
stack
page read and write
22B32000
heap
page read and write
9C0000
heap
page read and write
169D37FB000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
3EBF000
stack
page read and write
169C9BD9000
trusted library allocation
page read and write
169D9FE3000
trusted library allocation
page read and write
4AC1000
heap
page read and write
2660000
heap
page read and write
169CE45C000
trusted library allocation
page read and write
1154000
heap
page read and write
169D3686000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB2FE000
trusted library allocation
page read and write
169C6A76000
heap
page read and write
169D3672000
trusted library allocation
page read and write
169CB497000
trusted library allocation
page read and write
2AEF000
stack
page read and write
169C916C000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
211E000
stack
page read and write
169C56FE000
trusted library allocation
page read and write
169CC18D000
trusted library allocation
page read and write
169CC1FA000
trusted library allocation
page read and write
118A000
stack
page read and write
22B53000
heap
page read and write
4911000
heap
page read and write
169CE411000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CB07D000
trusted library allocation
page read and write
169C9161000
trusted library allocation
page read and write
169CBF0F000
trusted library allocation
page read and write
169CDA88000
trusted library allocation
page read and write
5D2E000
stack
page read and write
BC4000
heap
page read and write
400000
unkown
page readonly
169D39D6000
trusted library allocation
page read and write
169C6A34000
heap
page read and write
4A50000
direct allocation
page execute and read and write
169CA6E9000
trusted library allocation
page read and write
22B38000
heap
page read and write
169CD6EA000
trusted library allocation
page read and write
169C9845000
trusted library allocation
page read and write
1A2AB267000
heap
page read and write
169CA6D3000
trusted library allocation
page read and write
169CACF1000
trusted library allocation
page read and write
169C6FFD000
trusted library allocation
page read and write
169CD8F2000
trusted library allocation
page read and write
169D9FE3000
trusted library allocation
page read and write
13F0000
direct allocation
page read and write
169D9792000
trusted library allocation
page read and write
169D38E7000
trusted library allocation
page read and write
169D9767000
trusted library allocation
page read and write
12CB000
heap
page read and write
169C6751000
trusted library allocation
page read and write
169D34F8000
trusted library allocation
page read and write
169D370A000
trusted library allocation
page read and write
BC4000
heap
page read and write
5AF000
unkown
page execute and read and write
169D9CA2000
trusted library allocation
page read and write
169C9A65000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
4F00000
direct allocation
page execute and read and write
BC4000
heap
page read and write
169CB8F8000
trusted library allocation
page read and write
169D361E000
trusted library allocation
page read and write
169CD8C9000
trusted library allocation
page read and write
169D3658000
trusted library allocation
page read and write
169D9E68000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CD659000
trusted library allocation
page read and write
2196FBF0000
heap
page read and write
BC4000
heap
page read and write
1A2AB15F000
heap
page read and write
169CC1F4000
trusted library allocation
page read and write
169D9B5C000
trusted library allocation
page read and write
337F000
stack
page read and write
169D9977000
trusted library allocation
page read and write
169CE402000
trusted library allocation
page read and write
169CC24F000
trusted library allocation
page read and write
169CBD28000
trusted library allocation
page read and write
22B34000
heap
page read and write
AE0000
heap
page read and write
169C9845000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
169CBD3C000
trusted library allocation
page read and write
169CA62C000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
169D9CCE000
trusted library allocation
page read and write
10B9000
unkown
page execute and read and write
169CB483000
trusted library allocation
page read and write
169D98F2000
trusted library allocation
page read and write
169CB5E9000
trusted library allocation
page read and write
169C9BDC000
trusted library allocation
page read and write
4CA1000
heap
page read and write
169D3AE6000
trusted library allocation
page read and write
9B0000
direct allocation
page execute and read and write
169CD620000
trusted library allocation
page read and write
169CB0FA000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
4EF0000
direct allocation
page execute and read and write
169CB100000
trusted library allocation
page read and write
1F0000
heap
page read and write
169C98E0000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C6870000
trusted library allocation
page read and write
169CA6F3000
trusted library allocation
page read and write
22B2F000
heap
page read and write
169CC1FA000
trusted library allocation
page read and write
462F000
stack
page read and write
169C6F1B000
trusted library allocation
page read and write
169C9AFE000
trusted library allocation
page read and write
2FEF000
stack
page read and write
4C81000
heap
page read and write
169CBDA5000
trusted library allocation
page read and write
169D99C1000
trusted library allocation
page read and write
821000
unkown
page execute and write copy
169D9FCB000
trusted library allocation
page read and write
169D33A3000
trusted library allocation
page read and write
169D9757000
trusted library allocation
page read and write
169C983C000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
4110000
heap
page read and write
169CC204000
trusted library allocation
page read and write
169D9FDF000
trusted library allocation
page read and write
169C98DA000
trusted library allocation
page read and write
6CDAF000
unkown
page write copy
BC4000
heap
page read and write
169C9794000
trusted library allocation
page read and write
169C6FD1000
trusted library allocation
page read and write
169C91F2000
trusted library allocation
page read and write
29FD3064000
heap
page read and write
417E000
stack
page read and write
BC4000
heap
page read and write
169D9884000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169C98EF000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
169D98C4000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CADC1000
trusted library allocation
page read and write
169CDA83000
trusted library allocation
page read and write
169CD6FB000
trusted library allocation
page read and write
169CADC8000
trusted library allocation
page read and write
BC4000
heap
page read and write
12A1000
heap
page read and write
169CC3E6000
trusted library allocation
page read and write
169C9B35000
trusted library allocation
page read and write
169C687F000
trusted library allocation
page read and write
519000
unkown
page execute and read and write
28B90000
heap
page read and write
169C67CA000
trusted library allocation
page read and write
403E000
stack
page read and write
169CAAB3000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9C93000
trusted library allocation
page read and write
169CD620000
trusted library allocation
page read and write
1A2AB269000
heap
page read and write
169D9CF7000
trusted library allocation
page read and write
169C687F000
trusted library allocation
page read and write
169CC292000
trusted library allocation
page read and write
169D9C22000
trusted library allocation
page read and write
169C6A2F000
heap
page read and write
169D9D43000
trusted library allocation
page read and write
169D38ED000
trusted library allocation
page read and write
8C4000
heap
page read and write
1154000
heap
page read and write
169CC25E000
trusted library allocation
page read and write
169D9FBD000
trusted library allocation
page read and write
169D3A9A000
trusted library allocation
page read and write
4AC1000
heap
page read and write
BC4000
heap
page read and write
169D98F0000
trusted library allocation
page read and write
6CB30000
unkown
page readonly
169CCD6B000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
505000
heap
page read and write
BC4000
heap
page read and write
2B3E000
stack
page read and write
169CE4A4000
trusted library allocation
page read and write
169C9ED9000
trusted library allocation
page read and write
169D976F000
trusted library allocation
page read and write
11D0000
heap
page read and write
2B8F000
stack
page read and write
13F0000
direct allocation
page read and write
BC4000
heap
page read and write
294E000
stack
page read and write
BC4000
heap
page read and write
169CBDD7000
trusted library allocation
page read and write
169CC1C6000
trusted library allocation
page read and write
169D345A000
trusted library allocation
page read and write
169CAAEA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9EBB000
trusted library allocation
page read and write
BC5000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
22B1F000
heap
page read and write
BC4000
heap
page read and write
169C982E000
trusted library allocation
page read and write
169C6FD1000
trusted library allocation
page read and write
169C6A71000
heap
page read and write
169CBB98000
trusted library allocation
page read and write
169D9FE7000
trusted library allocation
page read and write
169CA62C000
trusted library allocation
page read and write
169C9751000
trusted library allocation
page read and write
169CE4C6000
trusted library allocation
page read and write
169CE4F4000
trusted library allocation
page read and write
1A2AB1B2000
heap
page read and write
169CE4BD000
trusted library allocation
page read and write
169CBD1C000
trusted library allocation
page read and write
169CC1FA000
trusted library allocation
page read and write
A00000
heap
page read and write
452E000
stack
page read and write
169D37F7000
trusted library allocation
page read and write
169C9B4E000
trusted library allocation
page read and write
169D9ED4000
trusted library allocation
page read and write
22B1F000
heap
page read and write
42EE000
stack
page read and write
640000
direct allocation
page read and write
169CD8C9000
trusted library allocation
page read and write
169C6F23000
trusted library allocation
page read and write
169C6884000
trusted library allocation
page read and write
8C4000
heap
page read and write
169CDA5C000
trusted library allocation
page read and write
416F000
stack
page read and write
42BE000
stack
page read and write
169CDA00000
trusted library allocation
page read and write
169D9890000
trusted library allocation
page read and write
169D1B76000
trusted library allocation
page read and write
BC4000
heap
page read and write
4C90000
heap
page read and write
169CBEA3000
trusted library allocation
page read and write
169CB0AE000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC3F1000
trusted library allocation
page read and write
22B1E000
heap
page read and write
5A8000
unkown
page execute and read and write
3A2E000
stack
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
2571000
heap
page read and write
169D3388000
trusted library allocation
page read and write
169CD8D6000
trusted library allocation
page read and write
169CCDE2000
trusted library allocation
page read and write
169D98C0000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
169D16A2000
trusted library allocation
page read and write
169CC1CA000
trusted library allocation
page read and write
169C9B8C000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D1709000
trusted library allocation
page read and write
1C5AF000
stack
page read and write
169D332C000
trusted library allocation
page read and write
2C7E000
stack
page read and write
169C6849000
trusted library allocation
page read and write
169CAF85000
trusted library allocation
page read and write
1CAA1000
heap
page read and write
22B2D000
heap
page read and write
169C6A85000
heap
page read and write
169C9BBD000
trusted library allocation
page read and write
169CC335000
trusted library allocation
page read and write
169D98F3000
trusted library allocation
page read and write
169CD911000
trusted library allocation
page read and write
88F000
stack
page read and write
169D33FD000
trusted library allocation
page read and write
169D977A000
trusted library allocation
page read and write
5181000
direct allocation
page read and write
169CBDDB000
trusted library allocation
page read and write
169D9858000
trusted library allocation
page read and write
4911000
heap
page read and write
11D4000
heap
page read and write
169D9CFA000
trusted library allocation
page read and write
1A2AB169000
heap
page read and write
169CC2C9000
trusted library allocation
page read and write
169C6F23000
trusted library allocation
page read and write
169C9BB5000
trusted library allocation
page read and write
169C9A63000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
169D99B7000
trusted library allocation
page read and write
169D376F000
trusted library allocation
page read and write
169CC2A6000
trusted library allocation
page read and write
22B46000
heap
page read and write
4491000
heap
page read and write
169CAAE0000
trusted library allocation
page read and write
BC5000
heap
page read and write
11D4000
heap
page read and write
169D9FC0000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
169C55F0000
trusted library allocation
page read and write
169D9852000
trusted library allocation
page read and write
3EEF000
stack
page read and write
169D3663000
trusted library allocation
page read and write
169CC286000
trusted library allocation
page read and write
169C6A40000
heap
page read and write
169CB4B8000
trusted library allocation
page read and write
3FCE000
stack
page read and write
169C6FE1000
trusted library allocation
page read and write
2580000
heap
page read and write
169C985E000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C55EC000
trusted library allocation
page read and write
456E000
stack
page read and write
169D1AD0000
trusted library allocation
page read and write
1A2AB17D000
heap
page read and write
11D4000
heap
page read and write
169CC1FA000
trusted library allocation
page read and write
169C9BC3000
trusted library allocation
page read and write
34FE000
stack
page read and write
12D3000
heap
page read and write
4AC1000
heap
page read and write
169C6F2D000
trusted library allocation
page read and write
169C673A000
trusted library allocation
page read and write
2127000
heap
page read and write
169C68AD000
trusted library allocation
page read and write
169CAAB3000
trusted library allocation
page read and write
169CC1D5000
trusted library allocation
page read and write
169D97E3000
trusted library allocation
page read and write
169D33C6000
trusted library allocation
page read and write
2ED4F000
stack
page read and write
169D97FB000
trusted library allocation
page read and write
169D9852000
trusted library allocation
page read and write
169CAC98000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
169C9867000
trusted library allocation
page read and write
169C97F5000
trusted library allocation
page read and write
169C916C000
trusted library allocation
page read and write
169CD9D9000
trusted library allocation
page read and write
BC4000
heap
page read and write
11D4000
heap
page read and write
4AC1000
heap
page read and write
169D36DF000
trusted library allocation
page read and write
169CC2C9000
trusted library allocation
page read and write
2E7F000
stack
page read and write
5AD000
unkown
page execute and read and write
169C985F000
trusted library allocation
page read and write
169C6A6A000
heap
page read and write
169C98E6000
trusted library allocation
page read and write
169C67DE000
trusted library allocation
page read and write
169D9B86000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CA6F3000
trusted library allocation
page read and write
169CB473000
trusted library allocation
page read and write
BC4000
heap
page read and write
11C0000
direct allocation
page read and write
169CBB3F000
trusted library allocation
page read and write
169C9B60000
trusted library allocation
page read and write
256E000
heap
page read and write
169CB4EA000
trusted library allocation
page read and write
169D97FE000
trusted library allocation
page read and write
169CCD77000
trusted library allocation
page read and write
169CAEF3000
trusted library allocation
page read and write
169C67F9000
trusted library allocation
page read and write
169D9B76000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D98F2000
trusted library allocation
page read and write
169CCD3A000
trusted library allocation
page read and write
169C9BE0000
trusted library allocation
page read and write
169CA6D3000
trusted library allocation
page read and write
169D97E7000
trusted library allocation
page read and write
169C5523000
trusted library allocation
page read and write
169CE4A1000
trusted library allocation
page read and write
417E000
stack
page read and write
6685000
heap
page read and write
417000
unkown
page read and write
BC4000
heap
page read and write
169C9B8A000
trusted library allocation
page read and write
169CB4CC000
trusted library allocation
page read and write
AC4000
heap
page read and write
169C9AB3000
trusted library allocation
page read and write
335F000
stack
page read and write
169CC2F1000
trusted library allocation
page read and write
169CAF89000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
169CB0C3000
trusted library allocation
page read and write
169CBEEA000
trusted library allocation
page read and write
169D9F9B000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
169D99BB000
trusted library allocation
page read and write
169D36BE000
trusted library allocation
page read and write
169CD620000
trusted library allocation
page read and write
169CB49F000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9B5C000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D99B3000
trusted library allocation
page read and write
169D9CCE000
trusted library allocation
page read and write
169D97ED000
trusted library allocation
page read and write
169CC237000
trusted library allocation
page read and write
169D7F13000
trusted library allocation
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
169D9F8F000
trusted library allocation
page read and write
169D373C000
trusted library allocation
page read and write
309000
unkown
page read and write
38BE000
stack
page read and write
19C000
stack
page read and write
169CDA67000
trusted library allocation
page read and write
169CAAB9000
trusted library allocation
page read and write
169D1BBF000
trusted library allocation
page read and write
169CB06D000
trusted library allocation
page read and write
169CB12F000
trusted library allocation
page read and write
169C55F0000
trusted library allocation
page read and write
169C9BDC000
trusted library allocation
page read and write
169D3785000
trusted library allocation
page read and write
169D3666000
trusted library allocation
page read and write
C62000
unkown
page execute and read and write
1C6BE000
stack
page read and write
290000
heap
page read and write
29FD2F00000
trusted library allocation
page read and write
169D1BBF000
trusted library allocation
page read and write
169CB4A2000
trusted library allocation
page read and write
169D16FC000
trusted library allocation
page read and write
169D9868000
trusted library allocation
page read and write
4AC2000
heap
page read and write
4911000
heap
page read and write
169C9BE3000
trusted library allocation
page read and write
169CB078000
trusted library allocation
page read and write
5191000
direct allocation
page read and write
169CC2F8000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
2EEF000
stack
page read and write
169C6A4B000
heap
page read and write
169CB4CB000
trusted library allocation
page read and write
169D9F91000
trusted library allocation
page read and write
169CAE6B000
trusted library allocation
page read and write
169CD69C000
trusted library allocation
page read and write
5CAB000
stack
page read and write
169D36DF000
trusted library allocation
page read and write
169CACBD000
trusted library allocation
page read and write
169CAABB000
trusted library allocation
page read and write
B28000
unkown
page execute and read and write
169C98E6000
trusted library allocation
page read and write
2120000
heap
page read and write
169D9E6B000
trusted library allocation
page read and write
4F50000
direct allocation
page read and write
12D3000
heap
page read and write
169D9CAD000
trusted library allocation
page read and write
169C5571000
trusted library allocation
page read and write
266E000
heap
page read and write
311F000
stack
page read and write
169CCD26000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C985F000
trusted library allocation
page read and write
169CCDF0000
trusted library allocation
page read and write
22B2D000
heap
page read and write
169CBDB3000
trusted library allocation
page read and write
169D5F70000
trusted library allocation
page read and write
2EF60000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9ED6000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
169D9F8F000
trusted library allocation
page read and write
169D34B6000
trusted library allocation
page read and write
169C98FA000
trusted library allocation
page read and write
169CC1F5000
trusted library allocation
page read and write
AC4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
169CB05D000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
169D99EE000
trusted library allocation
page read and write
169C6FE1000
trusted library allocation
page read and write
169CBF0B000
trusted library allocation
page read and write
169C66EE000
trusted library allocation
page read and write
169C9A6C000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
36CF000
stack
page read and write
BC4000
heap
page read and write
169CBD34000
trusted library allocation
page read and write
540000
heap
page read and write
AC4000
heap
page read and write
169C98E6000
trusted library allocation
page read and write
169CC2A6000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
169CB22B000
trusted library allocation
page read and write
22B31000
heap
page read and write
169D9CEC000
trusted library allocation
page read and write
169C9BCF000
trusted library allocation
page read and write
169D3769000
trusted library allocation
page read and write
4AC2000
heap
page read and write
169D9766000
trusted library allocation
page read and write
169CBDF6000
trusted library allocation
page read and write
28BF0000
heap
page read and write
169D5FEF000
trusted library allocation
page read and write
4AC1000
heap
page read and write
12BD000
heap
page read and write
48D0000
trusted library allocation
page read and write
169C55F6000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
1A2AB23B000
heap
page read and write
29FD4810000
heap
page read and write
169D9FCB000
trusted library allocation
page read and write
169D3675000
trusted library allocation
page read and write
169D5FC9000
trusted library allocation
page read and write
43E0000
heap
page read and write
AC4000
heap
page read and write
BC4000
heap
page read and write
169D9E92000
trusted library allocation
page read and write
6FE000
heap
page read and write
363E000
stack
page read and write
169C6A2F000
heap
page read and write
169C9198000
trusted library allocation
page read and write
169CAC6B000
trusted library allocation
page read and write
C01000
unkown
page execute and write copy
169CA6F7000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C68DF000
trusted library allocation
page read and write
169CDA6C000
trusted library allocation
page read and write
169CC1F4000
trusted library allocation
page read and write
169CB4C6000
trusted library allocation
page read and write
169D9BE2000
trusted library allocation
page read and write
169D9E92000
trusted library allocation
page read and write
169CBE89000
trusted library allocation
page read and write
169CCD7D000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
169CB3ED000
trusted library allocation
page read and write
AC4000
heap
page read and write
1C4AF000
stack
page read and write
169CD69E000
trusted library allocation
page read and write
169D9741000
trusted library allocation
page read and write
169CA6E8000
trusted library allocation
page read and write
169CADF0000
trusted library allocation
page read and write
169CE480000
trusted library allocation
page read and write
AC4000
heap
page read and write
12A1000
heap
page read and write
169C6A34000
heap
page read and write
169CC1C6000
trusted library allocation
page read and write
169CCD18000
trusted library allocation
page read and write
29FD4826000
heap
page read and write
169D9C2A000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D97F2000
trusted library allocation
page read and write
169C9BD9000
trusted library allocation
page read and write
169D99BF000
trusted library allocation
page read and write
169D366A000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
169D1AF0000
trusted library allocation
page read and write
169D37E6000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D98FD000
trusted library allocation
page read and write
169CD9BC000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C6A56000
heap
page read and write
169D9F25000
trusted library allocation
page read and write
169CB4DD000
trusted library allocation
page read and write
169CA6C9000
trusted library allocation
page read and write
169D9BCA000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
29BE000
stack
page read and write
169D9ED4000
trusted library allocation
page read and write
126F000
heap
page read and write
169D9F18000
trusted library allocation
page read and write
169D9E06000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
169CBF11000
trusted library allocation
page read and write
169CDA8A000
trusted library allocation
page read and write
169CAAB3000
trusted library allocation
page read and write
49A000
unkown
page execute and read and write
169CB132000
trusted library allocation
page read and write
169CC1CA000
trusted library allocation
page read and write
4911000
heap
page read and write
169CCD8A000
trusted library allocation
page read and write
169D9C85000
trusted library allocation
page read and write
169CCD94000
trusted library allocation
page read and write
87E000
stack
page read and write
169CBE5C000
trusted library allocation
page read and write
169D168E000
trusted library allocation
page read and write
169C98B1000
trusted library allocation
page read and write
1C57E000
stack
page read and write
22B34000
heap
page read and write
169CC18D000
trusted library allocation
page read and write
169C6F9F000
trusted library allocation
page read and write
169CC18D000
trusted library allocation
page read and write
169D9EA8000
trusted library allocation
page read and write
169CD65D000
trusted library allocation
page read and write
2D3F000
stack
page read and write
169D3785000
trusted library allocation
page read and write
362F000
stack
page read and write
169CC3B8000
trusted library allocation
page read and write
169CA0CA000
trusted library allocation
page read and write
169CD9A2000
trusted library allocation
page read and write
169D97CF000
trusted library allocation
page read and write
169D9CAD000
trusted library allocation
page read and write
22B2A000
heap
page read and write
9C000
stack
page read and write
22B1A000
heap
page read and write
337F000
stack
page read and write
43C000
unkown
page execute and read and write
11D4000
heap
page read and write
169D3638000
trusted library allocation
page read and write
169CAA97000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C6877000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
169CD6B4000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
169D362C000
trusted library allocation
page read and write
22B34000
heap
page read and write
169C6A38000
heap
page read and write
169D9C85000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
169D9FEB000
trusted library allocation
page read and write
169D362B000
trusted library allocation
page read and write
AFB000
unkown
page execute and read and write
4A50000
direct allocation
page execute and read and write
169CAAFE000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9955000
trusted library allocation
page read and write
169CAECB000
trusted library allocation
page read and write
169CBD43000
trusted library allocation
page read and write
169C6A34000
heap
page read and write
169CC1CA000
trusted library allocation
page read and write
169CAE5C000
trusted library allocation
page read and write
169C6A95000
heap
page read and write
169C5626000
trusted library allocation
page read and write
4CA1000
heap
page read and write
BC4000
heap
page read and write
35DF000
stack
page read and write
169D1AE0000
trusted library allocation
page read and write
169CADE8000
trusted library allocation
page read and write
12B4000
heap
page read and write
1A2AB15F000
heap
page read and write
169D377C000
trusted library allocation
page read and write
169D97F2000
trusted library allocation
page read and write
169CB0E8000
trusted library allocation
page read and write
CE1000
unkown
page execute and read and write
169D981A000
trusted library allocation
page read and write
169C91C0000
trusted library allocation
page read and write
169CA63C000
trusted library allocation
page read and write
2CCF000
stack
page read and write
169D9D82000
trusted library allocation
page read and write
169C98B0000
trusted library allocation
page read and write
169CBB1D000
trusted library allocation
page read and write
169C6FCB000
trusted library allocation
page read and write
4B6E000
stack
page read and write
169D97E3000
trusted library allocation
page read and write
169D9EE0000
trusted library allocation
page read and write
169CE4B6000
trusted library allocation
page read and write
8C4000
heap
page read and write
13E0000
heap
page read and write
169C91EA000
trusted library allocation
page read and write
1A2AB22A000
heap
page read and write
169CAAB9000
trusted library allocation
page read and write
37AE000
stack
page read and write
1C51E000
stack
page read and write
11E0000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4A30000
direct allocation
page execute and read and write
3D7F000
stack
page read and write
169D37F7000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D34FD000
trusted library allocation
page read and write
169CC3C6000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169C98EF000
trusted library allocation
page read and write
169CB5DF000
trusted library allocation
page read and write
4911000
heap
page read and write
169D99C1000
trusted library allocation
page read and write
F18000
unkown
page execute and read and write
169CA3E4000
trusted library allocation
page read and write
2A1000
unkown
page execute and write copy
169D9FCB000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D1700000
trusted library allocation
page read and write
169D9E95000
trusted library allocation
page read and write
2A0000
unkown
page read and write
4C81000
heap
page read and write
169C6A4C000
heap
page read and write
52D0000
direct allocation
page execute and read and write
169C6A3F000
heap
page read and write
169D1A51000
trusted library allocation
page read and write
169D98FE000
trusted library allocation
page read and write
169D9B41000
trusted library allocation
page read and write
169D9EEB000
trusted library allocation
page read and write
169C6842000
trusted library allocation
page read and write
169D5FC1000
trusted library allocation
page read and write
BC5000
heap
page read and write
169D34A3000
trusted library allocation
page read and write
169CA62C000
trusted library allocation
page read and write
169CAF7A000
trusted library allocation
page read and write
4911000
heap
page read and write
144E000
stack
page read and write
3C0E000
stack
page read and write
169D9FFA000
trusted library allocation
page read and write
6CDAE000
unkown
page read and write
169C5682000
trusted library allocation
page read and write
12DE000
heap
page read and write
169D37DA000
trusted library allocation
page read and write
4AC1000
heap
page read and write
1154000
heap
page read and write
525F000
stack
page read and write
169C9871000
trusted library allocation
page read and write
169C66E2000
trusted library allocation
page read and write
169D98D0000
trusted library allocation
page read and write
169D9CD1000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
821000
unkown
page execute and write copy
169CE4B8000
trusted library allocation
page read and write
169CC282000
trusted library allocation
page read and write
169C6A34000
heap
page read and write
11D4000
heap
page read and write
AC4000
heap
page read and write
169C5561000
trusted library allocation
page read and write
325E000
stack
page read and write
32AE000
stack
page read and write
169D9E6B000
trusted library allocation
page read and write
169D36DC000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CBE87000
trusted library allocation
page read and write
169D9C93000
trusted library allocation
page read and write
169CB0A2000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9B71000
trusted library allocation
page read and write
2615000
heap
page read and write
169CD878000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
BC4000
heap
page read and write
169CBD97000
trusted library allocation
page read and write
169C9B1B000
trusted library allocation
page read and write
169D9E7C000
trusted library allocation
page read and write
169CA6F7000
trusted library allocation
page read and write
169C6A71000
heap
page read and write
169CC2F8000
trusted library allocation
page read and write
4C81000
heap
page read and write
169CD9BA000
trusted library allocation
page read and write
B5253FE000
stack
page read and write
169CBD34000
trusted library allocation
page read and write
273F000
stack
page read and write
169D9824000
trusted library allocation
page read and write
29FD4828000
heap
page read and write
AC4000
heap
page read and write
169CC1E1000
trusted library allocation
page read and write
169CB078000
trusted library allocation
page read and write
12C9000
heap
page read and write
169CC1C6000
trusted library allocation
page read and write
5CEE000
stack
page read and write
169D9BC0000
trusted library allocation
page read and write
BC4000
heap
page read and write
4DF1000
direct allocation
page read and write
169CD90B000
trusted library allocation
page read and write
169D3661000
trusted library allocation
page read and write
4AC1000
heap
page read and write
22B35000
heap
page read and write
169CD656000
trusted library allocation
page read and write
434E000
stack
page read and write
33BE000
stack
page read and write
169CC28A000
trusted library allocation
page read and write
169D98F3000
trusted library allocation
page read and write
169CD8A1000
trusted library allocation
page read and write
21970090000
heap
page read and write
AC4000
heap
page read and write
169CD8B1000
trusted library allocation
page read and write
1C0000
heap
page read and write
125E000
heap
page read and write
169CC1B2000
trusted library allocation
page read and write
169CBB6A000
trusted library allocation
page read and write
169CC2F1000
trusted library allocation
page read and write
BC4000
heap
page read and write
11D4000
heap
page read and write
169D9FC8000
trusted library allocation
page read and write
169CD640000
trusted library allocation
page read and write
169C6FA3000
trusted library allocation
page read and write
169CCD94000
trusted library allocation
page read and write
169C6A76000
heap
page read and write
169CC34E000
trusted library allocation
page read and write
169CB132000
trusted library allocation
page read and write
169CE4F4000
trusted library allocation
page read and write
169CCDE2000
trusted library allocation
page read and write
169C6A4B000
heap
page read and write
169CBD19000
trusted library allocation
page read and write
1C61F000
stack
page read and write
169CE4DC000
trusted library allocation
page read and write
1A2AB1E3000
heap
page read and write
BC4000
heap
page read and write
169CBDA9000
trusted library allocation
page read and write
6A0F000
stack
page read and write
BC5000
heap
page read and write
BC4000
heap
page read and write
169CD890000
trusted library allocation
page read and write
169D3672000
trusted library allocation
page read and write
4A4F000
stack
page read and write
169CBD68000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
62C000
unkown
page execute and read and write
22B19000
heap
page read and write
169D9769000
trusted library allocation
page read and write
169CD936000
trusted library allocation
page read and write
169CB4EE000
trusted library allocation
page read and write
4C81000
heap
page read and write
169C6A7C000
heap
page read and write
8C4000
heap
page read and write
169D3675000
trusted library allocation
page read and write
169D9FB0000
trusted library allocation
page read and write
169C68B0000
trusted library allocation
page read and write
169CC3CD000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D97E7000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D3AEC000
trusted library allocation
page read and write
AC4000
heap
page read and write
22B35000
heap
page read and write
169CE481000
trusted library allocation
page read and write
169D9825000
trusted library allocation
page read and write
169C6A90000
heap
page read and write
1C3FF000
stack
page read and write
169C9161000
trusted library allocation
page read and write
BC4000
heap
page read and write
ACE000
stack
page read and write
169D97F2000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CB0ED000
trusted library allocation
page read and write
169C9865000
trusted library allocation
page read and write
169C91CC000
trusted library allocation
page read and write
12B9000
heap
page read and write
22B33000
heap
page read and write
43FE000
stack
page read and write
169D9F20000
trusted library allocation
page read and write
13F0000
direct allocation
page read and write
169CAA9B000
trusted library allocation
page read and write
169D3658000
trusted library allocation
page read and write
141B000
heap
page read and write
169D36DC000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
169D97CF000
trusted library allocation
page read and write
666E000
stack
page read and write
169D1A67000
trusted library allocation
page read and write
169CE486000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB0E8000
trusted library allocation
page read and write
BC4000
heap
page read and write
4FC1000
direct allocation
page read and write
169CD637000
trusted library allocation
page read and write
169CBEF8000
trusted library allocation
page read and write
169CAA93000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
169D9767000
trusted library allocation
page read and write
169C9BDC000
trusted library allocation
page read and write
169D9FE6000
trusted library allocation
page read and write
29FD2C73000
heap
page read and write
169D98F3000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
169C66EE000
trusted library allocation
page read and write
169D3658000
trusted library allocation
page read and write
169D9FFA000
trusted library allocation
page read and write
169D7F67000
trusted library allocation
page read and write
169C6A72000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
4911000
heap
page read and write
43BE000
stack
page read and write
C00000
unkown
page readonly
169CE4B8000
trusted library allocation
page read and write
169CD62D000
trusted library allocation
page read and write
29FE000
stack
page read and write
169CBDB3000
trusted library allocation
page read and write
169D9B3D000
trusted library allocation
page read and write
4BFC000
stack
page read and write
169D9FD4000
trusted library allocation
page read and write
169D9DEF000
trusted library allocation
page read and write
B3E000
unkown
page execute and write copy
AC4000
heap
page read and write
169CA6FA000
trusted library allocation
page read and write
169C97F5000
trusted library allocation
page read and write
169CAA6D000
trusted library allocation
page read and write
6CBC2000
unkown
page readonly
11D4000
heap
page read and write
890000
direct allocation
page read and write
169D99E5000
trusted library allocation
page read and write
413000
unkown
page readonly
169CBEE2000
trusted library allocation
page read and write
169C66E3000
trusted library allocation
page read and write
B5233FE000
stack
page read and write
1C8CD000
stack
page read and write
158E000
stack
page read and write
169D9DFE000
trusted library allocation
page read and write
11D4000
heap
page read and write
169C9A63000
trusted library allocation
page read and write
169CC3D9000
trusted library allocation
page read and write
169CB092000
trusted library allocation
page read and write
BC5000
heap
page read and write
448F000
stack
page read and write
169D9DE6000
trusted library allocation
page read and write
6E4D000
stack
page read and write
13E0000
heap
page read and write
1340000
heap
page read and write
169D3A64000
trusted library allocation
page read and write
169CC1F4000
trusted library allocation
page read and write
169CBDA7000
trusted library allocation
page read and write
169D983F000
trusted library allocation
page read and write
169CC3C6000
trusted library allocation
page read and write
169D9EFE000
trusted library allocation
page read and write
5E4D000
stack
page read and write
169D9C85000
trusted library allocation
page read and write
169C9743000
trusted library allocation
page read and write
169CC1F7000
trusted library allocation
page read and write
12C4000
heap
page read and write
169CD656000
trusted library allocation
page read and write
169D3AA5000
trusted library allocation
page read and write
169CC3E7000
trusted library allocation
page read and write
169C9BA7000
trusted library allocation
page read and write
169CD65D000
trusted library allocation
page read and write
169CBD36000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CAF81000
trusted library allocation
page read and write
169D9F9D000
trusted library allocation
page read and write
169CB07D000
trusted library allocation
page read and write
169C6A76000
heap
page read and write
169C9794000
trusted library allocation
page read and write
2196FD20000
heap
page read and write
169D97AA000
trusted library allocation
page read and write
169CACF5000
trusted library allocation
page read and write
169CC3D4000
trusted library allocation
page read and write
169D37FB000
trusted library allocation
page read and write
169D16FC000
trusted library allocation
page read and write
169CC316000
trusted library allocation
page read and write
169CAFA1000
trusted library allocation
page read and write
4911000
heap
page read and write
169CC292000
trusted library allocation
page read and write
169C6F63000
trusted library allocation
page read and write
377E000
stack
page read and write
169CE4E7000
trusted library allocation
page read and write
11C0000
direct allocation
page read and write
81D58A24000
trusted library allocation
page read and write
169C9767000
trusted library allocation
page read and write
169D9B53000
trusted library allocation
page read and write
169CC1F4000
trusted library allocation
page read and write
169C6851000
trusted library allocation
page read and write
500000
heap
page read and write
BC4000
heap
page read and write
169D3ADA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CB092000
trusted library allocation
page read and write
169C6A69000
heap
page read and write
4AC1000
heap
page read and write
169CAAC2000
trusted library allocation
page read and write
260E000
stack
page read and write
117D000
stack
page read and write
98E000
stack
page read and write
408E000
stack
page read and write
169CAAE0000
trusted library allocation
page read and write
169D9D7B000
trusted library allocation
page read and write
ABD000
heap
page read and write
169CAFEF000
trusted library allocation
page read and write
169C91E8000
trusted library allocation
page read and write
169CA65B000
trusted library allocation
page read and write
415E000
stack
page read and write
169D3782000
trusted library allocation
page read and write
169C91EF000
trusted library allocation
page read and write
169C98E3000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9DE1000
trusted library allocation
page read and write
169D983A000
trusted library allocation
page read and write
A45000
heap
page read and write
729C000
stack
page read and write
BC4000
heap
page read and write
169D99FD000
trusted library allocation
page read and write
22B27000
heap
page read and write
169C9806000
trusted library allocation
page read and write
169CAAEF000
trusted library allocation
page read and write
1A2AB1E8000
heap
page read and write
169D39FA000
trusted library allocation
page read and write
169D3356000
trusted library allocation
page read and write
4911000
heap
page read and write
317F000
stack
page read and write
169CAA5C000
trusted library allocation
page read and write
169D98E2000
trusted library allocation
page read and write
4B2E000
stack
page read and write
169CB078000
trusted library allocation
page read and write
169CD8E0000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
169C98FA000
trusted library allocation
page read and write
4911000
heap
page read and write
169CE497000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
169D391A000
trusted library allocation
page read and write
169C9A6A000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CB8EC000
trusted library allocation
page read and write
4C80000
heap
page read and write
169CAAE6000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169CC22C000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CC1D5000
trusted library allocation
page read and write
AC4000
heap
page read and write
169D98BC000
trusted library allocation
page read and write
169CBF11000
trusted library allocation
page read and write
1154000
heap
page read and write
371F000
stack
page read and write
373F000
stack
page read and write
6686000
heap
page read and write
169C6A72000
heap
page read and write
169CA6FA000
trusted library allocation
page read and write
169D9B34000
trusted library allocation
page read and write
169CB132000
trusted library allocation
page read and write
1A2AB15F000
heap
page read and write
169CBD3C000
trusted library allocation
page read and write
169CC215000
trusted library allocation
page read and write
1FD0000
heap
page read and write
169C98EC000
trusted library allocation
page read and write
22B35000
heap
page read and write
4A80000
direct allocation
page execute and read and write
169C6FCA000
trusted library allocation
page read and write
169C9BBF000
trusted library allocation
page read and write
BC4000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
169D9890000
trusted library allocation
page read and write
169CE48E000
trusted library allocation
page read and write
169CB8EE000
trusted library allocation
page read and write
169D3771000
trusted library allocation
page read and write
169D9BC0000
trusted library allocation
page read and write
11D4000
heap
page read and write
22B27000
heap
page read and write
169C9BFA000
trusted library allocation
page read and write
510000
heap
page read and write
12B0000
heap
page read and write
4C4000
unkown
page execute and read and write
169CC34E000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
169D1728000
trusted library allocation
page read and write
169C55E7000
trusted library allocation
page read and write
169D9998000
trusted library allocation
page read and write
169D377C000
trusted library allocation
page read and write
169D9CEA000
trusted library allocation
page read and write
169CB0E4000
trusted library allocation
page read and write
169D995C000
trusted library allocation
page read and write
169C97F5000
trusted library allocation
page read and write
169C9856000
trusted library allocation
page read and write
34EF000
stack
page read and write
169C55ED000
trusted library allocation
page read and write
169CA3EB000
trusted library allocation
page read and write
12A6000
heap
page read and write
169C66E6000
trusted library allocation
page read and write
169D9FFC000
trusted library allocation
page read and write
169D9D8C000
trusted library allocation
page read and write
4AC2000
heap
page read and write
4AC1000
heap
page read and write
169C6795000
trusted library allocation
page read and write
2617000
heap
page read and write
22B1E000
heap
page read and write
4C6F000
stack
page read and write
169D9CEC000
trusted library allocation
page read and write
BC4000
heap
page read and write
1154000
heap
page read and write
1255000
heap
page read and write
169CAF2C000
trusted library allocation
page read and write
4670000
heap
page read and write
169C98DA000
trusted library allocation
page read and write
169CB4AC000
trusted library allocation
page read and write
169CC39D000
trusted library allocation
page read and write
169D9813000
trusted library allocation
page read and write
169D989A000
trusted library allocation
page read and write
169CD9BC000
trusted library allocation
page read and write
169D985D000
trusted library allocation
page read and write
169D9E68000
trusted library allocation
page read and write
169D1780000
trusted library allocation
page read and write
363E000
stack
page read and write
11D4000
heap
page read and write
169D39F5000
trusted library allocation
page read and write
169D3726000
trusted library allocation
page read and write
169D9EEB000
trusted library allocation
page read and write
169CC1CA000
trusted library allocation
page read and write
16C0003F000
trusted library allocation
page read and write
4911000
heap
page read and write
389E000
stack
page read and write
169CBE42000
trusted library allocation
page read and write
22C19000
heap
page read and write
169CAB0A000
trusted library allocation
page read and write
169D99BD000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9FFC000
trusted library allocation
page read and write
169CC1EA000
trusted library allocation
page read and write
169C68AD000
trusted library allocation
page read and write
4B2F000
stack
page read and write
169CB3E3000
trusted library allocation
page read and write
1A2AB1EB000
heap
page read and write
169CC292000
trusted library allocation
page read and write
169D367F000
trusted library allocation
page read and write
1CA90000
heap
page read and write
169CA3F1000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CB0F7000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CAAB9000
trusted library allocation
page read and write
169CB4DE000
trusted library allocation
page read and write
169D97AA000
trusted library allocation
page read and write
385F000
stack
page read and write
169D37F2000
trusted library allocation
page read and write
169D7F36000
trusted library allocation
page read and write
169D9C22000
trusted library allocation
page read and write
169CB0EB000
trusted library allocation
page read and write
169CB267000
trusted library allocation
page read and write
169D9CD6000
trusted library allocation
page read and write
BC4000
heap
page read and write
22B4A000
heap
page read and write
169CAEBC000
trusted library allocation
page read and write
169CBEFB000
trusted library allocation
page read and write
169D376F000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
4C81000
heap
page read and write
169D9FB5000
trusted library allocation
page read and write
4911000
heap
page read and write
169C6A89000
heap
page read and write
DF1000
unkown
page execute and read and write
169C6888000
trusted library allocation
page read and write
3DBE000
stack
page read and write
169CCD90000
trusted library allocation
page read and write
169C6A7F000
heap
page read and write
169D9FE1000
trusted library allocation
page read and write
169CBDBF000
trusted library allocation
page read and write
ED435FC000
stack
page read and write
169C91CC000
trusted library allocation
page read and write
169D3617000
trusted library allocation
page read and write
169CAAB3000
trusted library allocation
page read and write
AB7000
heap
page read and write
BC4000
heap
page read and write
169CC1F4000
trusted library allocation
page read and write
4911000
heap
page read and write
169C971C000
trusted library allocation
page read and write
30B000
unkown
page execute and read and write
BC4000
heap
page read and write
169CD9B7000
trusted library allocation
page read and write
169D3A52000
trusted library allocation
page read and write
169C681A000
trusted library allocation
page read and write
2F8F000
stack
page read and write
169C6A30000
heap
page read and write
169CCDF0000
trusted library allocation
page read and write
11B000
stack
page read and write
BC4000
heap
page read and write
169D9FFA000
trusted library allocation
page read and write
169CA6F3000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169D9FEA000
trusted library allocation
page read and write
419000
unkown
page readonly
1A2AB267000
heap
page read and write
5120000
direct allocation
page read and write
6680000
heap
page read and write
169D376D000
trusted library allocation
page read and write
169C9ECF000
trusted library allocation
page read and write
169CE487000
trusted library allocation
page read and write
169C55F6000
trusted library allocation
page read and write
169C9869000
trusted library allocation
page read and write
11D4000
heap
page read and write
22B19000
heap
page read and write
169C6A69000
heap
page read and write
169D9CAD000
trusted library allocation
page read and write
169D362A000
trusted library allocation
page read and write
427000
unkown
page write copy
169CAAF3000
trusted library allocation
page read and write
169D9E7C000
trusted library allocation
page read and write
1154000
heap
page read and write
169CAFEB000
trusted library allocation
page read and write
169CC1FA000
trusted library allocation
page read and write
169C6A4C000
heap
page read and write
169D3740000
trusted library allocation
page read and write
169CBD39000
trusted library allocation
page read and write
169CC2E6000
trusted library allocation
page read and write
169D9858000
trusted library allocation
page read and write
48EE000
stack
page read and write
169D3785000
trusted library allocation
page read and write
169CAEEA000
trusted library allocation
page read and write
169D38FB000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CAAFE000
trusted library allocation
page read and write
169C6A34000
heap
page read and write
169D361A000
trusted library allocation
page read and write
169CB07B000
trusted library allocation
page read and write
169CC246000
trusted library allocation
page read and write
169D9BDA000
trusted library allocation
page read and write
11D4000
heap
page read and write
169D9FB3000
trusted library allocation
page read and write
22B46000
heap
page read and write
169CD62E000
trusted library allocation
page read and write
169D9CF8000
trusted library allocation
page read and write
169C6A2D000
heap
page read and write
169C9729000
trusted library allocation
page read and write
169CD637000
trusted library allocation
page read and write
169C5700000
trusted library allocation
page read and write
169CB0EA000
trusted library allocation
page read and write
169D9F9D000
trusted library allocation
page read and write
169D9FEA000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
11D4000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
169D9FF8000
trusted library allocation
page read and write
169C9845000
trusted library allocation
page read and write
8C4000
heap
page read and write
169D99FC000
trusted library allocation
page read and write
169C6A42000
heap
page read and write
169D3AE6000
trusted library allocation
page read and write
169CD6B1000
trusted library allocation
page read and write
169D1A5C000
trusted library allocation
page read and write
169C6A3D000
heap
page read and write
11D4000
heap
page read and write
169CB5E4000
trusted library allocation
page read and write
169CCD35000
trusted library allocation
page read and write
169D3686000
trusted library allocation
page read and write
169CCDD4000
trusted library allocation
page read and write
169CB13C000
trusted library allocation
page read and write
22B46000
heap
page read and write
169D9F9F000
trusted library allocation
page read and write
BC4000
heap
page read and write
3C7E000
stack
page read and write
4AC1000
heap
page read and write
169CADF0000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
169D9868000
trusted library allocation
page read and write
39BF000
stack
page read and write
169CD837000
trusted library allocation
page read and write
169D3632000
trusted library allocation
page read and write
670000
heap
page read and write
169D9E1B000
trusted library allocation
page read and write
169D9CCE000
trusted library allocation
page read and write
169D9DFE000
trusted library allocation
page read and write
B523BFE000
stack
page read and write
48BF000
stack
page read and write
4B20000
direct allocation
page execute and read and write
413000
unkown
page readonly
169D9FCB000
trusted library allocation
page read and write
1260000
heap
page read and write
169D99EB000
trusted library allocation
page read and write
11D4000
heap
page read and write
169CCD71000
trusted library allocation
page read and write
2D7F000
stack
page read and write
169CCD90000
trusted library allocation
page read and write
4AC1000
heap
page read and write
169C9894000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
7E0000
heap
page read and write
169D9FC3000
trusted library allocation
page read and write
169CE4F4000
trusted library allocation
page read and write
169C6A40000
heap
page read and write
169CC1EA000
trusted library allocation
page read and write
169C6A48000
heap
page read and write
AC4000
heap
page read and write
22B3B000
heap
page read and write
41AE000
stack
page read and write
169D9BFB000
trusted library allocation
page read and write
169C6A40000
heap
page read and write
169CE4BA000
trusted library allocation
page read and write
169CA6F7000
trusted library allocation
page read and write
169C9BBF000
trusted library allocation
page read and write
1154000
heap
page read and write
BC4000
heap
page read and write
169C55F6000
trusted library allocation
page read and write
169CE497000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
12D3000
heap
page read and write
169D3AF8000
trusted library allocation
page read and write
F19000
unkown
page execute and write copy
169D97B8000
trusted library allocation
page read and write
169C680F000
trusted library allocation
page read and write
169CC2A6000
trusted library allocation
page read and write
22B27000
heap
page read and write
169CC3A7000
trusted library allocation
page read and write
169C6877000
trusted library allocation
page read and write
12C4000
heap
page read and write
1C3AF000
stack
page read and write
169D9BAC000
trusted library allocation
page read and write
A4E000
heap
page read and write
169D3AEC000
trusted library allocation
page read and write
169CBD86000
trusted library allocation
page read and write
169D9FE7000
trusted library allocation
page read and write
3E9F000
stack
page read and write
169D9EFE000
trusted library allocation
page read and write
169CC282000
trusted library allocation
page read and write
266A000
heap
page read and write
11D4000
heap
page read and write
169C91E7000
trusted library allocation
page read and write
169D9C93000
trusted library allocation
page read and write
169CBD06000
trusted library allocation
page read and write
169C9A41000
trusted library allocation
page read and write
169C56A3000
trusted library allocation
page read and write
169CA6E8000
trusted library allocation
page read and write
169C981E000
trusted library allocation
page read and write
169D995C000
trusted library allocation
page read and write
169C9794000
trusted library allocation
page read and write
169C6A3B000
heap
page read and write
169D9CFA000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
169D1BD0000
trusted library allocation
page read and write
169D332F000
trusted library allocation
page read and write
BC4000
heap
page read and write
4911000
heap
page read and write
169CD68A000
trusted library allocation
page read and write
169CBF07000
trusted library allocation
page read and write
BC4000
heap
page read and write
1A2AB15F000
heap
page read and write
11D4000
heap
page read and write
169C9A6E000
trusted library allocation
page read and write
BC4000
heap
page read and write
10BB000
unkown
page execute and write copy
169C91C3000
trusted library allocation
page read and write
4911000
heap
page read and write
169D37C1000
trusted library allocation
page read and write
169C9869000
trusted library allocation
page read and write
169C98ED000
trusted library allocation
page read and write
169D9941000
trusted library allocation
page read and write
57B000
unkown
page execute and read and write
169CC254000
trusted library allocation
page read and write
169C9BF9000
trusted library allocation
page read and write
169D97F7000
trusted library allocation
page read and write
BC4000
heap
page read and write
1A2AB108000
heap
page read and write
169C98CD000
trusted library allocation
page read and write
169D3388000
trusted library allocation
page read and write
169CB8C2000
trusted library allocation
page read and write
169CC2F8000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
1154000
heap
page read and write
8C4000
heap
page read and write
169C9500000
trusted library allocation
page read and write
169D9CF7000
trusted library allocation
page read and write
169C98AB000
trusted library allocation
page read and write
169D98B4000
trusted library allocation
page read and write
169D9E6E000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
169D37BB000
trusted library allocation
page read and write
169D3AF5000
trusted library allocation
page read and write
169C6A85000
heap
page read and write
169C983B000
trusted library allocation
page read and write
BC5000
heap
page read and write
283F000
stack
page read and write
12BC000
heap
page read and write
4AC2000
heap
page read and write
169D3ADA000
trusted library allocation
page read and write
169D9BEF000
trusted library allocation
page read and write
334E000
stack
page read and write
169D34CE000
trusted library allocation
page read and write
169CC37B000
trusted library allocation
page read and write
11D4000
heap
page read and write
50D0000
direct allocation
page execute and read and write
169D7F2D000
trusted library allocation
page read and write
169CB2CE000
trusted library allocation
page read and write
AC4000
heap
page read and write
169C9871000
trusted library allocation
page read and write
169D9EF5000
trusted library allocation
page read and write
169C91F2000
trusted library allocation
page read and write
169CBDBC000
trusted library allocation
page read and write
169CAAB9000
trusted library allocation
page read and write
169C689D000
trusted library allocation
page read and write
2597000
heap
page read and write
169D9FD4000
trusted library allocation
page read and write
169D16D8000
trusted library allocation
page read and write
169C98DA000
trusted library allocation
page read and write
169CC3B1000
trusted library allocation
page read and write
169D3AEC000
trusted library allocation
page read and write
BC4000
heap
page read and write
169CA63C000
trusted library allocation
page read and write
29FD2C50000
heap
page read and write
169D9F8F000
trusted library allocation
page read and write
1C43E000
stack
page read and write
169C9BDC000
trusted library allocation
page read and write
169D3982000
trusted library allocation
page read and write
4080000
heap
page read and write
169D9D82000
trusted library allocation
page read and write
1A2AB23B000
heap
page read and write
169D9971000
trusted library allocation
page read and write
169C986A000
trusted library allocation
page read and write
169CB0ED000
trusted library allocation
page read and write
11D4000
heap
page read and write
387F000
stack
page read and write
169D3A86000
trusted library allocation
page read and write
169C976F000
trusted library allocation
page read and write
6D0B000
stack
page read and write
169CC1FA000
trusted library allocation
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
400000
unkown
page readonly
327F000
stack
page read and write
169CBE19000
trusted library allocation
page read and write
35170000
heap
page read and write
6EE000
stack
page read and write
4911000
heap
page read and write
AC4000
heap
page read and write
3B3E000
stack
page read and write
1A2AB1EB000
heap
page read and write
22B35000
heap
page read and write
640000
direct allocation
page read and write
169D984D000
trusted library allocation
page read and write
169D3638000
trusted library allocation
page read and write
169C9BC0000
trusted library allocation
page read and write
169C9871000
trusted library allocation
page read and write
169D97EA000
trusted library allocation
page read and write
BC4000
heap
page read and write
169D9B8B000
trusted library allocation
page read and write
4671000
heap
page read and write
169D9884000
trusted library allocation
page read and write
169CE4D0000
trusted library allocation
page read and write
169D37F2000
trusted library allocation
page read and write
BC4000
heap
page read and write
169C91CC000
trusted library allocation
page read and write
169C6A7C000
heap
page read and write
169CC216000
trusted library allocation
page read and write
169CB4EE000
trusted library allocation
page read and write
169CB3ED000
trusted library allocation
page read and write
BC4000
heap
page read and write
41E0000
heap
page read and write
169C6A9D000
heap
page read and write
169C9841000
trusted library allocation
page read and write
169CBE32000
trusted library allocation
page read and write
169D9813000
trusted library allocation
page read and write
4AC2000
heap
page read and write
There are 5389 hidden memdumps, click here to show them.