IOC Report
6SoKuOqyNh.exe

loading gif

Files

File Path
Type
Category
Malicious
6SoKuOqyNh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\1000003002\d27375200a.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\enter[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\1000002001\bfb8bb0dc7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingFHJDBKJKFI.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingHJKECAAAFH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGCAFHCA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BGDAKEHIIDGDAAKECBFBKKFCGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FBFCGIDAKECGCBGDBAFIDHCFBA
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\HDGIJJDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x37, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\HIEBAKEHDHCAKEBFBKEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IECBAFCAAKJDHJKFIEBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEHIJDGIEBKKFHJKJKEG
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\JKJDHDBKEBGHJJJJKEHDHJJEGH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKJEBAAECBGDHIECAKJKKECFHJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\043ba228-7b36-411f-90c5-c896b8a25aa3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\18a4232a-ac4a-4306-90ff-4649dc103d5e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\1f7a8fb9-2c07-4561-9965-4f1e875d495a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\37f9b0b7-73ae-4a9a-8571-6ae3eab9b48e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9a82f09a-75c1-4fbf-8eb6-67f7b80f3bdd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\59684176-b0ee-4e0d-8e9a-a70ba94d1d05.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1526edfb-5563-4fa1-8376-d2afc351273f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\2aa41e7d-5c88-426d-861c-e714a74e4011.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\3748bde3-a14d-408c-b874-2c10a189c323.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\4f351341-121f-46f7-99ac-8c30cd276d4f.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\526439bb-7eab-4f18-a8c1-ac1f3481032a.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7d03969a-b078-4812-bbce-181dbde62094.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000005.ldb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\0a52dac7-3516-4757-9246-b1cc60380e81.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\1d17d11e-510c-43cb-bb6f-fb80412c8d44.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\51420b53-bce1-4fec-8fad-aa107e9c3955.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\700e3deb-7db1-4886-b658-951fd268b4f9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\73b0e5e5-7957-41a6-adef-54641c237cdb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8a926b78-df5f-46ca-98d6-d781b0fabfff.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF44f16.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF4657d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF47377.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF4c62b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF4fccb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a3a697ee-2226-45dc-81eb-e47fae1a28ff.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\de66b456-12d3-4030-a00a-6d6a95419d22.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4b65c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4f902.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF54f6f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF49aa6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\00171fe1-d7b5-49dd-bfb9-0e694c2634d8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\2ddb5029-6d98-4f8e-9d52-2f567bb5354f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\2f589cb2-2525-450f-83f5-9a9a93d09f79.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF465da.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF47377.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\b125535f-e5ce-4b8d-9656-e5c43f9a238c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\bff4d8a4-6546-45b7-acbb-64ec0ecb918f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF43833.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF43842.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF43e6d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4652e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4b69a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4f921.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF54f21.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF58091.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e22fe7c4-949c-4ad6-8f09-2b88e0f10d12.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f2f61230-301c-42d3-af08-12b3ade9af92.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\4B76.tmp\4B77.tmp\4B78.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\F1CD.tmp\F1CE.tmp\F1CF.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\e3035b77-1104-4a78-909d-6dd30da69436.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\ed73a461-ebae-44ad-b469-c0d6bae92098.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5448_1226484613\e3035b77-1104-4a78-909d-6dd30da69436.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 6327 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 6327 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 6327 bytes
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
There are 207 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6SoKuOqyNh.exe
"C:\Users\user\Desktop\6SoKuOqyNh.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\bfb8bb0dc7.exe
"C:\Users\user\AppData\Local\Temp\1000002001\bfb8bb0dc7.exe"
malicious
C:\Users\user\1000003002\d27375200a.exe
"C:\Users\user\1000003002\d27375200a.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=2104,i,2763615900740779582,2928717422686434053,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://www.youtube.com/account
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2424 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=5280 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=3540 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6660 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6660 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7340 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:3
malicious
C:\Users\user\AppData\Local\Temp\1000002001\bfb8bb0dc7.exe
"C:\Users\user\AppData\Local\Temp\1000002001\bfb8bb0dc7.exe"
malicious
C:\Users\user\1000003002\d27375200a.exe
"C:\Users\user\1000003002\d27375200a.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
malicious
C:\Users\user\AppData\RoamingFHJDBKJKFI.exe
"C:\Users\user\AppData\RoamingFHJDBKJKFI.exe"
malicious
C:\Users\user\AppData\RoamingHJKECAAAFH.exe
"C:\Users\user\AppData\RoamingHJKECAAAFH.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-GB --service-sandbox-type=audio --mojo-platform-channel-handle=6720 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7056 --field-trial-handle=2200,i,2508916279924330796,5575134678906347488,262144 /prefetch:8
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\F1CD.tmp\F1CE.tmp\F1CF.bat C:\Users\user\1000003002\d27375200a.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=2256,i,12859344246917402077,1353247810428413468,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2324 -parentBuildID 20230927232528 -prefsHandle 2260 -prefMapHandle 2256 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f267dd4-7cc3-4504-b66d-b554eae41855} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" 1892526ad10 socket
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=2256,i,12859344246917402077,1353247810428413468,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3064 -parentBuildID 20230927232528 -prefsHandle 3208 -prefMapHandle 3204 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2957b26f-774e-48be-a5e4-6995945e05fa} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" 189373ea410 rdd
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\4B76.tmp\4B77.tmp\4B78.bat C:\Users\user\1000003002\d27375200a.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=2000,i,9310775074731790964,8760316038364529683,262144 /prefetch:8
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingFHJDBKJKFI.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingHJKECAAAFH.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 32 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/mozglue.dll~
unknown
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll5
unknown
malicious
http://85.28.47.31/8405906461a5200c/freebl3.dlll
unknown
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features
unknown
http://mozilla.org/#/properties/proposedEnrollment
unknown
http://detectportal.firefox.com/
unknown
http://mozilla.org/#/properties/schemaVersion
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
http://mozilla.org/#/properties/disableGreaseOnFallback
unknown
http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataType
unknown
https://spocs.getpocket.com/spocs
unknown
https://docs.google.com/
unknown
https://www.youtube.com/accountUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=e
unknown
https://addons.mozilla.org/user-media/addon_icons/784/784287-64.png?modified=mcrushed
unknown
https://screenshots.firefox.com
unknown
https://www.youtube.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://addons.mozilla.org/user-media/addon_icons/700/700308-64.png?modified=4bc8e79f
unknown
http://mozilla.org/#/properties/greasePaddingSize
unknown
http://mozilla.org/#/properties/channel
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
http://mozilla.org/#/properties/branches
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://mozilla.org/#/properties/userFacingName
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://ac.ecosia.org/p
unknown
http://mozilla.org/#/properties/bucketConfig/properties/namespace
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredEnabled
unknown
http://mozilla.org/#/properties/featureIds
unknown
http://mozilla.org/#/properties/outcomes/items/properties/slug
unknown
https://github.com/mozilla-services/screenshots
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://youtube.com/
unknown
http://mozilla.org/#/properties/referenceBranch
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
http://mozilla.org/#/properties/branches/anyOf/2
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/value
unknown
http://mozilla.org/#/properties/outcomes/items
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredIndex
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://www.instagram.com/
unknown
https://www.youtube.com/accountNUMB
unknown
https://drive-daily-2.corp.google.com/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.amazon.com/
unknown
https://fpn.firefox.com
unknown
https://json-schema.org/draft/2019-09/schemaInstance
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.youtube.comweave:service:start-over
unknown
http://mozilla.org/#/properties/csvImport
unknown
http://mozilla.org/#/properties/quickSuggestAllowPositionInSuggestions
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
http://detectportal.firefox.coma
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://www.google.com/favicon.ico
142.250.186.68
http://mozilla.org/#/properties/isRolloutAn
unknown
http://mozilla.org/#/properties/quickSuggestImpressionCapsSponsoredEnabled
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mo
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/itemsresource://gre/modul
unknown
https://www.youtube.com/accountC:
unknown
http://85.28.47.31/5499d72b3a3e55be.php/B
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
http://mozilla.org/#/properties/idhttp://mozilla.org/#/properties/appIdhttp://mozilla.org/#/properti
unknown
https://shavar.services.mozilla.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
http://mozilla.org/#/properties/isRollout
unknown
http://mozilla.org/#/properties/recordNavigationalSuggestionTelemetry
unknown
https://www.iqiyi.com/
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/enabled
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
unknown
https://ac.ecosia.org/pnaclte?q=
unknown
http://mozilla.org/#/properties/endDate
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items
unknown
http://mozilla.org/#/properties/addonsFeatureGate
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/ratio
unknown
http://mozilla.org/#/properties/localizations/anyOf/0/additionalProperties
unknown
http://mozilla.org/#/properties/addonsShowLessFrequentlyCap
unknown
http://mozilla.org/#/properties/autoFillAdaptiveHistoryEnabled
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.reddit.com
unknown
malicious
spocs.getpocket.com
unknown
malicious
clients2.googleusercontent.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
support.mozilla.org
unknown
malicious
firefox.settings.services.mozilla.com
unknown
malicious
push.services.mozilla.com
unknown
malicious
www.youtube.com
unknown
malicious
www.facebook.com
unknown
malicious
detectportal.firefox.com
unknown
malicious
bzib.nelreports.net
unknown
malicious
accounts.youtube.com
unknown
malicious
18.31.95.13.in-addr.arpa
unknown
malicious
shavar.services.mozilla.com
unknown
malicious
www.wikipedia.org
unknown
malicious
example.org
93.184.215.14
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
18.65.39.85
mitmdetection.services.mozilla.com
13.32.99.17
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
www.google.com
142.250.186.68
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
s-part-0045.t-0009.t-msedge.net
13.107.246.73
sni1gl.wpc.nucdn.net
152.199.21.175
youtube-ui.l.google.com
172.217.18.14
play.google.com
142.250.186.110
www3.l.google.com
142.250.184.206
reddit.map.fastly.net
151.101.65.140
googlehosted.l.googleusercontent.com
142.250.185.129
s-part-0032.t-0009.t-msedge.net
13.107.246.60
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
There are 31 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
142.250.186.68
www.google.com
United States
142.250.185.129
googlehosted.l.googleusercontent.com
United States
18.65.39.85
services.addons.mozilla.org
United States
192.168.2.9
unknown
unknown
13.107.246.60
s-part-0032.t-0009.t-msedge.net
United States
192.168.2.6
unknown
unknown
34.117.188.166
contile.services.mozilla.com
United States
142.250.185.142
unknown
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
13.107.246.73
s-part-0045.t-0009.t-msedge.net
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
185.215.113.19
unknown
Portugal
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
185.215.113.16
unknown
Portugal
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
13.32.99.17
mitmdetection.services.mozilla.com
United States
239.255.255.250
unknown
Reserved
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
There are 12 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
bfb8bb0dc7.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
d27375200a.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Width
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Height
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Flags
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|CssToDevPixelScaling
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SearchbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66650
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 123 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
831000
unkown
page execute and read and write
malicious
275A000
heap
page read and write
malicious
4D30000
direct allocation
page read and write
malicious
5340000
direct allocation
page read and write
malicious
E11000
unkown
page execute and read and write
malicious
9F1000
unkown
page execute and read and write
malicious
4BF0000
direct allocation
page read and write
malicious
CA1000
unkown
page execute and read and write
malicious
E11000
unkown
page execute and read and write
malicious
4CE0000
direct allocation
page read and write
malicious
5000000
direct allocation
page read and write
malicious
5150000
direct allocation
page read and write
malicious
2727000
heap
page read and write
malicious
12C4000
heap
page read and write
189445A8000
trusted library allocation
page read and write
12C4000
heap
page read and write
51B1000
direct allocation
page read and write
12C5000
heap
page read and write
18932857000
heap
page read and write
189379C1000
trusted library allocation
page read and write
6AB9000
heap
page read and write
1287000
heap
page read and write
12C4000
heap
page read and write
189447B9000
trusted library allocation
page read and write
271F8E92000
heap
page read and write
2BE0000
direct allocation
page read and write
189317A9000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
32BE000
stack
page read and write
18932899000
heap
page read and write
12C4000
heap
page read and write
18932853000
heap
page read and write
7D0000
heap
page read and write
4D90000
direct allocation
page execute and read and write
5180000
direct allocation
page execute and read and write
D64000
heap
page read and write
18934CCA000
trusted library allocation
page read and write
189328AF000
heap
page read and write
18937D84000
trusted library allocation
page read and write
4B81000
heap
page read and write
22E2F000
heap
page read and write
189460DB000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
189460DB000
trusted library allocation
page read and write
189356A1000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932864000
heap
page read and write
3DCF050000
trusted library allocation
page execute read
18932842000
heap
page read and write
12C4000
heap
page read and write
1893284F000
heap
page read and write
189449E0000
trusted library allocation
page read and write
4BB0000
heap
page read and write
18937D9D000
trusted library allocation
page read and write
14ED000
heap
page read and write
189388F2000
trusted library allocation
page read and write
189460EA000
trusted library allocation
page read and write
18935335000
trusted library allocation
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
189460DB000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
18935619000
trusted library allocation
page read and write
18932576000
trusted library allocation
page read and write
18932853000
heap
page read and write
18945AB6000
trusted library allocation
page read and write
49FE000
stack
page read and write
1893288C000
heap
page read and write
18938885000
trusted library allocation
page read and write
D64000
heap
page read and write
5180000
direct allocation
page execute and read and write
189379D6000
trusted library allocation
page read and write
1893288C000
heap
page read and write
1893671B000
trusted library allocation
page read and write
1893283A000
heap
page read and write
2F066000
heap
page read and write
12C4000
heap
page read and write
189354EA000
trusted library allocation
page read and write
18946022000
trusted library allocation
page read and write
189354A4000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
352CC000
stack
page read and write
189352BE000
trusted library allocation
page read and write
FEF000
heap
page read and write
1893549B000
trusted library allocation
page read and write
1893269A000
trusted library allocation
page read and write
453F000
stack
page read and write
22E32000
heap
page read and write
4771000
heap
page read and write
18944D10000
trusted library allocation
page read and write
12C4000
heap
page read and write
189387E9000
trusted library allocation
page read and write
12C4000
heap
page read and write
189367C3000
trusted library allocation
page read and write
189460E0000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
189460F5000
trusted library allocation
page read and write
12C4000
heap
page read and write
1B67487D000
heap
page read and write
1893645F000
trusted library allocation
page read and write
2D1F000
stack
page read and write
271FA960000
heap
page read and write
18947BDC000
trusted library allocation
page read and write
18934BCC000
trusted library allocation
page read and write
2FC0000
heap
page read and write
189354F8000
trusted library allocation
page read and write
18938716000
trusted library allocation
page read and write
18935333000
trusted library allocation
page read and write
1B6748E8000
heap
page read and write
18937744000
trusted library allocation
page read and write
18934BEF000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932857000
heap
page read and write
189410ED000
trusted library allocation
page read and write
385E000
stack
page read and write
12C4000
heap
page read and write
CA0000
unkown
page readonly
1894106B000
trusted library allocation
page read and write
18931732000
trusted library allocation
page read and write
189328A4000
heap
page read and write
18934C65000
trusted library allocation
page read and write
1893285C000
heap
page read and write
157B000
heap
page read and write
874000
heap
page read and write
18940EB7000
trusted library allocation
page read and write
18932844000
heap
page read and write
12C5000
heap
page read and write
1894492F000
trusted library allocation
page read and write
412F000
stack
page read and write
189356E2000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
18932834000
heap
page read and write
189313E1000
trusted library allocation
page read and write
423F000
stack
page read and write
18937DA8000
trusted library allocation
page read and write
22C30000
heap
page read and write
1893FBBE000
trusted library allocation
page read and write
18937E9C000
trusted library allocation
page read and write
2BC0000
direct allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
18945CC6000
trusted library allocation
page read and write
18935747000
trusted library allocation
page read and write
4B81000
heap
page read and write
18934C9C000
trusted library allocation
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
18938795000
trusted library allocation
page read and write
189356F9000
trusted library allocation
page read and write
12C5000
heap
page read and write
189327E8000
trusted library allocation
page read and write
189328A5000
heap
page read and write
15D4000
heap
page read and write
189337C0000
trusted library allocation
page read and write
189328A4000
heap
page read and write
F9A000
unkown
page execute and read and write
4DC0000
direct allocation
page execute and read and write
1893283A000
heap
page read and write
18932853000
heap
page read and write
874000
heap
page read and write
3FCE000
stack
page read and write
189360C3000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
18936271000
trusted library allocation
page read and write
E8D000
unkown
page execute and read and write
12C5000
heap
page read and write
461F000
stack
page read and write
12A0000
direct allocation
page read and write
417000
unkown
page write copy
810000
heap
page read and write
189356C4000
trusted library allocation
page read and write
18932886000
heap
page read and write
18932884000
heap
page read and write
1894472E000
trusted library allocation
page read and write
18934BF9000
trusted library allocation
page read and write
18932884000
heap
page read and write
18938795000
trusted library allocation
page read and write
1893542D000
trusted library allocation
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
12C4000
heap
page read and write
275C000
heap
page read and write
189354F3000
trusted library allocation
page read and write
4CD1000
heap
page read and write
12C4000
heap
page read and write
18935423000
trusted library allocation
page read and write
4B81000
heap
page read and write
1B67492B000
heap
page read and write
20633C80000
heap
page read and write
12C4000
heap
page read and write
189328A6000
heap
page read and write
18945FF3000
trusted library allocation
page read and write
1893283D000
heap
page read and write
18932886000
heap
page read and write
18932852000
heap
page read and write
66CE000
stack
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
304E000
stack
page read and write
189354DE000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934C15000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
18934B57000
trusted library allocation
page read and write
18932840000
heap
page read and write
18937E50000
trusted library allocation
page read and write
22A21000
heap
page read and write
271F8E8D000
heap
page read and write
22A63000
heap
page read and write
2AFE000
stack
page read and write
4B81000
heap
page read and write
189387A1000
trusted library allocation
page read and write
9C0000
heap
page read and write
4B81000
heap
page read and write
FF3000
heap
page read and write
189354DE000
trusted library allocation
page read and write
18945A4E000
trusted library allocation
page read and write
18935367000
trusted library allocation
page read and write
189387DC000
trusted library allocation
page read and write
FFF000
unkown
page execute and read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
22A63000
heap
page read and write
189387B6000
trusted library allocation
page read and write
1894595B000
trusted library allocation
page read and write
189388D7000
trusted library allocation
page read and write
189356F6000
trusted library allocation
page read and write
18932853000
heap
page read and write
1893559B000
trusted library allocation
page read and write
18932857000
heap
page read and write
690F000
stack
page read and write
12C4000
heap
page read and write
189313F6000
trusted library allocation
page read and write
189460C6000
trusted library allocation
page read and write
1893284F000
heap
page read and write
18945A9D000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893872C000
trusted library allocation
page read and write
2565000
heap
page read and write
1893606F000
trusted library allocation
page read and write
4771000
heap
page read and write
22B7E000
stack
page read and write
6C6E0000
unkown
page readonly
4CD1000
heap
page read and write
18945BEF000
trusted library allocation
page read and write
3C2F000
stack
page read and write
4B81000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18945983000
trusted library allocation
page read and write
1893286A000
heap
page read and write
189354E2000
trusted library allocation
page read and write
271FA97B000
heap
page read and write
12C4000
heap
page read and write
18935394000
trusted library allocation
page read and write
18935CB9000
trusted library allocation
page read and write
12C4000
heap
page read and write
3AEF000
stack
page read and write
18944853000
trusted library allocation
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
18938EE9000
trusted library allocation
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
12C4000
heap
page read and write
1011000
heap
page read and write
189326F8000
trusted library allocation
page read and write
18932886000
heap
page read and write
322F000
stack
page read and write
189460DE000
trusted library allocation
page read and write
18934BF9000
trusted library allocation
page read and write
12C5000
heap
page read and write
18935498000
trusted library allocation
page read and write
189445B7000
trusted library allocation
page read and write
102E000
heap
page read and write
12C4000
heap
page read and write
189377B4000
trusted library allocation
page read and write
1893285C000
heap
page read and write
4CD1000
heap
page read and write
1893285A000
heap
page read and write
189354FC000
trusted library allocation
page read and write
18945FAF000
trusted library allocation
page read and write
4771000
heap
page read and write
189460F3000
trusted library allocation
page read and write
12C4000
heap
page read and write
12A0000
direct allocation
page read and write
18932884000
heap
page read and write
189460B4000
trusted library allocation
page read and write
189325F1000
trusted library allocation
page read and write
189460F3000
trusted library allocation
page read and write
12C5000
heap
page read and write
18932884000
heap
page read and write
189354F8000
trusted library allocation
page read and write
8BB000
stack
page read and write
64D0000
heap
page read and write
18935834000
trusted library allocation
page read and write
15D4000
heap
page read and write
18945B76000
trusted library allocation
page read and write
18932573000
trusted library allocation
page read and write
278B000
heap
page read and write
381F000
stack
page read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
189460F3000
trusted library allocation
page read and write
189449A3000
trusted library allocation
page read and write
18946132000
trusted library allocation
page read and write
4B81000
heap
page read and write
4B7F000
stack
page read and write
189390B4000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937D75000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
12C5000
heap
page read and write
18935C5C000
trusted library allocation
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
4CD1000
heap
page read and write
18932853000
heap
page read and write
18932857000
heap
page read and write
2190000
heap
page read and write
18937ECA000
trusted library allocation
page read and write
18932840000
heap
page read and write
4CD1000
heap
page read and write
401E000
stack
page read and write
4F40000
direct allocation
page execute and read and write
18932838000
heap
page read and write
1893099E000
trusted library allocation
page read and write
18946D3F000
trusted library allocation
page read and write
189460C6000
trusted library allocation
page read and write
1B674968000
heap
page read and write
18934CFE000
trusted library allocation
page read and write
18937EF0000
trusted library allocation
page read and write
18932834000
heap
page read and write
9F1000
unkown
page execute and write copy
12C4000
heap
page read and write
4B81000
heap
page read and write
189390B7000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
1893FFF5000
trusted library allocation
page read and write
189377B4000
trusted library allocation
page read and write
12C5000
heap
page read and write
18945A9D000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18945CC6000
trusted library allocation
page read and write
18937799000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C5000
heap
page read and write
1518000
heap
page read and write
4B81000
heap
page read and write
18932677000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937E9C000
trusted library allocation
page read and write
1893581C000
trusted library allocation
page read and write
18937EEA000
trusted library allocation
page read and write
189356F4000
trusted library allocation
page read and write
1893284C000
heap
page read and write
15D4000
heap
page read and write
551FBFF000
stack
page read and write
6FE000
heap
page read and write
1893285C000
heap
page read and write
27B2000
heap
page read and write
1893283A000
heap
page read and write
18932853000
heap
page read and write
4781000
heap
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
18932842000
heap
page read and write
1893285D000
heap
page read and write
1F0000
heap
page read and write
4C4000
unkown
page execute and read and write
12C4000
heap
page read and write
18934B39000
trusted library allocation
page read and write
3B3F000
stack
page read and write
F00000
direct allocation
page execute and read and write
2E9E000
stack
page read and write
15D4000
heap
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
189317B4000
trusted library allocation
page read and write
18935633000
trusted library allocation
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
271F8EA8000
heap
page read and write
4CA0000
trusted library allocation
page read and write
278B000
heap
page read and write
18938899000
trusted library allocation
page read and write
18945FBB000
trusted library allocation
page read and write
18934BC2000
trusted library allocation
page read and write
18937DC1000
trusted library allocation
page read and write
18945D33000
trusted library allocation
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
1490000
direct allocation
page read and write
18935367000
trusted library allocation
page read and write
18932853000
heap
page read and write
12C5000
heap
page read and write
1893789F000
trusted library allocation
page read and write
18937D5D000
trusted library allocation
page read and write
12C5000
heap
page read and write
2730000
heap
page read and write
189451D5000
trusted library allocation
page read and write
18932838000
heap
page read and write
10FE000
stack
page read and write
18945AA5000
trusted library allocation
page read and write
2BC0000
direct allocation
page read and write
18934C76000
trusted library allocation
page read and write
1B67485F000
heap
page read and write
2BE0000
direct allocation
page read and write
12C4000
heap
page read and write
18932885000
heap
page read and write
1B67487D000
heap
page read and write
4B81000
heap
page read and write
1893283F000
heap
page read and write
18932857000
heap
page read and write
189379E8000
trusted library allocation
page read and write
12C4000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18935394000
trusted library allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18937EC4000
trusted library allocation
page read and write
18947CD4000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893624F000
trusted library allocation
page read and write
1893284C000
heap
page read and write
400000
unkown
page readonly
4CD1000
heap
page read and write
18939162000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935367000
trusted library allocation
page read and write
F40000
direct allocation
page execute and read and write
AD0000
heap
page read and write
189379F3000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
1893170A000
trusted library allocation
page read and write
18932853000
heap
page read and write
1893283F000
heap
page read and write
18932594000
trusted library allocation
page read and write
18934C9A000
trusted library allocation
page read and write
18935725000
trusted library allocation
page read and write
1893285E000
heap
page read and write
18932618000
trusted library allocation
page read and write
18941AE2000
trusted library allocation
page read and write
18945971000
trusted library allocation
page read and write
18946039000
trusted library allocation
page read and write
18932861000
heap
page read and write
33AE000
stack
page read and write
18939161000
trusted library allocation
page read and write
18945AE6000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285E000
heap
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
1893286A000
heap
page read and write
189379E2000
trusted library allocation
page read and write
1893283A000
heap
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189326F6000
trusted library allocation
page read and write
18935691000
trusted library allocation
page read and write
18932840000
heap
page read and write
1893286A000
heap
page read and write
22A21000
heap
page read and write
1893784F000
trusted library allocation
page read and write
18937E71000
trusted library allocation
page read and write
12C4000
heap
page read and write
18946022000
trusted library allocation
page read and write
189368F8000
trusted library allocation
page read and write
FF3000
heap
page read and write
22E0C000
heap
page read and write
46A000
unkown
page execute and read and write
3BFF000
stack
page read and write
1893566A000
trusted library allocation
page read and write
12A0000
direct allocation
page read and write
18945FA7000
trusted library allocation
page read and write
12C4000
heap
page read and write
18944865000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
18946032000
trusted library allocation
page read and write
1893267A000
trusted library allocation
page read and write
1893560C000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
4CD1000
heap
page read and write
E6BC1FF000
stack
page read and write
1893566A000
trusted library allocation
page read and write
407E000
stack
page read and write
189388A6000
trusted library allocation
page read and write
18937993000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932862000
heap
page read and write
189328A2000
heap
page read and write
18932669000
trusted library allocation
page read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
12C4000
heap
page read and write
189367FD000
trusted library allocation
page read and write
18935425000
trusted library allocation
page read and write
189449B7000
trusted library allocation
page read and write
20F0000
heap
page read and write
18938EEE000
trusted library allocation
page read and write
189448A8000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
18932861000
heap
page read and write
22E1E000
heap
page read and write
18937E7E000
trusted library allocation
page read and write
2BC0000
direct allocation
page read and write
18934B81000
trusted library allocation
page read and write
1893919A000
trusted library allocation
page read and write
18945D3E000
trusted library allocation
page read and write
18946178000
trusted library allocation
page read and write
1893684F000
trusted library allocation
page read and write
12C4000
heap
page read and write
F81000
heap
page read and write
327F000
stack
page read and write
18935487000
trusted library allocation
page read and write
18932896000
heap
page read and write
1893534F000
trusted library allocation
page read and write
189328AF000
heap
page read and write
189325D0000
trusted library allocation
page read and write
D64000
heap
page read and write
18932842000
heap
page read and write
18946023000
trusted library allocation
page read and write
47FE000
stack
page read and write
18932838000
heap
page read and write
75A000
stack
page read and write
471F000
stack
page read and write
18945BF2000
trusted library allocation
page read and write
4B81000
heap
page read and write
189368F8000
trusted library allocation
page read and write
1894477F000
trusted library allocation
page read and write
3FD0000
direct allocation
page read and write
4B81000
heap
page read and write
810E000
stack
page read and write
23C0000
heap
page read and write
18936737000
trusted library allocation
page read and write
18931771000
trusted library allocation
page read and write
18935394000
trusted library allocation
page read and write
18932838000
heap
page read and write
1893283C000
heap
page read and write
4B81000
heap
page read and write
189387E3000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
18945D5A000
trusted library allocation
page read and write
18932861000
heap
page read and write
18935259000
trusted library allocation
page read and write
18937797000
trusted library allocation
page read and write
18944D5A000
trusted library allocation
page read and write
18940E35000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
18931418000
trusted library allocation
page read and write
12C5000
heap
page read and write
3050000
direct allocation
page read and write
189360D2000
trusted library allocation
page read and write
18933109000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
1893526C000
trusted library allocation
page read and write
18935493000
trusted library allocation
page read and write
18944D79000
trusted library allocation
page read and write
189388CE000
trusted library allocation
page read and write
1109000
unkown
page execute and read and write
189356C7000
trusted library allocation
page read and write
12C4000
heap
page read and write
535000
heap
page read and write
189356E2000
trusted library allocation
page read and write
12C4000
heap
page read and write
189388D7000
trusted library allocation
page read and write
18932857000
heap
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
2430000
heap
page read and write
189377E3000
trusted library allocation
page read and write
189317FC000
trusted library allocation
page read and write
18932899000
heap
page read and write
4B81000
heap
page read and write
18941106000
trusted library allocation
page read and write
12C4000
heap
page read and write
18941070000
trusted library allocation
page read and write
1893FB98000
trusted library allocation
page read and write
1893283F000
heap
page read and write
33BF000
stack
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
189354A0000
trusted library allocation
page read and write
189388BE000
trusted library allocation
page read and write
18937987000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932890000
heap
page read and write
5334000
heap
page read and write
4B81000
heap
page read and write
189377A3000
trusted library allocation
page read and write
18937EC3000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893286A000
heap
page read and write
1893285C000
heap
page read and write
12C4000
heap
page read and write
18935355000
trusted library allocation
page read and write
4B81000
heap
page read and write
18936882000
trusted library allocation
page read and write
18941057000
trusted library allocation
page read and write
189460C6000
trusted library allocation
page read and write
12C5000
heap
page read and write
18937D1C000
trusted library allocation
page read and write
51075FF000
stack
page read and write
18932898000
heap
page read and write
189379A7000
trusted library allocation
page read and write
189364D6000
trusted library allocation
page read and write
197DA000000
trusted library allocation
page read and write
18935054000
trusted library allocation
page read and write
1B674957000
heap
page read and write
18931399000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932840000
heap
page read and write
18937EFA000
trusted library allocation
page read and write
4090000
heap
page read and write
1893569B000
trusted library allocation
page read and write
18947BDF000
trusted library allocation
page read and write
189387C0000
trusted library allocation
page read and write
1893522B000
trusted library allocation
page read and write
12C4000
heap
page read and write
20634000000
trusted library allocation
page read and write
12C4000
heap
page read and write
189388F4000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934BD5000
trusted library allocation
page read and write
189326BC000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935671000
trusted library allocation
page read and write
38FE000
stack
page read and write
18935214000
trusted library allocation
page read and write
18937E54000
trusted library allocation
page read and write
4DBE000
stack
page read and write
18932861000
heap
page read and write
18945C6C000
trusted library allocation
page read and write
18934C63000
trusted library allocation
page read and write
4CD1000
heap
page read and write
4B81000
heap
page read and write
189367E0000
trusted library allocation
page read and write
1893283F000
heap
page read and write
1893285C000
heap
page read and write
189387CD000
trusted library allocation
page read and write
18932853000
heap
page read and write
18932838000
heap
page read and write
18935486000
trusted library allocation
page read and write
18932857000
heap
page read and write
18935864000
trusted library allocation
page read and write
12C4000
heap
page read and write
189449D1000
trusted library allocation
page read and write
12C4000
heap
page read and write
1011000
heap
page read and write
6980000
heap
page read and write
18935469000
trusted library allocation
page read and write
63CF000
stack
page read and write
1893288E000
heap
page read and write
18935218000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
18945A57000
trusted library allocation
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
18935252000
trusted library allocation
page read and write
278E000
heap
page read and write
1893286A000
heap
page read and write
D64000
heap
page read and write
1893536F000
trusted library allocation
page read and write
278B000
heap
page read and write
12C4000
heap
page read and write
1B674957000
heap
page read and write
1893288D000
heap
page read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
1729F240000
heap
page read and write
417000
unkown
page write copy
153E000
stack
page read and write
6AB0000
heap
page read and write
18932886000
heap
page read and write
1893284C000
heap
page read and write
52B0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
38AE000
stack
page read and write
1893536F000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189317A7000
trusted library allocation
page read and write
1893286A000
heap
page read and write
18935469000
trusted library allocation
page read and write
4CD1000
heap
page read and write
189483FD000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937D79000
trusted library allocation
page read and write
12C4000
heap
page read and write
189417F3000
trusted library allocation
page read and write
F40000
direct allocation
page execute and read and write
18932885000
heap
page read and write
402E000
stack
page read and write
18937EFA000
trusted library allocation
page read and write
18940E82000
trusted library allocation
page read and write
18937ECE000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
48BE000
stack
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
1893283A000
heap
page read and write
18932857000
heap
page read and write
54D0000
direct allocation
page execute and read and write
1893286A000
heap
page read and write
12C4000
heap
page read and write
189313ED000
trusted library allocation
page read and write
1011000
heap
page read and write
189327C2000
trusted library allocation
page read and write
1893285A000
heap
page read and write
4CD1000
heap
page read and write
1893284F000
heap
page read and write
189449A3000
trusted library allocation
page read and write
18932842000
heap
page read and write
18932842000
heap
page read and write
18937EFA000
trusted library allocation
page read and write
1893285D000
heap
page read and write
18935493000
trusted library allocation
page read and write
18935283000
trusted library allocation
page read and write
189356F1000
trusted library allocation
page read and write
12C4000
heap
page read and write
400000
unkown
page readonly
189447D4000
trusted library allocation
page read and write
18934B33000
trusted library allocation
page read and write
1893288D000
heap
page read and write
18945D17000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934B09000
trusted library allocation
page read and write
18932896000
heap
page read and write
89B000
unkown
page execute and read and write
18934CC7000
trusted library allocation
page read and write
189460F3000
trusted library allocation
page read and write
189309D8000
trusted library allocation
page read and write
339E000
stack
page read and write
12C4000
heap
page read and write
467F000
stack
page read and write
400000
unkown
page readonly
5500000
direct allocation
page execute and read and write
18937D23000
trusted library allocation
page read and write
18937EBB000
trusted library allocation
page read and write
DDD000
stack
page read and write
12C4000
heap
page read and write
608E000
stack
page read and write
18932857000
heap
page read and write
18934BEF000
trusted library allocation
page read and write
18932853000
heap
page read and write
F17000
heap
page read and write
1894484E000
trusted library allocation
page read and write
18934CE2000
trusted library allocation
page read and write
1893534C000
trusted library allocation
page read and write
189448CD000
trusted library allocation
page read and write
40FF000
stack
page read and write
4771000
heap
page read and write
18932890000
heap
page read and write
18945A3C000
trusted library allocation
page read and write
18932579000
trusted library allocation
page read and write
1B6748E8000
heap
page read and write
4D40000
direct allocation
page execute and read and write
4D2F000
stack
page read and write
18941B83000
trusted library allocation
page read and write
1893566A000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893279A000
trusted library allocation
page read and write
189352BD000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893283C000
heap
page read and write
18941BFC000
trusted library allocation
page read and write
F4E000
stack
page read and write
22E10000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
1893560B000
trusted library allocation
page read and write
312E000
stack
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
4B81000
heap
page read and write
1011000
heap
page read and write
4B81000
heap
page read and write
18935328000
trusted library allocation
page read and write
4B81000
heap
page read and write
189387D2000
trusted library allocation
page read and write
18934BA7000
trusted library allocation
page read and write
1B674968000
heap
page read and write
18937744000
trusted library allocation
page read and write
18936267000
trusted library allocation
page read and write
383F000
stack
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
1B67487F000
heap
page read and write
18932896000
heap
page read and write
1B6748FC000
heap
page read and write
18932857000
heap
page read and write
189460DE000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932840000
heap
page read and write
18932857000
heap
page read and write
22E2B000
heap
page read and write
1C7CE000
stack
page read and write
18934CC0000
trusted library allocation
page read and write
E79000
unkown
page write copy
18932838000
heap
page read and write
42AE000
stack
page read and write
4B81000
heap
page read and write
1893283F000
heap
page read and write
18932884000
heap
page read and write
12C4000
heap
page read and write
3050000
direct allocation
page read and write
189351E2000
trusted library allocation
page read and write
1893284F000
heap
page read and write
18936848000
trusted library allocation
page read and write
18935429000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932884000
heap
page read and write
189358B6000
trusted library allocation
page read and write
4B81000
heap
page read and write
1121000
unkown
page execute and read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
189356FE000
trusted library allocation
page read and write
18935210000
trusted library allocation
page read and write
12C4000
heap
page read and write
22DF3000
heap
page read and write
189354F8000
trusted library allocation
page read and write
18945EB9000
trusted library allocation
page read and write
7006000
heap
page read and write
18934B2F000
trusted library allocation
page read and write
1893284C000
heap
page read and write
18932838000
heap
page read and write
18932884000
heap
page read and write
18944D30000
trusted library allocation
page read and write
18932864000
heap
page read and write
18932857000
heap
page read and write
4B81000
heap
page read and write
4E70000
direct allocation
page execute and read and write
189354F8000
trusted library allocation
page read and write
18946039000
trusted library allocation
page read and write
E72000
unkown
page execute and read and write
18931500000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935367000
trusted library allocation
page read and write
18937DC9000
trusted library allocation
page read and write
4D30000
direct allocation
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
18932861000
heap
page read and write
473F000
stack
page read and write
18932863000
heap
page read and write
18932838000
heap
page read and write
46BE000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
189388D0000
trusted library allocation
page read and write
189313F6000
trusted library allocation
page read and write
18937EA1000
trusted library allocation
page read and write
2B9F000
stack
page read and write
3EAF000
stack
page read and write
1893542E000
trusted library allocation
page read and write
18932842000
heap
page read and write
18934B7E000
trusted library allocation
page read and write
4CD1000
heap
page read and write
12C4000
heap
page read and write
1490000
direct allocation
page read and write
1893286A000
heap
page read and write
12A0000
direct allocation
page read and write
1B6748E8000
heap
page read and write
18934B7F000
trusted library allocation
page read and write
4CD1000
heap
page read and write
189354E4000
trusted library allocation
page read and write
18946042000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932886000
heap
page read and write
18932884000
heap
page read and write
189356A1000
trusted library allocation
page read and write
197DA1B0000
heap
page read and write
18932842000
heap
page read and write
18932884000
heap
page read and write
21DE000
stack
page read and write
4CD1000
heap
page read and write
D64000
heap
page read and write
12C5000
heap
page read and write
18945FD2000
trusted library allocation
page read and write
4771000
heap
page read and write
1893284F000
heap
page read and write
1893FB9D000
trusted library allocation
page read and write
1893286A000
heap
page read and write
244C000
unkown
page readonly
12C4000
heap
page read and write
1893684F000
trusted library allocation
page read and write
18931413000
trusted library allocation
page read and write
12C4000
heap
page read and write
189364D8000
trusted library allocation
page read and write
12C4000
heap
page read and write
189328AF000
heap
page read and write
189326E3000
trusted library allocation
page read and write
18932861000
heap
page read and write
4B81000
heap
page read and write
53A1000
direct allocation
page read and write
18932840000
heap
page read and write
189354C9000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189448EC000
trusted library allocation
page read and write
1894617D000
trusted library allocation
page read and write
18945FE4000
trusted library allocation
page read and write
820000
heap
page read and write
1C961000
heap
page read and write
18935C49000
trusted library allocation
page read and write
18931748000
trusted library allocation
page read and write
22E25000
heap
page read and write
18932861000
heap
page read and write
1893283A000
heap
page read and write
189326A8000
trusted library allocation
page read and write
12C4000
heap
page read and write
189337DD000
trusted library allocation
page read and write
18932842000
heap
page read and write
18945C99000
trusted library allocation
page read and write
4B81000
heap
page read and write
189377C9000
trusted library allocation
page read and write
1B674968000
heap
page read and write
12C4000
heap
page read and write
18946619000
trusted library allocation
page read and write
189387E9000
trusted library allocation
page read and write
2BFF000
stack
page read and write
189354C9000
trusted library allocation
page read and write
189379D9000
trusted library allocation
page read and write
12C4000
heap
page read and write
189449A3000
trusted library allocation
page read and write
4771000
heap
page read and write
12C5000
heap
page read and write
18945DFB000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932864000
heap
page read and write
CBF000
unkown
page execute and read and write
D64000
heap
page read and write
18944D00000
trusted library allocation
page read and write
189354D0000
trusted library allocation
page read and write
18935367000
trusted library allocation
page read and write
18940E35000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893289F000
heap
page read and write
6B00000
heap
page read and write
CE9000
unkown
page execute and read and write
12C5000
heap
page read and write
6C8BE000
unkown
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
12C4000
heap
page read and write
1C961000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
4771000
heap
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
4B81000
heap
page read and write
2BC0000
direct allocation
page read and write
FF3000
heap
page read and write
1893563F000
trusted library allocation
page read and write
FAE000
heap
page read and write
18932884000
heap
page read and write
271FA950000
heap
page read and write
1893283B000
heap
page read and write
12C4000
heap
page read and write
189377E3000
trusted library allocation
page read and write
12C5000
heap
page read and write
18932645000
trusted library allocation
page read and write
189379B5000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
12C5000
heap
page read and write
18945CCD000
trusted library allocation
page read and write
1893179D000
trusted library allocation
page read and write
18947BDC000
trusted library allocation
page read and write
12C4000
heap
page read and write
3D1F000
stack
page read and write
1B674959000
heap
page read and write
18935057000
trusted library allocation
page read and write
18932894000
heap
page read and write
12C4000
heap
page read and write
18945A6C000
trusted library allocation
page read and write
18932857000
heap
page read and write
22E43000
heap
page read and write
189350F0000
trusted library allocation
page read and write
18932623000
trusted library allocation
page read and write
D64000
heap
page read and write
4B81000
heap
page read and write
18935747000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937E91000
trusted library allocation
page read and write
18945C52000
trusted library allocation
page read and write
1893374C000
trusted library allocation
page read and write
1893283F000
heap
page read and write
18937E50000
trusted library allocation
page read and write
12C5000
heap
page read and write
18937E44000
trusted library allocation
page read and write
189358D1000
trusted library allocation
page read and write
18945D28000
trusted library allocation
page read and write
44BF000
stack
page read and write
1893285C000
heap
page read and write
189378F5000
trusted library allocation
page read and write
E79000
unkown
page write copy
1893267A000
trusted library allocation
page read and write
18937EFD000
trusted library allocation
page read and write
189358E4000
trusted library allocation
page read and write
12C5000
heap
page read and write
B41000
unkown
page execute and write copy
18937E7E000
trusted library allocation
page read and write
1893286A000
heap
page read and write
18941069000
trusted library allocation
page read and write
3ABF000
stack
page read and write
12C4000
heap
page read and write
2AEF000
stack
page read and write
1C961000
heap
page read and write
18934B87000
trusted library allocation
page read and write
1894478B000
trusted library allocation
page read and write
18932861000
heap
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
6FF0000
heap
page read and write
1B67484D000
heap
page read and write
189317A4000
trusted library allocation
page read and write
189328AB000
heap
page read and write
12C4000
heap
page read and write
419000
unkown
page readonly
35DE000
stack
page read and write
4B81000
heap
page read and write
18934C63000
trusted library allocation
page read and write
18945DFC000
trusted library allocation
page read and write
189356C5000
trusted library allocation
page read and write
18932884000
heap
page read and write
2BE0000
direct allocation
page read and write
1893FFFB000
trusted library allocation
page read and write
22E17000
heap
page read and write
189449AE000
trusted library allocation
page read and write
18932853000
heap
page read and write
18932896000
heap
page read and write
18932884000
heap
page read and write
18932884000
heap
page read and write
18937E71000
trusted library allocation
page read and write
189328A4000
heap
page read and write
1893689F000
trusted library allocation
page read and write
12C5000
heap
page read and write
5AD000
unkown
page execute and read and write
18936860000
trusted library allocation
page read and write
18932669000
trusted library allocation
page read and write
3FFE000
stack
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
18936791000
trusted library allocation
page read and write
1B6748AA000
heap
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
18932872000
heap
page read and write
189460B2000
trusted library allocation
page read and write
6970000
heap
page read and write
18937D92000
trusted library allocation
page read and write
12C4000
heap
page read and write
18938E93000
trusted library allocation
page read and write
12C4000
heap
page read and write
189356CF000
trusted library allocation
page read and write
4B81000
heap
page read and write
189379E8000
trusted library allocation
page read and write
4B81000
heap
page read and write
18944922000
trusted library allocation
page read and write
18932561000
trusted library allocation
page read and write
12C4000
heap
page read and write
51D0000
direct allocation
page execute and read and write
18945ABB000
trusted library allocation
page read and write
3D5E000
stack
page read and write
18937889000
trusted library allocation
page read and write
18932857000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
1893283A000
heap
page read and write
1893283C000
heap
page read and write
18946022000
trusted library allocation
page read and write
12C5000
heap
page read and write
4B81000
heap
page read and write
18934CCA000
trusted library allocation
page read and write
1893283F000
heap
page read and write
18934BC0000
trusted library allocation
page read and write
18937D19000
trusted library allocation
page read and write
12C4000
heap
page read and write
18946182000
trusted library allocation
page read and write
1893285C000
heap
page read and write
18932842000
heap
page read and write
18946005000
trusted library allocation
page read and write
22E33000
heap
page read and write
1B6748E1000
heap
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
18932861000
heap
page read and write
F10000
heap
page read and write
12C5000
heap
page read and write
18932863000
heap
page read and write
1893285A000
heap
page read and write
1893283A000
heap
page read and write
1893264A000
trusted library allocation
page read and write
22C71000
heap
page read and write
189356E8000
trusted library allocation
page read and write
189325E2000
trusted library allocation
page read and write
189325F3000
trusted library allocation
page read and write
12C4000
heap
page read and write
189317C7000
trusted library allocation
page read and write
5150000
direct allocation
page read and write
4B81000
heap
page read and write
3050000
direct allocation
page read and write
18932857000
heap
page read and write
101F000
heap
page read and write
189410A7000
trusted library allocation
page read and write
18934BC0000
trusted library allocation
page read and write
189326C7000
trusted library allocation
page read and write
1893288C000
heap
page read and write
18935459000
trusted library allocation
page read and write
12C4000
heap
page read and write
18946042000
trusted library allocation
page read and write
189375FB000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
9BE000
stack
page read and write
18934BED000
trusted library allocation
page read and write
18934BFE000
trusted library allocation
page read and write
18932899000
heap
page read and write
4233000
heap
page read and write
189360D4000
trusted library allocation
page read and write
189367E0000
trusted library allocation
page read and write
6920000
heap
page read and write
12A0000
direct allocation
page read and write
18932884000
heap
page read and write
18932842000
heap
page read and write
18932840000
heap
page read and write
1729F260000
heap
page read and write
18947BF4000
trusted library allocation
page read and write
18945A92000
trusted library allocation
page read and write
1893536F000
trusted library allocation
page read and write
18945A82000
trusted library allocation
page read and write
1122000
unkown
page execute and write copy
18932861000
heap
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
18932860000
heap
page read and write
1893285C000
heap
page read and write
1893283A000
heap
page read and write
1893285C000
heap
page read and write
18936860000
trusted library allocation
page read and write
18932853000
heap
page read and write
18932842000
heap
page read and write
18932761000
trusted library allocation
page read and write
1893284E000
heap
page read and write
18932856000
heap
page read and write
1893534A000
trusted library allocation
page read and write
18934B87000
trusted library allocation
page read and write
18932861000
heap
page read and write
18935394000
trusted library allocation
page read and write
D64000
heap
page read and write
18944850000
trusted library allocation
page read and write
18937880000
trusted library allocation
page read and write
12C4000
heap
page read and write
423E000
stack
page read and write
18945BD2000
trusted library allocation
page read and write
1893283A000
heap
page read and write
1893286A000
heap
page read and write
189460F3000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354FE000
trusted library allocation
page read and write
189317A2000
trusted library allocation
page read and write
1893286A000
heap
page read and write
18947BD2000
trusted library allocation
page read and write
2BEF000
stack
page read and write
18937EF6000
trusted library allocation
page read and write
1893288C000
heap
page read and write
1893256E000
trusted library allocation
page read and write
1893283F000
heap
page read and write
4CD1000
heap
page read and write
189358B0000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
18932591000
trusted library allocation
page read and write
18932838000
heap
page read and write
189367FD000
trusted library allocation
page read and write
2577000
heap
page read and write
189354A0000
trusted library allocation
page read and write
18935220000
trusted library allocation
page read and write
189364C3000
trusted library allocation
page read and write
155F000
heap
page read and write
18932861000
heap
page read and write
22E31000
heap
page read and write
189388D7000
trusted library allocation
page read and write
189354EA000
trusted library allocation
page read and write
1893536F000
trusted library allocation
page read and write
18937E91000
trusted library allocation
page read and write
18932850000
heap
page read and write
12C4000
heap
page read and write
22A63000
heap
page read and write
189354A0000
trusted library allocation
page read and write
12C4000
heap
page read and write
1170000
heap
page read and write
12C4000
heap
page read and write
1893288C000
heap
page read and write
1893774B000
trusted library allocation
page read and write
1729F309000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
8C0000
heap
page read and write
E6BB1FA000
stack
page read and write
1893283A000
heap
page read and write
12C5000
heap
page read and write
18935220000
trusted library allocation
page read and write
189352BD000
trusted library allocation
page read and write
1893285C000
heap
page read and write
3DFE000
stack
page read and write
189449D9000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
1894108B000
trusted library allocation
page read and write
F74000
heap
page read and write
12C4000
heap
page read and write
1893262B000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285A000
heap
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
4283000
heap
page read and write
FC9000
heap
page read and write
12C4000
heap
page read and write
18938798000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
4A3F000
stack
page read and write
12C4000
heap
page read and write
5190000
direct allocation
page execute and read and write
197D9F19000
heap
page read and write
18944973000
trusted library allocation
page read and write
192000
stack
page read and write
18932853000
heap
page read and write
12C5000
heap
page read and write
278B000
heap
page read and write
189387C0000
trusted library allocation
page read and write
18932842000
heap
page read and write
420000
heap
page read and write
18935429000
trusted library allocation
page read and write
18944D10000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
12C4000
heap
page read and write
1893526A000
trusted library allocation
page read and write
1893561E000
trusted library allocation
page read and write
3DCF081000
trusted library allocation
page execute read
18946D72000
trusted library allocation
page read and write
189354D0000
trusted library allocation
page read and write
189328A4000
heap
page read and write
21E0000
heap
page read and write
189354D7000
trusted library allocation
page read and write
18938780000
trusted library allocation
page read and write
18932853000
heap
page read and write
18935505000
trusted library allocation
page read and write
12C4000
heap
page read and write
D0E000
stack
page read and write
D64000
heap
page read and write
189328AF000
heap
page read and write
874000
heap
page read and write
3050000
direct allocation
page read and write
189372A3000
trusted library allocation
page read and write
18934B2F000
trusted library allocation
page read and write
12C4000
heap
page read and write
189360FB000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
899000
unkown
page read and write
18934CC7000
trusted library allocation
page read and write
18944D30000
trusted library allocation
page read and write
12C4000
heap
page read and write
950000
heap
page read and write
18937D9D000
trusted library allocation
page read and write
1893879C000
trusted library allocation
page read and write
3FBF000
stack
page read and write
4CD1000
heap
page read and write
20633B10000
unclassified section
page readonly
12C4000
heap
page read and write
62CF000
stack
page read and write
189356FE000
trusted library allocation
page read and write
18935349000
trusted library allocation
page read and write
4B81000
heap
page read and write
18946042000
trusted library allocation
page read and write
1893284F000
heap
page read and write
4B81000
heap
page read and write
18932886000
heap
page read and write
12C4000
heap
page read and write
18945D57000
trusted library allocation
page read and write
4B81000
heap
page read and write
18946042000
trusted library allocation
page read and write
1893288C000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
277A000
heap
page read and write
18940E3C000
trusted library allocation
page read and write
18936843000
trusted library allocation
page read and write
18931371000
trusted library allocation
page read and write
D64000
heap
page read and write
1893266C000
trusted library allocation
page read and write
1893288C000
heap
page read and write
1C74F000
stack
page read and write
1893285C000
heap
page read and write
485F000
stack
page read and write
12C4000
heap
page read and write
476F000
stack
page read and write
1893284F000
heap
page read and write
189388BB000
trusted library allocation
page read and write
475F000
stack
page read and write
189460E0000
trusted library allocation
page read and write
34FF000
stack
page read and write
18932861000
heap
page read and write
22E07000
heap
page read and write
1893546F000
trusted library allocation
page read and write
189327F0000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893551F000
trusted library allocation
page read and write
18945A49000
trusted library allocation
page read and write
12C5000
heap
page read and write
18947BE2000
trusted library allocation
page read and write
18941AFC000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18945C4F000
trusted library allocation
page read and write
874000
heap
page read and write
18932838000
heap
page read and write
1893284C000
heap
page read and write
18937EEC000
trusted library allocation
page read and write
18947C3B000
trusted library allocation
page read and write
189470D3000
trusted library allocation
page read and write
22E12000
heap
page read and write
189460EA000
trusted library allocation
page read and write
18935367000
trusted library allocation
page read and write
18932696000
trusted library allocation
page read and write
22E07000
heap
page read and write
189449D6000
trusted library allocation
page read and write
18935350000
trusted library allocation
page read and write
1893289A000
heap
page read and write
1894707F000
trusted library allocation
page read and write
18945CB1000
trusted library allocation
page read and write
1893283A000
heap
page read and write
18937EA1000
trusted library allocation
page read and write
5530000
direct allocation
page execute and read and write
4B81000
heap
page read and write
1893288F000
heap
page read and write
189353F5000
trusted library allocation
page read and write
1893283A000
heap
page read and write
345F000
stack
page read and write
12C4000
heap
page read and write
189367B7000
trusted library allocation
page read and write
22E12000
heap
page read and write
413000
unkown
page readonly
874000
heap
page read and write
1893285C000
heap
page read and write
18935367000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935496000
trusted library allocation
page read and write
1893283A000
heap
page read and write
18937ECE000
trusted library allocation
page read and write
15D4000
heap
page read and write
4B81000
heap
page read and write
22E25000
heap
page read and write
12C4000
heap
page read and write
189328AF000
heap
page read and write
400000
unkown
page execute and read and write
18932857000
heap
page read and write
52E0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
20634008000
trusted library allocation
page read and write
22E25000
heap
page read and write
4771000
heap
page read and write
189460D2000
trusted library allocation
page read and write
18946042000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932886000
heap
page read and write
401000
unkown
page execute read
189372AB000
trusted library allocation
page read and write
22E12000
heap
page read and write
3050000
direct allocation
page read and write
189326AA000
trusted library allocation
page read and write
4B81000
heap
page read and write
18946D63000
trusted library allocation
page read and write
12C4000
heap
page read and write
18946026000
trusted library allocation
page read and write
A1F000
unkown
page execute and read and write
12C4000
heap
page read and write
189354A4000
trusted library allocation
page read and write
189357C2000
trusted library allocation
page read and write
18932620000
trusted library allocation
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
18937DCE000
trusted library allocation
page read and write
18932854000
heap
page read and write
189328AF000
heap
page read and write
18945AD2000
trusted library allocation
page read and write
18937DCE000
trusted library allocation
page read and write
18936766000
trusted library allocation
page read and write
18934B77000
trusted library allocation
page read and write
189356F7000
trusted library allocation
page read and write
18937ECE000
trusted library allocation
page read and write
18932680000
trusted library allocation
page read and write
18936899000
trusted library allocation
page read and write
18935C23000
trusted library allocation
page read and write
1893284E000
heap
page read and write
FAE000
heap
page read and write
18C0003F000
trusted library allocation
page read and write
18945D76000
trusted library allocation
page read and write
18935448000
trusted library allocation
page read and write
1018000
heap
page read and write
18944981000
trusted library allocation
page read and write
A00000
heap
page read and write
CA1000
unkown
page execute and write copy
2E5F000
stack
page read and write
D64000
heap
page read and write
18938E7F000
trusted library allocation
page read and write
18935657000
trusted library allocation
page read and write
CF2000
unkown
page execute and read and write
15D0000
heap
page read and write
1540000
heap
page read and write
1894495D000
trusted library allocation
page read and write
189367C3000
trusted library allocation
page read and write
18936884000
trusted library allocation
page read and write
18930990000
trusted library allocation
page read and write
18933508000
trusted library allocation
page read and write
271FA975000
heap
page read and write
12C4000
heap
page read and write
2D5E000
stack
page read and write
18937D79000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893288D000
heap
page read and write
874000
heap
page read and write
372F000
stack
page read and write
2BE0000
direct allocation
page read and write
189328AF000
heap
page read and write
1893534C000
trusted library allocation
page read and write
189360C9000
trusted library allocation
page read and write
189356F7000
trusted library allocation
page read and write
18946979000
trusted library allocation
page read and write
12C5000
heap
page read and write
874000
heap
page read and write
18932890000
heap
page read and write
18932886000
heap
page read and write
148E000
stack
page read and write
18936742000
trusted library allocation
page read and write
4CD1000
heap
page read and write
4D70000
direct allocation
page execute and read and write
18932886000
heap
page read and write
12C4000
heap
page read and write
6405000
heap
page read and write
18937791000
trusted library allocation
page read and write
189367B1000
trusted library allocation
page read and write
2575000
heap
page read and write
20633D00000
trusted library allocation
page read and write
18935459000
trusted library allocation
page read and write
1893798D000
trusted library allocation
page read and write
18938ED7000
trusted library allocation
page read and write
18932838000
heap
page read and write
155E000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
2560000
heap
page read and write
4B81000
heap
page read and write
1893283A000
heap
page read and write
439F000
stack
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
1894477B000
trusted library allocation
page read and write
18934C05000
trusted library allocation
page read and write
1893289A000
heap
page read and write
18941192000
trusted library allocation
page read and write
114F000
stack
page read and write
18935355000
trusted library allocation
page read and write
18945D61000
trusted library allocation
page read and write
1893263B000
trusted library allocation
page read and write
1893676C000
trusted library allocation
page read and write
5180000
direct allocation
page execute and read and write
189358F6000
trusted library allocation
page read and write
1893779E000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
48A1000
heap
page read and write
18938E86000
trusted library allocation
page read and write
18931382000
trusted library allocation
page read and write
12C5000
heap
page read and write
18935696000
trusted library allocation
page read and write
1893564F000
trusted library allocation
page read and write
18937EF9000
trusted library allocation
page read and write
4B81000
heap
page read and write
1B67488D000
heap
page read and write
6C8C0000
unkown
page read and write
18945FAF000
trusted library allocation
page read and write
D64000
heap
page read and write
189460EA000
trusted library allocation
page read and write
18937EFD000
trusted library allocation
page read and write
4B81000
heap
page read and write
349F000
stack
page read and write
18937D84000
trusted library allocation
page read and write
4B81000
heap
page read and write
18938716000
trusted library allocation
page read and write
271F8EA6000
heap
page read and write
18937D62000
trusted library allocation
page read and write
34AF000
stack
page read and write
64CF000
stack
page read and write
4B81000
heap
page read and write
18937E9C000
trusted library allocation
page read and write
18931323000
trusted library allocation
page read and write
18934BDA000
trusted library allocation
page read and write
14A0000
heap
page read and write
42CE000
stack
page read and write
18937EF9000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
12C4000
heap
page read and write
18945D3E000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
18945CEE000
trusted library allocation
page read and write
1893649F000
trusted library allocation
page read and write
18937989000
trusted library allocation
page read and write
4B81000
heap
page read and write
189379F3000
trusted library allocation
page read and write
18937D84000
trusted library allocation
page read and write
18946043000
trusted library allocation
page read and write
18937EC4000
trusted library allocation
page read and write
18936843000
trusted library allocation
page read and write
189325D8000
trusted library allocation
page read and write
18940E3C000
trusted library allocation
page read and write
4771000
heap
page read and write
20634060000
trusted library allocation
page read and write
18932838000
heap
page read and write
1893285E000
heap
page read and write
18934BBF000
trusted library allocation
page read and write
18937995000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
22DF0000
heap
page read and write
874000
heap
page read and write
18937ECE000
trusted library allocation
page read and write
18931376000
trusted library allocation
page read and write
1893283A000
heap
page read and write
18932863000
heap
page read and write
18932884000
heap
page read and write
34DE000
stack
page read and write
18944983000
trusted library allocation
page read and write
1893675D000
trusted library allocation
page read and write
1893283F000
heap
page read and write
18931482000
trusted library allocation
page read and write
1893267A000
trusted library allocation
page read and write
4F6B000
stack
page read and write
12C4000
heap
page read and write
18934CFE000
trusted library allocation
page read and write
19D000
stack
page read and write
189328A2000
heap
page read and write
18934C76000
trusted library allocation
page read and write
18938881000
trusted library allocation
page read and write
12C4000
heap
page read and write
189317C6000
trusted library allocation
page read and write
4B81000
heap
page read and write
4E50000
direct allocation
page execute and read and write
1893284F000
heap
page read and write
4CE0000
direct allocation
page read and write
4CD1000
heap
page read and write
189354A7000
trusted library allocation
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
1893561E000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932694000
trusted library allocation
page read and write
18937EFE000
trusted library allocation
page read and write
4771000
heap
page read and write
1004000
heap
page read and write
1893288D000
heap
page read and write
18932582000
trusted library allocation
page read and write
189337A7000
trusted library allocation
page read and write
189460D2000
trusted library allocation
page read and write
540000
heap
page read and write
1566000
heap
page read and write
12C4000
heap
page read and write
18C0003F000
trusted library allocation
page read and write
8EF000
stack
page read and write
4FD000
unkown
page execute and read and write
189362D7000
trusted library allocation
page read and write
1893879C000
trusted library allocation
page read and write
18937DB0000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
D64000
heap
page read and write
FEF000
heap
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
1893285A000
heap
page read and write
1894478F000
trusted library allocation
page read and write
189314FE000
trusted library allocation
page read and write
874000
heap
page read and write
18934B95000
trusted library allocation
page read and write
F74000
heap
page read and write
4B81000
heap
page read and write
1016000
heap
page read and write
18945924000
trusted library allocation
page read and write
18940E00000
trusted library allocation
page read and write
FD2000
heap
page read and write
18938780000
trusted library allocation
page read and write
12C4000
heap
page read and write
189356C6000
trusted library allocation
page read and write
12C4000
heap
page read and write
18936793000
trusted library allocation
page read and write
18932840000
heap
page read and write
22E10000
heap
page read and write
18932840000
heap
page read and write
18932861000
heap
page read and write
401000
unkown
page execute read
18932853000
heap
page read and write
18932884000
heap
page read and write
4B81000
heap
page read and write
1893285C000
heap
page read and write
18932852000
heap
page read and write
189447DE000
trusted library allocation
page read and write
157B000
heap
page read and write
18937E6A000
trusted library allocation
page read and write
18935493000
trusted library allocation
page read and write
271F8E9F000
heap
page read and write
18932842000
heap
page read and write
18932840000
heap
page read and write
E72000
unkown
page execute and read and write
18937E2F000
trusted library allocation
page read and write
1893284C000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
18944955000
trusted library allocation
page read and write
413000
unkown
page readonly
189360E6000
trusted library allocation
page read and write
271FA978000
heap
page read and write
18932840000
heap
page read and write
4B81000
heap
page read and write
18938780000
trusted library allocation
page read and write
1893545F000
trusted library allocation
page read and write
18945C63000
trusted library allocation
page read and write
12C4000
heap
page read and write
48A1000
heap
page read and write
20633E70000
heap
page read and write
18935394000
trusted library allocation
page read and write
18934B57000
trusted library allocation
page read and write
18934BC2000
trusted library allocation
page read and write
113E000
stack
page read and write
420000
heap
page read and write
189356C4000
trusted library allocation
page read and write
18931323000
trusted library allocation
page read and write
189379A1000
trusted library allocation
page read and write
189367AF000
trusted library allocation
page read and write
1893285C000
heap
page read and write
189387BC000
trusted library allocation
page read and write
6B00000
heap
page read and write
12C4000
heap
page read and write
22E17000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
9F0000
unkown
page read and write
1893286A000
heap
page read and write
18945CBF000
trusted library allocation
page read and write
189360FB000
trusted library allocation
page read and write
18932836000
heap
page read and write
4CD1000
heap
page read and write
18938846000
trusted library allocation
page read and write
18945CE3000
trusted library allocation
page read and write
18938887000
trusted library allocation
page read and write
5180000
direct allocation
page execute and read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
18935220000
trusted library allocation
page read and write
1893371B000
trusted library allocation
page read and write
18938722000
trusted library allocation
page read and write
189455C7000
trusted library allocation
page read and write
189354D0000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
18945D10000
trusted library allocation
page read and write
18932852000
heap
page read and write
198000
stack
page read and write
2577000
heap
page read and write
4CD1000
heap
page read and write
18937D52000
trusted library allocation
page read and write
1B6748E3000
heap
page read and write
18937EF9000
trusted library allocation
page read and write
26F0000
heap
page read and write
22C63000
heap
page read and write
4B81000
heap
page read and write
189326BC000
trusted library allocation
page read and write
189377A3000
trusted library allocation
page read and write
25BE000
stack
page read and write
E11000
unkown
page execute and write copy
1893286A000
heap
page read and write
1C64F000
stack
page read and write
9B000
stack
page read and write
4B81000
heap
page read and write
18931791000
trusted library allocation
page read and write
18935226000
trusted library allocation
page read and write
4A7E000
stack
page read and write
1893283A000
heap
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
18940E9D000
trusted library allocation
page read and write
D64000
heap
page read and write
48A1000
heap
page read and write
4B81000
heap
page read and write
3E9E000
stack
page read and write
1B67488A000
heap
page read and write
189358EE000
trusted library allocation
page read and write
4B81000
heap
page read and write
1B674869000
heap
page read and write
1B674977000
heap
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
189357C6000
trusted library allocation
page read and write
14AE000
heap
page read and write
18932857000
heap
page read and write
12A0000
direct allocation
page read and write
22BF0000
heap
page read and write
12C4000
heap
page read and write
22E2B000
heap
page read and write
4861000
heap
page read and write
18931786000
trusted library allocation
page read and write
18946032000
trusted library allocation
page read and write
18945D76000
trusted library allocation
page read and write
E79000
unkown
page read and write
189390CA000
trusted library allocation
page read and write
18934B7A000
trusted library allocation
page read and write
12C4000
heap
page read and write
54E0000
direct allocation
page execute and read and write
98D000
stack
page read and write
189379C1000
trusted library allocation
page read and write
189328AF000
heap
page read and write
18940E98000
trusted library allocation
page read and write
1B674945000
heap
page read and write
18937E61000
trusted library allocation
page read and write
1893561B000
trusted library allocation
page read and write
62C000
unkown
page execute and read and write
18945FD0000
trusted library allocation
page read and write
18932853000
heap
page read and write
18932884000
heap
page read and write
18947056000
trusted library allocation
page read and write
189350F2000
trusted library allocation
page read and write
12C4000
heap
page read and write
413000
unkown
page readonly
189367EE000
trusted library allocation
page read and write
18932850000
heap
page read and write
18935425000
trusted library allocation
page read and write
1893548C000
trusted library allocation
page read and write
1893285A000
heap
page read and write
189379F1000
trusted library allocation
page read and write
22C71000
heap
page read and write
1893532D000
trusted library allocation
page read and write
18945D6B000
trusted library allocation
page read and write
5560000
direct allocation
page execute and read and write
189360E5000
trusted library allocation
page read and write
189325DA000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
18932853000
heap
page read and write
18934BB4000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18932863000
heap
page read and write
18937EF6000
trusted library allocation
page read and write
189356E9000
trusted library allocation
page read and write
4B81000
heap
page read and write
18940E03000
trusted library allocation
page read and write
18937EFE000
trusted library allocation
page read and write
18938899000
trusted library allocation
page read and write
1893379A000
trusted library allocation
page read and write
18936905000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893289C000
heap
page read and write
1894513D000
trusted library allocation
page read and write
12C4000
heap
page read and write
E6BD1FF000
stack
page read and write
4B81000
heap
page read and write
18945CE9000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
189449A3000
trusted library allocation
page read and write
18937D2E000
trusted library allocation
page read and write
18946998000
trusted library allocation
page read and write
189455E6000
trusted library allocation
page read and write
18940ECB000
trusted library allocation
page read and write
18932886000
heap
page read and write
1894601B000
trusted library allocation
page read and write
18944534000
trusted library allocation
page read and write
1893131B000
trusted library allocation
page read and write
F74000
heap
page read and write
4771000
heap
page read and write
1893284F000
heap
page read and write
1893288D000
heap
page read and write
189379B5000
trusted library allocation
page read and write
18937E2F000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937D62000
trusted library allocation
page read and write
18945515000
trusted library allocation
page read and write
18935488000
trusted library allocation
page read and write
4771000
heap
page read and write
18932884000
heap
page read and write
462F000
stack
page read and write
189367FA000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
18932842000
heap
page read and write
D64000
heap
page read and write
18932840000
heap
page read and write
189327C9000
trusted library allocation
page read and write
189387BE000
trusted library allocation
page read and write
7FCB000
stack
page read and write
1893541B000
trusted library allocation
page read and write
1893286A000
heap
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
4771000
heap
page read and write
820000
heap
page read and write
1893561E000
trusted library allocation
page read and write
18934BD6000
trusted library allocation
page read and write
A6BBD8000
stack
page read and write
189326F2000
trusted library allocation
page read and write
18937288000
trusted library allocation
page read and write
1140000
heap
page read and write
1893283F000
heap
page read and write
18931371000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937EC6000
trusted library allocation
page read and write
548F000
stack
page read and write
1893529F000
trusted library allocation
page read and write
443E000
stack
page read and write
326E000
stack
page read and write
2A9E000
stack
page read and write
189326C1000
trusted library allocation
page read and write
1893543E000
trusted library allocation
page read and write
18932886000
heap
page read and write
189460B4000
trusted library allocation
page read and write
12C4000
heap
page read and write
189356DC000
trusted library allocation
page read and write
439E000
stack
page read and write
18932884000
heap
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
189360E6000
trusted library allocation
page read and write
1893257E000
trusted library allocation
page read and write
874000
heap
page read and write
A52000
unkown
page execute and read and write
463E000
stack
page read and write
18932840000
heap
page read and write
18937D89000
trusted library allocation
page read and write
18931361000
trusted library allocation
page read and write
189367FA000
trusted library allocation
page read and write
189356A1000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893523E000
trusted library allocation
page read and write
18937EC4000
trusted library allocation
page read and write
22E15000
heap
page read and write
1B6748A1000
heap
page read and write
1893FB92000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
18932834000
heap
page read and write
18946026000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18937DAA000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
1893284C000
heap
page read and write
18932840000
heap
page read and write
401000
unkown
page execute read
18937E70000
trusted library allocation
page read and write
18932834000
heap
page read and write
5180000
direct allocation
page execute and read and write
18934B7F000
trusted library allocation
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
12C4000
heap
page read and write
18932836000
heap
page read and write
12C4000
heap
page read and write
189378A6000
trusted library allocation
page read and write
1893915F000
trusted library allocation
page read and write
18932857000
heap
page read and write
18937E10000
trusted library allocation
page read and write
189387F4000
trusted library allocation
page read and write
189460D2000
trusted library allocation
page read and write
9B000
stack
page read and write
18938748000
trusted library allocation
page read and write
18940E14000
trusted library allocation
page read and write
4CD1000
heap
page read and write
12C4000
heap
page read and write
1B6748EE000
heap
page read and write
1893543A000
trusted library allocation
page read and write
18932857000
heap
page read and write
1500000
heap
page read and write
189367EF000
trusted library allocation
page read and write
18932836000
heap
page read and write
1893873D000
trusted library allocation
page read and write
18938E92000
trusted library allocation
page read and write
386F000
stack
page read and write
18944D28000
trusted library allocation
page read and write
1893549B000
trusted library allocation
page read and write
4771000
heap
page read and write
189460F3000
trusted library allocation
page read and write
2C1E000
stack
page read and write
18932860000
heap
page read and write
1893286A000
heap
page read and write
18934B88000
trusted library allocation
page read and write
18944919000
trusted library allocation
page read and write
18945BE8000
trusted library allocation
page read and write
18944871000
trusted library allocation
page read and write
1893265E000
trusted library allocation
page read and write
12C4000
heap
page read and write
18938848000
trusted library allocation
page read and write
477E000
stack
page read and write
18932890000
heap
page read and write
189417CD000
trusted library allocation
page read and write
18932853000
heap
page read and write
2BC0000
direct allocation
page read and write
114B000
unkown
page execute and write copy
1C64F000
stack
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
18935444000
trusted library allocation
page read and write
15D4000
heap
page read and write
18932857000
heap
page read and write
18945AE2000
trusted library allocation
page read and write
2EBC000
stack
page read and write
18935CBE000
trusted library allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18935254000
trusted library allocation
page read and write
22E43000
heap
page read and write
189410A4000
trusted library allocation
page read and write
5CE000
stack
page read and write
12C4000
heap
page read and write
189354D7000
trusted library allocation
page read and write
18937ECE000
trusted library allocation
page read and write
189410AC000
trusted library allocation
page read and write
107F000
stack
page read and write
18935615000
trusted library allocation
page read and write
1893288D000
heap
page read and write
12C4000
heap
page read and write
22E12000
heap
page read and write
1894104F000
trusted library allocation
page read and write
18937D23000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893284F000
heap
page read and write
189337CA000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189328AF000
heap
page read and write
18935263000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934BBE000
trusted library allocation
page read and write
1893283F000
heap
page read and write
419000
unkown
page readonly
18946039000
trusted library allocation
page read and write
18945FE4000
trusted library allocation
page read and write
1893536F000
trusted library allocation
page read and write
18932834000
heap
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
18934C5E000
trusted library allocation
page read and write
18935670000
trusted library allocation
page read and write
2ABF000
stack
page read and write
12C4000
heap
page read and write
18938E78000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893688C000
trusted library allocation
page read and write
189367C3000
trusted library allocation
page read and write
1893286A000
heap
page read and write
1893799F000
trusted library allocation
page read and write
1893285C000
heap
page read and write
487F000
stack
page read and write
189317B4000
trusted library allocation
page read and write
27B1000
heap
page read and write
18945CEE000
trusted library allocation
page read and write
9BA000
stack
page read and write
18932853000
heap
page read and write
27B2000
heap
page read and write
1893285C000
heap
page read and write
4E60000
heap
page read and write
4B80000
heap
page read and write
12C4000
heap
page read and write
18934BD0000
trusted library allocation
page read and write
4B81000
heap
page read and write
189379DB000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932853000
heap
page read and write
189368F8000
trusted library allocation
page read and write
18940EE8000
trusted library allocation
page read and write
18932853000
heap
page read and write
22E0F000
heap
page read and write
1893886F000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
20634044000
trusted library allocation
page read and write
18932842000
heap
page read and write
1893546F000
trusted library allocation
page read and write
189356E2000
trusted library allocation
page read and write
18932861000
heap
page read and write
1893285E000
heap
page read and write
1893286A000
heap
page read and write
189362E8000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
22C30000
heap
page read and write
12C4000
heap
page read and write
1893FB00000
trusted library allocation
page read and write
18937DDE000
trusted library allocation
page read and write
1893283A000
heap
page read and write
1893289A000
heap
page read and write
1893284F000
heap
page read and write
513F000
stack
page read and write
14EF000
heap
page read and write
1893560B000
trusted library allocation
page read and write
18937EFE000
trusted library allocation
page read and write
E6BD9FF000
stack
page read and write
22E32000
heap
page read and write
18935486000
trusted library allocation
page read and write
18935355000
trusted library allocation
page read and write
12C4000
heap
page read and write
22A63000
heap
page read and write
1893263D000
trusted library allocation
page read and write
1893285A000
heap
page read and write
18941B90000
trusted library allocation
page read and write
4B81000
heap
page read and write
1B674929000
heap
page read and write
12C4000
heap
page read and write
18935348000
trusted library allocation
page read and write
402E000
stack
page read and write
189328AF000
heap
page read and write
12C4000
heap
page read and write
18937D5D000
trusted library allocation
page read and write
2F5F000
stack
page read and write
CCF000
stack
page read and write
4CD1000
heap
page read and write
12C4000
heap
page read and write
1893526A000
trusted library allocation
page read and write
18932834000
heap
page read and write
12C4000
heap
page read and write
189328A4000
heap
page read and write
271F8E70000
heap
page read and write
18932842000
heap
page read and write
126E000
stack
page read and write
397F000
stack
page read and write
18932859000
heap
page read and write
2EFCF000
stack
page read and write
22E15000
heap
page read and write
5DC000
stack
page read and write
22E2F000
heap
page read and write
18944D98000
trusted library allocation
page read and write
189460EA000
trusted library allocation
page read and write
18937791000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
4B81000
heap
page read and write
18945FB9000
trusted library allocation
page read and write
189317EC000
trusted library allocation
page read and write
189354EE000
trusted library allocation
page read and write
12C4000
heap
page read and write
44DF000
stack
page read and write
189460CA000
trusted library allocation
page read and write
189379D6000
trusted library allocation
page read and write
1893545B000
trusted library allocation
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
18937D92000
trusted library allocation
page read and write
18937797000
trusted library allocation
page read and write
1729F60A000
trusted library allocation
page read and write
12C5000
heap
page read and write
18937ECA000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945DFB000
trusted library allocation
page read and write
1B6748F1000
heap
page read and write
18935349000
trusted library allocation
page read and write
189355EC000
trusted library allocation
page read and write
1893266C000
trusted library allocation
page read and write
4B81000
heap
page read and write
1894695A000
trusted library allocation
page read and write
18938719000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18934C15000
trusted library allocation
page read and write
18932840000
heap
page read and write
18934B88000
trusted library allocation
page read and write
12C4000
heap
page read and write
189387D6000
trusted library allocation
page read and write
22A21000
heap
page read and write
12C4000
heap
page read and write
18934B72000
trusted library allocation
page read and write
18938879000
trusted library allocation
page read and write
18932853000
heap
page read and write
5330000
heap
page read and write
18934B3A000
trusted library allocation
page read and write
4B81000
heap
page read and write
349E000
stack
page read and write
189390FE000
trusted library allocation
page read and write
189460DB000
trusted library allocation
page read and write
189354A0000
trusted library allocation
page read and write
4110000
heap
page read and write
1893546C000
trusted library allocation
page read and write
18932842000
heap
page read and write
18935CC1000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285A000
heap
page read and write
1893285F000
heap
page read and write
18947C8E000
trusted library allocation
page read and write
18932853000
heap
page read and write
4CD1000
heap
page read and write
18932840000
heap
page read and write
6C641000
unkown
page execute read
12C4000
heap
page read and write
E10000
unkown
page readonly
12C4000
heap
page read and write
18935CEA000
trusted library allocation
page read and write
6AF1000
heap
page read and write
12C4000
heap
page read and write
18935259000
trusted library allocation
page read and write
4B81000
heap
page read and write
189448EF000
trusted library allocation
page read and write
F74000
heap
page read and write
18937EC3000
trusted library allocation
page read and write
189449F7000
trusted library allocation
page read and write
189387DC000
trusted library allocation
page read and write
18935226000
trusted library allocation
page read and write
189326BE000
trusted library allocation
page read and write
18934BAA000
trusted library allocation
page read and write
18937EC3000
trusted library allocation
page read and write
18935671000
trusted library allocation
page read and write
18945A72000
trusted library allocation
page read and write
18934C0A000
trusted library allocation
page read and write
18932838000
heap
page read and write
189460E2000
trusted library allocation
page read and write
18932884000
heap
page read and write
2BC0000
direct allocation
page read and write
189325C5000
trusted library allocation
page read and write
18932888000
heap
page read and write
189337AE000
trusted library allocation
page read and write
1893286A000
heap
page read and write
18935425000
trusted library allocation
page read and write
15D4000
heap
page read and write
18945B3D000
trusted library allocation
page read and write
18932863000
heap
page read and write
22E25000
heap
page read and write
18946042000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935444000
trusted library allocation
page read and write
18932853000
heap
page read and write
189325E1000
trusted library allocation
page read and write
2E1F000
stack
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
189460C6000
trusted library allocation
page read and write
189352BD000
trusted library allocation
page read and write
1893283A000
heap
page read and write
39EE000
stack
page read and write
189367C3000
trusted library allocation
page read and write
18932840000
heap
page read and write
1894112E000
trusted library allocation
page read and write
3CBE000
stack
page read and write
4CD1000
heap
page read and write
189309EF000
trusted library allocation
page read and write
12C4000
heap
page read and write
D01000
unkown
page execute and read and write
18945CEB000
trusted library allocation
page read and write
1893545B000
trusted library allocation
page read and write
1590000
heap
page read and write
18945FEF000
trusted library allocation
page read and write
1893283A000
heap
page read and write
189356DC000
trusted library allocation
page read and write
18935253000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893283A000
heap
page read and write
18932677000
trusted library allocation
page read and write
189356D3000
trusted library allocation
page read and write
FEF000
heap
page read and write
18932890000
heap
page read and write
18937E9C000
trusted library allocation
page read and write
35DF000
stack
page read and write
18947BD5000
trusted library allocation
page read and write
12C4000
heap
page read and write
189451F3000
trusted library allocation
page read and write
18940E00000
trusted library allocation
page read and write
156A000
heap
page read and write
189354F8000
trusted library allocation
page read and write
1893286A000
heap
page read and write
18932857000
heap
page read and write
5E8000
heap
page read and write
3C5E000
stack
page read and write
18937797000
trusted library allocation
page read and write
189379B5000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
1894708A000
trusted library allocation
page read and write
18935CB9000
trusted library allocation
page read and write
3DCF091000
trusted library allocation
page execute read
18932857000
heap
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
1893285C000
heap
page read and write
189364EC000
trusted library allocation
page read and write
1893283A000
heap
page read and write
63E000
unkown
page execute and read and write
12BA000
unkown
page execute and write copy
12C0000
heap
page read and write
1B6748EE000
heap
page read and write
1893284F000
heap
page read and write
18945D6C000
trusted library allocation
page read and write
12C5000
heap
page read and write
4E7F000
stack
page read and write
189356E2000
trusted library allocation
page read and write
18935259000
trusted library allocation
page read and write
1C8CD000
stack
page read and write
22E24000
heap
page read and write
18937DD7000
trusted library allocation
page read and write
189448A0000
trusted library allocation
page read and write
1893289C000
heap
page read and write
18932840000
heap
page read and write
18935446000
trusted library allocation
page read and write
271F8E79000
heap
page read and write
189358B2000
trusted library allocation
page read and write
12C4000
heap
page read and write
189470F3000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935697000
trusted library allocation
page read and write
18935473000
trusted library allocation
page read and write
1893689F000
trusted library allocation
page read and write
22A21000
heap
page read and write
189460B4000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
18932836000
heap
page read and write
189460D2000
trusted library allocation
page read and write
189326E0000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935630000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
189379D4000
trusted library allocation
page read and write
18932838000
heap
page read and write
18935446000
trusted library allocation
page read and write
18932838000
heap
page read and write
371F000
stack
page read and write
18935262000
trusted library allocation
page read and write
189417BA000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932840000
heap
page read and write
18945C44000
trusted library allocation
page read and write
4CD1000
heap
page read and write
1CA60000
trusted library allocation
page read and write
18932664000
trusted library allocation
page read and write
4771000
heap
page read and write
1893286A000
heap
page read and write
22E24000
heap
page read and write
4771000
heap
page read and write
1B674869000
heap
page read and write
19C000
stack
page read and write
18945D66000
trusted library allocation
page read and write
43EE000
stack
page read and write
321E000
stack
page read and write
5107DFF000
stack
page read and write
18932895000
heap
page read and write
22A20000
heap
page read and write
4CD1000
heap
page read and write
1B67485F000
heap
page read and write
189379C4000
trusted library allocation
page read and write
18944D79000
trusted library allocation
page read and write
9F0000
heap
page read and write
18935615000
trusted library allocation
page read and write
18935226000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
12C5000
heap
page read and write
271F8DF0000
heap
page read and write
1B6748E0000
heap
page read and write
4D30000
direct allocation
page execute and read and write
1893779E000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
18935484000
trusted library allocation
page read and write
1580000
heap
page read and write
1893288D000
heap
page read and write
2577000
heap
page read and write
3A3E000
stack
page read and write
18945B7F000
trusted library allocation
page read and write
4EC1000
heap
page read and write
4B81000
heap
page read and write
189379D2000
trusted library allocation
page read and write
189377A3000
trusted library allocation
page read and write
18934C62000
trusted library allocation
page read and write
18945D76000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
18932670000
trusted library allocation
page read and write
F74000
heap
page read and write
18938E7B000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
271F8EA8000
heap
page read and write
18932852000
heap
page read and write
18932641000
trusted library allocation
page read and write
4B81000
heap
page read and write
18946D23000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937DE6000
trusted library allocation
page read and write
1893283F000
heap
page read and write
22E17000
heap
page read and write
22E17000
heap
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
12C4000
heap
page read and write
18946039000
trusted library allocation
page read and write
18945135000
trusted library allocation
page read and write
18946198000
trusted library allocation
page read and write
18936848000
trusted library allocation
page read and write
F97000
heap
page read and write
18935459000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189313EB000
trusted library allocation
page read and write
12C4000
heap
page read and write
2E3E000
stack
page read and write
1893289E000
heap
page read and write
12C4000
heap
page read and write
18934BD3000
trusted library allocation
page read and write
18932838000
heap
page read and write
189388BE000
trusted library allocation
page read and write
2F9F000
stack
page read and write
4CD1000
heap
page read and write
18934BED000
trusted library allocation
page read and write
1B674860000
heap
page read and write
1590000
heap
page read and write
18931371000
trusted library allocation
page read and write
1893285C000
heap
page read and write
189378A6000
trusted library allocation
page read and write
18941129000
trusted library allocation
page read and write
1893883F000
trusted library allocation
page read and write
1893541E000
trusted library allocation
page read and write
1893171A000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932884000
heap
page read and write
18935425000
trusted library allocation
page read and write
1893285C000
heap
page read and write
18932884000
heap
page read and write
12C4000
heap
page read and write
1893561B000
trusted library allocation
page read and write
4B81000
heap
page read and write
189387A7000
trusted library allocation
page read and write
1893286A000
heap
page read and write
4771000
heap
page read and write
18947BF4000
trusted library allocation
page read and write
18934CC4000
trusted library allocation
page read and write
189387A3000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18932853000
heap
page read and write
18945D76000
trusted library allocation
page read and write
18932840000
heap
page read and write
1893288E000
heap
page read and write
18934B29000
trusted library allocation
page read and write
EDB000
stack
page read and write
1893284F000
heap
page read and write
362E000
stack
page read and write
18935486000
trusted library allocation
page read and write
500000
unkown
page execute and read and write
1893169D000
trusted library allocation
page read and write
18934CC6000
trusted library allocation
page read and write
4CD1000
heap
page read and write
377F000
stack
page read and write
4771000
heap
page read and write
4280000
heap
page read and write
12C4000
heap
page read and write
376E000
stack
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18932842000
heap
page read and write
4100000
heap
page read and write
D64000
heap
page read and write
1893536F000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
1112000
unkown
page execute and read and write
18935446000
trusted library allocation
page read and write
26AF000
stack
page read and write
18935429000
trusted library allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18945B93000
trusted library allocation
page read and write
18932885000
heap
page read and write
1894601B000
trusted library allocation
page read and write
18940E92000
trusted library allocation
page read and write
271F8DF4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
18936073000
trusted library allocation
page read and write
189460DB000
trusted library allocation
page read and write
8640000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
52E0000
direct allocation
page execute and read and write
18935212000
trusted library allocation
page read and write
1C30F000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
30DF000
stack
page read and write
18935394000
trusted library allocation
page read and write
18932886000
heap
page read and write
36FF000
stack
page read and write
F74000
heap
page read and write
551EBFF000
stack
page read and write
18938E8A000
trusted library allocation
page read and write
311E000
stack
page read and write
189460F3000
trusted library allocation
page read and write
1893288D000
heap
page read and write
4771000
heap
page read and write
18945A4C000
trusted library allocation
page read and write
1893286A000
heap
page read and write
4CD1000
heap
page read and write
D64000
heap
page read and write
363F000
stack
page read and write
18937E69000
trusted library allocation
page read and write
1893285C000
heap
page read and write
18932857000
heap
page read and write
4B81000
heap
page read and write
189460CA000
trusted library allocation
page read and write
1893284C000
heap
page read and write
189337B6000
trusted library allocation
page read and write
31DF000
stack
page read and write
18938843000
trusted library allocation
page read and write
1003000
heap
page read and write
18937D9D000
trusted library allocation
page read and write
6FDE000
stack
page read and write
1893684F000
trusted library allocation
page read and write
189460E0000
trusted library allocation
page read and write
4771000
heap
page read and write
18940E99000
trusted library allocation
page read and write
1893284F000
heap
page read and write
22C51000
heap
page read and write
18936884000
trusted library allocation
page read and write
18932842000
heap
page read and write
18932857000
heap
page read and write
1893288C000
heap
page read and write
57E000
stack
page read and write
F5A000
heap
page read and write
1576000
heap
page read and write
12C4000
heap
page read and write
25AE000
stack
page read and write
4B81000
heap
page read and write
1893777D000
trusted library allocation
page read and write
18935C8F000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
18945A73000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934B83000
trusted library allocation
page read and write
18946032000
trusted library allocation
page read and write
1B6748F1000
heap
page read and write
12C4000
heap
page read and write
1893677D000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893284F000
heap
page read and write
18940EB6000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
4B81000
heap
page read and write
18937DF9000
trusted library allocation
page read and write
7E90000
heap
page read and write
1893FB73000
trusted library allocation
page read and write
189354C9000
trusted library allocation
page read and write
4CD1000
heap
page read and write
449F000
stack
page read and write
18935220000
trusted library allocation
page read and write
4D1000
unkown
page execute and read and write
12C4000
heap
page read and write
18945D79000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
156B000
heap
page read and write
1112000
unkown
page execute and read and write
189448CB000
trusted library allocation
page read and write
39AF000
stack
page read and write
1575000
heap
page read and write
1893684F000
trusted library allocation
page read and write
940000
heap
page read and write
144B000
stack
page read and write
18937EE0000
trusted library allocation
page read and write
18945CC3000
trusted library allocation
page read and write
22E15000
heap
page read and write
12C4000
heap
page read and write
18937D68000
trusted library allocation
page read and write
18937791000
trusted library allocation
page read and write
12C5000
heap
page read and write
18932842000
heap
page read and write
1893545F000
trusted library allocation
page read and write
12C4000
heap
page read and write
189387D2000
trusted library allocation
page read and write
4B81000
heap
page read and write
18945D61000
trusted library allocation
page read and write
4B81000
heap
page read and write
F74000
heap
page read and write
400000
unkown
page readonly
18934CFE000
trusted library allocation
page read and write
1B674978000
heap
page read and write
18945B93000
trusted library allocation
page read and write
16DF000
stack
page read and write
E79000
unkown
page read and write
1893534C000
trusted library allocation
page read and write
10DF000
unkown
page execute and read and write
18932842000
heap
page read and write
1B6748FC000
heap
page read and write
1B67486C000
heap
page read and write
680E000
stack
page read and write
189354D7000
trusted library allocation
page read and write
18936737000
trusted library allocation
page read and write
18944733000
trusted library allocation
page read and write
18936854000
trusted library allocation
page read and write
22E17000
heap
page read and write
4CD1000
heap
page read and write
18932618000
trusted library allocation
page read and write
18935422000
trusted library allocation
page read and write
5340000
direct allocation
page read and write
1893FFB5000
trusted library allocation
page read and write
12C4000
heap
page read and write
22E07000
heap
page read and write
18932890000
heap
page read and write
18945C66000
trusted library allocation
page read and write
189379E0000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
12C4000
heap
page read and write
18945D36000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932896000
heap
page read and write
12C5000
heap
page read and write
489F000
stack
page read and write
51F0000
direct allocation
page execute and read and write
874000
heap
page read and write
1893284F000
heap
page read and write
18934B72000
trusted library allocation
page read and write
18937E71000
trusted library allocation
page read and write
1B6748F1000
heap
page read and write
102E000
heap
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
4B81000
heap
page read and write
18935759000
trusted library allocation
page read and write
4CD1000
heap
page read and write
2BC0000
direct allocation
page read and write
1893288D000
heap
page read and write
22E24000
heap
page read and write
1893522F000
trusted library allocation
page read and write
1893283F000
heap
page read and write
18932842000
heap
page read and write
124E000
stack
page read and write
12C4000
heap
page read and write
401000
unkown
page execute read
FAF000
heap
page read and write
189354EC000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
271F8D90000
heap
page read and write
4CD1000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18937DFE000
trusted library allocation
page read and write
12C4000
heap
page read and write
189314B0000
trusted library allocation
page read and write
18937EC4000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
18932853000
heap
page read and write
18935354000
trusted library allocation
page read and write
22E0A000
heap
page read and write
151D000
heap
page read and write
22E11000
heap
page read and write
18937E72000
trusted library allocation
page read and write
18937EBB000
trusted library allocation
page read and write
18946039000
trusted library allocation
page read and write
12C5000
heap
page read and write
1894490F000
trusted library allocation
page read and write
4B81000
heap
page read and write
189417B3000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
3051DFA1E000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
18932886000
heap
page read and write
29BE000
stack
page read and write
12C4000
heap
page read and write
1893FB7D000
trusted library allocation
page read and write
18935433000
trusted library allocation
page read and write
4B81000
heap
page read and write
189326C1000
trusted library allocation
page read and write
12C4000
heap
page read and write
114A000
heap
page read and write
1894494A000
trusted library allocation
page read and write
1894495E000
trusted library allocation
page read and write
189460DE000
trusted library allocation
page read and write
27B2000
heap
page read and write
1893283F000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
22E09000
heap
page read and write
1893536F000
trusted library allocation
page read and write
1590000
heap
page read and write
4B81000
heap
page read and write
15D4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893288C000
heap
page read and write
18937799000
trusted library allocation
page read and write
18938E89000
trusted library allocation
page read and write
12C5000
heap
page read and write
429E000
stack
page read and write
1893266E000
trusted library allocation
page read and write
4771000
heap
page read and write
18932884000
heap
page read and write
18932842000
heap
page read and write
189379D6000
trusted library allocation
page read and write
18935394000
trusted library allocation
page read and write
12C4000
heap
page read and write
54B0000
direct allocation
page execute and read and write
E6BB1FF000
stack
page read and write
12C4000
heap
page read and write
18945D66000
trusted library allocation
page read and write
189352FE000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
18935284000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
189449DD000
trusted library allocation
page read and write
4B81000
heap
page read and write
22E0E000
heap
page read and write
18940EF1000
trusted library allocation
page read and write
1893283C000
heap
page read and write
18946114000
trusted library allocation
page read and write
18935C97000
trusted library allocation
page read and write
18932884000
heap
page read and write
12C4000
heap
page read and write
2C2E000
stack
page read and write
12C4000
heap
page read and write
22E25000
heap
page read and write
18937DB6000
trusted library allocation
page read and write
1B6748EE000
heap
page read and write
189313DC000
trusted library allocation
page read and write
18934BCC000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932853000
heap
page read and write
18937EA1000
trusted library allocation
page read and write
18945A80000
trusted library allocation
page read and write
18934B81000
trusted library allocation
page read and write
18946026000
trusted library allocation
page read and write
189388FE000
trusted library allocation
page read and write
4B81000
heap
page read and write
1894496F000
trusted library allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
189388F0000
trusted library allocation
page read and write
18945C75000
trusted library allocation
page read and write
538E000
stack
page read and write
336F000
stack
page read and write
18945A00000
trusted library allocation
page read and write
4B81000
heap
page read and write
189326BE000
trusted library allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18935505000
trusted library allocation
page read and write
4B81000
heap
page read and write
189460F3000
trusted library allocation
page read and write
1893526A000
trusted library allocation
page read and write
4B81000
heap
page read and write
1729F2A0000
heap
page read and write
1893531C000
trusted library allocation
page read and write
4CD1000
heap
page read and write
1893260F000
trusted library allocation
page read and write
22E17000
heap
page read and write
12C5000
heap
page read and write
4771000
heap
page read and write
189387EF000
trusted library allocation
page read and write
18938881000
trusted library allocation
page read and write
12C5000
heap
page read and write
1893377C000
trusted library allocation
page read and write
18936884000
trusted library allocation
page read and write
1C961000
heap
page read and write
18932884000
heap
page read and write
18934CCA000
trusted library allocation
page read and write
65B000
stack
page read and write
18934BBB000
trusted library allocation
page read and write
18932842000
heap
page read and write
18947BE4000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
156A000
heap
page read and write
12C4000
heap
page read and write
18945CD7000
trusted library allocation
page read and write
18945ECD000
trusted library allocation
page read and write
22E0A000
heap
page read and write
D64000
heap
page read and write
4B81000
heap
page read and write
2D6E000
stack
page read and write
18937EA1000
trusted library allocation
page read and write
1893525B000
trusted library allocation
page read and write
244C000
unkown
page readonly
18932834000
heap
page read and write
1894119A000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
189317FC000
trusted library allocation
page read and write
18932857000
heap
page read and write
18940E32000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
189470EF000
trusted library allocation
page read and write
189378AE000
trusted library allocation
page read and write
12C4000
heap
page read and write
493E000
stack
page read and write
4B81000
heap
page read and write
18944925000
trusted library allocation
page read and write
18932872000
heap
page read and write
874000
heap
page read and write
18935493000
trusted library allocation
page read and write
1894102F000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932847000
heap
page read and write
12C4000
heap
page read and write
1893146A000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
18946024000
trusted library allocation
page read and write
18934CCA000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189358B0000
trusted library allocation
page read and write
18945FC7000
trusted library allocation
page read and write
4CD1000
heap
page read and write
18932861000
heap
page read and write
1893283A000
heap
page read and write
2740000
heap
page execute and read and write
3050000
direct allocation
page read and write
18932886000
heap
page read and write
18945BCE000
trusted library allocation
page read and write
189451EF000
trusted library allocation
page read and write
18937D79000
trusted library allocation
page read and write
18935367000
trusted library allocation
page read and write
1893257F000
trusted library allocation
page read and write
1893285A000
heap
page read and write
22A21000
heap
page read and write
3FDE000
stack
page read and write
18932857000
heap
page read and write
189356E8000
trusted library allocation
page read and write
18932580000
trusted library allocation
page read and write
1B6748E0000
heap
page read and write
189356EB000
trusted library allocation
page read and write
18941AF9000
trusted library allocation
page read and write
18946042000
trusted library allocation
page read and write
156B000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
189410D0000
trusted library allocation
page read and write
1893520C000
trusted library allocation
page read and write
2C17000
heap
page read and write
4771000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18931776000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
3C3E000
stack
page read and write
1893286A000
heap
page read and write
12C5000
heap
page read and write
427E000
stack
page read and write
189449DD000
trusted library allocation
page read and write
18932838000
heap
page read and write
189350EE000
trusted library allocation
page read and write
1893269D000
trusted library allocation
page read and write
18935175000
trusted library allocation
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
1894592A000
trusted library allocation
page read and write
4771000
heap
page read and write
189314D2000
trusted library allocation
page read and write
1C44F000
stack
page read and write
22A2C000
heap
page read and write
D01000
unkown
page execute and write copy
12C4000
heap
page read and write
60C0000
heap
page read and write
12C4000
heap
page read and write
18945CCD000
trusted library allocation
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
1893286A000
heap
page read and write
18935262000
trusted library allocation
page read and write
18945A82000
trusted library allocation
page read and write
13FD000
stack
page read and write
1B674921000
heap
page read and write
18937EC7000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354E2000
trusted library allocation
page read and write
18938773000
trusted library allocation
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
874000
heap
page read and write
18932884000
heap
page read and write
9D0000
direct allocation
page read and write
1893264A000
trusted library allocation
page read and write
156D000
heap
page read and write
45FF000
stack
page read and write
4B81000
heap
page read and write
189379C1000
trusted library allocation
page read and write
189317E4000
trusted library allocation
page read and write
18937DCE000
trusted library allocation
page read and write
12C4000
heap
page read and write
4230000
heap
page read and write
18934BDA000
trusted library allocation
page read and write
18935656000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
18946034000
trusted library allocation
page read and write
18938E5E000
trusted library allocation
page read and write
1893255C000
trusted library allocation
page read and write
1893FB03000
trusted library allocation
page read and write
18937EF6000
trusted library allocation
page read and write
1893523E000
trusted library allocation
page read and write
18934C65000
trusted library allocation
page read and write
419F000
stack
page read and write
18935636000
trusted library allocation
page read and write
D64000
heap
page read and write
1893522B000
trusted library allocation
page read and write
18932886000
heap
page read and write
E6BC9FF000
stack
page read and write
189356FA000
trusted library allocation
page read and write
12C4000
heap
page read and write
F20000
direct allocation
page execute and read and write
18932838000
heap
page read and write
189390F9000
trusted library allocation
page read and write
18937EF6000
trusted library allocation
page read and write
18932853000
heap
page read and write
18935355000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937EF6000
trusted library allocation
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893688C000
trusted library allocation
page read and write
399E000
stack
page read and write
18947BD7000
trusted library allocation
page read and write
60C6000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
189448BF000
trusted library allocation
page read and write
189367FA000
trusted library allocation
page read and write
18945CCA000
trusted library allocation
page read and write
22A8D000
heap
page read and write
12C4000
heap
page read and write
278B000
heap
page read and write
189410E9000
trusted library allocation
page read and write
18944783000
trusted library allocation
page read and write
101F000
heap
page read and write
18945FD2000
trusted library allocation
page read and write
18932884000
heap
page read and write
4E09000
stack
page read and write
189313FE000
trusted library allocation
page read and write
18937E50000
trusted library allocation
page read and write
22E17000
heap
page read and write
D09000
unkown
page read and write
22ACA000
heap
page read and write
189356D3000
trusted library allocation
page read and write
35FE000
stack
page read and write
189379D9000
trusted library allocation
page read and write
1B6748FC000
heap
page read and write
1893286A000
heap
page read and write
20633E30000
heap
page readonly
18932838000
heap
page read and write
8FD000
stack
page read and write
18935349000
trusted library allocation
page read and write
4771000
heap
page read and write
4B81000
heap
page read and write
18937ECA000
trusted library allocation
page read and write
18937D89000
trusted library allocation
page read and write
1893288F000
heap
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
189449F6000
trusted library allocation
page read and write
1011000
heap
page read and write
45DF000
stack
page read and write
18935C15000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285A000
heap
page read and write
18941BD1000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932884000
heap
page read and write
18932842000
heap
page read and write
A5B000
unkown
page execute and read and write
12C4000
heap
page read and write
18932853000
heap
page read and write
18945D23000
trusted library allocation
page read and write
8480000
heap
page read and write
20633B90000
heap
page read and write
12C4000
heap
page read and write
18937EC3000
trusted library allocation
page read and write
1893284C000
heap
page read and write
18932853000
heap
page read and write
189314B0000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935150000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354F3000
trusted library allocation
page read and write
189379DB000
trusted library allocation
page read and write
1893283A000
heap
page read and write
18937EBB000
trusted library allocation
page read and write
1893283F000
heap
page read and write
18932857000
heap
page read and write
189451C5000
trusted library allocation
page read and write
1009000
heap
page read and write
18945CFB000
trusted library allocation
page read and write
101F000
heap
page read and write
1525000
heap
page read and write
18932894000
heap
page read and write
18932842000
heap
page read and write
189368A3000
trusted library allocation
page read and write
18934B21000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
1893289C000
heap
page read and write
18945D36000
trusted library allocation
page read and write
1B67485F000
heap
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
18945B81000
trusted library allocation
page read and write
9CE000
stack
page read and write
51B0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189325E5000
trusted library allocation
page read and write
425E000
stack
page read and write
417000
unkown
page read and write
189362CF000
trusted library allocation
page read and write
3070000
heap
page read and write
18932857000
heap
page read and write
3EFF000
stack
page read and write
22E17000
heap
page read and write
1893284C000
heap
page read and write
18932842000
heap
page read and write
18936768000
trusted library allocation
page read and write
18932861000
heap
page read and write
4B81000
heap
page read and write
417F000
stack
page read and write
18934B63000
trusted library allocation
page read and write
18947BD7000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934CCA000
trusted library allocation
page read and write
4B81000
heap
page read and write
189379F1000
trusted library allocation
page read and write
1C54E000
stack
page read and write
189379EF000
trusted library allocation
page read and write
12C4000
heap
page read and write
22E17000
heap
page read and write
18935367000
trusted library allocation
page read and write
18932838000
heap
page read and write
1894707B000
trusted library allocation
page read and write
189387A3000
trusted library allocation
page read and write
18941BA6000
trusted library allocation
page read and write
18945B2E000
trusted library allocation
page read and write
18934CBF000
trusted library allocation
page read and write
18941181000
trusted library allocation
page read and write
6C8C5000
unkown
page readonly
12C4000
heap
page read and write
18945D51000
trusted library allocation
page read and write
1CA4F000
stack
page read and write
1B6748E3000
heap
page read and write
4B81000
heap
page read and write
18937EF6000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
FEF000
heap
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
F40000
direct allocation
page execute and read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
189314FE000
trusted library allocation
page read and write
189354A0000
trusted library allocation
page read and write
18932853000
heap
page read and write
189387CB000
trusted library allocation
page read and write
22E15000
heap
page read and write
18935215000
trusted library allocation
page read and write
12C4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
18932886000
heap
page read and write
18946D63000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
189388DC000
trusted library allocation
page read and write
1894598C000
trusted library allocation
page read and write
18945AB8000
trusted library allocation
page read and write
189337FC000
trusted library allocation
page read and write
B29000
unkown
page execute and read and write
189460F5000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
22E25000
heap
page read and write
12C4000
heap
page read and write
2F9E000
stack
page read and write
830000
unkown
page read and write
1893289B000
heap
page read and write
1893629B000
trusted library allocation
page read and write
18945979000
trusted library allocation
page read and write
4B81000
heap
page read and write
331F000
stack
page read and write
18940E73000
trusted library allocation
page read and write
395F000
stack
page read and write
18938E75000
trusted library allocation
page read and write
189326A8000
trusted library allocation
page read and write
12C4000
heap
page read and write
189379E8000
trusted library allocation
page read and write
18945D23000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945B88000
trusted library allocation
page read and write
42FE000
stack
page read and write
18945CEE000
trusted library allocation
page read and write
12C4000
heap
page read and write
271F9007000
trusted library allocation
page read and write
1563000
heap
page read and write
18932853000
heap
page read and write
4771000
heap
page read and write
1C961000
heap
page read and write
18937880000
trusted library allocation
page read and write
189354C9000
trusted library allocation
page read and write
18946033000
trusted library allocation
page read and write
12C4000
heap
page read and write
189377F7000
trusted library allocation
page read and write
18937EFE000
trusted library allocation
page read and write
4B81000
heap
page read and write
30EF000
stack
page read and write
FB0000
heap
page read and write
1893288C000
heap
page read and write
1893286A000
heap
page read and write
189378AE000
trusted library allocation
page read and write
1893283A000
heap
page read and write
189460D2000
trusted library allocation
page read and write
14FE000
heap
page read and write
18932861000
heap
page read and write
4B81000
heap
page read and write
18937DA3000
trusted library allocation
page read and write
1893568B000
trusted library allocation
page read and write
18935433000
trusted library allocation
page read and write
12C4000
heap
page read and write
189460B4000
trusted library allocation
page read and write
189460B4000
trusted library allocation
page read and write
4CD1000
heap
page read and write
18947C0A000
trusted library allocation
page read and write
1893286A000
heap
page read and write
189367F8000
trusted library allocation
page read and write
1893288C000
heap
page read and write
189447C3000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932620000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893523E000
trusted library allocation
page read and write
189360FB000
trusted library allocation
page read and write
18932857000
heap
page read and write
18931790000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932884000
heap
page read and write
4B81000
heap
page read and write
18947CED000
trusted library allocation
page read and write
18948100000
trusted library allocation
page read and write
18932886000
heap
page read and write
12C4000
heap
page read and write
157B000
heap
page read and write
34FF0000
trusted library allocation
page read and write
4B81000
heap
page read and write
18947BDF000
trusted library allocation
page read and write
4B81000
heap
page read and write
18935210000
trusted library allocation
page read and write
189325E5000
trusted library allocation
page read and write
189314FE000
trusted library allocation
page read and write
189460EA000
trusted library allocation
page read and write
18932691000
trusted library allocation
page read and write
18932895000
heap
page read and write
12C4000
heap
page read and write
189448D8000
trusted library allocation
page read and write
1893284C000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18944987000
trusted library allocation
page read and write
18945A98000
trusted library allocation
page read and write
18946910000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
18936848000
trusted library allocation
page read and write
189364E4000
trusted library allocation
page read and write
18935459000
trusted library allocation
page read and write
1894559B000
trusted library allocation
page read and write
18945966000
trusted library allocation
page read and write
18937DC9000
trusted library allocation
page read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
18944D5C000
trusted library allocation
page read and write
18932884000
heap
page read and write
1893284C000
heap
page read and write
18935C1C000
trusted library allocation
page read and write
1894117E000
trusted library allocation
page read and write
18939185000
trusted library allocation
page read and write
D64000
heap
page read and write
12C4000
heap
page read and write
18935C85000
trusted library allocation
page read and write
18945FAD000
trusted library allocation
page read and write
12C4000
heap
page read and write
423C000
heap
page read and write
189364BF000
trusted library allocation
page read and write
18932838000
heap
page read and write
189326A1000
trusted library allocation
page read and write
18935394000
trusted library allocation
page read and write
72BC000
stack
page read and write
18937EE0000
trusted library allocation
page read and write
419000
unkown
page readonly
12C4000
heap
page read and write
D64000
heap
page read and write
189378C8000
trusted library allocation
page read and write
4CD1000
heap
page read and write
2FA0000
direct allocation
page read and write
189460CA000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
49BF000
stack
page read and write
18932861000
heap
page read and write
12C4000
heap
page read and write
18941003000
trusted library allocation
page read and write
2E6F000
stack
page read and write
189358B2000
trusted library allocation
page read and write
874000
heap
page read and write
2FA0000
direct allocation
page read and write
18937889000
trusted library allocation
page read and write
18932850000
heap
page read and write
18932853000
heap
page read and write
18932842000
heap
page read and write
1893888B000
trusted library allocation
page read and write
6FE0000
heap
page read and write
189367F0000
trusted library allocation
page read and write
1893283A000
heap
page read and write
18932838000
heap
page read and write
1893286A000
heap
page read and write
18945CCA000
trusted library allocation
page read and write
18935394000
trusted library allocation
page read and write
189449E0000
trusted library allocation
page read and write
197D9F10000
heap
page read and write
18931724000
trusted library allocation
page read and write
18932623000
trusted library allocation
page read and write
1729F500000
trusted library allocation
page read and write
18935349000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
1500000
heap
page read and write
189460DB000
trusted library allocation
page read and write
1555000
heap
page read and write
12C5000
heap
page read and write
2BC0000
direct allocation
page read and write
1893283A000
heap
page read and write
18934CBF000
trusted library allocation
page read and write
18945AC2000
trusted library allocation
page read and write
874000
heap
page read and write
18937D8E000
trusted library allocation
page read and write
FAF000
heap
page read and write
5061000
direct allocation
page read and write
18933746000
trusted library allocation
page read and write
12C5000
heap
page read and write
4B81000
heap
page read and write
18945D6B000
trusted library allocation
page read and write
18932842000
heap
page read and write
1893288D000
heap
page read and write
1893286A000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
18932698000
trusted library allocation
page read and write
18940FD1000
trusted library allocation
page read and write
18946043000
trusted library allocation
page read and write
18935498000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
18938827000
trusted library allocation
page read and write
347F000
stack
page read and write
12C4000
heap
page read and write
18937EC1000
trusted library allocation
page read and write
18937ECA000
trusted library allocation
page read and write
189411BA000
trusted library allocation
page read and write
1893286A000
heap
page read and write
20634063000
trusted library allocation
page read and write
18932861000
heap
page read and write
18937D33000
trusted library allocation
page read and write
1893284E000
heap
page read and write
189337DD000
trusted library allocation
page read and write
189449D4000
trusted library allocation
page read and write
1893286A000
heap
page read and write
1893288D000
heap
page read and write
4B81000
heap
page read and write
54F0000
direct allocation
page execute and read and write
189388F4000
trusted library allocation
page read and write
1893286A000
heap
page read and write
4370000
heap
page read and write
189387FB000
trusted library allocation
page read and write
278E000
heap
page read and write
18932838000
heap
page read and write
D64000
heap
page read and write
189352BD000
trusted library allocation
page read and write
189460B4000
trusted library allocation
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
189460F6000
trusted library allocation
page read and write
4771000
heap
page read and write
1893283A000
heap
page read and write
375E000
stack
page read and write
26C0000
direct allocation
page execute and read and write
1893266E000
trusted library allocation
page read and write
18938EDA000
trusted library allocation
page read and write
874000
heap
page read and write
1893277B000
trusted library allocation
page read and write
668F000
stack
page read and write
1B674869000
heap
page read and write
18941147000
trusted library allocation
page read and write
18935491000
trusted library allocation
page read and write
1893286A000
heap
page read and write
18941BAB000
trusted library allocation
page read and write
197DA200000
trusted library allocation
page read and write
EE0000
direct allocation
page read and write
22EF3000
heap
page read and write
48A1000
heap
page read and write
1893285C000
heap
page read and write
4B81000
heap
page read and write
18934B83000
trusted library allocation
page read and write
D64000
heap
page read and write
419000
unkown
page readonly
189367F8000
trusted library allocation
page read and write
189378F2000
trusted library allocation
page read and write
12C4000
heap
page read and write
189451FC000
trusted library allocation
page read and write
189387EF000
trusted library allocation
page read and write
BDF000
unkown
page execute and read and write
18932884000
heap
page read and write
189364FE000
trusted library allocation
page read and write
18945CBF000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935355000
trusted library allocation
page read and write
18944A00000
trusted library allocation
page read and write
4782000
heap
page read and write
12C4000
heap
page read and write
1894511F000
trusted library allocation
page read and write
189455F2000
trusted library allocation
page read and write
18934BC2000
trusted library allocation
page read and write
1893888B000
trusted library allocation
page read and write
18937D89000
trusted library allocation
page read and write
1B67493C000
heap
page read and write
1893283A000
heap
page read and write
371E000
stack
page read and write
12C4000
heap
page read and write
18932836000
heap
page read and write
18933608000
trusted library allocation
page read and write
2F06E000
heap
page read and write
1893FBB6000
trusted library allocation
page read and write
18935433000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
18937D8E000
trusted library allocation
page read and write
18945C72000
trusted library allocation
page read and write
6980000
heap
page read and write
1893178A000
trusted library allocation
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
18932863000
heap
page read and write
18934BD0000
trusted library allocation
page read and write
18945A32000
trusted library allocation
page read and write
18937E04000
trusted library allocation
page read and write
1893288C000
heap
page read and write
18932838000
heap
page read and write
22C51000
heap
page read and write
1109000
unkown
page execute and read and write
12C4000
heap
page read and write
403F000
stack
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
189460D2000
trusted library allocation
page read and write
189360F5000
trusted library allocation
page read and write
216E000
stack
page read and write
1CA66000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
18932836000
heap
page read and write
1590000
heap
page read and write
18935332000
trusted library allocation
page read and write
1893286A000
heap
page read and write
18937E91000
trusted library allocation
page read and write
F74000
heap
page read and write
18946928000
trusted library allocation
page read and write
1893886F000
trusted library allocation
page read and write
1893284F000
heap
page read and write
18932544000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935828000
trusted library allocation
page read and write
12C4000
heap
page read and write
1894114A000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893569D000
trusted library allocation
page read and write
1893651C000
trusted library allocation
page read and write
18932683000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
18934BEF000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932884000
heap
page read and write
1893132F000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
18932863000
heap
page read and write
189353F5000
trusted library allocation
page read and write
18932890000
heap
page read and write
12C4000
heap
page read and write
189387D6000
trusted library allocation
page read and write
4B81000
heap
page read and write
3EEE000
stack
page read and write
12C5000
heap
page read and write
18935244000
trusted library allocation
page read and write
18935C9B000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18932840000
heap
page read and write
20634016000
trusted library allocation
page read and write
189364C3000
trusted library allocation
page read and write
189358D1000
trusted library allocation
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
1893288D000
heap
page read and write
1B674801000
heap
page read and write
18946042000
trusted library allocation
page read and write
18932669000
trusted library allocation
page read and write
12C4000
heap
page read and write
2AEE000
stack
page read and write
10BE000
stack
page read and write
1893285C000
heap
page read and write
22A81000
heap
page read and write
18945D00000
trusted library allocation
page read and write
353E000
stack
page read and write
18937EBF000
trusted library allocation
page read and write
18935283000
trusted library allocation
page read and write
18937DA8000
trusted library allocation
page read and write
1893797B000
trusted library allocation
page read and write
18932842000
heap
page read and write
2BDF000
stack
page read and write
189460DE000
trusted library allocation
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
18937797000
trusted library allocation
page read and write
12C4000
heap
page read and write
18946043000
trusted library allocation
page read and write
22E32000
heap
page read and write
18932579000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
18931426000
trusted library allocation
page read and write
18932691000
trusted library allocation
page read and write
41DE000
stack
page read and write
1893285C000
heap
page read and write
1893283F000
heap
page read and write
189388A6000
trusted library allocation
page read and write
18932861000
heap
page read and write
1590000
heap
page read and write
18945952000
trusted library allocation
page read and write
D64000
heap
page read and write
4B81000
heap
page read and write
1893330A000
trusted library allocation
page read and write
1893300A000
trusted library allocation
page read and write
18932840000
heap
page read and write
18945B3D000
trusted library allocation
page read and write
18935367000
trusted library allocation
page read and write
18932886000
heap
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
18932853000
heap
page read and write
6971000
heap
page read and write
189460E0000
trusted library allocation
page read and write
1893873E000
trusted library allocation
page read and write
1893286A000
heap
page read and write
12C4000
heap
page read and write
18932850000
heap
page read and write
18932840000
heap
page read and write
12C4000
heap
page read and write
18934C58000
trusted library allocation
page read and write
1149000
unkown
page execute and read and write
2BC0000
direct allocation
page read and write
1893283A000
heap
page read and write
18932838000
heap
page read and write
18945A2A000
trusted library allocation
page read and write
240E000
stack
page read and write
18932838000
heap
page read and write
6C8BF000
unkown
page write copy
18932838000
heap
page read and write
189411A1000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
18932863000
heap
page read and write
12C4000
heap
page read and write
18937EF6000
trusted library allocation
page read and write
1893284F000
heap
page read and write
874000
heap
page read and write
12C4000
heap
page read and write
18946900000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
12C4000
heap
page read and write
189388F0000
trusted library allocation
page read and write
418E000
stack
page read and write
18945CD2000
trusted library allocation
page read and write
18932886000
heap
page read and write
9D0000
direct allocation
page read and write
1893289E000
heap
page read and write
4B81000
heap
page read and write
4CD1000
heap
page read and write
1893678F000
trusted library allocation
page read and write
1893285C000
heap
page read and write
1893284C000
heap
page read and write
18935244000
trusted library allocation
page read and write
6910000
heap
page read and write
189460CA000
trusted library allocation
page read and write
18932842000
heap
page read and write
189360F5000
trusted library allocation
page read and write
1893884C000
trusted library allocation
page read and write
18932838000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1C68E000
stack
page read and write
22A2C000
heap
page read and write
18946100000
trusted library allocation
page read and write
189314A9000
trusted library allocation
page read and write
189364E8000
trusted library allocation
page read and write
18932856000
heap
page read and write
1893288C000
heap
page read and write
189326E0000
trusted library allocation
page read and write
4B81000
heap
page read and write
189448E6000
trusted library allocation
page read and write
12C4000
heap
page read and write
114E000
heap
page read and write
4CD1000
heap
page read and write
18947BD7000
trusted library allocation
page read and write
411E000
stack
page read and write
1893283F000
heap
page read and write
189460E1000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932884000
heap
page read and write
18932886000
heap
page read and write
189448EE000
trusted library allocation
page read and write
1893285C000
heap
page read and write
189388CE000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893286A000
heap
page read and write
18947BEC000
trusted library allocation
page read and write
42BF000
stack
page read and write
1730000
heap
page read and write
189354C9000
trusted library allocation
page read and write
189328A2000
heap
page read and write
E10000
unkown
page readonly
189379EF000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932670000
trusted library allocation
page read and write
44EF000
stack
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18935266000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
18935259000
trusted library allocation
page read and write
421F000
stack
page read and write
5340000
direct allocation
page read and write
1893288C000
heap
page read and write
189337A2000
trusted library allocation
page read and write
4B81000
heap
page read and write
18946039000
trusted library allocation
page read and write
155D000
heap
page read and write
4CD1000
heap
page read and write
2BE0000
direct allocation
page read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
1893285A000
heap
page read and write
3BDF000
stack
page read and write
1893283A000
heap
page read and write
18945D3C000
trusted library allocation
page read and write
18932895000
heap
page read and write
18932857000
heap
page read and write
27B1000
heap
page read and write
18932884000
heap
page read and write
18932855000
heap
page read and write
18932663000
trusted library allocation
page read and write
68F000
stack
page read and write
18945CE9000
trusted library allocation
page read and write
1893147E000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893288C000
heap
page read and write
18937DB0000
trusted library allocation
page read and write
18934BD0000
trusted library allocation
page read and write
189460B4000
trusted library allocation
page read and write
18932857000
heap
page read and write
18932886000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
2D7E000
stack
page read and write
4771000
heap
page read and write
18945DFB000
trusted library allocation
page read and write
4B81000
heap
page read and write
4771000
heap
page read and write
189356CA000
trusted library allocation
page read and write
18932838000
heap
page read and write
4B81000
heap
page read and write
189460D2000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932865000
heap
page read and write
18935283000
trusted library allocation
page read and write
18935367000
trusted library allocation
page read and write
18932853000
heap
page read and write
189390C3000
trusted library allocation
page read and write
1893534E000
trusted library allocation
page read and write
18932840000
heap
page read and write
18945FF5000
trusted library allocation
page read and write
27B2000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
189354F3000
trusted library allocation
page read and write
3A9F000
stack
page read and write
18935433000
trusted library allocation
page read and write
18932857000
heap
page read and write
189375FB000
trusted library allocation
page read and write
189379EF000
trusted library allocation
page read and write
12C4000
heap
page read and write
FCB000
heap
page read and write
1893785B000
trusted library allocation
page read and write
189379B5000
trusted library allocation
page read and write
475E000
stack
page read and write
189364F3000
trusted library allocation
page read and write
189313F6000
trusted library allocation
page read and write
18935444000
trusted library allocation
page read and write
1B674957000
heap
page read and write
4B81000
heap
page read and write
18932886000
heap
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
18932861000
heap
page read and write
E11000
unkown
page execute and write copy
189362DB000
trusted library allocation
page read and write
18935619000
trusted library allocation
page read and write
18932842000
heap
page read and write
37BE000
stack
page read and write
E7B000
unkown
page execute and read and write
22E2B000
heap
page read and write
52E0000
direct allocation
page execute and read and write
18944209000
trusted library allocation
page read and write
18941179000
trusted library allocation
page read and write
18946103000
trusted library allocation
page read and write
1893543E000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893FFE1000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18932861000
heap
page read and write
189460DE000
trusted library allocation
page read and write
1554000
heap
page read and write
1893283F000
heap
page read and write
FD6000
heap
page read and write
500000
heap
page read and write
18932884000
heap
page read and write
1893879C000
trusted library allocation
page read and write
18937DAA000
trusted library allocation
page read and write
18932890000
heap
page read and write
18932575000
trusted library allocation
page read and write
337F000
stack
page read and write
20633E00000
heap
page read and write
18940E03000
trusted library allocation
page read and write
18945CD2000
trusted library allocation
page read and write
12C4000
heap
page read and write
189390CE000
trusted library allocation
page read and write
18935350000
trusted library allocation
page read and write
12C4000
heap
page read and write
1554000
heap
page read and write
18932896000
heap
page read and write
18938E98000
trusted library allocation
page read and write
18932886000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18937D68000
trusted library allocation
page read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
189354DE000
trusted library allocation
page read and write
12C5000
heap
page read and write
1893283A000
heap
page read and write
18941422000
trusted library allocation
page read and write
18937EE0000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
20633CBA000
heap
page read and write
18936843000
trusted library allocation
page read and write
189317AC000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
1B67486C000
heap
page read and write
18932884000
heap
page read and write
189327C6000
trusted library allocation
page read and write
1893881F000
trusted library allocation
page read and write
1894601B000
trusted library allocation
page read and write
12C4000
heap
page read and write
A59000
unkown
page read and write
18935367000
trusted library allocation
page read and write
1893799F000
trusted library allocation
page read and write
600E000
stack
page read and write
12C4000
heap
page read and write
2FAF000
stack
page read and write
1893283A000
heap
page read and write
18945CAF000
trusted library allocation
page read and write
12C4000
heap
page read and write
3077000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189352A3000
trusted library allocation
page read and write
6C6E1000
unkown
page execute read
18938EEC000
trusted library allocation
page read and write
12C5000
heap
page read and write
1894108E000
trusted library allocation
page read and write
12C4000
heap
page read and write
1B674957000
heap
page read and write
18935259000
trusted library allocation
page read and write
435E000
stack
page read and write
18932853000
heap
page read and write
18945CEB000
trusted library allocation
page read and write
CD8000
unkown
page execute and read and write
189449EC000
trusted library allocation
page read and write
18935446000
trusted library allocation
page read and write
12C4000
heap
page read and write
18936749000
trusted library allocation
page read and write
1893288C000
heap
page read and write
1894457A000
trusted library allocation
page read and write
189390CE000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
189388FE000
trusted library allocation
page read and write
18932840000
heap
page read and write
18934BDA000
trusted library allocation
page read and write
12C4000
heap
page read and write
658E000
stack
page read and write
18932886000
heap
page read and write
4771000
heap
page read and write
401000
unkown
page execute read
1893521C000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354D0000
trusted library allocation
page read and write
1893283A000
heap
page read and write
189327BA000
trusted library allocation
page read and write
18944861000
trusted library allocation
page read and write
874000
heap
page read and write
189328AF000
heap
page read and write
317F000
stack
page read and write
189387BC000
trusted library allocation
page read and write
18944781000
trusted library allocation
page read and write
12A0000
direct allocation
page read and write
411F000
stack
page read and write
1B674977000
heap
page read and write
400000
unkown
page readonly
22E17000
heap
page read and write
22E0E000
heap
page read and write
189354D0000
trusted library allocation
page read and write
FF3000
heap
page read and write
12C5000
heap
page read and write
2FA0000
direct allocation
page read and write
18932840000
heap
page read and write
1893FB32000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
9F0000
unkown
page readonly
18946170000
trusted library allocation
page read and write
18941098000
trusted library allocation
page read and write
1C950000
heap
page read and write
189352BE000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945FB3000
trusted library allocation
page read and write
189460E0000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18937EF6000
trusted library allocation
page read and write
2F06B000
heap
page read and write
D64000
heap
page read and write
1893283A000
heap
page read and write
1B674958000
heap
page read and write
1893268F000
trusted library allocation
page read and write
18937D30000
trusted library allocation
page read and write
18941165000
trusted library allocation
page read and write
12C4000
heap
page read and write
18938879000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932850000
heap
page read and write
2BC0000
direct allocation
page read and write
D64000
heap
page read and write
18932838000
heap
page read and write
1B674977000
heap
page read and write
18935C9B000
trusted library allocation
page read and write
189325E3000
trusted library allocation
page read and write
4771000
heap
page read and write
189328AF000
heap
page read and write
22E25000
heap
page read and write
189362E8000
trusted library allocation
page read and write
189337AE000
trusted library allocation
page read and write
18935408000
trusted library allocation
page read and write
6C6BD000
unkown
page readonly
18931774000
trusted library allocation
page read and write
2BC0000
direct allocation
page read and write
E6BB9FE000
stack
page read and write
189360D5000
trusted library allocation
page read and write
5570000
direct allocation
page execute and read and write
413E000
stack
page read and write
18945A35000
trusted library allocation
page read and write
43BE000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
18945CC0000
trusted library allocation
page read and write
22E12000
heap
page read and write
189460B4000
trusted library allocation
page read and write
18937EFE000
trusted library allocation
page read and write
18937D75000
trusted library allocation
page read and write
1B674863000
heap
page read and write
2BD7000
heap
page read and write
18932854000
heap
page read and write
3FEF000
stack
page read and write
26BF000
stack
page read and write
1893286A000
heap
page read and write
4771000
heap
page read and write
189362CF000
trusted library allocation
page read and write
189387FB000
trusted library allocation
page read and write
1894178C000
trusted library allocation
page read and write
18930998000
trusted library allocation
page read and write
244C000
unkown
page readonly
12C4000
heap
page read and write
18945CE9000
trusted library allocation
page read and write
18935C9E000
trusted library allocation
page read and write
1894494E000
trusted library allocation
page read and write
18932853000
heap
page read and write
18931746000
trusted library allocation
page read and write
20633B00000
unclassified section
page readonly
189387AB000
trusted library allocation
page read and write
18932863000
heap
page read and write
1893179A000
trusted library allocation
page read and write
189354D0000
trusted library allocation
page read and write
2BEF000
stack
page read and write
18937E4A000
trusted library allocation
page read and write
18932853000
heap
page read and write
18934CC0000
trusted library allocation
page read and write
22E15000
heap
page read and write
18941419000
trusted library allocation
page read and write
18932892000
heap
page read and write
4B81000
heap
page read and write
18932857000
heap
page read and write
5150000
direct allocation
page read and write
1893284F000
heap
page read and write
C9D000
stack
page read and write
1893288D000
heap
page read and write
1893284E000
heap
page read and write
18945D52000
trusted library allocation
page read and write
155C000
heap
page read and write
189390B7000
trusted library allocation
page read and write
18946018000
trusted library allocation
page read and write
4B81000
heap
page read and write
18947BE4000
trusted library allocation
page read and write
18937DD7000
trusted library allocation
page read and write
1893914C000
trusted library allocation
page read and write
41CE000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
18944789000
trusted library allocation
page read and write
18947BE2000
trusted library allocation
page read and write
189360E5000
trusted library allocation
page read and write
1540000
heap
page read and write
2570000
heap
page read and write
18936F00000
trusted library allocation
page read and write
1893797B000
trusted library allocation
page read and write
4B81000
heap
page read and write
18941048000
trusted library allocation
page read and write
189325F2000
trusted library allocation
page read and write
12C4000
heap
page read and write
18947C21000
trusted library allocation
page read and write
18937E4D000
trusted library allocation
page read and write
874000
heap
page read and write
12C4000
heap
page read and write
18937E27000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935333000
trusted library allocation
page read and write
189354DE000
trusted library allocation
page read and write
830000
unkown
page readonly
1893284C000
heap
page read and write
1894118F000
trusted library allocation
page read and write
189379F1000
trusted library allocation
page read and write
18934C6F000
trusted library allocation
page read and write
18937281000
trusted library allocation
page read and write
18945C79000
trusted library allocation
page read and write
18937EFE000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893542A000
trusted library allocation
page read and write
18932895000
heap
page read and write
271FA96B000
heap
page read and write
1893284D000
heap
page read and write
1030000
heap
page read and write
1893522F000
trusted library allocation
page read and write
3C7F000
stack
page read and write
1893284F000
heap
page read and write
18934CBF000
trusted library allocation
page read and write
12C5000
heap
page read and write
18932884000
heap
page read and write
12C4000
heap
page read and write
18934BEF000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
1893286A000
heap
page read and write
1893289A000
heap
page read and write
1893283A000
heap
page read and write
18936221000
trusted library allocation
page read and write
1B674968000
heap
page read and write
18937E91000
trusted library allocation
page read and write
83D000
stack
page read and write
1894599A000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945FDB000
trusted library allocation
page read and write
1893874E000
trusted library allocation
page read and write
4B81000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
18945FB8000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
157B000
heap
page read and write
18936287000
trusted library allocation
page read and write
18935485000
trusted library allocation
page read and write
4771000
heap
page read and write
A6B15E000
stack
page read and write
2E7F000
stack
page read and write
18932840000
heap
page read and write
18932884000
heap
page read and write
1893283A000
heap
page read and write
1C94D000
stack
page read and write
12C4000
heap
page read and write
1893283B000
heap
page read and write
12C4000
heap
page read and write
18938738000
trusted library allocation
page read and write
18946D58000
trusted library allocation
page read and write
189460F6000
trusted library allocation
page read and write
12C4000
heap
page read and write
189317B2000
trusted library allocation
page read and write
1893283A000
heap
page read and write
1893285C000
heap
page read and write
18941AE0000
trusted library allocation
page read and write
18946D50000
trusted library allocation
page read and write
1893283F000
heap
page read and write
9C000
stack
page read and write
2FA0000
direct allocation
page read and write
26F0000
direct allocation
page execute and read and write
2D2F000
stack
page read and write
12C5000
heap
page read and write
18935347000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189353F5000
trusted library allocation
page read and write
189387B6000
trusted library allocation
page read and write
21A0000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
44FE000
stack
page read and write
189360FB000
trusted library allocation
page read and write
4771000
heap
page read and write
27B2000
heap
page read and write
18946D4D000
trusted library allocation
page read and write
700A000
heap
page read and write
18932857000
heap
page read and write
2577000
heap
page read and write
18938E98000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932633000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893284F000
heap
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
18932886000
heap
page read and write
12C4000
heap
page read and write
189449EB000
trusted library allocation
page read and write
18947BF1000
trusted library allocation
page read and write
FFF000
unkown
page execute and read and write
1893378B000
trusted library allocation
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
18937ECA000
trusted library allocation
page read and write
4771000
heap
page read and write
189410F2000
trusted library allocation
page read and write
E9A000
unkown
page execute and write copy
12C4000
heap
page read and write
1280000
heap
page read and write
189317DD000
trusted library allocation
page read and write
1893284C000
heap
page read and write
18932899000
heap
page read and write
18937D28000
trusted library allocation
page read and write
317E000
stack
page read and write
1894498D000
trusted library allocation
page read and write
18932842000
heap
page read and write
4861000
heap
page read and write
244C000
unkown
page readonly
12C4000
heap
page read and write
189460F5000
trusted library allocation
page read and write
1B6748E9000
heap
page read and write
A59000
unkown
page write copy
12C4000
heap
page read and write
18937DAA000
trusted library allocation
page read and write
4771000
heap
page read and write
51A0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
1B6748E0000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
367E000
stack
page read and write
18945CBD000
trusted library allocation
page read and write
18935259000
trusted library allocation
page read and write
1893262B000
trusted library allocation
page read and write
12C4000
heap
page read and write
1F0000
heap
page read and write
18937E9C000
trusted library allocation
page read and write
12C4000
heap
page read and write
545000
heap
page read and write
FEB000
heap
page read and write
18936747000
trusted library allocation
page read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
189379E0000
trusted library allocation
page read and write
18937EF9000
trusted library allocation
page read and write
1893285A000
heap
page read and write
189356C6000
trusted library allocation
page read and write
18932768000
trusted library allocation
page read and write
1893285C000
heap
page read and write
2AAF000
stack
page read and write
197D9E50000
heap
page read and write
4B81000
heap
page read and write
189379D9000
trusted library allocation
page read and write
FF3000
heap
page read and write
12C4000
heap
page read and write
1590000
heap
page read and write
18932857000
heap
page read and write
18944539000
trusted library allocation
page read and write
12C4000
heap
page read and write
4D50000
direct allocation
page execute and read and write
12C4000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
18937D68000
trusted library allocation
page read and write
1893141A000
trusted library allocation
page read and write
18932861000
heap
page read and write
18935340000
trusted library allocation
page read and write
60C5000
heap
page read and write
18932836000
heap
page read and write
18944721000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
18944879000
trusted library allocation
page read and write
1893283A000
heap
page read and write
1893688C000
trusted library allocation
page read and write
189460B4000
trusted library allocation
page read and write
189337FC000
trusted library allocation
page read and write
189379E0000
trusted library allocation
page read and write
189328AF000
heap
page read and write
4770000
heap
page read and write
18934BA7000
trusted library allocation
page read and write
157B000
heap
page read and write
18932842000
heap
page read and write
12C5000
heap
page read and write
18C0003F000
trusted library allocation
page read and write
189364FC000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945D66000
trusted library allocation
page read and write
18932853000
heap
page read and write
1894613C000
trusted library allocation
page read and write
18934BDA000
trusted library allocation
page read and write
18935254000
trusted library allocation
page read and write
608000
heap
page read and write
1893627A000
trusted library allocation
page read and write
189351D1000
trusted library allocation
page read and write
189317CA000
trusted library allocation
page read and write
1893283F000
heap
page read and write
1893283B000
heap
page read and write
61E01000
direct allocation
page execute read
189354DE000
trusted library allocation
page read and write
4CD1000
heap
page read and write
18940E78000
trusted library allocation
page read and write
18945A97000
trusted library allocation
page read and write
18937E6A000
trusted library allocation
page read and write
1894114C000
trusted library allocation
page read and write
1003000
heap
page read and write
1893149E000
trusted library allocation
page read and write
1894141C000
trusted library allocation
page read and write
4771000
heap
page read and write
18932853000
heap
page read and write
194000
stack
page read and write
18945D76000
trusted library allocation
page read and write
3B2E000
stack
page read and write
303F000
stack
page read and write
12C4000
heap
page read and write
2791000
heap
page read and write
1893288D000
heap
page read and write
4B81000
heap
page read and write
22C51000
heap
page read and write
189460E2000
trusted library allocation
page read and write
18947CA2000
trusted library allocation
page read and write
401000
unkown
page execute read
18935446000
trusted library allocation
page read and write
425F000
stack
page read and write
1893288E000
heap
page read and write
12C4000
heap
page read and write
43DE000
stack
page read and write
1893FFCD000
trusted library allocation
page read and write
874000
heap
page read and write
22E17000
heap
page read and write
189387BE000
trusted library allocation
page read and write
18932838000
heap
page read and write
3C1F000
stack
page read and write
18937E70000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935591000
trusted library allocation
page read and write
1893288D000
heap
page read and write
493000
unkown
page execute and read and write
1893286A000
heap
page read and write
189362F6000
trusted library allocation
page read and write
18940EBE000
trusted library allocation
page read and write
18935226000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
4B81000
heap
page read and write
18937DF9000
trusted library allocation
page read and write
18932861000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893264A000
trusted library allocation
page read and write
12C5000
heap
page read and write
1893787A000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354F8000
trusted library allocation
page read and write
1B67485F000
heap
page read and write
4771000
heap
page read and write
18935659000
trusted library allocation
page read and write
4771000
heap
page read and write
18932890000
heap
page read and write
4CD1000
heap
page read and write
1893288C000
heap
page read and write
1893285C000
heap
page read and write
22C71000
heap
page read and write
18945CD2000
trusted library allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
18940E70000
trusted library allocation
page read and write
22A21000
heap
page read and write
4B81000
heap
page read and write
18937799000
trusted library allocation
page read and write
189354FC000
trusted library allocation
page read and write
18932585000
trusted library allocation
page read and write
18932884000
heap
page read and write
4B81000
heap
page read and write
18937744000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18937D84000
trusted library allocation
page read and write
1893288D000
heap
page read and write
189326BE000
trusted library allocation
page read and write
12C4000
heap
page read and write
189455F2000
trusted library allocation
page read and write
18946026000
trusted library allocation
page read and write
B41000
unkown
page execute and read and write
18937E24000
trusted library allocation
page read and write
18945CD7000
trusted library allocation
page read and write
1893288E000
heap
page read and write
1893137E000
trusted library allocation
page read and write
18944927000
trusted library allocation
page read and write
18940E78000
trusted library allocation
page read and write
189354D7000
trusted library allocation
page read and write
18938738000
trusted library allocation
page read and write
18932861000
heap
page read and write
1893647C000
trusted library allocation
page read and write
837B000
stack
page read and write
4CD1000
heap
page read and write
189337D7000
trusted library allocation
page read and write
189379A1000
trusted library allocation
page read and write
12C4000
heap
page read and write
6AB3000
heap
page read and write
18935CFC000
trusted library allocation
page read and write
189377B4000
trusted library allocation
page read and write
18935C9E000
trusted library allocation
page read and write
4771000
heap
page read and write
1C84E000
stack
page read and write
18945CF9000
trusted library allocation
page read and write
189325EF000
trusted library allocation
page read and write
4EC1000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
18945CEB000
trusted library allocation
page read and write
189379DB000
trusted library allocation
page read and write
189449A3000
trusted library allocation
page read and write
12C4000
heap
page read and write
22E25000
heap
page read and write
9D0000
direct allocation
page read and write
12BA000
unkown
page execute and write copy
4B81000
heap
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
F50000
heap
page read and write
18935254000
trusted library allocation
page read and write
18934B81000
trusted library allocation
page read and write
189358EE000
trusted library allocation
page read and write
12C4000
heap
page read and write
40D0000
direct allocation
page read and write
18932892000
heap
page read and write
899000
unkown
page write copy
18945FEF000
trusted library allocation
page read and write
18932853000
heap
page read and write
189377E3000
trusted library allocation
page read and write
18937EF9000
trusted library allocation
page read and write
413000
unkown
page readonly
D64000
heap
page read and write
189470F5000
trusted library allocation
page read and write
189367E0000
trusted library allocation
page read and write
189358D7000
trusted library allocation
page read and write
22A21000
heap
page read and write
1893777D000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
1893288C000
heap
page read and write
18938885000
trusted library allocation
page read and write
E10000
unkown
page read and write
18945D61000
trusted library allocation
page read and write
415E000
stack
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
189378F7000
trusted library allocation
page read and write
18930981000
trusted library allocation
page read and write
1893132F000
trusted library allocation
page read and write
1894592D000
trusted library allocation
page read and write
2577000
heap
page read and write
18934BED000
trusted library allocation
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
18935460000
trusted library allocation
page read and write
18932840000
heap
page read and write
18937D52000
trusted library allocation
page read and write
604E000
stack
page read and write
F40000
direct allocation
page execute and read and write
48A0000
heap
page read and write
12C4000
heap
page read and write
189379E2000
trusted library allocation
page read and write
1893679E000
trusted library allocation
page read and write
1893132F000
trusted library allocation
page read and write
18934CC7000
trusted library allocation
page read and write
1893266E000
trusted library allocation
page read and write
18932842000
heap
page read and write
1893283A000
heap
page read and write
18937EA1000
trusted library allocation
page read and write
18932852000
heap
page read and write
1B6748F1000
heap
page read and write
D64000
heap
page read and write
F74000
heap
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
189410D0000
trusted library allocation
page read and write
18946135000
trusted library allocation
page read and write
18945FE4000
trusted library allocation
page read and write
18946192000
trusted library allocation
page read and write
18935394000
trusted library allocation
page read and write
22E15000
heap
page read and write
12C4000
heap
page read and write
189410B7000
trusted library allocation
page read and write
18937EF2000
trusted library allocation
page read and write
189309B3000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
1893285D000
heap
page read and write
1893774B000
trusted library allocation
page read and write
18946026000
trusted library allocation
page read and write
1893286A000
heap
page read and write
2FA0000
direct allocation
page read and write
12C4000
heap
page read and write
189328AF000
heap
page read and write
4B81000
heap
page read and write
3050000
direct allocation
page read and write
189367FA000
trusted library allocation
page read and write
18932853000
heap
page read and write
1894707D000
trusted library allocation
page read and write
D64000
heap
page read and write
18937DB6000
trusted library allocation
page read and write
18945FF3000
trusted library allocation
page read and write
2577000
heap
page read and write
12C4000
heap
page read and write
22A6B000
heap
page read and write
19E000
stack
page read and write
4B81000
heap
page read and write
1749000
heap
page read and write
2D2F000
stack
page read and write
22E24000
heap
page read and write
18932842000
heap
page read and write
18938863000
trusted library allocation
page read and write
1893283F000
heap
page read and write
36DF000
stack
page read and write
12C4000
heap
page read and write
18935226000
trusted library allocation
page read and write
12C4000
heap
page read and write
1B674977000
heap
page read and write
423000
unkown
page readonly
4AFF000
stack
page read and write
1893283A000
heap
page read and write
101F000
heap
page read and write
18946015000
trusted library allocation
page read and write
18932620000
trusted library allocation
page read and write
189356F4000
trusted library allocation
page read and write
18936221000
trusted library allocation
page read and write
189377F7000
trusted library allocation
page read and write
435000
unkown
page read and write
1B674929000
heap
page read and write
18935467000
trusted library allocation
page read and write
18931466000
trusted library allocation
page read and write
18945A5A000
trusted library allocation
page read and write
189460C6000
trusted library allocation
page read and write
18937DFE000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945CE9000
trusted library allocation
page read and write
18932838000
heap
page read and write
1893285C000
heap
page read and write
6C6CE000
unkown
page read and write
18938829000
trusted library allocation
page read and write
18945D30000
trusted library allocation
page read and write
14F1000
heap
page read and write
189313D5000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
18932861000
heap
page read and write
18947BD2000
trusted library allocation
page read and write
18945D76000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893547D000
trusted library allocation
page read and write
18932857000
heap
page read and write
18935668000
trusted library allocation
page read and write
1893283F000
heap
page read and write
18937D62000
trusted library allocation
page read and write
18938E86000
trusted library allocation
page read and write
18946018000
trusted library allocation
page read and write
18932842000
heap
page read and write
18935394000
trusted library allocation
page read and write
4860000
heap
page read and write
18935340000
trusted library allocation
page read and write
189388D0000
trusted library allocation
page read and write
18934C62000
trusted library allocation
page read and write
18935406000
trusted library allocation
page read and write
18932884000
heap
page read and write
27B0000
heap
page read and write
12C4000
heap
page read and write
22C63000
heap
page read and write
12A0000
direct allocation
page read and write
12C4000
heap
page read and write
4771000
heap
page read and write
4E40000
direct allocation
page execute and read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
189358B6000
trusted library allocation
page read and write
2F3F000
stack
page read and write
18932863000
heap
page read and write
FEF000
heap
page read and write
189356DA000
trusted library allocation
page read and write
18945BD5000
trusted library allocation
page read and write
18940EC5000
trusted library allocation
page read and write
1893536F000
trusted library allocation
page read and write
173B000
heap
page read and write
1893284F000
heap
page read and write
189325F3000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934B87000
trusted library allocation
page read and write
1490000
direct allocation
page read and write
6CE000
stack
page read and write
18932842000
heap
page read and write
18937ED1000
trusted library allocation
page read and write
18934CFE000
trusted library allocation
page read and write
18937EFE000
trusted library allocation
page read and write
4B81000
heap
page read and write
18936063000
trusted library allocation
page read and write
18934BED000
trusted library allocation
page read and write
12C4000
heap
page read and write
18931426000
trusted library allocation
page read and write
189460E1000
trusted library allocation
page read and write
18932838000
heap
page read and write
4B81000
heap
page read and write
18937EC3000
trusted library allocation
page read and write
189354EA000
trusted library allocation
page read and write
189317A9000
trusted library allocation
page read and write
189352FD000
trusted library allocation
page read and write
18932645000
trusted library allocation
page read and write
189470B5000
trusted library allocation
page read and write
874000
heap
page read and write
18932890000
heap
page read and write
18932840000
heap
page read and write
22E0F000
heap
page read and write
18936902000
trusted library allocation
page read and write
18935469000
trusted library allocation
page read and write
1500000
heap
page read and write
189387E3000
trusted library allocation
page read and write
12C4000
heap
page read and write
155F000
heap
page read and write
12C4000
heap
page read and write
189356F4000
trusted library allocation
page read and write
18945A78000
trusted library allocation
page read and write
1893269D000
trusted library allocation
page read and write
189352A6000
trusted library allocation
page read and write
189350F2000
trusted library allocation
page read and write
189390C3000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
18932579000
trusted library allocation
page read and write
12A0000
direct allocation
page read and write
18937EF6000
trusted library allocation
page read and write
189387B9000
trusted library allocation
page read and write
189354E4000
trusted library allocation
page read and write
874000
heap
page read and write
18934B24000
trusted library allocation
page read and write
1894492C000
trusted library allocation
page read and write
3E9F000
stack
page read and write
189364E2000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932861000
heap
page read and write
18932840000
heap
page read and write
18945B83000
trusted library allocation
page read and write
1893285C000
heap
page read and write
18935100000
trusted library allocation
page read and write
22C00000
heap
page read and write
12C5000
heap
page read and write
4771000
heap
page read and write
18932840000
heap
page read and write
18938E96000
trusted library allocation
page read and write
18932857000
heap
page read and write
189326C7000
trusted library allocation
page read and write
18944951000
trusted library allocation
page read and write
189410B1000
trusted library allocation
page read and write
1003000
heap
page read and write
51075FC000
stack
page read and write
2063403C000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
1893171A000
trusted library allocation
page read and write
189368F8000
trusted library allocation
page read and write
18932884000
heap
page read and write
18934CCA000
trusted library allocation
page read and write
22E17000
heap
page read and write
1893283A000
heap
page read and write
4CD1000
heap
page read and write
1729F600000
trusted library allocation
page read and write
1893523B000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
12C5000
heap
page read and write
18932842000
heap
page read and write
4B81000
heap
page read and write
2FA0000
direct allocation
page read and write
26FA000
heap
page read and write
4B81000
heap
page read and write
18932670000
trusted library allocation
page read and write
43AF000
stack
page read and write
18945CCA000
trusted library allocation
page read and write
189372BC000
trusted library allocation
page read and write
18937ECE000
trusted library allocation
page read and write
39BE000
stack
page read and write
18937842000
trusted library allocation
page read and write
4B81000
heap
page read and write
18947BF4000
trusted library allocation
page read and write
12C4000
heap
page read and write
1C961000
heap
page read and write
189356A1000
trusted library allocation
page read and write
18934BDA000
trusted library allocation
page read and write
189379F3000
trusted library allocation
page read and write
189460DB000
trusted library allocation
page read and write
1893FB78000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893289A000
heap
page read and write
2BE0000
direct allocation
page read and write
18945CC6000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893288D000
heap
page read and write
18941151000
trusted library allocation
page read and write
18937EE0000
trusted library allocation
page read and write
4C51000
direct allocation
page read and write
18940E9E000
trusted library allocation
page read and write
351CC000
stack
page read and write
18936231000
trusted library allocation
page read and write
1729F607000
trusted library allocation
page read and write
5AC000
stack
page read and write
18932834000
heap
page read and write
189460DE000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354FC000
trusted library allocation
page read and write
1893285A000
heap
page read and write
18945BD5000
trusted library allocation
page read and write
189328A7000
heap
page read and write
18932842000
heap
page read and write
18935394000
trusted library allocation
page read and write
18937DB0000
trusted library allocation
page read and write
1893551F000
trusted library allocation
page read and write
12C4000
heap
page read and write
1894478D000
trusted library allocation
page read and write
18945CC6000
trusted library allocation
page read and write
189460EA000
trusted library allocation
page read and write
189387F4000
trusted library allocation
page read and write
18932884000
heap
page read and write
1893283F000
heap
page read and write
18937D79000
trusted library allocation
page read and write
18934BDA000
trusted library allocation
page read and write
18934BFE000
trusted library allocation
page read and write
F74000
heap
page read and write
22E12000
heap
page read and write
1B6748FC000
heap
page read and write
6C6D2000
unkown
page readonly
18932861000
heap
page read and write
12C4000
heap
page read and write
18945D52000
trusted library allocation
page read and write
23AE000
stack
page read and write
427000
unkown
page write copy
22E17000
heap
page read and write
12C4000
heap
page read and write
1893289A000
heap
page read and write
874000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4B81000
heap
page read and write
18935448000
trusted library allocation
page read and write
4CD1000
heap
page read and write
18935394000
trusted library allocation
page read and write
551F3FF000
stack
page read and write
189354F3000
trusted library allocation
page read and write
189390B7000
trusted library allocation
page read and write
18945D2C000
trusted library allocation
page read and write
4771000
heap
page read and write
18935346000
trusted library allocation
page read and write
189460B4000
trusted library allocation
page read and write
2BA0000
heap
page read and write
1893288C000
heap
page read and write
1894489E000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
18935446000
trusted library allocation
page read and write
22E07000
heap
page read and write
4771000
heap
page read and write
4CD1000
heap
page read and write
22E05000
heap
page read and write
4B81000
heap
page read and write
18944D28000
trusted library allocation
page read and write
12C4000
heap
page read and write
18946026000
trusted library allocation
page read and write
4B81000
heap
page read and write
5520000
direct allocation
page execute and read and write
189356A1000
trusted library allocation
page read and write
D02000
unkown
page execute and read and write
18934BED000
trusted library allocation
page read and write
466E000
stack
page read and write
12C4000
heap
page read and write
189449E3000
trusted library allocation
page read and write
4B81000
heap
page read and write
520000
heap
page read and write
6C3B000
stack
page read and write
189328AF000
heap
page read and write
18935237000
trusted library allocation
page read and write
18937D33000
trusted library allocation
page read and write
189367C3000
trusted library allocation
page read and write
373E000
stack
page read and write
427000
unkown
page write copy
1893534C000
trusted library allocation
page read and write
18937E9E000
trusted library allocation
page read and write
3D7E000
stack
page read and write
1893567E000
trusted library allocation
page read and write
820E000
stack
page read and write
189354EA000
trusted library allocation
page read and write
2D6E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
189337D7000
trusted library allocation
page read and write
58E000
stack
page read and write
18945D98000
trusted library allocation
page read and write
28F5E000
stack
page read and write
189460E2000
trusted library allocation
page read and write
1893566A000
trusted library allocation
page read and write
18947BEC000
trusted library allocation
page read and write
1893283A000
heap
page read and write
189368A3000
trusted library allocation
page read and write
4F00000
direct allocation
page execute and read and write
189387BC000
trusted library allocation
page read and write
1893283A000
heap
page read and write
1B67493C000
heap
page read and write
18934BA7000
trusted library allocation
page read and write
18932886000
heap
page read and write
465E000
stack
page read and write
1893675A000
trusted library allocation
page read and write
5E0000
heap
page read and write
623000
heap
page read and write
1893283A000
heap
page read and write
189326F6000
trusted library allocation
page read and write
1893887E000
trusted library allocation
page read and write
189367BC000
trusted library allocation
page read and write
18937EF6000
trusted library allocation
page read and write
18938733000
trusted library allocation
page read and write
189313A3000
trusted library allocation
page read and write
18935767000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18945932000
trusted library allocation
page read and write
12C4000
heap
page read and write
1B67485F000
heap
page read and write
18937DE6000
trusted library allocation
page read and write
271F8CA0000
heap
page read and write
4B81000
heap
page read and write
18932838000
heap
page read and write
18945CC4000
trusted library allocation
page read and write
1893263C000
trusted library allocation
page read and write
4CD1000
heap
page read and write
18932842000
heap
page read and write
1893283C000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
A6BBFF000
stack
page read and write
12C4000
heap
page read and write
189387A7000
trusted library allocation
page read and write
12C5000
heap
page read and write
15D4000
heap
page read and write
12C4000
heap
page read and write
18945D33000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18944855000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
4CD1000
heap
page read and write
359F000
stack
page read and write
18932838000
heap
page read and write
189387C0000
trusted library allocation
page read and write
18945A45000
trusted library allocation
page read and write
551EBFC000
stack
page read and write
22E14000
heap
page read and write
12C4000
heap
page read and write
189327F8000
trusted library allocation
page read and write
18932842000
heap
page read and write
4B81000
heap
page read and write
189362CE000
trusted library allocation
page read and write
18945A7D000
trusted library allocation
page read and write
4B81000
heap
page read and write
189455E8000
trusted library allocation
page read and write
18935265000
trusted library allocation
page read and write
12C5000
heap
page read and write
18941A95000
trusted library allocation
page read and write
F5E000
heap
page read and write
3E7F000
stack
page read and write
4CD1000
heap
page read and write
18932886000
heap
page read and write
461E000
stack
page read and write
2C10000
heap
page read and write
1893178E000
trusted library allocation
page read and write
18932638000
trusted library allocation
page read and write
189325D0000
trusted library allocation
page read and write
4771000
heap
page read and write
4B81000
heap
page read and write
18935328000
trusted library allocation
page read and write
18937889000
trusted library allocation
page read and write
18937842000
trusted library allocation
page read and write
189354EA000
trusted library allocation
page read and write
1893FB3C000
trusted library allocation
page read and write
721000
heap
page read and write
189356E8000
trusted library allocation
page read and write
18946930000
trusted library allocation
page read and write
189356E2000
trusted library allocation
page read and write
18932838000
heap
page read and write
189364B1000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
5A7000
unkown
page execute and read and write
12C4000
heap
page read and write
71BC000
stack
page read and write
1C54F000
stack
page read and write
18932838000
heap
page read and write
189356C4000
trusted library allocation
page read and write
189379D2000
trusted library allocation
page read and write
874000
heap
page read and write
189356C4000
trusted library allocation
page read and write
18937EFA000
trusted library allocation
page read and write
189328AF000
heap
page read and write
12C4000
heap
page read and write
18937E1B000
trusted library allocation
page read and write
18932863000
heap
page read and write
22A63000
heap
page read and write
12C5000
heap
page read and write
18945C63000
trusted library allocation
page read and write
189328A6000
heap
page read and write
18934CC7000
trusted library allocation
page read and write
18932886000
heap
page read and write
FA4000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18935247000
trusted library allocation
page read and write
4B81000
heap
page read and write
2BE0000
direct allocation
page read and write
18932834000
heap
page read and write
1893283A000
heap
page read and write
4771000
heap
page read and write
51E0000
direct allocation
page execute and read and write
18932899000
heap
page read and write
12C4000
heap
page read and write
155E000
stack
page read and write
1893284F000
heap
page read and write
18935283000
trusted library allocation
page read and write
189325EB000
trusted library allocation
page read and write
189356F9000
trusted library allocation
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
4B81000
heap
page read and write
18938899000
trusted library allocation
page read and write
18937D19000
trusted library allocation
page read and write
847C000
stack
page read and write
2BC0000
direct allocation
page read and write
27B1000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18940E14000
trusted library allocation
page read and write
189328AF000
heap
page read and write
2FA0000
direct allocation
page read and write
2BE0000
direct allocation
page read and write
1893288C000
heap
page read and write
1893283C000
heap
page read and write
1893789F000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
1893379C000
trusted library allocation
page read and write
2063400D000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
189328AF000
heap
page read and write
18935212000
trusted library allocation
page read and write
18935638000
trusted library allocation
page read and write
2C2E000
stack
page read and write
1893546F000
trusted library allocation
page read and write
4CD1000
heap
page read and write
4B81000
heap
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
1893559B000
trusted library allocation
page read and write
12C4000
heap
page read and write
4D91000
direct allocation
page read and write
18931477000
trusted library allocation
page read and write
4B81000
heap
page read and write
189460D2000
trusted library allocation
page read and write
1894455A000
trusted library allocation
page read and write
1893276E000
trusted library allocation
page read and write
22E14000
heap
page read and write
1893283F000
heap
page read and write
189325EF000
trusted library allocation
page read and write
4771000
heap
page read and write
189375B9000
trusted library allocation
page read and write
12C4000
heap
page read and write
189448C7000
trusted library allocation
page read and write
18935444000
trusted library allocation
page read and write
18934BF9000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
1893283F000
heap
page read and write
F74000
heap
page read and write
4771000
heap
page read and write
12A0000
direct allocation
page read and write
18945AFE000
trusted library allocation
page read and write
503B000
stack
page read and write
1893521C000
trusted library allocation
page read and write
4771000
heap
page read and write
18938860000
trusted library allocation
page read and write
189451DD000
trusted library allocation
page read and write
189360D3000
trusted library allocation
page read and write
18940E7D000
trusted library allocation
page read and write
18944858000
trusted library allocation
page read and write
1893288C000
heap
page read and write
12C5000
heap
page read and write
18944209000
trusted library allocation
page read and write
62C000
unkown
page execute and read and write
12C4000
heap
page read and write
271FA97D000
heap
page read and write
1894661C000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893288C000
heap
page read and write
1893285C000
heap
page read and write
18932857000
heap
page read and write
189379E2000
trusted library allocation
page read and write
18932891000
heap
page read and write
18940E92000
trusted library allocation
page read and write
3DAE000
stack
page read and write
270D000
heap
page execute and read and write
2FBC000
stack
page read and write
1893564B000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893288D000
heap
page read and write
189388F4000
trusted library allocation
page read and write
171E000
stack
page read and write
18932840000
heap
page read and write
18944887000
trusted library allocation
page read and write
18932896000
heap
page read and write
189367A1000
trusted library allocation
page read and write
1893285C000
heap
page read and write
1893FB82000
trusted library allocation
page read and write
18935696000
trusted library allocation
page read and write
20633B70000
unclassified section
page readonly
12C4000
heap
page read and write
12C4000
heap
page read and write
1893284C000
heap
page read and write
1893285A000
heap
page read and write
309F000
stack
page read and write
189460DE000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
1893625F000
trusted library allocation
page read and write
12C4000
heap
page read and write
1575000
heap
page read and write
18946039000
trusted library allocation
page read and write
1C961000
heap
page read and write
12B8000
unkown
page execute and read and write
18932838000
heap
page read and write
D64000
heap
page read and write
12C5000
heap
page read and write
1893534C000
trusted library allocation
page read and write
189354D7000
trusted library allocation
page read and write
12C4000
heap
page read and write
22A21000
heap
page read and write
18936884000
trusted library allocation
page read and write
18932853000
heap
page read and write
FB2000
unkown
page execute and write copy
18932853000
heap
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
18932853000
heap
page read and write
18932840000
heap
page read and write
6C640000
unkown
page readonly
18937EF6000
trusted library allocation
page read and write
20633CB0000
heap
page read and write
18932857000
heap
page read and write
189460EA000
trusted library allocation
page read and write
874000
heap
page read and write
18940ECF000
trusted library allocation
page read and write
18932863000
heap
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
22E25000
heap
page read and write
2BE0000
direct allocation
page read and write
18935446000
trusted library allocation
page read and write
451E000
stack
page read and write
20633E60000
heap
page read and write
1893289E000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
1B67492B000
heap
page read and write
12C4000
heap
page read and write
18944935000
trusted library allocation
page read and write
4771000
heap
page read and write
697E000
heap
page read and write
1893375F000
trusted library allocation
page read and write
189388BB000
trusted library allocation
page read and write
457E000
stack
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18937ECE000
trusted library allocation
page read and write
12C5000
heap
page read and write
1893288E000
heap
page read and write
18945947000
trusted library allocation
page read and write
5160000
direct allocation
page execute and read and write
18932840000
heap
page read and write
4CD1000
heap
page read and write
1011000
heap
page read and write
22A62000
heap
page read and write
189448A6000
trusted library allocation
page read and write
1893268F000
trusted library allocation
page read and write
1B6748EE000
heap
page read and write
189387BE000
trusted library allocation
page read and write
18935250000
trusted library allocation
page read and write
18932856000
heap
page read and write
18932842000
heap
page read and write
4B81000
heap
page read and write
18946DAC000
trusted library allocation
page read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
189449D1000
trusted library allocation
page read and write
189367FA000
trusted library allocation
page read and write
22C20000
heap
page read and write
18940ED4000
trusted library allocation
page read and write
18945ABE000
trusted library allocation
page read and write
12C4000
heap
page read and write
FB1000
unkown
page execute and read and write
18932886000
heap
page read and write
4B81000
heap
page read and write
4771000
heap
page read and write
18932857000
heap
page read and write
18932890000
heap
page read and write
3B1E000
stack
page read and write
18938719000
trusted library allocation
page read and write
6F0000
heap
page read and write
18932836000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189354C9000
trusted library allocation
page read and write
4EC1000
heap
page read and write
18945D6C000
trusted library allocation
page read and write
D02000
unkown
page execute and write copy
1004000
heap
page read and write
18935394000
trusted library allocation
page read and write
18935172000
trusted library allocation
page read and write
189358D7000
trusted library allocation
page read and write
197DA207000
trusted library allocation
page read and write
18945BF4000
trusted library allocation
page read and write
4B81000
heap
page read and write
18944747000
trusted library allocation
page read and write
1893284C000
heap
page read and write
12C4000
heap
page read and write
189379E8000
trusted library allocation
page read and write
D64000
heap
page read and write
1893269D000
trusted library allocation
page read and write
22A0E000
stack
page read and write
1121000
unkown
page execute and write copy
18937D68000
trusted library allocation
page read and write
4CE0000
direct allocation
page read and write
18932F0B000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893688C000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
4B81000
heap
page read and write
18935251000
trusted library allocation
page read and write
1B674945000
heap
page read and write
22E31000
heap
page read and write
2FEE000
stack
page read and write
18932857000
heap
page read and write
18935262000
trusted library allocation
page read and write
EE0000
direct allocation
page read and write
4861000
heap
page read and write
189354EA000
trusted library allocation
page read and write
1893285D000
heap
page read and write
417000
unkown
page read and write
18934C6C000
trusted library allocation
page read and write
189388F2000
trusted library allocation
page read and write
189354EE000
trusted library allocation
page read and write
297E000
stack
page read and write
1893283F000
heap
page read and write
189368D2000
trusted library allocation
page read and write
18932853000
heap
page read and write
18945CEE000
trusted library allocation
page read and write
18932838000
heap
page read and write
18932838000
heap
page read and write
189451F6000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
18932857000
heap
page read and write
2FA0000
direct allocation
page read and write
18946DA9000
trusted library allocation
page read and write
22E17000
heap
page read and write
4CD1000
heap
page read and write
18941B9B000
trusted library allocation
page read and write
189379F5000
trusted library allocation
page read and write
18932842000
heap
page read and write
1560000
heap
page read and write
12C4000
heap
page read and write
18936231000
trusted library allocation
page read and write
12C4000
heap
page read and write
189460DB000
trusted library allocation
page read and write
18932863000
heap
page read and write
F70000
heap
page read and write
22A4B000
heap
page read and write
35BF000
stack
page read and write
4B81000
heap
page read and write
18941B96000
trusted library allocation
page read and write
189356F4000
trusted library allocation
page read and write
1893283B000
heap
page read and write
F74000
heap
page read and write
18932894000
heap
page read and write
12C4000
heap
page read and write
15D4000
heap
page read and write
18932842000
heap
page read and write
189354D7000
trusted library allocation
page read and write
189470EA000
trusted library allocation
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
18937D19000
trusted library allocation
page read and write
189377F7000
trusted library allocation
page read and write
1893284C000
heap
page read and write
20633FA4000
heap
page read and write
D64000
heap
page read and write
18945CF9000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
22E31000
heap
page read and write
189325EF000
trusted library allocation
page read and write
43C000
unkown
page execute and read and write
189356C6000
trusted library allocation
page read and write
18945A7D000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
18932884000
heap
page read and write
18946D56000
trusted library allocation
page read and write
18941BA2000
trusted library allocation
page read and write
189314AD000
trusted library allocation
page read and write
189460B4000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932884000
heap
page read and write
18934BED000
trusted library allocation
page read and write
22C51000
heap
page read and write
12C5000
heap
page read and write
9D0000
direct allocation
page read and write
4B81000
heap
page read and write
18945FE4000
trusted library allocation
page read and write
189448AA000
trusted library allocation
page read and write
18938860000
trusted library allocation
page read and write
1893797F000
trusted library allocation
page read and write
18932669000
trusted library allocation
page read and write
15D4000
heap
page read and write
18932853000
heap
page read and write
1545000
heap
page read and write
18932896000
heap
page read and write
1018000
heap
page read and write
18937DCE000
trusted library allocation
page read and write
12C5000
heap
page read and write
1893283A000
heap
page read and write
18937DDE000
trusted library allocation
page read and write
1893536F000
trusted library allocation
page read and write
1893549B000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354A0000
trusted library allocation
page read and write
3D9E000
stack
page read and write
18935431000
trusted library allocation
page read and write
3051DFA24000
trusted library allocation
page read and write
189387CD000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937D92000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
197DA20A000
trusted library allocation
page read and write
12C4000
heap
page read and write
189449EC000
trusted library allocation
page read and write
33FE000
stack
page read and write
22E2B000
heap
page read and write
12C4000
heap
page read and write
F40000
direct allocation
page execute and read and write
189353F5000
trusted library allocation
page read and write
18932899000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
48FF000
stack
page read and write
18937892000
trusted library allocation
page read and write
1580000
heap
page read and write
2063ABE0000
heap
page read and write
1893283A000
heap
page read and write
18932890000
heap
page read and write
18934BF9000
trusted library allocation
page read and write
18945CCD000
trusted library allocation
page read and write
22C30000
heap
page read and write
18932840000
heap
page read and write
18937DC3000
trusted library allocation
page read and write
18937D20000
trusted library allocation
page read and write
4B81000
heap
page read and write
22E10000
heap
page read and write
18932884000
heap
page read and write
189362C0000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
12C5000
heap
page read and write
1893521A000
trusted library allocation
page read and write
189354E4000
trusted library allocation
page read and write
18932840000
heap
page read and write
3F9F000
stack
page read and write
271F8EA1000
heap
page read and write
12C4000
heap
page read and write
1893289A000
heap
page read and write
189314E4000
trusted library allocation
page read and write
18934BF9000
trusted library allocation
page read and write
1122000
unkown
page execute and write copy
1893285A000
heap
page read and write
2577000
heap
page read and write
1893286A000
heap
page read and write
3DCF031000
trusted library allocation
page execute read
D64000
heap
page read and write
189360F5000
trusted library allocation
page read and write
189388FE000
trusted library allocation
page read and write
18934BA7000
trusted library allocation
page read and write
CA0000
unkown
page read and write
12C4000
heap
page read and write
189387A6000
trusted library allocation
page read and write
22E33000
heap
page read and write
189460EA000
trusted library allocation
page read and write
1893288D000
heap
page read and write
18932891000
heap
page read and write
1290000
heap
page read and write
12C5000
heap
page read and write
1893546C000
trusted library allocation
page read and write
18934C65000
trusted library allocation
page read and write
18935218000
trusted library allocation
page read and write
18932886000
heap
page read and write
151A000
heap
page read and write
12C4000
heap
page read and write
18941AA0000
trusted library allocation
page read and write
18932850000
heap
page read and write
18932838000
heap
page read and write
1893284F000
heap
page read and write
4CD1000
heap
page read and write
18945D3C000
trusted library allocation
page read and write
12C4000
heap
page read and write
2F073000
heap
page read and write
3AFE000
stack
page read and write
18932886000
heap
page read and write
18945D66000
trusted library allocation
page read and write
1893606D000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893542E000
trusted library allocation
page read and write
4CD1000
heap
page read and write
874000
heap
page read and write
2737000
heap
page read and write
12C4000
heap
page read and write
1893284C000
heap
page read and write
7C0000
heap
page read and write
189362BE000
trusted library allocation
page read and write
4EC0000
heap
page read and write
18931323000
trusted library allocation
page read and write
271FA96D000
heap
page read and write
1893529F000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18934B19000
trusted library allocation
page read and write
18940E97000
trusted library allocation
page read and write
1893288C000
heap
page read and write
1893284F000
heap
page read and write
18944976000
trusted library allocation
page read and write
4771000
heap
page read and write
18945CCD000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932838000
heap
page read and write
1893283F000
heap
page read and write
400000
unkown
page readonly
1893874E000
trusted library allocation
page read and write
3B7E000
stack
page read and write
18932856000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893872C000
trusted library allocation
page read and write
18932842000
heap
page read and write
1893285A000
heap
page read and write
1121000
unkown
page execute and write copy
874000
heap
page read and write
18945CE9000
trusted library allocation
page read and write
18934BA7000
trusted library allocation
page read and write
1893690A000
trusted library allocation
page read and write
18944941000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945D3C000
trusted library allocation
page read and write
12C4000
heap
page read and write
189460DB000
trusted library allocation
page read and write
1893288C000
heap
page read and write
4F00000
direct allocation
page execute and read and write
1894110E000
trusted library allocation
page read and write
189309BF000
trusted library allocation
page read and write
189326D9000
trusted library allocation
page read and write
4B81000
heap
page read and write
22E17000
heap
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
1893283A000
heap
page read and write
EE0000
direct allocation
page read and write
18946043000
trusted library allocation
page read and write
12C4000
heap
page read and write
FAB000
heap
page read and write
189356EF000
trusted library allocation
page read and write
18944623000
trusted library allocation
page read and write
18932847000
heap
page read and write
18932857000
heap
page read and write
1B67493C000
heap
page read and write
2FA0000
direct allocation
page read and write
18932863000
heap
page read and write
189387C5000
trusted library allocation
page read and write
18945B88000
trusted library allocation
page read and write
189460DE000
trusted library allocation
page read and write
18934BCC000
trusted library allocation
page read and write
18936766000
trusted library allocation
page read and write
189325F1000
trusted library allocation
page read and write
18932838000
heap
page read and write
E10000
unkown
page read and write
12C4000
heap
page read and write
18932840000
heap
page read and write
1893170E000
trusted library allocation
page read and write
18932861000
heap
page read and write
189449AC000
trusted library allocation
page read and write
189352BA000
trusted library allocation
page read and write
12C5000
heap
page read and write
22E25000
heap
page read and write
1893375A000
trusted library allocation
page read and write
5340000
direct allocation
page read and write
189460C6000
trusted library allocation
page read and write
22A21000
heap
page read and write
4B81000
heap
page read and write
18932838000
heap
page read and write
18935924000
trusted library allocation
page read and write
874000
heap
page read and write
18945EB5000
trusted library allocation
page read and write
1B6748F2000
heap
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
18935630000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893534E000
trusted library allocation
page read and write
18945D6B000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1894493B000
trusted library allocation
page read and write
18935247000
trusted library allocation
page read and write
874000
heap
page read and write
1893288C000
heap
page read and write
12C4000
heap
page read and write
18946622000
trusted library allocation
page read and write
22E17000
heap
page read and write
18932864000
heap
page read and write
1893588E000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937E48000
trusted library allocation
page read and write
189372CE000
trusted library allocation
page read and write
1893283F000
heap
page read and write
1B674945000
heap
page read and write
12C4000
heap
page read and write
18935367000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932856000
heap
page read and write
2BC0000
direct allocation
page read and write
18932861000
heap
page read and write
100A000
heap
page read and write
2FAC000
stack
page read and write
12C4000
heap
page read and write
189327AC000
trusted library allocation
page read and write
1893149E000
trusted library allocation
page read and write
18945CEB000
trusted library allocation
page read and write
18935220000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932842000
heap
page read and write
18935633000
trusted library allocation
page read and write
189360A7000
trusted library allocation
page read and write
4771000
heap
page read and write
1420000
heap
page read and write
18944785000
trusted library allocation
page read and write
22DF9000
heap
page read and write
1894484E000
trusted library allocation
page read and write
18945CD2000
trusted library allocation
page read and write
1893542D000
trusted library allocation
page read and write
18932840000
heap
page read and write
189460D2000
trusted library allocation
page read and write
12C4000
heap
page read and write
189362C3000
trusted library allocation
page read and write
189470F5000
trusted library allocation
page read and write
189328AB000
heap
page read and write
B32000
unkown
page execute and read and write
1893543A000
trusted library allocation
page read and write
22DF9000
heap
page read and write
1893283C000
heap
page read and write
1893797F000
trusted library allocation
page read and write
18932857000
heap
page read and write
18945B6D000
trusted library allocation
page read and write
189448D0000
trusted library allocation
page read and write
4771000
heap
page read and write
18941176000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18935699000
trusted library allocation
page read and write
189379E2000
trusted library allocation
page read and write
189470FE000
trusted library allocation
page read and write
1893285C000
heap
page read and write
48A1000
heap
page read and write
12C4000
heap
page read and write
18945BE1000
trusted library allocation
page read and write
4B81000
heap
page read and write
101F000
heap
page read and write
18945CB5000
trusted library allocation
page read and write
1893283A000
heap
page read and write
2C3E000
stack
page read and write
1893784F000
trusted library allocation
page read and write
1B674921000
heap
page read and write
12C4000
heap
page read and write
3C1E000
stack
page read and write
18932857000
heap
page read and write
189317F9000
trusted library allocation
page read and write
1893283F000
heap
page read and write
1893283A000
heap
page read and write
189358E4000
trusted library allocation
page read and write
1566000
heap
page read and write
189367A7000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935329000
trusted library allocation
page read and write
18932838000
heap
page read and write
4C3F000
stack
page read and write
12C5000
heap
page read and write
18932864000
heap
page read and write
1893FB35000
trusted library allocation
page read and write
313F000
stack
page read and write
12C4000
heap
page read and write
1893520C000
trusted library allocation
page read and write
1893285C000
heap
page read and write
18940E73000
trusted library allocation
page read and write
18937DB6000
trusted library allocation
page read and write
1121000
unkown
page execute and write copy
12C4000
heap
page read and write
189362DE000
trusted library allocation
page read and write
189328AF000
heap
page read and write
1893288E000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
18945FDB000
trusted library allocation
page read and write
3F3E000
stack
page read and write
D64000
heap
page read and write
1894116A000
trusted library allocation
page read and write
12C4000
heap
page read and write
22E17000
heap
page read and write
1893289A000
heap
page read and write
FA1000
heap
page read and write
189358C3000
trusted library allocation
page read and write
1893289A000
heap
page read and write
1C960000
heap
page read and write
18935220000
trusted library allocation
page read and write
12C4000
heap
page read and write
18933735000
trusted library allocation
page read and write
18946015000
trusted library allocation
page read and write
4CD1000
heap
page read and write
1893915F000
trusted library allocation
page read and write
18937E91000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934BED000
trusted library allocation
page read and write
189379D4000
trusted library allocation
page read and write
18932838000
heap
page read and write
D0B000
unkown
page execute and read and write
18937EEE000
trusted library allocation
page read and write
1893FFE9000
trusted library allocation
page read and write
18934B32000
trusted library allocation
page read and write
12C4000
heap
page read and write
189390F9000
trusted library allocation
page read and write
22E0F000
heap
page read and write
12FC000
stack
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
18944920000
trusted library allocation
page read and write
18947CB9000
trusted library allocation
page read and write
18935486000
trusted library allocation
page read and write
1893543A000
trusted library allocation
page read and write
18936860000
trusted library allocation
page read and write
18934BB2000
trusted library allocation
page read and write
22A21000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
18934BDA000
trusted library allocation
page read and write
18946039000
trusted library allocation
page read and write
22E17000
heap
page read and write
1893286A000
heap
page read and write
18944964000
trusted library allocation
page read and write
300E000
stack
page read and write
426F000
stack
page read and write
FD8000
heap
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
189354EE000
trusted library allocation
page read and write
4B81000
heap
page read and write
1894486E000
trusted library allocation
page read and write
189364A7000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937E7E000
trusted library allocation
page read and write
2EAC000
stack
page read and write
4B81000
heap
page read and write
189326C7000
trusted library allocation
page read and write
18933764000
trusted library allocation
page read and write
18941163000
trusted library allocation
page read and write
13CE000
stack
page read and write
12C4000
heap
page read and write
1893283B000
heap
page read and write
12C5000
heap
page read and write
189358C3000
trusted library allocation
page read and write
1893289E000
heap
page read and write
2E5E000
stack
page read and write
18937D5D000
trusted library allocation
page read and write
18937E9E000
trusted library allocation
page read and write
12C4000
heap
page read and write
189327E0000
trusted library allocation
page read and write
22E10000
heap
page read and write
1893286A000
heap
page read and write
1893283A000
heap
page read and write
4B81000
heap
page read and write
A0A000
heap
page read and write
3E5F000
stack
page read and write
39DE000
stack
page read and write
12C4000
heap
page read and write
18934CC7000
trusted library allocation
page read and write
189460DE000
trusted library allocation
page read and write
22A10000
heap
page read and write
271F8EA6000
heap
page read and write
18940E32000
trusted library allocation
page read and write
18934BEF000
trusted library allocation
page read and write
189460D2000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937892000
trusted library allocation
page read and write
423000
unkown
page readonly
18945FAF000
trusted library allocation
page read and write
22E17000
heap
page read and write
4B81000
heap
page read and write
18932838000
heap
page read and write
189460C6000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937D1C000
trusted library allocation
page read and write
18937E91000
trusted library allocation
page read and write
4B81000
heap
page read and write
18935C99000
trusted library allocation
page read and write
1893284C000
heap
page read and write
1729F290000
heap
page read and write
189367FA000
trusted library allocation
page read and write
4771000
heap
page read and write
1893774B000
trusted library allocation
page read and write
189390C1000
trusted library allocation
page read and write
874000
heap
page read and write
15D4000
heap
page read and write
18937DC9000
trusted library allocation
page read and write
4771000
heap
page read and write
12C5000
heap
page read and write
189448C5000
trusted library allocation
page read and write
18932857000
heap
page read and write
15BE000
stack
page read and write
18932853000
heap
page read and write
189326DF000
trusted library allocation
page read and write
2D1F000
stack
page read and write
12C4000
heap
page read and write
FA2000
unkown
page execute and read and write
18932892000
heap
page read and write
18934B32000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893283F000
heap
page read and write
189356E2000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
12C5000
heap
page read and write
1575000
heap
page read and write
18932842000
heap
page read and write
18932861000
heap
page read and write
35EF000
stack
page read and write
500000
heap
page read and write
18934BBB000
trusted library allocation
page read and write
18944D00000
trusted library allocation
page read and write
18945FA8000
trusted library allocation
page read and write
189327D8000
trusted library allocation
page read and write
18940E7D000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
18937EF6000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
1893534F000
trusted library allocation
page read and write
18935456000
trusted library allocation
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
189356F8000
trusted library allocation
page read and write
189354DE000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
18932896000
heap
page read and write
389E000
stack
page read and write
3EBE000
stack
page read and write
1893283A000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
61ECC000
direct allocation
page read and write
C20000
heap
page read and write
18937EFE000
trusted library allocation
page read and write
189354EC000
trusted library allocation
page read and write
22A63000
heap
page read and write
435F000
stack
page read and write
18932838000
heap
page read and write
1893284C000
heap
page read and write
1894707B000
trusted library allocation
page read and write
18932585000
trusted library allocation
page read and write
189367A1000
trusted library allocation
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
1B674977000
heap
page read and write
874000
heap
page read and write
18937DD7000
trusted library allocation
page read and write
1893286A000
heap
page read and write
12C4000
heap
page read and write
18938869000
trusted library allocation
page read and write
189356C4000
trusted library allocation
page read and write
12C5000
heap
page read and write
1893262A000
trusted library allocation
page read and write
1893285E000
heap
page read and write
1893377C000
trusted library allocation
page read and write
18938863000
trusted library allocation
page read and write
189326A6000
trusted library allocation
page read and write
22A63000
heap
page read and write
1893285E000
heap
page read and write
1893283A000
heap
page read and write
18935C97000
trusted library allocation
page read and write
1894600D000
trusted library allocation
page read and write
189379F5000
trusted library allocation
page read and write
189354EA000
trusted library allocation
page read and write
18945D19000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
1893172E000
trusted library allocation
page read and write
22E17000
heap
page read and write
520000
heap
page read and write
3D6F000
stack
page read and write
874000
heap
page read and write
189317DD000
trusted library allocation
page read and write
18944562000
trusted library allocation
page read and write
9C5000
heap
page read and write
189356EB000
trusted library allocation
page read and write
18936293000
trusted library allocation
page read and write
12C5000
heap
page read and write
18934CFE000
trusted library allocation
page read and write
18935670000
trusted library allocation
page read and write
1893534E000
trusted library allocation
page read and write
12C4000
heap
page read and write
18936848000
trusted library allocation
page read and write
12C4000
heap
page read and write
21A7000
heap
page read and write
12C4000
heap
page read and write
189354A0000
trusted library allocation
page read and write
18932884000
heap
page read and write
52E0000
direct allocation
page execute and read and write
18932840000
heap
page read and write
4CD1000
heap
page read and write
80CC000
stack
page read and write
1893289C000
heap
page read and write
4B81000
heap
page read and write
2FA0000
direct allocation
page read and write
18945A95000
trusted library allocation
page read and write
4771000
heap
page read and write
189317CA000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4F1000
unkown
page execute and read and write
67CF000
stack
page read and write
1B6748F1000
heap
page read and write
12C4000
heap
page read and write
1893874E000
trusted library allocation
page read and write
1893283F000
heap
page read and write
189354EE000
trusted library allocation
page read and write
1894484A000
trusted library allocation
page read and write
12C4000
heap
page read and write
18935473000
trusted library allocation
page read and write
189379D2000
trusted library allocation
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
22E17000
heap
page read and write
189317EC000
trusted library allocation
page read and write
189358F6000
trusted library allocation
page read and write
1005000
heap
page read and write
1003000
heap
page read and write
4B81000
heap
page read and write
18932853000
heap
page read and write
189325D0000
trusted library allocation
page read and write
1566000
heap
page read and write
1893285D000
heap
page read and write
18944729000
trusted library allocation
page read and write
F40000
direct allocation
page execute and read and write
6400000
heap
page read and write
189379E0000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893141E000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
18937E7E000
trusted library allocation
page read and write
18945CEE000
trusted library allocation
page read and write
18947BEB000
trusted library allocation
page read and write
1B67492D000
heap
page read and write
12C4000
heap
page read and write
22DFC000
heap
page read and write
385F000
stack
page read and write
18938798000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945A99000
trusted library allocation
page read and write
189372C6000
trusted library allocation
page read and write
18932861000
heap
page read and write
479E000
stack
page read and write
18945B43000
trusted library allocation
page read and write
189326BC000
trusted library allocation
page read and write
189317F9000
trusted library allocation
page read and write
4771000
heap
page read and write
18937DDE000
trusted library allocation
page read and write
12C5000
heap
page read and write
4B81000
heap
page read and write
1893286A000
heap
page read and write
189449D6000
trusted library allocation
page read and write
1893520F000
trusted library allocation
page read and write
22AA3000
heap
page read and write
4771000
heap
page read and write
189460E0000
trusted library allocation
page read and write
18935212000
trusted library allocation
page read and write
AFF000
unkown
page execute and read and write
4B81000
heap
page read and write
18935CFC000
trusted library allocation
page read and write
18938748000
trusted library allocation
page read and write
189362DE000
trusted library allocation
page read and write
1893285C000
heap
page read and write
189367E0000
trusted library allocation
page read and write
40DF000
stack
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
1893FB14000
trusted library allocation
page read and write
22E10000
heap
page read and write
189460DE000
trusted library allocation
page read and write
18945D2C000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
18938798000
trusted library allocation
page read and write
18932853000
heap
page read and write
335F000
stack
page read and write
18947C6B000
trusted library allocation
page read and write
18932857000
heap
page read and write
271F900A000
trusted library allocation
page read and write
189362A1000
trusted library allocation
page read and write
189356CA000
trusted library allocation
page read and write
189317DF000
trusted library allocation
page read and write
18945CCA000
trusted library allocation
page read and write
387E000
stack
page read and write
1893285C000
heap
page read and write
1894487D000
trusted library allocation
page read and write
18935444000
trusted library allocation
page read and write
22E15000
heap
page read and write
18934B72000
trusted library allocation
page read and write
18938860000
trusted library allocation
page read and write
18932853000
heap
page read and write
12C4000
heap
page read and write
189356DA000
trusted library allocation
page read and write
18935307000
trusted library allocation
page read and write
12C4000
heap
page read and write
271F8EA8000
heap
page read and write
18932890000
heap
page read and write
12C4000
heap
page read and write
18945A03000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18941AEE000
trusted library allocation
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
15D4000
heap
page read and write
1575000
heap
page read and write
18932894000
heap
page read and write
197DA1B4000
heap
page read and write
1729F300000
heap
page read and write
1893285A000
heap
page read and write
18937D75000
trusted library allocation
page read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
12C4000
heap
page read and write
1893178E000
trusted library allocation
page read and write
1893284C000
heap
page read and write
6FEE000
heap
page read and write
18936869000
trusted library allocation
page read and write
12C4000
heap
page read and write
189387C5000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354E4000
trusted library allocation
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
189353F5000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
12C5000
heap
page read and write
189328A5000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18938780000
trusted library allocation
page read and write
18932842000
heap
page read and write
1893283A000
heap
page read and write
189388DC000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
F0E000
stack
page read and write
1B674808000
heap
page read and write
189372C0000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
189364C8000
trusted library allocation
page read and write
18934BD0000
trusted library allocation
page read and write
189373D3000
trusted library allocation
page read and write
18932857000
heap
page read and write
189388CE000
trusted library allocation
page read and write
18932853000
heap
page read and write
189314E4000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
18941BD4000
trusted library allocation
page read and write
189354E4000
trusted library allocation
page read and write
4C2E000
stack
page read and write
1B674968000
heap
page read and write
18940E82000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
870000
heap
page read and write
18945CBB000
trusted library allocation
page read and write
18941AFC000
trusted library allocation
page read and write
189388DC000
trusted library allocation
page read and write
189378C8000
trusted library allocation
page read and write
30DE000
stack
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
271F8DB0000
heap
page read and write
4771000
heap
page read and write
189388A6000
trusted library allocation
page read and write
4D30000
direct allocation
page read and write
1893882B000
trusted library allocation
page read and write
18933721000
trusted library allocation
page read and write
18932886000
heap
page read and write
1893561E000
trusted library allocation
page read and write
4B81000
heap
page read and write
18932861000
heap
page read and write
1B6748E8000
heap
page read and write
F74000
heap
page read and write
22E17000
heap
page read and write
189327CF000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
12C4000
heap
page read and write
18946173000
trusted library allocation
page read and write
1893679E000
trusted library allocation
page read and write
12C4000
heap
page read and write
3DBF000
stack
page read and write
18932890000
heap
page read and write
4B81000
heap
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
1893286A000
heap
page read and write
4B81000
heap
page read and write
2530000
heap
page read and write
18945927000
trusted library allocation
page read and write
12C4000
heap
page read and write
321F000
stack
page read and write
189354A0000
trusted library allocation
page read and write
18932857000
heap
page read and write
1893284C000
heap
page read and write
2FA0000
direct allocation
page read and write
1893284E000
heap
page read and write
12C4000
heap
page read and write
22E17000
heap
page read and write
1893536F000
trusted library allocation
page read and write
18945A14000
trusted library allocation
page read and write
18945AA3000
trusted library allocation
page read and write
189352A3000
trusted library allocation
page read and write
12C4000
heap
page read and write
189354E2000
trusted library allocation
page read and write
18932850000
heap
page read and write
4CE0000
trusted library allocation
page read and write
22E13000
heap
page read and write
189460F3000
trusted library allocation
page read and write
1894110B000
trusted library allocation
page read and write
4D7F000
stack
page read and write
1893536F000
trusted library allocation
page read and write
12C4000
heap
page read and write
18938773000
trusted library allocation
page read and write
12C4000
heap
page read and write
2530000
heap
page read and write
18932842000
heap
page read and write
1893541D000
trusted library allocation
page read and write
18932617000
trusted library allocation
page read and write
18935336000
trusted library allocation
page read and write
18935639000
trusted library allocation
page read and write
327F000
stack
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
189388F0000
trusted library allocation
page read and write
18932857000
heap
page read and write
189379EF000
trusted library allocation
page read and write
1893285E000
heap
page read and write
4B81000
heap
page read and write
430E000
stack
page read and write
1B67486C000
heap
page read and write
E0F000
stack
page read and write
20634014000
trusted library allocation
page read and write
4B81000
heap
page read and write
278B000
heap
page read and write
18932861000
heap
page read and write
26FE000
heap
page read and write
18946032000
trusted library allocation
page read and write
18947BCE000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893285C000
heap
page read and write
12C4000
heap
page read and write
189364DF000
trusted library allocation
page read and write
189360AB000
trusted library allocation
page read and write
18945BE5000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893541B000
trusted library allocation
page read and write
1893289F000
heap
page read and write
FC9000
heap
page read and write
18935657000
trusted library allocation
page read and write
4B81000
heap
page read and write
271F8F00000
trusted library allocation
page read and write
4CD1000
heap
page read and write
22C30000
heap
page read and write
1554000
heap
page read and write
189460F5000
trusted library allocation
page read and write
18932861000
heap
page read and write
1894453B000
trusted library allocation
page read and write
1893288C000
heap
page read and write
18935CEA000
trusted library allocation
page read and write
2FDE000
stack
page read and write
189449D9000
trusted library allocation
page read and write
18945CF9000
trusted library allocation
page read and write
12C4000
heap
page read and write
189326BE000
trusted library allocation
page read and write
189455FC000
trusted library allocation
page read and write
1893536F000
trusted library allocation
page read and write
1893569D000
trusted library allocation
page read and write
18941AF7000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18935284000
trusted library allocation
page read and write
189470F1000
trusted library allocation
page read and write
1893789F000
trusted library allocation
page read and write
18945FE9000
trusted library allocation
page read and write
14AA000
heap
page read and write
189379DB000
trusted library allocation
page read and write
4B81000
heap
page read and write
39FF000
stack
page read and write
189354EC000
trusted library allocation
page read and write
4C7E000
stack
page read and write
D64000
heap
page read and write
189325F5000
trusted library allocation
page read and write
12C4000
heap
page read and write
1556000
heap
page read and write
1893525B000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
361E000
stack
page read and write
18937989000
trusted library allocation
page read and write
18932857000
heap
page read and write
18937D62000
trusted library allocation
page read and write
1893288D000
heap
page read and write
18932853000
heap
page read and write
18932853000
heap
page read and write
1893379C000
trusted library allocation
page read and write
18944D98000
trusted library allocation
page read and write
1893283A000
heap
page read and write
18935259000
trusted library allocation
page read and write
4771000
heap
page read and write
18935C8F000
trusted library allocation
page read and write
18932842000
heap
page read and write
4CD1000
heap
page read and write
10DF000
unkown
page execute and read and write
1893283F000
heap
page read and write
4771000
heap
page read and write
18932862000
heap
page read and write
18937DE8000
trusted library allocation
page read and write
18941197000
trusted library allocation
page read and write
4CD1000
heap
page read and write
189327D6000
trusted library allocation
page read and write
1894707F000
trusted library allocation
page read and write
189388F2000
trusted library allocation
page read and write
E11000
unkown
page execute and write copy
4E64000
heap
page read and write
12C4000
heap
page read and write
420E000
stack
page read and write
4B81000
heap
page read and write
1894601D000
trusted library allocation
page read and write
4B81000
heap
page read and write
E10000
unkown
page readonly
530000
heap
page read and write
4CD1000
heap
page read and write
189378E1000
trusted library allocation
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
18932591000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
1893284F000
heap
page read and write
12C5000
heap
page read and write
4B81000
heap
page read and write
18933768000
trusted library allocation
page read and write
12C4000
heap
page read and write
4CD1000
heap
page read and write
18935CC4000
trusted library allocation
page read and write
12A0000
direct allocation
page read and write
4D7E000
stack
page read and write
18937DA3000
trusted library allocation
page read and write
18932614000
trusted library allocation
page read and write
189354A0000
trusted library allocation
page read and write
4E2F000
stack
page read and write
18945CA5000
trusted library allocation
page read and write
18935CBE000
trusted library allocation
page read and write
1893288C000
heap
page read and write
12C4000
heap
page read and write
18937EF2000
trusted library allocation
page read and write
1893283A000
heap
page read and write
12C4000
heap
page read and write
5550000
direct allocation
page execute and read and write
18932853000
heap
page read and write
1893283A000
heap
page read and write
3050000
direct allocation
page read and write
84A2000
heap
page read and write
189362E8000
trusted library allocation
page read and write
844000
heap
page read and write
18936854000
trusted library allocation
page read and write
1893286A000
heap
page read and write
1893283F000
heap
page read and write
400000
unkown
page execute and read and write
189326F6000
trusted library allocation
page read and write
18932858000
heap
page read and write
1893FFF3000
trusted library allocation
page read and write
18945A47000
trusted library allocation
page read and write
18946032000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893787A000
trusted library allocation
page read and write
12C5000
heap
page read and write
18946D41000
trusted library allocation
page read and write
12C4000
heap
page read and write
18947079000
trusted library allocation
page read and write
189328AF000
heap
page read and write
3C6E000
stack
page read and write
12C5000
heap
page read and write
18935367000
trusted library allocation
page read and write
1893288C000
heap
page read and write
189356C4000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
18935681000
trusted library allocation
page read and write
43FF000
stack
page read and write
4140000
heap
page read and write
4B81000
heap
page read and write
18937ECE000
trusted library allocation
page read and write
189455FE000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18931740000
trusted library allocation
page read and write
189367BA000
trusted library allocation
page read and write
189387A1000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937DD7000
trusted library allocation
page read and write
1B6748EE000
heap
page read and write
12C4000
heap
page read and write
18932669000
trusted library allocation
page read and write
18946039000
trusted library allocation
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
1893283A000
heap
page read and write
18945A51000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18932890000
heap
page read and write
41BE000
stack
page read and write
18936907000
trusted library allocation
page read and write
E7B000
unkown
page execute and read and write
21A4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18941BEC000
trusted library allocation
page read and write
437F000
stack
page read and write
1893283F000
heap
page read and write
278E000
heap
page read and write
18934CFE000
trusted library allocation
page read and write
4B81000
heap
page read and write
1566000
heap
page read and write
2FC0000
heap
page read and write
18932857000
heap
page read and write
1893283F000
heap
page read and write
18932838000
heap
page read and write
18935C99000
trusted library allocation
page read and write
189360E9000
trusted library allocation
page read and write
4B3E000
stack
page read and write
189460F5000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
5170000
direct allocation
page execute and read and write
12C4000
heap
page read and write
1893284C000
heap
page read and write
189390D9000
trusted library allocation
page read and write
12B8000
unkown
page execute and read and write
18932853000
heap
page read and write
18946035000
trusted library allocation
page read and write
189317A0000
trusted library allocation
page read and write
189367AC000
trusted library allocation
page read and write
18938863000
trusted library allocation
page read and write
12C4000
heap
page read and write
6D3C000
stack
page read and write
18932840000
heap
page read and write
18937ECE000
trusted library allocation
page read and write
18944522000
trusted library allocation
page read and write
18938722000
trusted library allocation
page read and write
18932896000
heap
page read and write
18932857000
heap
page read and write
189353F5000
trusted library allocation
page read and write
874000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12A0000
direct allocation
page read and write
18946009000
trusted library allocation
page read and write
34EE000
stack
page read and write
1893289A000
heap
page read and write
18932838000
heap
page read and write
1894452D000
trusted library allocation
page read and write
18935456000
trusted library allocation
page read and write
1893283A000
heap
page read and write
18932694000
trusted library allocation
page read and write
1893286A000
heap
page read and write
1C40F000
stack
page read and write
12C4000
heap
page read and write
189325AB000
trusted library allocation
page read and write
1893629E000
trusted library allocation
page read and write
12C4000
heap
page read and write
22AA0000
heap
page read and write
3050000
direct allocation
page read and write
3ADE000
stack
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189364D6000
trusted library allocation
page read and write
189314D2000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893536F000
trusted library allocation
page read and write
189379D6000
trusted library allocation
page read and write
1894619D000
trusted library allocation
page read and write
18937987000
trusted library allocation
page read and write
18936745000
trusted library allocation
page read and write
22E31000
heap
page read and write
189390FE000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893FFB9000
trusted library allocation
page read and write
18932890000
heap
page read and write
18934BEE000
trusted library allocation
page read and write
12C4000
heap
page read and write
18934BDC000
trusted library allocation
page read and write
18934BA7000
trusted library allocation
page read and write
840000
heap
page read and write
18932842000
heap
page read and write
2410000
heap
page read and write
4CD1000
heap
page read and write
18940FEA000
trusted library allocation
page read and write
18932838000
heap
page read and write
18937D5D000
trusted library allocation
page read and write
22DFF000
heap
page read and write
189461BE000
trusted library allocation
page read and write
1893674E000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893284C000
heap
page read and write
4B81000
heap
page read and write
18946D35000
trusted library allocation
page read and write
18938875000
trusted library allocation
page read and write
18932838000
heap
page read and write
18935496000
trusted library allocation
page read and write
18932691000
trusted library allocation
page read and write
18937DC9000
trusted library allocation
page read and write
18932896000
heap
page read and write
18932842000
heap
page read and write
4F50000
direct allocation
page execute and read and write
15D4000
heap
page read and write
1893777D000
trusted library allocation
page read and write
4CE0000
direct allocation
page read and write
189451E3000
trusted library allocation
page read and write
18935333000
trusted library allocation
page read and write
278B000
heap
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
452E000
stack
page read and write
18937D30000
trusted library allocation
page read and write
F30000
direct allocation
page execute and read and write
1566000
heap
page read and write
12A0000
direct allocation
page read and write
189354E4000
trusted library allocation
page read and write
4B81000
heap
page read and write
1893283A000
heap
page read and write
1893883A000
trusted library allocation
page read and write
189388D0000
trusted library allocation
page read and write
189326AC000
trusted library allocation
page read and write
29AE000
stack
page read and write
1540000
heap
page read and write
189356A1000
trusted library allocation
page read and write
189325D0000
trusted library allocation
page read and write
18932884000
heap
page read and write
189356F4000
trusted library allocation
page read and write
12C4000
heap
page read and write
61E00000
direct allocation
page execute and read and write
18934B88000
trusted library allocation
page read and write
E79000
unkown
page write copy
1893283A000
heap
page read and write
12C4000
heap
page read and write
156B000
heap
page read and write
18932894000
heap
page read and write
1720000
heap
page read and write
3DCF050000
trusted library allocation
page execute read
18937D92000
trusted library allocation
page read and write
12C4000
heap
page read and write
19D000
stack
page read and write
189356EF000
trusted library allocation
page read and write
18932842000
heap
page read and write
325E000
stack
page read and write
189328AF000
heap
page read and write
18935CC1000
trusted library allocation
page read and write
4B81000
heap
page read and write
18945CEB000
trusted library allocation
page read and write
18937E1B000
trusted library allocation
page read and write
189352BD000
trusted library allocation
page read and write
20633FA0000
heap
page read and write
2290000
heap
page read and write
12C4000
heap
page read and write
44DE000
stack
page read and write
18932884000
heap
page read and write
18936076000
trusted library allocation
page read and write
18932861000
heap
page read and write
1894102C000
trusted library allocation
page read and write
18944228000
trusted library allocation
page read and write
12C4000
heap
page read and write
157B000
heap
page read and write
49F000
unkown
page execute and read and write
1893284E000
heap
page read and write
4CD1000
heap
page read and write
6D7E000
stack
page read and write
12C4000
heap
page read and write
18932623000
trusted library allocation
page read and write
18937D89000
trusted library allocation
page read and write
12C4000
heap
page read and write
18946042000
trusted library allocation
page read and write
2577000
heap
page read and write
18931480000
trusted library allocation
page read and write
18937E38000
trusted library allocation
page read and write
1581000
heap
page read and write
12C4000
heap
page read and write
189317E4000
trusted library allocation
page read and write
1893283A000
heap
page read and write
22E2D000
heap
page read and write
189417D5000
trusted library allocation
page read and write
406E000
stack
page read and write
18932890000
heap
page read and write
18932556000
trusted library allocation
page read and write
189378DD000
trusted library allocation
page read and write
4B81000
heap
page read and write
189316A5000
trusted library allocation
page read and write
18937D75000
trusted library allocation
page read and write
4B81000
heap
page read and write
2BD0000
heap
page read and write
18932842000
heap
page read and write
18937799000
trusted library allocation
page read and write
12C4000
heap
page read and write
101F000
heap
page read and write
1B674864000
heap
page read and write
189328AF000
heap
page read and write
189448E6000
trusted library allocation
page read and write
12C4000
heap
page read and write
4250000
heap
page read and write
189313DB000
trusted library allocation
page read and write
1575000
heap
page read and write
189379F5000
trusted library allocation
page read and write
12C5000
heap
page read and write
18932853000
heap
page read and write
28C24103000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
189354A4000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
1893784F000
trusted library allocation
page read and write
C30000
heap
page read and write
18932840000
heap
page read and write
18933409000
trusted library allocation
page read and write
18932899000
heap
page read and write
18946D5A000
trusted library allocation
page read and write
18945FEE000
trusted library allocation
page read and write
1C961000
heap
page read and write
14FE000
heap
page read and write
189460B4000
trusted library allocation
page read and write
1893285A000
heap
page read and write
18945D6B000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
189372D1000
trusted library allocation
page read and write
18932857000
heap
page read and write
18936899000
trusted library allocation
page read and write
12C4000
heap
page read and write
140E000
stack
page read and write
18932845000
heap
page read and write
A0E000
heap
page read and write
1893283F000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18935CDF000
trusted library allocation
page read and write
189367FD000
trusted library allocation
page read and write
1893536F000
trusted library allocation
page read and write
12C4000
heap
page read and write
278B000
heap
page read and write
18932842000
heap
page read and write
18946026000
trusted library allocation
page read and write
18934BC0000
trusted library allocation
page read and write
189390D9000
trusted library allocation
page read and write
12C5000
heap
page read and write
D09000
unkown
page write copy
18937EF9000
trusted library allocation
page read and write
F6F000
unkown
page execute and read and write
5300000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937E27000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932885000
heap
page read and write
2D3F000
stack
page read and write
18945B86000
trusted library allocation
page read and write
5180000
direct allocation
page execute and read and write
18945FF5000
trusted library allocation
page read and write
1893285A000
heap
page read and write
278B000
heap
page read and write
12C4000
heap
page read and write
189379D9000
trusted library allocation
page read and write
874000
heap
page read and write
34BE000
stack
page read and write
12C4000
heap
page read and write
61EB7000
direct allocation
page readonly
12C4000
heap
page read and write
18932861000
heap
page read and write
18945D6B000
trusted library allocation
page read and write
18937993000
trusted library allocation
page read and write
892000
unkown
page execute and read and write
1893536F000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18932842000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
189459EB000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
1595000
heap
page read and write
22AA0000
heap
page read and write
3050000
direct allocation
page read and write
38BF000
stack
page read and write
22E43000
heap
page read and write
189387B6000
trusted library allocation
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
18935367000
trusted library allocation
page read and write
15D4000
heap
page read and write
1893286A000
heap
page read and write
12C4000
heap
page read and write
18937D8E000
trusted library allocation
page read and write
1893285E000
heap
page read and write
4D2E000
stack
page read and write
18935205000
trusted library allocation
page read and write
18935226000
trusted library allocation
page read and write
1893560B000
trusted library allocation
page read and write
1527000
heap
page read and write
52E0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
20634010000
trusted library allocation
page read and write
189356EF000
trusted library allocation
page read and write
189367A7000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
1893521C000
trusted library allocation
page read and write
335E000
stack
page read and write
189470CB000
trusted library allocation
page read and write
189327A6000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
12C4000
heap
page read and write
189460EA000
trusted library allocation
page read and write
12C5000
heap
page read and write
12C4000
heap
page read and write
1893285C000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
1893288C000
heap
page read and write
18936520000
trusted library allocation
page read and write
874000
heap
page read and write
18941012000
trusted library allocation
page read and write
4EBF000
stack
page read and write
9B000
stack
page read and write
12C4000
heap
page read and write
18932857000
heap
page read and write
18937E71000
trusted library allocation
page read and write
18934CC0000
trusted library allocation
page read and write
18937E9C000
trusted library allocation
page read and write
18932670000
trusted library allocation
page read and write
18933208000
trusted library allocation
page read and write
6FA000
heap
page read and write
1893284D000
heap
page read and write
4B81000
heap
page read and write
189360F5000
trusted library allocation
page read and write
587000
unkown
page execute and read and write
18934BFE000
trusted library allocation
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
6AF0000
heap
page read and write
18934CC7000
trusted library allocation
page read and write
12C4000
heap
page read and write
18936854000
trusted library allocation
page read and write
4B81000
heap
page read and write
399F000
stack
page read and write
12C4000
heap
page read and write
9D0000
direct allocation
page read and write
18941B74000
trusted library allocation
page read and write
18932857000
heap
page read and write
22A75000
heap
page read and write
189460DB000
trusted library allocation
page read and write
18938EE2000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1893286A000
heap
page read and write
18932623000
trusted library allocation
page read and write
1893522B000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
18944228000
trusted library allocation
page read and write
12C4000
heap
page read and write
3D3F000
stack
page read and write
4B81000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4771000
heap
page read and write
47BF000
stack
page read and write
4771000
heap
page read and write
12C4000
heap
page read and write
4B81000
heap
page read and write
189356F9000
trusted library allocation
page read and write
1894491B000
trusted library allocation
page read and write
18937DE8000
trusted library allocation
page read and write
12C4000
heap
page read and write
18937A00000
trusted library allocation
page read and write
1893289A000
heap
page read and write
4B81000
heap
page read and write
18937D2B000
trusted library allocation
page read and write
22C63000
heap
page read and write
18934CBF000
trusted library allocation
page read and write
22A6B000
heap
page read and write
12C4000
heap
page read and write
1893283F000
heap
page read and write
18935484000
trusted library allocation
page read and write
18936823000
trusted library allocation
page read and write
1893284F000
heap
page read and write
12C5000
heap
page read and write
1540000
heap
page read and write
20634003000
trusted library allocation
page read and write
1894177D000
trusted library allocation
page read and write
18935685000
trusted library allocation
page read and write
18945C4B000
trusted library allocation
page read and write
18935394000
trusted library allocation
page read and write
18932842000
heap
page read and write
189388BE000
trusted library allocation
page read and write
FB1000
unkown
page execute and write copy
18940E70000
trusted library allocation
page read and write
1893285C000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
12C4000
heap
page read and write
B42000
unkown
page execute and write copy
18932857000
heap
page read and write
18935453000
trusted library allocation
page read and write
4B81000
heap
page read and write
6C87F000
unkown
page readonly
1893567E000
trusted library allocation
page read and write
1B67492B000
heap
page read and write
197D9E70000
heap
page read and write
1893285C000
heap
page read and write
18932698000
trusted library allocation
page read and write
4B81000
heap
page read and write
22E25000
heap
page read and write
18932857000
heap
page read and write
18945D19000
trusted library allocation
page read and write
6AFE000
heap
page read and write
12C4000
heap
page read and write
22A64000
heap
page read and write
CDA000
unkown
page execute and write copy
18935CC4000
trusted library allocation
page read and write
18932853000
heap
page read and write
1893284C000
heap
page read and write
189354FC000
trusted library allocation
page read and write
4B81000
heap
page read and write
189367E0000
trusted library allocation
page read and write
18941005000
trusted library allocation
page read and write
18944578000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893285A000
heap
page read and write
2FA0000
direct allocation
page read and write
12C4000
heap
page read and write
1893675E000
trusted library allocation
page read and write
18937D9D000
trusted library allocation
page read and write
1893283F000
heap
page read and write
9D0000
direct allocation
page read and write
E98000
unkown
page execute and read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
18946DB9000
trusted library allocation
page read and write
18932857000
heap
page read and write
12C4000
heap
page read and write
1B674860000
heap
page read and write
189350C3000
trusted library allocation
page read and write
18947BF1000
trusted library allocation
page read and write
18934C63000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
1C50F000
stack
page read and write
1893284D000
heap
page read and write
12C4000
heap
page read and write
18945D76000
trusted library allocation
page read and write
18935CDF000
trusted library allocation
page read and write
7DF000
stack
page read and write
189328A6000
heap
page read and write
12C5000
heap
page read and write
416E000
stack
page read and write
189379D2000
trusted library allocation
page read and write
12C4000
heap
page read and write
12C4000
heap
page read and write
189328AF000
heap
page read and write
2BC0000
direct allocation
page read and write
12C4000
heap
page read and write
2F074000
heap
page read and write
18945507000
trusted library allocation
page read and write
189354E4000
trusted library allocation
page read and write
48A1000
heap
page read and write
12C4000
heap
page read and write
189317FC000
trusted library allocation
page read and write
2E6F000
stack
page read and write
12C5000
heap
page read and write
18932861000
heap
page read and write
18932850000
heap
page read and write
18945D23000
trusted library allocation
page read and write
1893283A000
heap
page read and write
1893534C000
trusted library allocation
page read and write
3FDF000
stack
page read and write
1893283A000
heap
page read and write
18937DA8000
trusted library allocation
page read and write
189372AD000
trusted library allocation
page read and write
1893283A000
heap
page read and write
51085FF000
stack
page read and write
189317F9000
trusted library allocation
page read and write
1893285A000
heap
page read and write
1554000
heap
page read and write
18935696000
trusted library allocation
page read and write
12C4000
heap
page read and write
189351F0000
trusted library allocation
page read and write
4D30000
direct allocation
page read and write
26EE000
stack
page read and write
1893914C000
trusted library allocation
page read and write
D64000
heap
page read and write
1893286A000
heap
page read and write
40CE000
stack
page read and write
2BF0000
heap
page read and write
1893288C000
heap
page read and write
189354EC000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893522B000
trusted library allocation
page read and write
860000
heap
page read and write
18944871000
trusted library allocation
page read and write
1893543E000
trusted library allocation
page read and write
18937E54000
trusted library allocation
page read and write
1121000
unkown
page execute and read and write
18941093000
trusted library allocation
page read and write
3D5F000
stack
page read and write
4B81000
heap
page read and write
189328AF000
heap
page read and write
847000
heap
page read and write
189328AF000
heap
page read and write
12C4000
heap
page read and write
18937995000
trusted library allocation
page read and write
1894707C000
trusted library allocation
page read and write
18932853000
heap
page read and write
18932895000
heap
page read and write
1893283A000
heap
page read and write
18932853000
heap
page read and write
271F9000000
trusted library allocation
page read and write
1C78D000
stack
page read and write
12C4000
heap
page read and write
18932838000
heap
page read and write
12C4000
heap
page read and write
734000
heap
page read and write
12C4000
heap
page read and write
189387CB000
trusted library allocation
page read and write
18935233000
trusted library allocation
page read and write
4B81000
heap
page read and write
12C4000
heap
page read and write
18934BEF000
trusted library allocation
page read and write
189449B2000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
18937DA3000
trusted library allocation
page read and write
189388BB000
trusted library allocation
page read and write
874000
heap
page read and write
22DFA000
heap
page read and write
18932894000
heap
page read and write
18932838000
heap
page read and write
1893284C000
heap
page read and write
18935441000
trusted library allocation
page read and write
3EDE000
stack
page read and write
61ED3000
direct allocation
page read and write
189460F3000
trusted library allocation
page read and write
189328AF000
heap
page read and write
18945CD7000
trusted library allocation
page read and write
12C4000
heap
page read and write
D64000
heap
page read and write
18935486000
trusted library allocation
page read and write
18932585000
trusted library allocation
page read and write
12C4000
heap
page read and write
18945944000
trusted library allocation
page read and write
18932850000
heap
page read and write
189326C1000
trusted library allocation
page read and write
18932861000
heap
page read and write
4D41000
direct allocation
page read and write
189387A9000
trusted library allocation
page read and write
189353F5000
trusted library allocation
page read and write
189461B6000
trusted library allocation
page read and write
18937D8E000
trusted library allocation
page read and write
1B674957000
heap
page read and write
12A0000
direct allocation
page read and write
D64000
heap
page read and write
1B674929000
heap
page read and write
12C4000
heap
page read and write
18945D3E000
trusted library allocation
page read and write
12C4000
heap
page read and write
874000
heap
page read and write
189362F2000
trusted library allocation
page read and write
18934CCA000
trusted library allocation
page read and write
12C4000
heap
page read and write
1893589F000
trusted library allocation
page read and write
18937E10000
trusted library allocation
page read and write
18937E6A000
trusted library allocation
page read and write
1893283F000
heap
page read and write
189387A9000
trusted library allocation
page read and write
189367AC000
trusted library allocation
page read and write
197D9D60000
heap
page read and write
18941052000
trusted library allocation
page read and write
18937D0B000
trusted library allocation
page read and write
22C71000
heap
page read and write
18932892000
heap
page read and write
189375B9000
trusted library allocation
page read and write
18938E93000
trusted library allocation
page read and write
3ADF000
stack
page read and write
18945141000
trusted library allocation
page read and write
D64000
heap
page read and write
18934B3A000
trusted library allocation
page read and write
18935840000
trusted library allocation
page read and write
831000
unkown
page execute and write copy
5540000
direct allocation
page execute and read and write
2EAE000
stack
page read and write
6406000
heap
page read and write
18940EBE000
trusted library allocation
page read and write
1893283A000
heap
page read and write
189317EC000
trusted library allocation
page read and write
18932857000
heap
page read and write
18940EB2000
trusted library allocation
page read and write
There are 6498 hidden memdumps, click here to show them.