IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f6cf9649caee60e34e7dc846b8ef82147e12f8_864df792_3eae7e71-a0ca-454a-b251-32c63d31ac5e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\1000003002\ead6a72944.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\enter[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\PharmaciesDetection[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\buildred[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\ba77748b9b.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000025001\PharmaciesDetection.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000027001\buildred.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000028001\build2.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\447331\Buyer.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ringtones
DOS executable (COM, 0x8C-variant)
dropped
malicious
C:\Users\user\AppData\RoamingAEGIJKEHCA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingBKKFHIEGDH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BAEBGCFIEHCFIDGCAAFBFCGCAA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGCAAFHIEBKJKEBFIEHD
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\DBGHDGHCGHCAAKFIIECFHCFBFC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EGCBFIEHIEGCAAAKKKKE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBFIJJEBKEBFCBGDAEGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIDAFCAFCBKECBGCFIIJJJEBGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\JECAEHJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJEHJKJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\KJKJJEGIDBGIDGCBAFHCGCGCGD
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ba77748b9b.exe_c52996289693f72af0efe8aebf14278e62b8f65_2a85276a_1729a490-1b0b-4b14-93d9-4fdfc415ec02\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7395.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 15:57:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7480.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER74D0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCAF1.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 15:56:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCDFF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE9D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:54 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\buildred.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5aaf1d3f-b406-43c2-9eb8-f5a09597f5a4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\64179981-6bfb-48dc-9f32-6a048321eb61.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9ed43527-0b4c-427d-9ffa-121a3f44787a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66A3C758-1D20.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\00e822c6-f297-4142-bfcf-efa7729e488a.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\47d27e8d-6e3c-4dcf-9767-c5c8f3ddc3f0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\5fd672f4-d76d-492e-9c0e-697a213dd316.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\66d0befe-353a-4da5-bf98-2d7f6a81583b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\32107250-635a-465d-b6dd-3551630a06c7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\3a160f2f-6f59-4735-ab5c-12a4d281ebb0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF44c67.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13366483034970725
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\b3f8668d-d144-44c4-af87-40acbc1b04ad.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4271c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4272b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4293f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF45020.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d65f1af3-41e1-4a68-be4e-67eda4382949.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f6f1d48b-780b-4ad1-aa1d-d4291dccb5b1.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\580c62a7-9264-4dea-93d1-2092fde3e2f6.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\7366.tmp\7367.tmp\7368.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Assure
data
dropped
C:\Users\user\AppData\Local\Temp\Australian
data
dropped
C:\Users\user\AppData\Local\Temp\Backed
DIY-Thermocam raw data (Lepton 3.x), scale 21280--27861, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 0.589205
dropped
C:\Users\user\AppData\Local\Temp\Barely
data
dropped
C:\Users\user\AppData\Local\Temp\Bathroom
data
dropped
C:\Users\user\AppData\Local\Temp\Bench
data
dropped
C:\Users\user\AppData\Local\Temp\Cake
data
dropped
C:\Users\user\AppData\Local\Temp\Club
data
dropped
C:\Users\user\AppData\Local\Temp\Compile
data
dropped
C:\Users\user\AppData\Local\Temp\Consoles
data
dropped
C:\Users\user\AppData\Local\Temp\Czech
data
dropped
C:\Users\user\AppData\Local\Temp\Deborah
data
dropped
C:\Users\user\AppData\Local\Temp\Desire
data
dropped
C:\Users\user\AppData\Local\Temp\Elsewhere
data
dropped
C:\Users\user\AppData\Local\Temp\Ensemble
data
dropped
C:\Users\user\AppData\Local\Temp\Expenses
data
dropped
C:\Users\user\AppData\Local\Temp\Film
data
dropped
C:\Users\user\AppData\Local\Temp\Geographic
data
dropped
C:\Users\user\AppData\Local\Temp\Harley
data
dropped
C:\Users\user\AppData\Local\Temp\Means
data
dropped
C:\Users\user\AppData\Local\Temp\Moment
data
dropped
C:\Users\user\AppData\Local\Temp\Olive
data
dropped
C:\Users\user\AppData\Local\Temp\Provide
data
dropped
C:\Users\user\AppData\Local\Temp\Psychiatry
data
dropped
C:\Users\user\AppData\Local\Temp\Pulling
data
dropped
C:\Users\user\AppData\Local\Temp\Ranch
data
dropped
C:\Users\user\AppData\Local\Temp\Ruth
ASCII text, with very long lines (1017), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Ruth.cmd (copy)
ASCII text, with very long lines (1017), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Scout
data
dropped
C:\Users\user\AppData\Local\Temp\Stylus
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp73F3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp7452.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Turtle
data
dropped
C:\Users\user\AppData\Local\Temp\Usd
data
dropped
C:\Users\user\AppData\Local\Temp\Within
GTA2 binary mission script (SCR), Residential area (ste)
dropped
C:\Users\user\AppData\Local\Temp\f784bf58-ac45-46b9-a7fc-8f1c8349a6f9.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 14:57:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 14:57:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 14:57:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 14:57:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 14:57:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 162 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingBKKFHIEGDH.exe"
malicious
C:\Users\user\AppData\RoamingBKKFHIEGDH.exe
"C:\Users\user\AppData\RoamingBKKFHIEGDH.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingAEGIJKEHCA.exe"
malicious
C:\Users\user\AppData\RoamingAEGIJKEHCA.exe
"C:\Users\user\AppData\RoamingAEGIJKEHCA.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\ba77748b9b.exe
"C:\Users\user\AppData\Local\Temp\1000002001\ba77748b9b.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Ruth Ruth.cmd & Ruth.cmd & exit
malicious
C:\Users\user\AppData\Local\Temp\1000027001\buildred.exe
"C:\Users\user\AppData\Local\Temp\1000027001\buildred.exe"
malicious
C:\Users\user\1000003002\ead6a72944.exe
"C:\Users\user\1000003002\ead6a72944.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\7366.tmp\7367.tmp\7368.bat C:\Users\user\1000003002\ead6a72944.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000028001\build2.exe
"C:\Users\user\AppData\Local\Temp\1000028001\build2.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000002001\ba77748b9b.exe
"C:\Users\user\AppData\Local\Temp\1000002001\ba77748b9b.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 616 -s 2504
C:\Users\user\AppData\Local\Temp\1000025001\PharmaciesDetection.exe
"C:\Users\user\AppData\Local\Temp\1000025001\PharmaciesDetection.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 1040
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 --field-trial-handle=2404,i,6116549712235558753,12862378424519255312,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=2072,i,12084099025757561661,8900613295013787749,262144 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://www.youtube.com/account
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2932 --field-trial-handle=2680,i,8259539397810858714,2629132827171544738,262144 /prefetch:3
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2240 -parentBuildID 20230927232528 -prefsHandle 2124 -prefMapHandle 2140 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5bf760f3-4a16-4712-bdf3-1a7919266e26} 7092 "\\.\pipe\gecko-crash-server-pipe.7092" 26181e6b310 socket
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6684 --field-trial-handle=2680,i,8259539397810858714,2629132827171544738,262144 /prefetch:8
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://firefox.settings.services.mozilla.com/v1clearCache/this._cacheEntryPromise
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/recordsor
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
https://github.com/mozilla-services/screenshots
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881The
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
http://exslt.org/common
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
https://www.google.com/policies/privacy/resource://gre/modules/Log.sys.mjsipc:first-content-process-
unknown
http://85.28.47.31/8405906461a5200c/vcruntime140.dll;
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://www.youtube.com/accountC:
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
http://tempuri.org/Entity/Id5Response
unknown
https://www.youtube.com/account--attempting-deelevationN
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://tempuri.org/Entity/Id8Response
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
https://monitor.firefox.com/about
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://85.28.47.31/8405906461a5200c/sqlite3.dlleZ2B
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
https://screenshots.firefox.comPage
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
https://firefox-source-docs.mozilla.org/remote/Security.html
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://tempuri.org/Entity/Id19ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
http://85.28.47.31/8405906461a5200c/softokn3.dllk
unknown
http://85.28.47.31/5499d72b3a3e55be.phposition:
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
clients2.googleusercontent.com
unknown
malicious
bzib.nelreports.net
unknown
malicious
www.youtube-nocookie.com
unknown
malicious
chrome.cloudflare-dns.com
172.64.41.3
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
vaniloin.fun
104.21.72.79
ssl.bingadsedgeextension-prod-centralus.azurewebsites.net
52.153.155.231
googlehosted.l.googleusercontent.com
142.250.185.161

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.9
unknown
Portugal
malicious
185.215.113.19
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
52.153.155.231
ssl.bingadsedgeextension-prod-centralus.azurewebsites.net
United States
142.251.35.161
unknown
United States
142.250.65.163
unknown
United States
142.251.40.227
unknown
United States
152.195.19.97
unknown
United States
172.217.23.110
unknown
United States
142.251.168.84
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
142.250.185.67
unknown
United States
142.250.185.110
unknown
United States
64.233.167.84
unknown
United States
239.255.255.250
unknown
Reserved
20.75.60.91
unknown
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
104.21.72.79
vaniloin.fun
United States
127.0.0.1
unknown
unknown
There are 10 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{8bed2d34-5941-43e2-7b4c-f8419a90a4a0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ba77748b9b.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ead6a72944.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
ProgramId
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
FileId
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
LowerCaseLongPath
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
LongPathHash
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
Name
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
OriginalFileName
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
Publisher
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
Version
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
BinFileVersion
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
BinaryType
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
ProductName
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
ProductVersion
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
LinkDate
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
BinProductVersion
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
AppxPackageFullName
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
AppxPackageRelativeId
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
Size
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
Language
\REGISTRY\A\{da73b9b4-51b3-33d9-af38-789c7e502d2c}\Root\InventoryApplicationFile\ba77748b9b.exe|e226833eea39fbfb
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400F27258E3C
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66734
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66734
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66734
WindowTabManagerFileMappingId
There are 103 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3E1000
unkown
page execute and read and write
malicious
9C1000
unkown
page execute and read and write
malicious
802000
unkown
page readonly
malicious
4FB0000
direct allocation
page read and write
malicious
26D7000
heap
page read and write
malicious
51C0000
direct allocation
page read and write
malicious
A51000
unkown
page execute and read and write
malicious
52D0000
direct allocation
page read and write
malicious
27D7000
heap
page read and write
malicious
26FA000
heap
page read and write
malicious
EC1000
unkown
page execute and read and write
malicious
51A0000
direct allocation
page read and write
malicious
5430000
direct allocation
page read and write
malicious
5570000
direct allocation
page read and write
malicious
4CB0000
direct allocation
page read and write
malicious
2C37000
trusted library allocation
page read and write
malicious
EC1000
unkown
page execute and read and write
malicious
9C1000
unkown
page execute and read and write
malicious
4AF0000
direct allocation
page read and write
malicious
F80000
heap
page read and write
4C2E000
stack
page read and write
BCAD4BB000
stack
page read and write
4616FFF000
stack
page read and write
26194756000
trusted library allocation
page read and write
380E000
stack
page read and write
26191FA7000
trusted library allocation
page read and write
26193B13000
trusted library allocation
page read and write
26191FC7000
trusted library allocation
page read and write
FC4000
heap
page read and write
26190730000
trusted library allocation
page read and write
46BF000
stack
page read and write
1F16D78C000
heap
page read and write
E2D000
trusted library allocation
page execute and read and write
54E000
heap
page read and write
3B7F000
stack
page read and write
D7B7FFC000
stack
page read and write
2AE0000
heap
page read and write
4671000
heap
page read and write
26192AFC000
trusted library allocation
page read and write
9C4000
heap
page read and write
E04000
heap
page read and write
16FB000
heap
page read and write
1F16D6CC000
heap
page read and write
9C4000
heap
page read and write
1434000
heap
page read and write
28D6A000
heap
page read and write
26194BE6000
trusted library allocation
page read and write
398F000
stack
page read and write
1434000
heap
page read and write
449000
unkown
page write copy
538E000
stack
page read and write
40961FF000
stack
page read and write
32FE000
stack
page read and write
1434000
heap
page read and write
7448000
heap
page read and write
3A6F000
stack
page read and write
26192119000
trusted library allocation
page read and write
18FF000
stack
page read and write
1F170DA6000
heap
page read and write
E14000
trusted library allocation
page read and write
1F16F9A2000
heap
page read and write
56CE000
stack
page read and write
26191E5F000
trusted library allocation
page read and write
1434000
heap
page read and write
774A000
trusted library allocation
page read and write
1070000
heap
page read and write
1F16D745000
heap
page read and write
13D4000
heap
page read and write
5140000
direct allocation
page execute and read and write
6721000
heap
page read and write
3E33000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
2B2E000
stack
page read and write
44AE000
stack
page read and write
1F16D895000
direct allocation
page read and write
1F16DB00000
heap
page read and write
26192384000
trusted library allocation
page read and write
26194EE0000
trusted library allocation
page read and write
4D41000
heap
page read and write
4E40000
heap
page read and write
9C4000
heap
page read and write
22C66000
heap
page read and write
26191F69000
trusted library allocation
page read and write
13F0000
heap
page read and write
334F000
stack
page read and write
26193232000
trusted library allocation
page read and write
9C4000
heap
page read and write
1F16D745000
heap
page read and write
4671000
heap
page read and write
1F16D660000
heap
page read and write
2618F2C5000
trusted library allocation
page read and write
1F16D78C000
heap
page read and write
F90000
heap
page read and write
6A50000
trusted library allocation
page read and write
6E1000
unkown
page execute and read and write
D05000
heap
page read and write
2952000
heap
page read and write
74CE000
heap
page read and write
3EA3000
trusted library allocation
page read and write
27A6000
heap
page read and write
26181EDD000
trusted library allocation
page read and write
1C2FF000
stack
page read and write
890000
direct allocation
page read and write
22C77000
heap
page read and write
26191ED4000
trusted library allocation
page read and write
E30000
heap
page read and write
2D9B000
trusted library allocation
page read and write
1434000
heap
page read and write
435000
unkown
page read and write
26194CFB000
trusted library allocation
page read and write
1F1727E0000
direct allocation
page read and write
FC0000
direct allocation
page read and write
401000
unkown
page execute read
26193AEB000
trusted library allocation
page read and write
FC4000
heap
page read and write
26191EFB000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
5630000
direct allocation
page execute and read and write
296B000
heap
page read and write
7F4000
heap
page read and write
261936FC000
trusted library allocation
page read and write
26192A03000
trusted library allocation
page read and write
3B8F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
1F172D07000
direct allocation
page read and write
A4E000
stack
page read and write
556F000
stack
page read and write
9C4000
heap
page read and write
652A000
trusted library allocation
page read and write
22C85000
heap
page read and write
16F0000
direct allocation
page read and write
ED0000
heap
page read and write
BAE000
unkown
page execute and read and write
CB9000
unkown
page execute and read and write
26192D39000
trusted library allocation
page read and write
4D2F000
stack
page read and write
16D4000
heap
page read and write
26193B11000
trusted library allocation
page read and write
4A0E000
stack
page read and write
2618EC13000
trusted library allocation
page read and write
1F16D955000
heap
page read and write
438F000
stack
page read and write
2594A000000
trusted library allocation
page read and write
401000
unkown
page execute read
2618FD10000
trusted library allocation
page read and write
7F4000
heap
page read and write
5650000
direct allocation
page execute and read and write
26192476000
trusted library allocation
page read and write
CBC000
stack
page read and write
26192670000
trusted library allocation
page read and write
170A000
heap
page read and write
430000
heap
page read and write
BCACC3E000
stack
page read and write
FE0000
direct allocation
page read and write
261907D4000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
25E0000
heap
page read and write
1434000
heap
page read and write
6C94F000
unkown
page write copy
7F4000
heap
page read and write
26192D73000
trusted library allocation
page read and write
CB9000
unkown
page execute and read and write
26192C69000
trusted library allocation
page read and write
2619521A000
trusted library allocation
page read and write
1CAA1000
heap
page read and write
1F170826000
heap
page read and write
26194903000
trusted library allocation
page read and write
2619213D000
trusted library allocation
page read and write
9C4000
heap
page read and write
58D000
heap
page read and write
46FE000
stack
page read and write
1F16D732000
heap
page read and write
314F000
stack
page read and write
F22000
unkown
page execute and read and write
22C74000
heap
page read and write
26194C00000
trusted library allocation
page read and write
BCABC3E000
stack
page read and write
10B7000
heap
page read and write
26192ECC000
trusted library allocation
page read and write
1F16D789000
heap
page read and write
7D0E000
stack
page read and write
130BDB50000
heap
page read and write
9C000
stack
page read and write
2618FE03000
trusted library allocation
page read and write
7EE000
stack
page read and write
26191FAE000
trusted library allocation
page read and write
2C7E000
stack
page read and write
1434000
heap
page read and write
1430000
heap
page read and write
9C4000
heap
page read and write
261927F6000
trusted library allocation
page read and write
1F16D7B9000
heap
page read and write
2975000
heap
page read and write
1F16D8D4000
direct allocation
page read and write
BCABABD000
stack
page read and write
130BDC1D000
trusted library allocation
page read and write
54A1000
heap
page read and write
3E1C000
trusted library allocation
page read and write
16DB000
heap
page read and write
26192400000
trusted library allocation
page read and write
2618E68A000
trusted library allocation
page read and write
1434000
heap
page read and write
4EE000
heap
page read and write
26191F9D000
trusted library allocation
page read and write
1697000
heap
page read and write
6870000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
1434000
heap
page read and write
22C75000
heap
page read and write
4671000
heap
page read and write
FE0000
direct allocation
page read and write
5000000
trusted library allocation
page read and write
130BDA72000
trusted library allocation
page read and write
27AA000
heap
page read and write
FE0000
direct allocation
page read and write
4671000
heap
page read and write
27A8000
heap
page read and write
1F16D73F000
heap
page read and write
261927F6000
trusted library allocation
page read and write
4D41000
heap
page read and write
1694000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1434000
heap
page read and write
74F0000
heap
page read and write
1435000
heap
page read and write
3BEE000
stack
page read and write
2F73000
trusted library allocation
page read and write
22C85000
heap
page read and write
FC4000
heap
page read and write
46181FE000
stack
page read and write
9C0000
unkown
page read and write
22C92000
heap
page read and write
26181EA8000
trusted library allocation
page read and write
1434000
heap
page read and write
2E47000
heap
page read and write
26192DA7000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
22C85000
heap
page read and write
261838C3000
heap
page read and write
26191F62000
trusted library allocation
page read and write
4D41000
heap
page read and write
358E000
stack
page read and write
63E000
unkown
page execute and read and write
26194C7F000
trusted library allocation
page read and write
1434000
heap
page read and write
55AE000
stack
page read and write
1F172D00000
direct allocation
page read and write
4C50000
direct allocation
page execute and read and write
472E000
stack
page read and write
26195200000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
7F4000
heap
page read and write
35210000
heap
page read and write
BCAD57D000
stack
page read and write
261949F8000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
3CEF000
stack
page read and write
1F16D732000
heap
page read and write
26192DCF000
trusted library allocation
page read and write
4BEF000
stack
page read and write
413E000
stack
page read and write
46EF000
stack
page read and write
BCABE7B000
stack
page read and write
1434000
heap
page read and write
26193AF0000
trusted library allocation
page read and write
3E2F000
stack
page read and write
26191F6F000
trusted library allocation
page read and write
26192AF4000
trusted library allocation
page read and write
27A0000
heap
page read and write
5160000
direct allocation
page execute and read and write
488F000
stack
page read and write
3480000
direct allocation
page read and write
1673000
heap
page read and write
6638000
heap
page read and write
1F16FC28000
heap
page read and write
1434000
heap
page read and write
1420000
direct allocation
page read and write
AB9000
unkown
page read and write
26195223000
trusted library allocation
page read and write
2973000
heap
page read and write
267E000
stack
page read and write
26193B05000
trusted library allocation
page read and write
480F000
stack
page read and write
7F4000
heap
page read and write
7430000
heap
page read and write
2618EC10000
trusted library allocation
page read and write
181E000
stack
page read and write
4B0F000
stack
page read and write
1434000
heap
page read and write
2D7F000
stack
page read and write
6F0000
unkown
page execute and write copy
261920E0000
trusted library section
page readonly
F0C000
stack
page read and write
2F10000
direct allocation
page read and write
1F16D78C000
heap
page read and write
26192DFB000
trusted library allocation
page read and write
2618EB76000
trusted library allocation
page read and write
26190C03000
trusted library allocation
page read and write
1434000
heap
page read and write
26192C91000
trusted library allocation
page read and write
7F4000
heap
page read and write
3504C000
stack
page read and write
2618F26B000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
7630000
heap
page read and write
3480000
direct allocation
page read and write
30D7000
trusted library allocation
page read and write
1031000
heap
page read and write
26194E52000
trusted library allocation
page read and write
261947E4000
trusted library allocation
page read and write
26184251000
heap
page read and write
4617FFB000
stack
page read and write
26192C00000
trusted library allocation
page read and write
26193BDA000
trusted library allocation
page read and write
461000
unkown
page read and write
1434000
heap
page read and write
5026000
trusted library allocation
page read and write
16F0000
direct allocation
page read and write
43C000
unkown
page execute and read and write
BCAEE3F000
stack
page read and write
775F000
trusted library allocation
page read and write
A22000
unkown
page execute and read and write
21E0000
heap
page read and write
BCAF63E000
stack
page read and write
458F000
stack
page read and write
2618EC26000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
26192917000
trusted library allocation
page read and write
1434000
heap
page read and write
2618E77B000
trusted library allocation
page read and write
23DF000
stack
page read and write
F4B07E000
unkown
page readonly
1C7BE000
stack
page read and write
1E53ADCB000
heap
page read and write
26194D03000
trusted library allocation
page read and write
482E000
stack
page read and write
7F4000
heap
page read and write
261842A5000
heap
page read and write
2EBE000
trusted library allocation
page read and write
1F16D7A0000
heap
page read and write
13A0000
heap
page read and write
84F000
stack
page read and write
28CC0000
heap
page read and write
1434000
heap
page read and write
9C4000
heap
page read and write
11E6000
unkown
page execute and read and write
26194C17000
trusted library allocation
page read and write
2600000
direct allocation
page execute and read and write
22C52000
heap
page read and write
1824000
heap
page read and write
DEC000
stack
page read and write
7300000
heap
page read and write
2F9B000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
1F171E22000
heap
page read and write
FE0000
direct allocation
page read and write
26193B91000
trusted library allocation
page read and write
9C4000
heap
page read and write
26191FAE000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
26193B76000
trusted library allocation
page read and write
9C0000
unkown
page readonly
2619324B000
trusted library allocation
page read and write
4E41000
heap
page read and write
4671000
heap
page read and write
26194503000
trusted library allocation
page read and write
7F4000
heap
page read and write
4D41000
heap
page read and write
890000
direct allocation
page read and write
26191FDE000
trusted library allocation
page read and write
1F16F120000
remote allocation
page read and write
3090000
direct allocation
page read and write
FC0000
direct allocation
page read and write
5730000
direct allocation
page execute and read and write
2618EC7F000
trusted library allocation
page read and write
1F16D7AA000
heap
page read and write
26194AB1000
trusted library allocation
page read and write
890000
direct allocation
page read and write
2618424D000
heap
page read and write
1434000
heap
page read and write
3BCE000
stack
page read and write
1434000
heap
page read and write
1CAA1000
heap
page read and write
800000
unkown
page readonly
1434000
heap
page read and write
2619238E000
trusted library allocation
page read and write
26192DA9000
trusted library allocation
page read and write
2760000
heap
page read and write
470E000
stack
page read and write
261924CA000
trusted library allocation
page read and write
FC4000
heap
page read and write
1434000
heap
page read and write
139E000
stack
page read and write
26191F62000
trusted library allocation
page read and write
2594A150000
heap
page read and write
1434000
heap
page read and write
FC4000
heap
page read and write
F29000
unkown
page write copy
4671000
heap
page read and write
307B000
stack
page read and write
1434000
heap
page read and write
1434000
heap
page read and write
4D41000
heap
page read and write
10A6000
heap
page read and write
6537000
trusted library allocation
page read and write
5032000
trusted library allocation
page read and write
26192437000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
22C50000
heap
page read and write
26190008000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
9C5000
heap
page read and write
6200000
heap
page read and write
1F16D789000
heap
page read and write
9C4000
heap
page read and write
27AE000
heap
page read and write
28E8C921000
trusted library allocation
page execute read
5420000
direct allocation
page execute and read and write
1E539280000
heap
page read and write
46179FD000
stack
page read and write
F74000
heap
page read and write
1F16F7A0000
heap
page read and write
1434000
heap
page read and write
1F16D73F000
heap
page read and write
1C67F000
stack
page read and write
1CB7D000
stack
page read and write
1F16FDA0000
heap
page read and write
4CEE000
stack
page read and write
46A000
unkown
page execute and read and write
6C955000
unkown
page readonly
4617BFE000
stack
page read and write
671C000
stack
page read and write
BCB529F000
stack
page read and write
26194951000
trusted library allocation
page read and write
26194600000
trusted library allocation
page read and write
1C7FE000
stack
page read and write
2619521D000
trusted library allocation
page read and write
625E000
stack
page read and write
1F1731F1000
heap
page read and write
8C0000
direct allocation
page read and write
3C4E000
stack
page read and write
2BAE000
stack
page read and write
13D4000
heap
page read and write
438E000
stack
page read and write
4D41000
heap
page read and write
261927ED000
trusted library allocation
page read and write
26191FE6000
trusted library allocation
page read and write
9C4000
heap
page read and write
2618EF0B000
heap
page read and write
26192DD9000
trusted library allocation
page read and write
FC4000
heap
page read and write
E04000
heap
page read and write
4D41000
heap
page read and write
26193BF0000
trusted library allocation
page read and write
261926FE000
trusted library allocation
page read and write
47FF000
stack
page read and write
1435000
heap
page read and write
3102000
trusted library allocation
page read and write
130BDC03000
trusted library allocation
page read and write
296B000
heap
page read and write
881E000
stack
page read and write
1F1703A0000
heap
page read and write
9C4000
heap
page read and write
1F171228000
heap
page read and write
7E3D000
stack
page read and write
261936FC000
trusted library allocation
page read and write
2618EF69000
heap
page read and write
498E000
stack
page read and write
1824000
heap
page read and write
4E50000
heap
page read and write
26192DA0000
trusted library allocation
page read and write
368F000
stack
page read and write
26192503000
trusted library allocation
page read and write
22C9D000
heap
page read and write
FC0000
direct allocation
page read and write
26192CB9000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
592000
heap
page read and write
130BDA67000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
1435000
heap
page read and write
26193918000
trusted library allocation
page read and write
9C4000
heap
page read and write
BCB435E000
stack
page read and write
1F16D72C000
heap
page read and write
40989FE000
stack
page read and write
22C7D000
heap
page read and write
26195246000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
3E3C000
trusted library allocation
page read and write
E04000
heap
page read and write
7F4000
heap
page read and write
2660000
heap
page read and write
1F16D745000
heap
page read and write
6A30000
trusted library allocation
page read and write
10A5000
heap
page read and write
890000
direct allocation
page read and write
26192E54000
trusted library allocation
page read and write
4D41000
heap
page read and write
1F17059F000
heap
page read and write
2A6E000
stack
page read and write
26194D77000
trusted library allocation
page read and write
162A000
heap
page read and write
130BDC00000
trusted library allocation
page read and write
16FD000
heap
page read and write
FE0000
direct allocation
page read and write
261947F6000
trusted library allocation
page read and write
9C4000
heap
page read and write
261924A1000
trusted library allocation
page read and write
FC0000
direct allocation
page read and write
AB2000
unkown
page execute and read and write
26192788000
trusted library allocation
page read and write
1F16D735000
heap
page read and write
58D000
heap
page read and write
5180000
direct allocation
page execute and read and write
26192C7F000
trusted library allocation
page read and write
2618F100000
trusted library allocation
page read and write
62E0000
heap
page read and write
26192A56000
trusted library allocation
page read and write
26192155000
trusted library allocation
page read and write
1F16D7B7000
heap
page read and write
68F0000
trusted library allocation
page execute and read and write
480F000
stack
page read and write
1E539080000
heap
page read and write
22C7D000
heap
page read and write
E30000
heap
page read and write
26181C10000
heap
page read and write
67F5000
trusted library allocation
page read and write
4D41000
heap
page read and write
26AA000
heap
page read and write
FB0000
heap
page read and write
2619237B000
trusted library allocation
page read and write
11D8000
unkown
page execute and read and write
26192B45000
trusted library allocation
page read and write
338C000
stack
page read and write
26193228000
trusted library allocation
page read and write
86DB000
stack
page read and write
26192665000
trusted library allocation
page read and write
26191FF1000
trusted library allocation
page read and write
25949EE0000
heap
page read and write
26193B3A000
trusted library allocation
page read and write
9C0000
unkown
page read and write
F48D5E000
unkown
page readonly
1434000
heap
page read and write
26190718000
trusted library allocation
page read and write
45AF000
stack
page read and write
6DB0000
trusted library allocation
page read and write
2D00000
heap
page read and write
4617DFB000
stack
page read and write
26192AB0000
trusted library allocation
page read and write
26194900000
trusted library allocation
page read and write
2618F1E1000
trusted library allocation
page read and write
26191FC9000
trusted library allocation
page read and write
EED000
heap
page read and write
26191FCE000
trusted library allocation
page read and write
E13000
trusted library allocation
page execute and read and write
2619380D000
trusted library allocation
page read and write
40BE000
stack
page read and write
1F173FB0000
heap
page read and write
2618E660000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
26193503000
trusted library allocation
page read and write
26191FC9000
trusted library allocation
page read and write
26193523000
trusted library allocation
page read and write
1F16D735000
heap
page read and write
1434000
heap
page read and write
26193AE5000
trusted library allocation
page read and write
26184310000
trusted library allocation
page read and write
2618ECBD000
trusted library allocation
page read and write
22C77000
heap
page read and write
2618FE79000
trusted library allocation
page read and write
4671000
heap
page read and write
3CCF000
stack
page read and write
36EE000
stack
page read and write
27AE000
heap
page read and write
9C4000
heap
page read and write
26193710000
trusted library allocation
page read and write
1F16D7A1000
heap
page read and write
41AF000
stack
page read and write
7732000
trusted library allocation
page read and write
1F16D7A0000
heap
page read and write
1F16D78C000
heap
page read and write
7F4000
heap
page read and write
5221000
direct allocation
page read and write
26190768000
trusted library allocation
page read and write
7E50000
heap
page read and write
53C000
stack
page read and write
4671000
heap
page read and write
261949D5000
trusted library allocation
page read and write
581000
heap
page read and write
2619237B000
trusted library allocation
page read and write
1F16FB9E000
heap
page read and write
1F172967000
direct allocation
page read and write
26194CC8000
trusted library allocation
page read and write
470E000
stack
page read and write
9C4000
heap
page read and write
25B7000
heap
page read and write
25949F00000
trusted library allocation
page read and write
BCB455E000
stack
page read and write
9C4000
heap
page read and write
3A8E000
stack
page read and write
FC0000
direct allocation
page read and write
74F0000
heap
page read and write
CC1000
unkown
page execute and read and write
78FD000
trusted library allocation
page read and write
5710000
direct allocation
page execute and read and write
6C771000
unkown
page execute read
1F16FE22000
heap
page read and write
581000
heap
page read and write
E04000
heap
page read and write
13D4000
heap
page read and write
E00000
trusted library allocation
page read and write
26192C03000
trusted library allocation
page read and write
7735000
trusted library allocation
page read and write
2619249B000
trusted library allocation
page read and write
2618E65C000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
1F172DA7000
direct allocation
page read and write
26195214000
trusted library allocation
page read and write
42FF000
stack
page read and write
9C4000
heap
page read and write
CCF000
unkown
page execute and write copy
2618EC75000
trusted library allocation
page read and write
5620000
direct allocation
page execute and read and write
26194D73000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
4671000
heap
page read and write
2618F10C000
trusted library allocation
page read and write
505E000
trusted library allocation
page read and write
484E000
stack
page read and write
4E60000
direct allocation
page execute and read and write
26191FF1000
trusted library allocation
page read and write
2619267A000
trusted library allocation
page read and write
4671000
heap
page read and write
F70000
heap
page execute and read and write
26195231000
trusted library allocation
page read and write
10A5000
heap
page read and write
261907D6000
trusted library allocation
page read and write
26191E1A000
trusted library allocation
page read and write
26192AB0000
trusted library allocation
page read and write
1F173244000
heap
page read and write
26194BF7000
trusted library allocation
page read and write
6BDF000
stack
page read and write
9C4000
heap
page read and write
FC0000
direct allocation
page read and write
2618EBFE000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
1434000
heap
page read and write
119F000
unkown
page execute and read and write
3062000
trusted library allocation
page read and write
1F1713A0000
heap
page read and write
5340000
direct allocation
page execute and read and write
1434000
heap
page read and write
F3A000
trusted library allocation
page execute and read and write
1F17179C000
heap
page read and write
261927D2000
trusted library allocation
page read and write
4671000
heap
page read and write
9C5000
heap
page read and write
55B0000
direct allocation
page execute and read and write
7F4000
heap
page read and write
9C1000
unkown
page execute and write copy
BCAC03E000
stack
page read and write
3E9C000
trusted library allocation
page read and write
68A0000
trusted library allocation
page execute and read and write
9C4000
heap
page read and write
1F16D712000
heap
page read and write
1F16D6C0000
heap
page read and write
5A0000
heap
page read and write
401000
unkown
page execute read
170E000
heap
page read and write
F36000
trusted library allocation
page execute and read and write
35AF000
stack
page read and write
9C4000
heap
page read and write
FC4000
heap
page read and write
775A000
trusted library allocation
page read and write
5580000
direct allocation
page execute and read and write
4BCF000
stack
page read and write
2618E63C000
trusted library allocation
page read and write
7FF6C72E2000
unkown
page read and write
1A00000
direct allocation
page read and write
E00000
heap
page read and write
BCB16BD000
stack
page read and write
9C4000
heap
page read and write
3E3F000
trusted library allocation
page read and write
46EF000
stack
page read and write
26193B95000
trusted library allocation
page read and write
2618EC82000
trusted library allocation
page read and write
261947B4000
trusted library allocation
page read and write
167E000
heap
page read and write
26191E00000
trusted library allocation
page read and write
9B000
stack
page read and write
1F1727CB000
direct allocation
page read and write
7497000
heap
page read and write
4671000
heap
page read and write
FC4000
heap
page read and write
1E53ADD8000
heap
page read and write
5530000
trusted library allocation
page read and write
2619249B000
trusted library allocation
page read and write
22C7D000
heap
page read and write
3FB0000
direct allocation
page read and write
FE0000
direct allocation
page read and write
9C5000
heap
page read and write
489F000
stack
page read and write
26191EAD000
trusted library allocation
page read and write
22C73000
heap
page read and write
26194BD6000
trusted library allocation
page read and write
54BA000
heap
page read and write
22B15000
heap
page read and write
16D0000
direct allocation
page read and write
22C6D000
heap
page read and write
7D10000
trusted library allocation
page read and write
2D8F000
stack
page read and write
74E000
stack
page read and write
3077000
trusted library allocation
page read and write
26193BD1000
trusted library allocation
page read and write
1434000
heap
page read and write
310F000
stack
page read and write
E04000
heap
page read and write
1434000
heap
page read and write
33AF000
stack
page read and write
26192A26000
trusted library allocation
page read and write
40981FE000
stack
page read and write
1434000
heap
page read and write
4811000
heap
page read and write
22C93000
heap
page read and write
88D000
unkown
page execute and read and write
695F000
stack
page read and write
2630000
direct allocation
page read and write
26190500000
trusted library allocation
page read and write
1824000
heap
page read and write
546E000
stack
page read and write
4D41000
heap
page read and write
1F172BD0000
direct allocation
page read and write
4C40000
direct allocation
page execute and read and write
261924A1000
trusted library allocation
page read and write
374318104000
trusted library allocation
page read and write
26194D40000
trusted library allocation
page read and write
388E000
stack
page read and write
26191FA7000
trusted library allocation
page read and write
4671000
heap
page read and write
6D20000
trusted library allocation
page read and write
1434000
heap
page read and write
8AFE000
stack
page read and write
501E000
trusted library allocation
page read and write
6DA4000
trusted library allocation
page read and write
4616DF8000
stack
page read and write
3A4F000
stack
page read and write
7F4000
heap
page read and write
36CE000
stack
page read and write
891E000
stack
page read and write
134E000
stack
page read and write
5D10000
trusted library allocation
page read and write
7210000
heap
page read and write
1F171A2F000
heap
page read and write
1434000
heap
page read and write
26191FE2000
trusted library allocation
page read and write
26191FB8000
trusted library allocation
page read and write
2618F00C000
heap
page read and write
4671000
heap
page read and write
6C2B000
stack
page read and write
400000
unkown
page readonly
4216000
heap
page read and write
26192991000
trusted library allocation
page read and write
1CAA1000
heap
page read and write
BCB5A9F000
stack
page read and write
104F000
heap
page read and write
BCAD63F000
stack
page read and write
1F16D72C000
heap
page read and write
2F10000
direct allocation
page read and write
1824000
heap
page read and write
2DAD000
trusted library allocation
page read and write
26192200000
trusted library allocation
page read and write
2F10000
direct allocation
page read and write
1434000
heap
page read and write
300C000
stack
page read and write
53C0000
direct allocation
page execute and read and write
26181E47000
trusted library allocation
page read and write
45CE000
stack
page read and write
2619354F000
trusted library allocation
page read and write
344E000
stack
page read and write
6574000
heap
page read and write
747E000
heap
page read and write
1F16F628000
heap
page read and write
3267000
heap
page read and write
1824000
heap
page read and write
26191FBE000
trusted library allocation
page read and write
9C000
stack
page read and write
2730000
heap
page read and write
BCB351E000
stack
page read and write
581000
heap
page read and write
423000
unkown
page readonly
26194D88000
trusted library allocation
page read and write
1434000
heap
page read and write
2618E7E4000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page execute and read and write
26192259000
trusted library allocation
page read and write
16F0000
direct allocation
page read and write
FC4000
heap
page read and write
22C75000
heap
page read and write
9C4000
heap
page read and write
261927A5000
trusted library allocation
page read and write
26192384000
trusted library allocation
page read and write
26195203000
trusted library allocation
page read and write
21D0000
heap
page read and write
26192D03000
trusted library allocation
page read and write
7FF6C7041000
unkown
page execute read
26192759000
trusted library allocation
page read and write
9C4000
heap
page read and write
6D49000
heap
page read and write
26192475000
trusted library allocation
page read and write
1F1732C8000
heap
page read and write
9C4000
heap
page read and write
1F16D70B000
heap
page read and write
2618E703000
trusted library allocation
page read and write
22C5A000
heap
page read and write
222E000
stack
page read and write
261923CE000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
26193700000
trusted library allocation
page read and write
5B0000
heap
page read and write
FE0000
direct allocation
page read and write
13D5000
heap
page read and write
26192109000
trusted library allocation
page read and write
22C61000
heap
page read and write
A22000
unkown
page execute and read and write
9C4000
heap
page read and write
45AF000
stack
page read and write
56E0000
direct allocation
page execute and read and write
244C000
unkown
page readonly
2EF4A000
heap
page read and write
450E000
stack
page read and write
26193AEC000
trusted library allocation
page read and write
6D86000
trusted library allocation
page read and write
26194A00000
trusted library allocation
page read and write
1434000
heap
page read and write
4D41000
heap
page read and write
26191E7B000
trusted library allocation
page read and write
41F000
unkown
page read and write
581000
heap
page read and write
1F16DA30000
heap
page read and write
9C0000
heap
page read and write
4811000
heap
page read and write
7FF6C72CB000
unkown
page readonly
1E539170000
heap
page read and write
26192C1B000
trusted library allocation
page read and write
26192480000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
F74000
heap
page read and write
2EFE000
stack
page read and write
FE0000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
34A7000
heap
page read and write
9C4000
heap
page read and write
26194B73000
trusted library allocation
page read and write
26190C44000
trusted library allocation
page read and write
26191FBE000
trusted library allocation
page read and write
9C4000
heap
page read and write
26192256000
trusted library allocation
page read and write
1F173FA1000
heap
page read and write
130BDA6E000
trusted library allocation
page read and write
2619225C000
trusted library allocation
page read and write
1F16D789000
heap
page read and write
6800000
trusted library allocation
page read and write
4370000
heap
page read and write
16D0000
direct allocation
page read and write
22C93000
heap
page read and write
1F1732B6000
heap
page read and write
26EF000
stack
page read and write
1F16D72F000
heap
page read and write
261842B5000
heap
page read and write
4D41000
heap
page read and write
2FFE000
stack
page read and write
26194CDE000
trusted library allocation
page read and write
FC4000
heap
page read and write
4D41000
heap
page read and write
16D0000
direct allocation
page read and write
581000
heap
page read and write
4671000
heap
page read and write
2618F160000
trusted library allocation
page read and write
BCAD538000
stack
page read and write
26190709000
trusted library allocation
page read and write
1F16D7A9000
heap
page read and write
1F16D7B6000
heap
page read and write
26194CC3000
trusted library allocation
page read and write
BCABEBF000
stack
page read and write
13D4000
heap
page read and write
1F170FA0000
heap
page read and write
27AA000
heap
page read and write
16DC000
heap
page read and write
26191FA5000
trusted library allocation
page read and write
2618F1C4000
trusted library allocation
page read and write
1C48F000
stack
page read and write
26192C2E000
trusted library allocation
page read and write
49AE000
stack
page read and write
1E539190000
heap
page read and write
BCB445F000
stack
page read and write
9C4000
heap
page read and write
4E0000
heap
page read and write
4BEF000
stack
page read and write
380E000
stack
page read and write
26191E7F000
trusted library allocation
page read and write
6A9F000
stack
page read and write
26192DC1000
trusted library allocation
page read and write
26192B64000
trusted library allocation
page read and write
22C77000
heap
page read and write
26192C3C000
trusted library allocation
page read and write
2E3E000
stack
page read and write
4671000
heap
page read and write
19E000
stack
page read and write
26192DAC000
trusted library allocation
page read and write
2DCE000
stack
page read and write
26192CBD000
trusted library allocation
page read and write
436E000
stack
page read and write
61ECC000
direct allocation
page read and write
FF0000
heap
page read and write
261924A1000
trusted library allocation
page read and write
1434000
heap
page read and write
10A3000
heap
page read and write
41BF000
stack
page read and write
26192DBA000
trusted library allocation
page read and write
5350000
direct allocation
page execute and read and write
BCB06BE000
stack
page read and write
26191FA7000
trusted library allocation
page read and write
1434000
heap
page read and write
13D0000
heap
page read and write
130BDA96000
trusted library allocation
page read and write
196E000
stack
page read and write
9C4000
heap
page read and write
26192776000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
7DCE000
stack
page read and write
26192203000
trusted library allocation
page read and write
261935B3000
trusted library allocation
page read and write
26191FE2000
trusted library allocation
page read and write
26191FE2000
trusted library allocation
page read and write
8559000
heap
page read and write
1070000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1F16D7AA000
heap
page read and write
1E53940A000
trusted library allocation
page read and write
9C4000
heap
page read and write
1434000
heap
page read and write
26192521000
trusted library allocation
page read and write
26191F6E000
trusted library allocation
page read and write
2619269F000
trusted library allocation
page read and write
74EE000
heap
page read and write
37FE000
stack
page read and write
3B8F000
stack
page read and write
6300000
trusted library allocation
page execute and read and write
2619249B000
trusted library allocation
page read and write
1F1711A7000
heap
page read and write
9C4000
heap
page read and write
261935FE000
trusted library allocation
page read and write
7F4000
heap
page read and write
7350000
heap
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
4210000
heap
page read and write
1A00000
direct allocation
page read and write
7468000
heap
page read and write
22C57000
heap
page read and write
26192D4D000
trusted library allocation
page read and write
3A8E000
stack
page read and write
26193915000
trusted library allocation
page read and write
9C4000
heap
page read and write
4D41000
heap
page read and write
26192A4E000
trusted library allocation
page read and write
4E39000
stack
page read and write
7492000
heap
page read and write
5CF0000
trusted library allocation
page read and write
6607000
heap
page read and write
FC4000
heap
page read and write
3AAE000
stack
page read and write
4671000
heap
page read and write
26194E68000
trusted library allocation
page read and write
1F16D7BE000
heap
page read and write
2618FD71000
trusted library allocation
page read and write
22C77000
heap
page read and write
368F000
stack
page read and write
26194E74000
trusted library allocation
page read and write
26194C2B000
trusted library allocation
page read and write
261842B5000
heap
page read and write
25FE000
stack
page read and write
22C6E000
heap
page read and write
BCAD5BF000
stack
page read and write
2B8E000
stack
page read and write
9C4000
heap
page read and write
26192CA9000
trusted library allocation
page read and write
1F16D78C000
heap
page read and write
130BD710000
unclassified section
page readonly
1434000
heap
page read and write
40EE000
stack
page read and write
417E000
stack
page read and write
16FB000
heap
page read and write
1434000
heap
page read and write
7FF6C72BC000
unkown
page read and write
2618EBFB000
trusted library allocation
page read and write
BCABF7F000
stack
page read and write
30B7000
heap
page read and write
26192D3B000
trusted library allocation
page read and write
26194D0C000
trusted library allocation
page read and write
261936EB000
trusted library allocation
page read and write
261927BC000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
22C85000
heap
page read and write
442000
unkown
page execute and read and write
130BDACA000
trusted library allocation
page read and write
6C1D000
stack
page read and write
384F000
stack
page read and write
FC4000
heap
page read and write
2618E534000
trusted library allocation
page read and write
37BF000
stack
page read and write
1F16D735000
heap
page read and write
1F1734A0000
heap
page read and write
26191FBE000
trusted library allocation
page read and write
413F000
stack
page read and write
9C4000
heap
page read and write
2F44000
trusted library allocation
page read and write
6C75E000
unkown
page read and write
9C4000
heap
page read and write
1434000
heap
page read and write
26181F52000
unclassified section
page read and write
75E0000
heap
page read and write
2618FEAB000
trusted library allocation
page read and write
1F172028000
heap
page read and write
2619071E000
trusted library allocation
page read and write
7434000
heap
page read and write
40EE000
stack
page read and write
65A5000
heap
page read and write
7F4000
heap
page read and write
3E47000
trusted library allocation
page read and write
BCB4A1E000
stack
page read and write
9C4000
heap
page read and write
FDE000
heap
page read and write
50F0000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
EC0000
unkown
page readonly
22C6E000
heap
page read and write
4213000
heap
page read and write
41CF000
stack
page read and write
340F000
stack
page read and write
5320000
direct allocation
page execute and read and write
5E0000
heap
page read and write
4D41000
heap
page read and write
1F16D72C000
heap
page read and write
4D41000
heap
page read and write
26192380000
trusted library allocation
page read and write
3F3F000
stack
page read and write
22C77000
heap
page read and write
7755000
trusted library allocation
page read and write
88B000
unkown
page execute and read and write
2100000
heap
page read and write
4671000
heap
page read and write
7F4000
heap
page read and write
26194A13000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
2F10000
direct allocation
page read and write
26194711000
trusted library allocation
page read and write
26192D95000
trusted library allocation
page read and write
1F16D712000
heap
page read and write
74F0000
heap
page read and write
22C71000
heap
page read and write
5654000
heap
page read and write
9C4000
heap
page read and write
4FEE000
stack
page read and write
50B0000
heap
page read and write
5050000
trusted library allocation
page read and write
26193BCE000
trusted library allocation
page read and write
85A0000
heap
page read and write
356F000
stack
page read and write
4FD0000
heap
page read and write
4D41000
heap
page read and write
26194847000
trusted library allocation
page read and write
26191FA5000
trusted library allocation
page read and write
3E0F000
stack
page read and write
2618F29F000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
F4C17E000
unkown
page readonly
1420000
direct allocation
page read and write
2F3C000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
FC4000
heap
page read and write
138F000
unkown
page execute and write copy
6D41000
heap
page read and write
22C5B000
heap
page read and write
9C4000
heap
page read and write
2AE6000
heap
page read and write
F74000
heap
page read and write
2F8A000
trusted library allocation
page read and write
22C84000
heap
page read and write
26194CA2000
trusted library allocation
page read and write
26192369000
trusted library allocation
page read and write
49CF000
stack
page read and write
26BD000
heap
page execute and read and write
6A40000
trusted library allocation
page read and write
6815000
heap
page read and write
BCABBFB000
stack
page read and write
7BCE000
stack
page read and write
2EF3D000
heap
page read and write
261947DB000
trusted library allocation
page read and write
2619381C000
trusted library allocation
page read and write
244C000
unkown
page readonly
2825000
heap
page read and write
6722000
heap
page read and write
1824000
heap
page read and write
7FF6C7041000
unkown
page execute read
26191FA5000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
4671000
heap
page read and write
26192A3A000
trusted library allocation
page read and write
1C7AE000
stack
page read and write
1434000
heap
page read and write
28E8C8E1000
trusted library allocation
page execute read
26192D3B000
trusted library allocation
page read and write
26191F6F000
trusted library allocation
page read and write
26192100000
trusted library allocation
page read and write
BCB33BF000
stack
page read and write
45CE000
stack
page read and write
F74000
heap
page read and write
1F173286000
heap
page read and write
26194EEC000
trusted library allocation
page read and write
2618FE0C000
trusted library allocation
page read and write
FC0000
direct allocation
page read and write
26190C2F000
trusted library allocation
page read and write
52C0000
direct allocation
page read and write
26181F40000
trusted library section
page readonly
1F16D789000
heap
page read and write
7F4000
heap
page read and write
16BC000
heap
page read and write
4D41000
heap
page read and write
1F17062F000
heap
page read and write
6810000
heap
page read and write
37CF000
stack
page read and write
9C4000
heap
page read and write
26193B0D000
trusted library allocation
page read and write
4671000
heap
page read and write
26192DBA000
trusted library allocation
page read and write
26194501000
trusted library allocation
page read and write
261936E3000
trusted library allocation
page read and write
4671000
heap
page read and write
5110000
trusted library allocation
page execute and read and write
26181CA0000
trusted library allocation
page execute read
1F1715A6000
heap
page read and write
26191FA7000
trusted library allocation
page read and write
166F000
stack
page read and write
26194D1B000
trusted library allocation
page read and write
460F000
stack
page read and write
FE0000
direct allocation
page read and write
CD0000
unkown
page execute and write copy
26194ED4000
trusted library allocation
page read and write
2618E56D000
trusted library allocation
page read and write
16A1000
heap
page read and write
2619264E000
trusted library allocation
page read and write
2619275F000
trusted library allocation
page read and write
FC4000
heap
page read and write
63EE000
stack
page read and write
890000
direct allocation
page read and write
1F16D732000
heap
page read and write
2619274F000
trusted library allocation
page read and write
26194B59000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
130BD7D0000
heap
page read and write
5320000
direct allocation
page execute and read and write
27AB000
heap
page read and write
3090000
direct allocation
page read and write
26192392000
trusted library allocation
page read and write
1434000
heap
page read and write
10FF000
stack
page read and write
1F17002E000
heap
page read and write
5201000
direct allocation
page read and write
4B11000
heap
page read and write
22C75000
heap
page read and write
A51000
unkown
page execute and write copy
1F16D73F000
heap
page read and write
4671000
heap
page read and write
BCABB7B000
stack
page read and write
7F4000
heap
page read and write
1F172930000
heap
page read and write
26192692000
trusted library allocation
page read and write
26190C6A000
trusted library allocation
page read and write
7F4000
heap
page read and write
1F16D789000
heap
page read and write
FC0000
direct allocation
page read and write
4D41000
heap
page read and write
7F4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
2618EFBA000
heap
page read and write
2618F225000
trusted library allocation
page read and write
4671000
heap
page read and write
420000
heap
page read and write
167F000
heap
page read and write
E04000
heap
page read and write
26192140000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
330F000
stack
page read and write
D2F000
unkown
page execute and read and write
2618EFE6000
heap
page read and write
BCB4A9E000
stack
page read and write
428E000
stack
page read and write
4D41000
heap
page read and write
2618F1E5000
trusted library allocation
page read and write
2BEF000
stack
page read and write
22C7D000
heap
page read and write
9C4000
heap
page read and write
26191E3D000
trusted library allocation
page read and write
1F16D75A000
heap
page read and write
2720000
direct allocation
page read and write
31C7000
trusted library allocation
page read and write
4AEE000
stack
page read and write
2619077D000
trusted library allocation
page read and write
9C4000
heap
page read and write
4671000
heap
page read and write
4CA0000
direct allocation
page read and write
50EF000
stack
page read and write
1434000
heap
page read and write
F48D1D000
stack
page read and write
25949D90000
heap
page read and write
2F46000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
26194BDA000
trusted library allocation
page read and write
FC4000
heap
page read and write
7F0000
heap
page read and write
26192DC1000
trusted library allocation
page read and write
497E000
stack
page read and write
294A4FE04000
trusted library allocation
page read and write
26181F5F000
unclassified section
page read and write
446F000
stack
page read and write
26193B0B000
trusted library allocation
page read and write
9C4000
heap
page read and write
3EA8000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
58D000
heap
page read and write
1434000
heap
page read and write
1434000
heap
page read and write
15A18C600000
trusted library allocation
page read and write
493F000
stack
page read and write
318F000
stack
page read and write
10A5000
heap
page read and write
27AC000
heap
page read and write
2618ECAA000
trusted library allocation
page read and write
4D41000
heap
page read and write
343E000
stack
page read and write
28D81000
heap
page read and write
26191FCD000
trusted library allocation
page read and write
261924A1000
trusted library allocation
page read and write
26191FCD000
trusted library allocation
page read and write
2619320A000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
6603000
heap
page read and write
2618F1AD000
trusted library allocation
page read and write
832000
unkown
page readonly
22C6A000
heap
page read and write
5320000
direct allocation
page execute and read and write
7D6C000
stack
page read and write
26192C93000
trusted library allocation
page read and write
6D70000
trusted library allocation
page execute and read and write
ABB000
unkown
page execute and read and write
130BD8F2000
unclassified section
page read and write
1F171999000
heap
page read and write
4D41000
heap
page read and write
FE0000
direct allocation
page read and write
26184222000
heap
page read and write
530B000
stack
page read and write
9C4000
heap
page read and write
2619276A000
trusted library allocation
page read and write
26184262000
heap
page read and write
360E000
stack
page read and write
26191F62000
trusted library allocation
page read and write
26194D88000
trusted library allocation
page read and write
9C4000
heap
page read and write
1070000
heap
page read and write
2F0F000
stack
page read and write
1F16D759000
heap
page read and write
F32000
trusted library allocation
page read and write
26191FA7000
trusted library allocation
page read and write
130BDB54000
heap
page read and write
4FB0000
heap
page read and write
321E000
stack
page read and write
1434000
heap
page read and write
26181C80000
heap
page read and write
2726000
heap
page read and write
26191F6F000
trusted library allocation
page read and write
167F000
heap
page read and write
12EC000
heap
page read and write
26193215000
trusted library allocation
page read and write
4D41000
heap
page read and write
2618F1D5000
trusted library allocation
page read and write
6C770000
unkown
page readonly
7443000
heap
page read and write
11E6000
unkown
page execute and write copy
CCF000
unkown
page execute and read and write
22C75000
heap
page read and write
22C70000
heap
page read and write
6A70000
trusted library allocation
page execute and read and write
26193BE6000
trusted library allocation
page read and write
27A3000
heap
page read and write
26193546000
trusted library allocation
page read and write
22C73000
heap
page read and write
FC4000
heap
page read and write
267F000
stack
page read and write
7F4000
heap
page read and write
6645000
heap
page read and write
F1D000
unkown
page execute and read and write
26194C7A000
trusted library allocation
page read and write
472E000
stack
page read and write
25949DA9000
heap
page read and write
138D000
unkown
page execute and read and write
1A00000
direct allocation
page read and write
36AF000
stack
page read and write
9C4000
heap
page read and write
26192EF3000
trusted library allocation
page read and write
35212000
heap
page read and write
1F16D732000
heap
page read and write
7F4000
heap
page read and write
26192661000
trusted library allocation
page read and write
7F4000
heap
page read and write
2619071B000
trusted library allocation
page read and write
26192B03000
trusted library allocation
page read and write
6720000
heap
page read and write
22C75000
heap
page read and write
9C4000
heap
page read and write
22C77000
heap
page read and write
297C000
heap
page read and write
2618E798000
trusted library allocation
page read and write
26191FE2000
trusted library allocation
page read and write
BCB42DE000
stack
page read and write
6C94E000
unkown
page read and write
56B0000
direct allocation
page execute and read and write
2F10000
direct allocation
page read and write
26192D77000
trusted library allocation
page read and write
26192E01000
trusted library allocation
page read and write
1F16F210000
heap
page execute read
26193593000
trusted library allocation
page read and write
407F000
stack
page read and write
6DA0000
trusted library allocation
page read and write
4671000
heap
page read and write
7FF6C72CB000
unkown
page readonly
1434000
heap
page read and write
FE0000
direct allocation
page read and write
F4B000
trusted library allocation
page execute and read and write
46177FF000
stack
page read and write
300F000
stack
page read and write
2619238C000
trusted library allocation
page read and write
2618F2EA000
trusted library allocation
page read and write
7FF6C734B000
unkown
page readonly
7683000
heap
page read and write
413000
unkown
page readonly
FE0000
direct allocation
page read and write
7201000
heap
page read and write
D76000
unkown
page execute and write copy
7F4000
heap
page read and write
7FF6C734B000
unkown
page readonly
2619245C000
trusted library allocation
page read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
26194612000
trusted library allocation
page read and write
1620000
heap
page read and write
26193B0F000
trusted library allocation
page read and write
7F4000
heap
page read and write
26193900000
trusted library allocation
page read and write
2D07000
heap
page read and write
4D41000
heap
page read and write
E04000
heap
page read and write
26191F2B000
trusted library allocation
page read and write
192F000
stack
page read and write
3E0F000
stack
page read and write
261945DB000
trusted library allocation
page read and write
F2E000
heap
page read and write
67A0000
trusted library allocation
page read and write
10A9000
heap
page read and write
BCB343E000
stack
page read and write
BAE000
unkown
page execute and read and write
1E539280000
heap
page read and write
26192EC0000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
1F172980000
direct allocation
page read and write
C87000
unkown
page execute and read and write
2619525C000
trusted library allocation
page read and write
E6B000
unkown
page execute and read and write
6816000
heap
page read and write
26191FAE000
trusted library allocation
page read and write
27B1000
heap
page read and write
2618FE9A000
trusted library allocation
page read and write
4A0000
heap
page read and write
2619371E000
trusted library allocation
page read and write
26192463000
trusted library allocation
page read and write
6535000
trusted library allocation
page read and write
26194781000
trusted library allocation
page read and write
4D41000
heap
page read and write
4E80000
direct allocation
page execute and read and write
16A4000
heap
page read and write
400000
unkown
page readonly
3048000
trusted library allocation
page read and write
3EB8000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
FC4000
heap
page read and write
2619280D000
unclassified section
page read and write
1F172D77000
direct allocation
page read and write
9C4000
heap
page read and write
104E000
heap
page read and write
4671000
heap
page read and write
26181E30000
trusted library allocation
page read and write
36BE000
stack
page read and write
400000
unkown
page readonly
4EA0000
direct allocation
page execute and read and write
26194D65000
trusted library allocation
page read and write
2619074C000
trusted library allocation
page read and write
26191FB8000
trusted library allocation
page read and write
26192A85000
trusted library allocation
page read and write
6D1C000
stack
page read and write
26184266000
heap
page read and write
28D19000
heap
page read and write
41BE000
stack
page read and write
1F16D8DC000
direct allocation
page read and write
FC4000
heap
page read and write
4FA0000
direct allocation
page read and write
AD13AF04000
trusted library allocation
page read and write
9C4000
heap
page read and write
297C000
heap
page read and write
2618E79F000
trusted library allocation
page read and write
4D41000
heap
page read and write
2E8F000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
130BDB60000
unclassified section
page readonly
4E10000
direct allocation
page execute and read and write
26194E6A000
trusted library allocation
page read and write
BCABBBB000
stack
page read and write
42E0000
heap
page read and write
1F171821000
heap
page read and write
10C1000
unkown
page execute and read and write
261842B5000
heap
page read and write
2619239A000
trusted library allocation
page read and write
BCABE3E000
stack
page read and write
A29000
unkown
page read and write
26193568000
trusted library allocation
page read and write
26192751000
trusted library allocation
page read and write
1434000
heap
page read and write
9C4000
heap
page read and write
1F16D6F2000
heap
page read and write
26193AD9000
trusted library allocation
page read and write
22C75000
heap
page read and write
4D41000
heap
page read and write
9C4000
heap
page read and write
304F000
stack
page read and write
13FE000
stack
page read and write
1434000
heap
page read and write
2618E7F9000
trusted library allocation
page read and write
1CA7E000
stack
page read and write
BCB479C000
stack
page read and write
1E539250000
heap
page read and write
1F16D7B6000
heap
page read and write
2619473E000
trusted library allocation
page read and write
22C5B000
heap
page read and write
130BDB00000
heap
page read and write
261932BD000
trusted library allocation
page read and write
4D0F000
stack
page read and write
26192665000
trusted library allocation
page read and write
9C4000
heap
page read and write
6530000
trusted library allocation
page read and write
336F000
stack
page read and write
7F4000
heap
page read and write
840000
heap
page read and write
1F16D7A2000
heap
page read and write
26193BF2000
trusted library allocation
page read and write
FC4000
heap
page read and write
2ED9E000
stack
page read and write
4BFE000
stack
page read and write
13CE000
stack
page read and write
4D10000
heap
page read and write
3E4D000
stack
page read and write
422E000
stack
page read and write
26192DA0000
trusted library allocation
page read and write
14DF000
stack
page read and write
28E8C8D1000
trusted library allocation
page execute read
261924CA000
trusted library allocation
page read and write
28D16000
heap
page read and write
4671000
heap
page read and write
26191FA5000
trusted library allocation
page read and write
261935DF000
trusted library allocation
page read and write
1F16FA26000
heap
page read and write
74E1000
heap
page read and write
432F000
stack
page read and write
26192700000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
D7B7FFF000
stack
page read and write
5450000
direct allocation
page execute and read and write
1F16D90A000
direct allocation
page read and write
7F4000
heap
page read and write
2618FEA8000
trusted library allocation
page read and write
26190600000
trusted library allocation
page read and write
26195218000
trusted library allocation
page read and write
26194D3C000
trusted library allocation
page read and write
26194D56000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
26192790000
trusted library allocation
page read and write
55CE000
stack
page read and write
5760000
direct allocation
page execute and read and write
6A7000
unkown
page execute and read and write
64EE000
stack
page read and write
2619265E000
trusted library allocation
page read and write
26181EF2000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
26191FC9000
trusted library allocation
page read and write
FC4000
heap
page read and write
3FAE000
stack
page read and write
26191FB8000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
3A7E000
stack
page read and write
26194D4D000
trusted library allocation
page read and write
98F000
stack
page read and write
427000
unkown
page write copy
1F170C2E000
heap
page read and write
26193601000
trusted library allocation
page read and write
27AB000
heap
page read and write
4D41000
heap
page read and write
9C4000
heap
page read and write
6721000
heap
page read and write
592000
heap
page read and write
4D41000
heap
page read and write
474F000
stack
page read and write
26194A94000
trusted library allocation
page read and write
16D0000
direct allocation
page read and write
1F17102F000
heap
page read and write
2974000
heap
page read and write
51A0000
direct allocation
page execute and read and write
261947C6000
trusted library allocation
page read and write
500000
heap
page read and write
28D63000
heap
page read and write
130BD8F0000
unclassified section
page read and write
745C000
heap
page read and write
26192673000
trusted library allocation
page read and write
4CA0000
direct allocation
page read and write
297C000
heap
page read and write
26194941000
trusted library allocation
page read and write
26194CC0000
trusted library allocation
page read and write
294E000
heap
page read and write
58D000
heap
page read and write
62C000
unkown
page execute and read and write
10B6000
heap
page read and write
26192CAD000
trusted library allocation
page read and write
2618F167000
trusted library allocation
page read and write
27AB000
heap
page read and write
194000
stack
page read and write
244C000
unkown
page readonly
BCABFBE000
stack
page read and write
2618FEC3000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
311E000
trusted library allocation
page read and write
27A7000
heap
page read and write
26194200000
trusted library allocation
page read and write
4C0E000
stack
page read and write
2D0E000
heap
page read and write
3E64000
trusted library allocation
page read and write
1F0000
heap
page read and write
244C000
unkown
page readonly
2619471E000
trusted library allocation
page read and write
55D1000
direct allocation
page read and write
4373000
heap
page read and write
1F16D789000
heap
page read and write
9C4000
heap
page read and write
648F000
stack
page read and write
4671000
heap
page read and write
26190C65000
trusted library allocation
page read and write
2FA5DCF04000
trusted library allocation
page read and write
5A8000
heap
page read and write
1F16D7A7000
heap
page read and write
4E00000
direct allocation
page execute and read and write
846000
unkown
page readonly
393E000
stack
page read and write
22C75000
heap
page read and write
130BDC12000
trusted library allocation
page read and write
3CB3000
trusted library allocation
page read and write
166E000
heap
page read and write
5300000
direct allocation
page execute and read and write
4671000
heap
page read and write
297C000
heap
page read and write
5130000
direct allocation
page execute and read and write
261924CA000
trusted library allocation
page read and write
277F000
stack
page read and write
2618EC1E000
trusted library allocation
page read and write
6539000
trusted library allocation
page read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
408F000
stack
page read and write
2618E6A9000
trusted library allocation
page read and write
2619243D000
trusted library allocation
page read and write
67AB000
trusted library allocation
page read and write
4D41000
heap
page read and write
496F000
stack
page read and write
2976000
heap
page read and write
26194C54000
trusted library allocation
page read and write
1434000
heap
page read and write
26190723000
trusted library allocation
page read and write
26191F62000
trusted library allocation
page read and write
130BDC10000
trusted library allocation
page read and write
4D41000
heap
page read and write
1F16D73F000
heap
page read and write
2618FD03000
trusted library allocation
page read and write
3C0F000
stack
page read and write
1090000
heap
page read and write
9C4000
heap
page read and write
4671000
heap
page read and write
1E539259000
heap
page read and write
26191FA0000
trusted library allocation
page read and write
44CF000
stack
page read and write
BCB2ABE000
stack
page read and write
22C7D000
heap
page read and write
3A3F000
stack
page read and write
5430000
direct allocation
page execute and read and write
F497D8000
stack
page read and write
382E000
stack
page read and write
FDA000
heap
page read and write
1434000
heap
page read and write
16D0000
direct allocation
page read and write
26190734000
trusted library allocation
page read and write
13D4000
heap
page read and write
9BE000
stack
page read and write
26193819000
trusted library allocation
page read and write
BCAD5FE000
stack
page read and write
BCAFEBF000
stack
page read and write
1F16D745000
heap
page read and write
26194EFC000
trusted library allocation
page read and write
2619076C000
trusted library allocation
page read and write
5011000
direct allocation
page read and write
130BD780000
heap
page read and write
5460000
direct allocation
page execute and read and write
119F000
unkown
page execute and read and write
2ECF000
stack
page read and write
2619247B000
trusted library allocation
page read and write
1434000
heap
page read and write
2780000
heap
page read and write
26191FA7000
trusted library allocation
page read and write
C60000
heap
page read and write
7475000
heap
page read and write
FC4000
heap
page read and write
26181EE6000
trusted library allocation
page read and write
A0C000
stack
page read and write
9C4000
heap
page read and write
1C3FF000
stack
page read and write
26194D31000
trusted library allocation
page read and write
3D2E000
stack
page read and write
1F16D78C000
heap
page read and write
1F16D630000
heap
page read and write
BCAB1FF000
stack
page read and write
26192384000
trusted library allocation
page read and write
3E7D000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
4671000
heap
page read and write
447E000
stack
page read and write
22C75000
heap
page read and write
3EC2000
trusted library allocation
page read and write
9C4000
heap
page read and write
74F4000
heap
page read and write
26190822000
trusted library allocation
page read and write
26181BC0000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
1F172221000
heap
page read and write
549000
heap
page read and write
402E000
stack
page read and write
2618E6DD000
trusted library allocation
page read and write
7F4000
heap
page read and write
26190300000
trusted library allocation
page read and write
52C0000
direct allocation
page read and write
22C77000
heap
page read and write
3090000
direct allocation
page read and write
28E8C901000
trusted library allocation
page execute read
1434000
heap
page read and write
26190608000
trusted library allocation
page read and write
26192D00000
trusted library allocation
page read and write
25CE000
stack
page read and write
4D41000
heap
page read and write
BCAFE75000
stack
page read and write
10A5000
heap
page read and write
26194BD0000
trusted library allocation
page read and write
2618E687000
trusted library allocation
page read and write
4EAE000
stack
page read and write
27A9000
heap
page read and write
2618E600000
trusted library allocation
page read and write
22C69000
heap
page read and write
7FF6C72E4000
unkown
page read and write
26192DFB000
trusted library allocation
page read and write
548E000
stack
page read and write
56E0000
direct allocation
page execute and read and write
FC4000
heap
page read and write
52C0000
direct allocation
page read and write
130BDC14000
trusted library allocation
page read and write
26191FC7000
trusted library allocation
page read and write
434E000
stack
page read and write
67FB000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
6A60000
trusted library allocation
page read and write
3F7E000
stack
page read and write
EC1000
unkown
page execute and write copy
38AF000
stack
page read and write
1F16D73F000
heap
page read and write
4AAF000
stack
page read and write
7F4000
heap
page read and write
22C77000
heap
page read and write
1F16D8A3000
direct allocation
page read and write
1F173580000
heap
page read and write
133A000
stack
page read and write
27AC000
heap
page read and write
FE0000
direct allocation
page read and write
7F4000
heap
page read and write
130BDC32000
trusted library allocation
page read and write
26192C0A000
trusted library allocation
page read and write
1E53926D000
heap
page read and write
54C0000
direct allocation
page execute and read and write
3067000
trusted library allocation
page read and write
2EB3000
trusted library allocation
page read and write
3BEE000
stack
page read and write
58D000
heap
page read and write
7C0E000
stack
page read and write
2DFE000
stack
page read and write
2797000
heap
page read and write
4D41000
heap
page read and write
1F16D710000
heap
page read and write
1434000
heap
page read and write
458F000
stack
page read and write
EC0000
unkown
page readonly
FC0000
direct allocation
page read and write
16EA000
heap
page read and write
35215000
heap
page read and write
2B4F000
stack
page read and write
9C4000
heap
page read and write
26181E03000
trusted library allocation
page read and write
3E12000
trusted library allocation
page read and write
22C77000
heap
page read and write
744F000
heap
page read and write
F74000
heap
page read and write
9C4000
heap
page read and write
3CFE000
stack
page read and write
1CA3F000
stack
page read and write
1F1732AF000
heap
page read and write
1434000
heap
page read and write
E20000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
2618EC7D000
trusted library allocation
page read and write
F2B000
unkown
page execute and read and write
130BDA64000
trusted library allocation
page read and write
F74000
heap
page read and write
26193B09000
trusted library allocation
page read and write
9C4000
heap
page read and write
F29000
unkown
page write copy
4671000
heap
page read and write
22C67000
heap
page read and write
4671000
heap
page read and write
1434000
heap
page read and write
280B000
heap
page read and write
BCABFFE000
stack
page read and write
1F16D745000
heap
page read and write
31DE000
stack
page read and write
28D07000
heap
page read and write
9C4000
heap
page read and write
1F16D72C000
heap
page read and write
22D53000
heap
page read and write
7F4000
heap
page read and write
1434000
heap
page read and write
3A4F000
stack
page read and write
2F0F000
stack
page read and write
26194B43000
trusted library allocation
page read and write
1A10000
heap
page read and write
419000
unkown
page readonly
1434000
heap
page read and write
1824000
heap
page read and write
26191FA5000
trusted library allocation
page read and write
BCB446F000
stack
page read and write
4FD000
unkown
page execute and read and write
1A00000
direct allocation
page read and write
1F16F82A000
heap
page read and write
1434000
heap
page read and write
26194EF8000
trusted library allocation
page read and write
42B0000
heap
page read and write
1434000
heap
page read and write
1F16F150000
direct allocation
page read and write
1098000
heap
page read and write
478E000
stack
page read and write
CD0000
unkown
page execute and write copy
57C000
stack
page read and write
54A000
heap
page read and write
1700000
heap
page read and write
661F000
heap
page read and write
26191FBE000
trusted library allocation
page read and write
44AE000
stack
page read and write
16D3000
heap
page read and write
4671000
heap
page read and write
4D41000
heap
page read and write
433E000
stack
page read and write
22C7D000
heap
page read and write
261936CD000
trusted library allocation
page read and write
26192DA0000
trusted library allocation
page read and write
9C4000
heap
page read and write
890000
direct allocation
page read and write
7F4000
heap
page read and write
5CE000
unkown
page execute and read and write
4D1000
unkown
page execute and read and write
22C77000
heap
page read and write
2E0F000
stack
page read and write
4B10000
heap
page read and write
7F4000
heap
page read and write
2618F1A1000
trusted library allocation
page read and write
26184244000
heap
page read and write
26192380000
trusted library allocation
page read and write
1434000
heap
page read and write
26192DB8000
trusted library allocation
page read and write
6EF000
unkown
page execute and write copy
394E000
stack
page read and write
8FA000
stack
page read and write
890000
direct allocation
page read and write
26192900000
trusted library allocation
page read and write
EB0000
direct allocation
page execute and read and write
26192DFB000
trusted library allocation
page read and write
BCB2BBC000
stack
page read and write
581000
heap
page read and write
261947EB000
trusted library allocation
page read and write
4671000
heap
page read and write
1434000
heap
page read and write
BCB34DD000
stack
page read and write
26192D68000
trusted library allocation
page read and write
1F16D7B5000
heap
page read and write
67F0000
trusted library allocation
page read and write
592000
heap
page read and write
1F1731F0000
heap
page read and write
2535000
heap
page read and write
F45000
trusted library allocation
page execute and read and write
1F16D789000
heap
page read and write
417000
unkown
page read and write
2CBE000
stack
page read and write
4671000
heap
page read and write
26194C03000
trusted library allocation
page read and write
EC1000
unkown
page execute and write copy
74DE000
heap
page read and write
1C44F000
stack
page read and write
2594A007000
trusted library allocation
page read and write
4D41000
heap
page read and write
2619030A000
trusted library allocation
page read and write
261927D7000
trusted library allocation
page read and write
2618F103000
trusted library allocation
page read and write
26193B81000
trusted library allocation
page read and write
58D000
heap
page read and write
1434000
heap
page read and write
4D41000
heap
page read and write
5190000
direct allocation
page read and write
E50000
heap
page read and write
26191FBE000
trusted library allocation
page read and write
1824000
heap
page read and write
26195250000
trusted library allocation
page read and write
26192F24000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
346F000
stack
page read and write
592000
heap
page read and write
13A0000
heap
page read and write
2BF8000
heap
page read and write
4671000
heap
page read and write
430F000
stack
page read and write
3CBF000
stack
page read and write
2E60000
trusted library allocation
page read and write
26195216000
trusted library allocation
page read and write
334F000
stack
page read and write
26192DCC000
trusted library allocation
page read and write
40CE000
stack
page read and write
13D4000
heap
page read and write
2618F240000
trusted library allocation
page read and write
1F16D70B000
heap
page read and write
3EAD000
trusted library allocation
page read and write
16D0000
direct allocation
page read and write
26194D08000
trusted library allocation
page read and write
485000
heap
page read and write
1F16D75A000
heap
page read and write
40979FE000
stack
page read and write
130BD6F0000
remote allocation
page read and write
1E53ADC0000
heap
page read and write
26183870000
trusted library section
page read and write
2618EC6A000
trusted library allocation
page read and write
130BDA98000
trusted library allocation
page read and write
1434000
heap
page read and write
1C93E000
stack
page read and write
9C4000
heap
page read and write
31D6000
trusted library allocation
page read and write
270C000
heap
page read and write
22C69000
heap
page read and write
4D41000
heap
page read and write
16BC000
heap
page read and write
261842EB000
heap
page read and write
1F16F3A5000
heap
page read and write
16E5000
heap
page read and write
1F16D7B6000
heap
page read and write
1F16D7BE000
heap
page read and write
7F5E000
stack
page read and write
26191FB8000
trusted library allocation
page read and write
16D0000
direct allocation
page read and write
FE0000
direct allocation
page read and write
324E000
stack
page read and write
7F4000
heap
page read and write
34CE000
stack
page read and write
1F16D732000
heap
page read and write
261842EC000
heap
page read and write
261842EE000
heap
page read and write
22F0000
heap
page read and write
2618E7B3000
trusted library allocation
page read and write
2618FD00000
trusted library allocation
page read and write
261927D7000
trusted library allocation
page read and write
26194A80000
trusted library allocation
page read and write
427000
unkown
page write copy
85A4000
heap
page read and write
1058000
heap
page read and write
26194E00000
trusted library allocation
page read and write
CCF000
unkown
page execute and write copy
9C4000
heap
page read and write
2DAA000
trusted library allocation
page read and write
401000
unkown
page execute read
2618F2E1000
trusted library allocation
page read and write
346E000
stack
page read and write
344E000
stack
page read and write
F4C0BE000
stack
page read and write
130BDA47000
trusted library allocation
page read and write
1F173202000
heap
page read and write
9C4000
heap
page read and write
5650000
heap
page read and write
AB9000
unkown
page write copy
1F16D789000
heap
page read and write
F74000
heap
page read and write
1F16D70A000
heap
page read and write
26192D77000
trusted library allocation
page read and write
BCB3D5B000
stack
page read and write
3DD3000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
261923CE000
trusted library allocation
page read and write
26193AE7000
trusted library allocation
page read and write
855C000
heap
page read and write
5300000
direct allocation
page execute and read and write
26193565000
trusted library allocation
page read and write
40AF000
stack
page read and write
43B0000
heap
page read and write
26194E57000
trusted library allocation
page read and write
46171FF000
stack
page read and write
1F16D78C000
heap
page read and write
2F10000
direct allocation
page read and write
88E000
stack
page read and write
BCAB9FE000
stack
page read and write
1434000
heap
page read and write
3E29000
trusted library allocation
page read and write
64CE000
stack
page read and write
5130000
heap
page read and write
54E0000
direct allocation
page execute and read and write
C51000
unkown
page execute and read and write
890000
direct allocation
page read and write
261922D3000
trusted library allocation
page read and write
F74000
heap
page read and write
22C75000
heap
page read and write
11D8000
unkown
page execute and read and write
5700000
direct allocation
page execute and read and write
3DFF000
stack
page read and write
26190794000
trusted library allocation
page read and write
27A7000
heap
page read and write
30EB000
trusted library allocation
page read and write
26181E5D000
trusted library allocation
page read and write
26192463000
trusted library allocation
page read and write
1F16D89E000
direct allocation
page read and write
1434000
heap
page read and write
61F0000
heap
page read and write
E04000
heap
page read and write
2619357F000
trusted library allocation
page read and write
39AF000
stack
page read and write
4671000
heap
page read and write
E6C000
unkown
page execute and write copy
C87000
unkown
page execute and read and write
4E30000
direct allocation
page execute and read and write
4EC0000
direct allocation
page execute and read and write
2F20000
heap
page read and write
5AD000
unkown
page execute and read and write
1434000
heap
page read and write
581000
heap
page read and write
4671000
heap
page read and write
5490000
direct allocation
page execute and read and write
9C4000
heap
page read and write
3090000
direct allocation
page read and write
3107000
trusted library allocation
page read and write
1F16D789000
heap
page read and write
E3E000
heap
page read and write
3080000
heap
page read and write
6D9000
unkown
page execute and read and write
1F172805000
direct allocation
page read and write
25949EC0000
heap
page read and write
2619227D000
trusted library allocation
page read and write
26191FE6000
trusted library allocation
page read and write
9C0000
unkown
page readonly
130BDAEB000
trusted library allocation
page read and write
2AAF000
stack
page read and write
45BE000
stack
page read and write
30E4000
trusted library allocation
page read and write
50EF000
stack
page read and write
26193B83000
trusted library allocation
page read and write
26194C3A000
trusted library allocation
page read and write
78EE000
stack
page read and write
26194700000
trusted library allocation
page read and write
1C98D000
stack
page read and write
52F0000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
7F4000
heap
page read and write
394E000
stack
page read and write
4671000
heap
page read and write
3CEF000
stack
page read and write
1F16D7A9000
heap
page read and write
2618FD6C000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
9C4000
heap
page read and write
2618F299000
trusted library allocation
page read and write
26AE000
heap
page read and write
26191FB8000
trusted library allocation
page read and write
261927F6000
trusted library allocation
page read and write
2530000
heap
page read and write
1F16D8AD000
direct allocation
page read and write
638E000
stack
page read and write
26194703000
trusted library allocation
page read and write
22C5D000
heap
page read and write
9C4000
heap
page read and write
10BC000
heap
page read and write
296F000
heap
page read and write
1434000
heap
page read and write
22DE000
stack
page read and write
26192C15000
trusted library allocation
page read and write
26193200000
trusted library allocation
page read and write
4FEE000
stack
page read and write
4D3E000
stack
page read and write
9B000
stack
page read and write
1C54F000
stack
page read and write
BCAC23A000
stack
page read and write
9C4000
heap
page read and write
26192D9B000
trusted library allocation
page read and write
2618FEA8000
trusted library allocation
page read and write
11FF000
stack
page read and write
2619355C000
trusted library allocation
page read and write
26194D4F000
trusted library allocation
page read and write
261927D7000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
1F16D72F000
heap
page read and write
1F16D7A0000
heap
page read and write
5021000
trusted library allocation
page read and write
130BDAB2000
trusted library allocation
page read and write
26192380000
trusted library allocation
page read and write
26194D00000
trusted library allocation
page read and write
9C4000
heap
page read and write
26192E73000
trusted library allocation
page read and write
FAE000
stack
page read and write
3090000
direct allocation
page read and write
244C000
unkown
page readonly
19D000
stack
page read and write
5331000
direct allocation
page read and write
2F40000
heap
page read and write
2117000
heap
page read and write
482F000
stack
page read and write
2618EC66000
trusted library allocation
page read and write
4D41000
heap
page read and write
138E000
stack
page read and write
9C4000
heap
page read and write
BCAD53B000
stack
page read and write
130BDAB9000
trusted library allocation
page read and write
446F000
stack
page read and write
2618F19D000
trusted library allocation
page read and write
1F173244000
heap
page read and write
26194B61000
trusted library allocation
page read and write
1434000
heap
page read and write
9C4000
heap
page read and write
129E000
stack
page read and write
1F172E3F000
direct allocation
page read and write
26192DBA000
trusted library allocation
page read and write
1F16D73F000
heap
page read and write
56D0000
direct allocation
page execute and read and write
274D000
heap
page read and write
7F4000
heap
page read and write
26192300000
trusted library allocation
page read and write
26193A01000
trusted library allocation
page read and write
22C61000
heap
page read and write
26195211000
trusted library allocation
page read and write
F2B000
unkown
page execute and read and write
6560000
heap
page read and write
D68000
unkown
page execute and read and write
138F000
unkown
page execute and write copy
2EF8000
trusted library allocation
page read and write
BCADE3E000
stack
page read and write
16D3000
heap
page read and write
1434000
heap
page read and write
26192C65000
trusted library allocation
page read and write
58D000
heap
page read and write
1434000
heap
page read and write
26192316000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
4671000
heap
page read and write
FE0000
direct allocation
page read and write
27A7000
heap
page read and write
1F173224000
heap
page read and write
2619520F000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
2619321B000
trusted library allocation
page read and write
1E539282000
heap
page read and write
26193AC5000
trusted library allocation
page read and write
E6D000
unkown
page execute and read and write
26183860000
heap
page read and write
39CE000
stack
page read and write
25E5000
heap
page read and write
5450000
direct allocation
page execute and read and write
67B1000
trusted library allocation
page read and write
26193B7B000
trusted library allocation
page read and write
BCAFA73000
stack
page read and write
BCB41DE000
stack
page read and write
3019000
trusted library allocation
page read and write
26194A03000
trusted library allocation
page read and write
4671000
heap
page read and write
26194E37000
trusted library allocation
page read and write
26194A77000
trusted library allocation
page read and write
DD94BB04000
trusted library allocation
page read and write
2F6C000
trusted library allocation
page read and write
1434000
heap
page read and write
F70000
heap
page read and write
26191FA5000
trusted library allocation
page read and write
9C4000
heap
page read and write
1F16D73F000
heap
page read and write
2618F200000
trusted library allocation
page read and write
BCB1EBD000
stack
page read and write
261842EB000
heap
page read and write
130BDA23000
trusted library allocation
page read and write
3520C000
stack
page read and write
5090000
trusted library allocation
page read and write
26194917000
trusted library allocation
page read and write
6ADC000
stack
page read and write
1208000
trusted library allocation
page read and write
2E82000
trusted library allocation
page read and write
2C3F000
stack
page read and write
9C4000
heap
page read and write
130BDC3D000
trusted library allocation
page read and write
1F16D7A1000
heap
page read and write
E04000
heap
page read and write
26194CB5000
trusted library allocation
page read and write
338E000
stack
page read and write
27A4000
heap
page read and write
2619479A000
trusted library allocation
page read and write
615E000
stack
page read and write
26194C24000
trusted library allocation
page read and write
2618428D000
heap
page read and write
748C000
heap
page read and write
5320000
direct allocation
page execute and read and write
27AF000
heap
page read and write
4671000
heap
page read and write
2EC9000
trusted library allocation
page read and write
50F0000
heap
page read and write
22C5D000
heap
page read and write
9C4000
heap
page read and write
2619245F000
trusted library allocation
page read and write
2618E6E1000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
26194E6C000
trusted library allocation
page read and write
429E000
stack
page read and write
26191F69000
trusted library allocation
page read and write
1F173244000
heap
page read and write
530000
heap
page read and write
2F47000
heap
page read and write
F47000
trusted library allocation
page execute and read and write
26E0000
heap
page execute and read and write
2619370D000
trusted library allocation
page read and write
53B000
stack
page read and write
7FF6C7348000
unkown
page write copy
3B9F000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
1F16D78C000
heap
page read and write
27A0000
heap
page read and write
1434000
heap
page read and write
1F172399000
heap
page read and write
3D8E000
stack
page read and write
303E000
stack
page read and write
F1F000
unkown
page execute and write copy
26194607000
trusted library allocation
page read and write
2618F1F3000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
16D3000
heap
page read and write
BCB12AE000
stack
page read and write
FC0000
direct allocation
page read and write
7D80000
heap
page read and write
1F172DAF000
direct allocation
page read and write
E50000
heap
page read and write
2619249B000
trusted library allocation
page read and write
2619073B000
trusted library allocation
page read and write
130BDA0B000
trusted library allocation
page read and write
4CFF000
stack
page read and write
CAE000
stack
page read and write
130BD8FF000
unclassified section
page read and write
26191FA0000
trusted library allocation
page read and write
26181BB0000
trusted library allocation
page read and write
BCB499E000
stack
page read and write
26194C3D000
trusted library allocation
page read and write
22C93000
heap
page read and write
1C68F000
stack
page read and write
1F16D7B6000
heap
page read and write
257E000
stack
page read and write
3B0E000
stack
page read and write
5150000
trusted library allocation
page read and write
19B000
stack
page read and write
679E000
stack
page read and write
2618E66E000
trusted library allocation
page read and write
D00000
heap
page read and write
56E0000
direct allocation
page execute and read and write
BCABB3B000
stack
page read and write
2618EC00000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
1F16D72F000
heap
page read and write
1F1732CA000
heap
page read and write
261936F7000
trusted library allocation
page read and write
581000
heap
page read and write
486E000
stack
page read and write
7200000
heap
page read and write
4D41000
heap
page read and write
BCB439F000
stack
page read and write
3083000
trusted library allocation
page read and write
26190509000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
8A2E000
stack
page read and write
743D000
heap
page read and write
22C77000
heap
page read and write
4D41000
heap
page read and write
37EF000
stack
page read and write
26192ADF000
trusted library allocation
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
26194D27000
trusted library allocation
page read and write
11E7000
unkown
page execute and write copy
2619323A000
trusted library allocation
page read and write
2640003F000
trusted library allocation
page read and write
11E7000
unkown
page execute and write copy
6A90000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
261927C3000
trusted library allocation
page read and write
13DE000
stack
page read and write
1824000
heap
page read and write
3E39000
trusted library allocation
page read and write
2619010A000
trusted library allocation
page read and write
4D41000
heap
page read and write
BCACA3F000
stack
page read and write
130BDA2E000
trusted library allocation
page read and write
3E6E000
stack
page read and write
54F0000
direct allocation
page execute and read and write
26191F33000
trusted library allocation
page read and write
192000
stack
page read and write
27AD000
heap
page read and write
491F000
stack
page read and write
4671000
heap
page read and write
26194E0D000
trusted library allocation
page read and write
EBE000
stack
page read and write
2618E490000
trusted library section
page readonly
4671000
heap
page read and write
5450000
direct allocation
page execute and read and write
41CF000
stack
page read and write
413000
unkown
page readonly
5750000
direct allocation
page execute and read and write
C50000
heap
page read and write
2F85000
trusted library allocation
page read and write
4D41000
heap
page read and write
26191F88000
trusted library allocation
page read and write
1F1727DC000
direct allocation
page read and write
141E000
stack
page read and write
319F000
stack
page read and write
4811000
heap
page read and write
22C61000
heap
page read and write
4D41000
heap
page read and write
26192396000
trusted library allocation
page read and write
40CE000
stack
page read and write
104C000
heap
page read and write
FC4000
heap
page read and write
4671000
heap
page read and write
10A9000
heap
page read and write
400E000
stack
page read and write
261924CA000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
2619274B000
trusted library allocation
page read and write
9C4000
heap
page read and write
2F10000
direct allocation
page read and write
26193808000
trusted library allocation
page read and write
1F16D712000
heap
page read and write
9C4000
heap
page read and write
854C000
heap
page read and write
2618F2DE000
trusted library allocation
page read and write
2618FEE2000
trusted library allocation
page read and write
1F0000
heap
page read and write
26192E9D000
trusted library allocation
page read and write
26193803000
trusted library allocation
page read and write
1F16D7AA000
heap
page read and write
2619524E000
trusted library allocation
page read and write
1F17099E000
heap
page read and write
6C762000
unkown
page readonly
26193716000
trusted library allocation
page read and write
2F52000
trusted library allocation
page read and write
26194803000
trusted library allocation
page read and write
1F16D745000
heap
page read and write
1E539400000
trusted library allocation
page read and write
464E000
stack
page read and write
2D9E000
trusted library allocation
page read and write
130BD740000
heap
page read and write
9C4000
heap
page read and write
FC4000
heap
page read and write
354F000
stack
page read and write
194000
stack
page read and write
9C4000
heap
page read and write
4F50000
trusted library allocation
page read and write
1434000
heap
page read and write
1F16D759000
heap
page read and write
8EA000
stack
page read and write
26194E72000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
E73000
heap
page read and write
2F8F000
trusted library allocation
page read and write
400000
unkown
page readonly
26192800000
unclassified section
page read and write
7FF6C72BC000
unkown
page write copy
FC4000
heap
page read and write
26193BAA000
trusted library allocation
page read and write
F4C13E000
stack
page read and write
1824000
heap
page read and write
4D41000
heap
page read and write
16BC000
heap
page read and write
305B000
trusted library allocation
page read and write
FC4000
heap
page read and write
1820000
heap
page read and write
400000
unkown
page readonly
1C58F000
stack
page read and write
10A0000
heap
page read and write
26194C49000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
4920000
heap
page read and write
4671000
heap
page read and write
31E8000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
4E41000
heap
page read and write
1F16D78C000
heap
page read and write
3E91000
trusted library allocation
page read and write
46175FF000
stack
page read and write
26181EEE000
trusted library allocation
page read and write
16D0000
direct allocation
page read and write
10A6000
heap
page read and write
E04000
heap
page read and write
19AE000
stack
page read and write
1434000
heap
page read and write
324F000
stack
page read and write
2619391D000
trusted library allocation
page read and write
FC4000
heap
page read and write
4D41000
heap
page read and write
26194E6E000
trusted library allocation
page read and write
32CF000
stack
page read and write
6525000
trusted library allocation
page read and write
F4C07E000
unkown
page readonly
33FF000
stack
page read and write
2F10000
direct allocation
page read and write
50F1000
heap
page read and write
3090000
direct allocation
page read and write
592000
heap
page read and write
1F16D7A9000
heap
page read and write
1F1721A0000
heap
page read and write
53B0000
direct allocation
page execute and read and write
26181C00000
heap
page read and write
4F4000
unkown
page readonly
1F173FB0000
heap
page read and write
26191FE2000
trusted library allocation
page read and write
2CFE000
stack
page read and write
26194BFD000
trusted library allocation
page read and write
296B000
heap
page read and write
EDB000
heap
page read and write
9E7000
stack
page read and write
3E0000
unkown
page readonly
261945E5000
trusted library allocation
page read and write
4F1000
unkown
page execute and read and write
45ED000
stack
page read and write
1434000
heap
page read and write
13D4000
heap
page read and write
1A2B000
heap
page read and write
4D41000
heap
page read and write
26194EE3000
trusted library allocation
page read and write
2618FF00000
trusted library allocation
page read and write
1435000
heap
page read and write
4D41000
heap
page read and write
134E000
stack
page read and write
25B7000
heap
page read and write
9C4000
heap
page read and write
392F000
stack
page read and write
130BDA5D000
trusted library allocation
page read and write
444F000
stack
page read and write
1E539530000
heap
page read and write
55A0000
direct allocation
page execute and read and write
87DC000
stack
page read and write
540000
heap
page read and write
28D0D000
heap
page read and write
26192A00000
trusted library allocation
page read and write
26192DC1000
trusted library allocation
page read and write
7F4000
heap
page read and write
13D4000
heap
page read and write
6630000
heap
page read and write
78AE000
stack
page read and write
1F16D950000
heap
page read and write
93E000
stack
page read and write
26191FB8000
trusted library allocation
page read and write
9C4000
heap
page read and write
54A0000
direct allocation
page execute and read and write
4EAE000
stack
page read and write
3F8E000
stack
page read and write
4671000
heap
page read and write
9C4000
heap
page read and write
13A0000
heap
page read and write
E65000
heap
page read and write
58D000
heap
page read and write
261936EB000
trusted library allocation
page read and write
26192455000
trusted library allocation
page read and write
4D41000
heap
page read and write
669E000
stack
page read and write
1F1707A7000
heap
page read and write
BCB14BD000
stack
page read and write
2618E503000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
2618E6AD000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
4AAF000
stack
page read and write
2930000
heap
page read and write
108F000
heap
page read and write
26192AF7000
trusted library allocation
page read and write
4671000
heap
page read and write
36CE000
stack
page read and write
13D5000
heap
page read and write
502D000
trusted library allocation
page read and write
4671000
heap
page read and write
1F16D7B1000
heap
page read and write
374E000
stack
page read and write
26191F33000
trusted library allocation
page read and write
FFE000
stack
page read and write
4E30000
direct allocation
page execute and read and write
26191E2D000
trusted library allocation
page read and write
1E539300000
trusted library allocation
page read and write
67FE000
trusted library allocation
page read and write
261842C6000
heap
page read and write
4D41000
heap
page read and write
1F16D78C000
heap
page read and write
13B0000
heap
page read and write
130BDB56000
heap
page read and write
4671000
heap
page read and write
26191FCD000
trusted library allocation
page read and write
1434000
heap
page read and write
BCAF67E000
stack
page read and write
2619478C000
trusted library allocation
page read and write
261945D9000
trusted library allocation
page read and write
2618421F000
heap
page read and write
9C4000
heap
page read and write
4D41000
heap
page read and write
4E6F000
stack
page read and write
22C7D000
heap
page read and write
26194EFA000
trusted library allocation
page read and write
1F16D7A0000
heap
page read and write
2DBE000
stack
page read and write
BCB4158000
stack
page read and write
58D000
heap
page read and write
FC4000
heap
page read and write
74DA000
heap
page read and write
55D0000
direct allocation
page execute and read and write
2619245C000
trusted library allocation
page read and write
4D41000
heap
page read and write
7F4000
heap
page read and write
16DC000
heap
page read and write
74BE000
heap
page read and write
E04000
heap
page read and write
58D000
heap
page read and write
4C2E000
stack
page read and write
16D0000
direct allocation
page read and write
449000
unkown
page read and write
511000
heap
page read and write
26191FAE000
trusted library allocation
page read and write
7F4000
heap
page read and write
774F000
trusted library allocation
page read and write
4160000
heap
page read and write
26192C89000
trusted library allocation
page read and write
26191FA5000
trusted library allocation
page read and write
1434000
heap
page read and write
BCAE63E000
stack
page read and write
300F000
trusted library allocation
page read and write
26192D71000
trusted library allocation
page read and write
1F17282F000
direct allocation
page read and write
9C4000
heap
page read and write
BCAA9D8000
stack
page read and write
3BAF000
stack
page read and write
2618E598000
trusted library allocation
page read and write
4D11000
heap
page read and write
30AB000
trusted library allocation
page read and write
26193B07000
trusted library allocation
page read and write
1EF509F00000
trusted library allocation
page read and write
1C650000
heap
page read and write
9C4000
heap
page read and write
1F16FF9A000
heap
page read and write
2618F23E000
trusted library allocation
page read and write
5FDE000
stack
page read and write
FC4000
heap
page read and write
367F000
stack
page read and write
9C4000
heap
page read and write
1F173A97000
heap
page read and write
28D01000
heap
page read and write
1434000
heap
page read and write
51DE000
stack
page read and write
786E000
stack
page read and write
26192CBF000
trusted library allocation
page read and write
BCB18BD000
stack
page read and write
26195209000
trusted library allocation
page read and write
22AE000
stack
page read and write
2D85000
trusted library allocation
page read and write
2618425E000
heap
page read and write
F29000
unkown
page write copy
10BD000
heap
page read and write
420E000
stack
page read and write
26193557000
trusted library allocation
page read and write
26181B70000
heap
page read and write
1434000
heap
page read and write
261949B5000
trusted library allocation
page read and write
26192200000
trusted library allocation
page read and write
FC4000
heap
page read and write
1F172D28000
direct allocation
page read and write
427000
unkown
page write copy
4671000
heap
page read and write
26191FDE000
trusted library allocation
page read and write
EC0000
unkown
page read and write
7210000
heap
page read and write
294E000
heap
page read and write
1F173244000
heap
page read and write
4AB0000
trusted library allocation
page read and write
26190C00000
trusted library allocation
page read and write
406E000
stack
page read and write
261936F7000
trusted library allocation
page read and write
27A0000
heap
page read and write
5450000
direct allocation
page execute and read and write
1434000
heap
page read and write
26181A00000
unclassified section
page readonly
2530000
heap
page read and write
67CE000
trusted library allocation
page read and write
26194E29000
trusted library allocation
page read and write
2619238C000
trusted library allocation
page read and write
10A6000
heap
page read and write
27AE000
heap
page read and write
13AE000
heap
page read and write
55F0000
direct allocation
page execute and read and write
12E5000
heap
page read and write
2619249B000
trusted library allocation
page read and write
7F4000
heap
page read and write
FC4000
heap
page read and write
32BF000
stack
page read and write
1F16D72C000
heap
page read and write
2E97000
trusted library allocation
page read and write
3BCE000
stack
page read and write
2618FED2000
trusted library allocation
page read and write
FC4000
heap
page read and write
46173FF000
stack
page read and write
E6C000
unkown
page execute and write copy
581000
heap
page read and write
261838B0000
unclassified section
page read and write
444E000
stack
page read and write
1091000
heap
page read and write
27A9000
heap
page read and write
261927D7000
trusted library allocation
page read and write
261927D7000
trusted library allocation
page read and write
7F4000
heap
page read and write
130BDA12000
trusted library allocation
page read and write
4D41000
heap
page read and write
FC0000
direct allocation
page read and write
2619475E000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
261935C0000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
6D2C000
stack
page read and write
4A8F000
stack
page read and write
56E0000
direct allocation
page execute and read and write
9C4000
heap
page read and write
3D0E000
stack
page read and write
5060000
trusted library allocation
page read and write
3ACF000
stack
page read and write
7F4000
heap
page read and write
6D55000
heap
page read and write
26194BC3000
trusted library allocation
page read and write
4D41000
heap
page read and write
41EF000
stack
page read and write
9C5000
heap
page read and write
4BBF000
stack
page read and write
2618E7F0000
trusted library allocation
page read and write
F0B000
heap
page read and write
7AF000
stack
page read and write
3090000
direct allocation
page read and write
9C4000
heap
page read and write
37AF000
stack
page read and write
7820000
trusted library allocation
page execute and read and write
F74000
heap
page read and write
4D41000
heap
page read and write
26192D39000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
77CD000
stack
page read and write
45EE000
stack
page read and write
2618E681000
trusted library allocation
page read and write
1F16D789000
heap
page read and write
26194AA6000
trusted library allocation
page read and write
261936F7000
trusted library allocation
page read and write
11E6000
unkown
page execute and write copy
3260000
heap
page read and write
423000
unkown
page readonly
4671000
heap
page read and write
28D1F000
heap
page read and write
16D3000
heap
page read and write
1435000
heap
page read and write
1F16F42B000
heap
page read and write
2618EFE1000
heap
page read and write
26194D2E000
trusted library allocation
page read and write
1E53ADCD000
heap
page read and write
4671000
heap
page read and write
48DE000
stack
page read and write
500000
unkown
page execute and read and write
9C4000
heap
page read and write
26193241000
trusted library allocation
page read and write
26192485000
trusted library allocation
page read and write
1F172760000
direct allocation
page read and write
1F16D7B5000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
436E000
stack
page read and write
422E000
stack
page read and write
26193AFC000
trusted library allocation
page read and write
1F16D709000
heap
page read and write
BCB2B7E000
stack
page read and write
FC4000
heap
page read and write
2618F2C0000
trusted library allocation
page read and write
261935CE000
trusted library allocation
page read and write
4D41000
heap
page read and write
348C000
stack
page read and write
BCAFC74000
stack
page read and write
130BD730000
heap
page read and write
7F4000
heap
page read and write
FC4000
heap
page read and write
2619324E000
trusted library allocation
page read and write
BCABAFE000
stack
page read and write
9C4000
heap
page read and write
26194F00000
trusted library allocation
page read and write
1C78F000
stack
page read and write
1F16D789000
heap
page read and write
A2B000
unkown
page execute and read and write
2DB0000
trusted library allocation
page read and write
26192AB6000
trusted library allocation
page read and write
27A8000
heap
page read and write
27A6000
heap
page read and write
261924A1000
trusted library allocation
page read and write
27A0000
heap
page read and write
9C4000
heap
page read and write
FC4000
heap
page read and write
2EF43000
heap
page read and write
2938000
heap
page read and write
40961FA000
stack
page read and write
3050000
trusted library allocation
page read and write
2F0C000
stack
page read and write
56E0000
direct allocation
page execute and read and write
26191F9A000
trusted library allocation
page read and write
7F4000
heap
page read and write
4671000
heap
page read and write
261838C0000
heap
page read and write
2792000
heap
page read and write
1F16D745000
heap
page read and write
26191FF1000
trusted library allocation
page read and write
F29000
unkown
page read and write
261842C6000
heap
page read and write
4D11000
heap
page read and write
1434000
heap
page read and write
26194C4D000
trusted library allocation
page read and write
4D41000
heap
page read and write
5390000
direct allocation
page execute and read and write
54D0000
direct allocation
page execute and read and write
421C000
heap
page read and write
2B91000
trusted library allocation
page read and write
3D4F000
stack
page read and write
1434000
heap
page read and write
1F16D7A7000
heap
page read and write
5A7000
unkown
page execute and read and write
2D0A000
trusted library allocation
page read and write
6206000
heap
page read and write
330E000
stack
page read and write
26191F00000
trusted library allocation
page read and write
2619460B000
trusted library allocation
page read and write
1CBA0000
trusted library allocation
page read and write
26192D85000
trusted library allocation
page read and write
1F16F5A3000
heap
page read and write
13D4000
heap
page read and write
581000
heap
page read and write
130E000
stack
page read and write
10A5000
heap
page read and write
1F172870000
direct allocation
page read and write
40A0000
heap
page read and write
3E4E000
stack
page read and write
408000
unkown
page readonly
22C75000
heap
page read and write
493000
unkown
page execute and read and write
31BF000
stack
page read and write
1434000
heap
page read and write
5780000
direct allocation
page execute and read and write
A2B000
unkown
page execute and read and write
FC4000
heap
page read and write
26195253000
trusted library allocation
page read and write
2618E571000
trusted library allocation
page read and write
2618E54A000
trusted library allocation
page read and write
26193703000
trusted library allocation
page read and write
E04000
heap
page read and write
26191FE6000
trusted library allocation
page read and write
43CE000
stack
page read and write
890000
direct allocation
page read and write
1CBA9000
heap
page read and write
4D41000
heap
page read and write
27A3000
heap
page read and write
261924A1000
trusted library allocation
page read and write
1F16D70B000
heap
page read and write
4220000
heap
page read and write
7FCA0000
trusted library allocation
page execute and read and write
9C4000
heap
page read and write
6C74D000
unkown
page readonly
496F000
stack
page read and write
F29000
unkown
page read and write
1434000
heap
page read and write
296E000
heap
page read and write
88C000
unkown
page execute and write copy
6520000
trusted library allocation
page read and write
890000
direct allocation
page read and write
28D03000
heap
page read and write
4671000
heap
page read and write
1434000
heap
page read and write
2618E79C000
trusted library allocation
page read and write
26192767000
trusted library allocation
page read and write
1F172A20000
direct allocation
page read and write
1A1B000
heap
page read and write
1F16D78C000
heap
page read and write
6C6D1000
unkown
page execute read
25949DA0000
heap
page read and write
4D41000
heap
page read and write
2618F1D7000
trusted library allocation
page read and write
1F16D70B000
heap
page read and write
2618EC26000
trusted library allocation
page read and write
3E4C000
trusted library allocation
page read and write
26181BE0000
heap
page readonly
22C9D000
heap
page read and write
BCB44DE000
stack
page read and write
2619238A000
trusted library allocation
page read and write
2618FE00000
trusted library allocation
page read and write
9C4000
heap
page read and write
9C5000
heap
page read and write
1F172969000
direct allocation
page read and write
1434000
heap
page read and write
1434000
heap
page read and write
417000
unkown
page write copy
1F16D78C000
heap
page read and write
1434000
heap
page read and write
26192369000
trusted library allocation
page read and write
1824000
heap
page read and write
457F000
stack
page read and write
2618EC15000
trusted library allocation
page read and write
1F16D712000
heap
page read and write
11E6000
unkown
page execute and read and write
1434000
heap
page read and write
7459000
heap
page read and write
7748000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
19E000
stack
page read and write
22C92000
heap
page read and write
58D000
heap
page read and write
CC1000
unkown
page execute and read and write
26192802000
unclassified section
page read and write
FE0000
direct allocation
page read and write
5590000
direct allocation
page execute and read and write
1F16D8BB000
direct allocation
page read and write
1097000
heap
page read and write
942E000
stack
page read and write
4A7F000
stack
page read and write
1F16D7BE000
heap
page read and write
1C88E000
stack
page read and write
26193AF0000
trusted library allocation
page read and write
261927CF000
trusted library allocation
page read and write
22BB6000
heap
page read and write
1CA3E000
stack
page read and write
26193582000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
F60000
trusted library allocation
page read and write
CFE000
stack
page read and write
BCAD47E000
stack
page read and write
130BD760000
heap
page read and write
26192D8D000
trusted library allocation
page read and write
25B5000
heap
page read and write
123B000
stack
page read and write
26194B9E000
trusted library allocation
page read and write
6EF000
unkown
page execute and read and write
890000
direct allocation
page read and write
4671000
heap
page read and write
4950000
heap
page read and write
624E000
stack
page read and write
4671000
heap
page read and write
26192603000
trusted library allocation
page read and write
22C69000
heap
page read and write
1434000
heap
page read and write
9C4000
heap
page read and write
2619471C000
trusted library allocation
page read and write
443F000
stack
page read and write
26181E68000
trusted library allocation
page read and write
26194786000
trusted library allocation
page read and write
665A000
heap
page read and write
26183850000
trusted library section
page readonly
5065000
trusted library allocation
page read and write
2618EFE3000
heap
page read and write
1434000
heap
page read and write
26A0000
heap
page read and write
4E3F000
stack
page read and write
354F000
stack
page read and write
4671000
heap
page read and write
6D90000
trusted library allocation
page read and write
2EF35000
heap
page read and write
3090000
direct allocation
page read and write
26192C72000
trusted library allocation
page read and write
1C6BE000
stack
page read and write
1F16F22D000
heap
page read and write
6205000
heap
page read and write
130BDA10000
trusted library allocation
page read and write
6C6D0000
unkown
page readonly
5CF8000
trusted library allocation
page read and write
4D41000
heap
page read and write
26192D4D000
trusted library allocation
page read and write
8530000
heap
page read and write
26191F97000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
26D7000
heap
page read and write
26191D70000
trusted library section
page readonly
2618E7A5000
trusted library allocation
page read and write
26194742000
trusted library allocation
page read and write
2619248B000
trusted library allocation
page read and write
1F16D8C2000
direct allocation
page read and write
9C4000
heap
page read and write
BCB431E000
stack
page read and write
9C4000
heap
page read and write
1434000
heap
page read and write
2618EAE0000
trusted library section
page readonly
353F000
stack
page read and write
390F000
stack
page read and write
2618E66C000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
1434000
heap
page read and write
1F172D9F000
direct allocation
page read and write
4FA0000
direct allocation
page read and write
26191FB8000
trusted library allocation
page read and write
14FD000
heap
page read and write
74FA000
heap
page read and write
BCB425E000
stack
page read and write
19F0000
heap
page read and write
2618E667000
trusted library allocation
page read and write
2618F1B2000
trusted library allocation
page read and write
26192703000
trusted library allocation
page read and write
3E30000
trusted library allocation
page read and write
EF7000
heap
page read and write
1F170B9F000
heap
page read and write
50F1000
heap
page read and write
1C8FE000
stack
page read and write
22C7C000
heap
page read and write
1F173224000
heap
page read and write
2619076F000
trusted library allocation
page read and write
26191FBE000
trusted library allocation
page read and write
2618F2CC000
trusted library allocation
page read and write
4671000
heap
page read and write
1434000
heap
page read and write
3E3E000
stack
page read and write
2BF0000
heap
page read and write
2618F1BA000
trusted library allocation
page read and write
4D41000
heap
page read and write
6C90F000
unkown
page readonly
26193256000
trusted library allocation
page read and write
22C69000
heap
page read and write
10C1000
unkown
page execute and read and write
1434000
heap
page read and write
2618F1B7000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
52DF000
stack
page read and write
261842EB000
heap
page read and write
26192EF9000
trusted library allocation
page read and write
6D99000
trusted library allocation
page read and write
26192C33000
trusted library allocation
page read and write
1434000
heap
page read and write
FE0000
direct allocation
page read and write
294F000
heap
page read and write
42AF000
stack
page read and write
9C4000
heap
page read and write
26190C89000
trusted library allocation
page read and write
27A9000
heap
page read and write
2618E581000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
22C77000
heap
page read and write
358E000
stack
page read and write
22C77000
heap
page read and write
4D41000
heap
page read and write
26192303000
trusted library allocation
page read and write
1434000
heap
page read and write
408F000
stack
page read and write
FC0000
direct allocation
page read and write
26194D54000
trusted library allocation
page read and write
26192AEE000
trusted library allocation
page read and write
38FF000
stack
page read and write
2EA2000
trusted library allocation
page read and write
4E41000
heap
page read and write
9C4000
heap
page read and write
261924A1000
trusted library allocation
page read and write
26192D2C000
trusted library allocation
page read and write
2618EB00000
trusted library allocation
page read and write
601E000
stack
page read and write
10A5000
heap
page read and write
6ADE000
stack
page read and write
6D25000
trusted library allocation
page read and write
9C4000
heap
page read and write
1F172CE8000
direct allocation
page read and write
1F16D7BA000
heap
page read and write
40AF000
stack
page read and write
26193A03000
trusted library allocation
page read and write
13D4000
heap
page read and write
1F16D745000
heap
page read and write
5133000
heap
page read and write
1F1732C9000
heap
page read and write
6A20000
trusted library allocation
page read and write
26193271000
trusted library allocation
page read and write
261926F3000
trusted library allocation
page read and write
FC4000
heap
page read and write
BCB419E000
stack
page read and write
49F000
unkown
page execute and read and write
1C93E000
stack
page read and write
1434000
heap
page read and write
130BDAC8000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
2C8C000
trusted library allocation
page read and write
4D41000
heap
page read and write
26195221000
trusted library allocation
page read and write
2680000
heap
page read and write
4671000
heap
page read and write
2C8E000
stack
page read and write
41EE000
stack
page read and write
74E6000
heap
page read and write
2618FE80000
trusted library allocation
page read and write
5004000
trusted library allocation
page read and write
FC4000
heap
page read and write
26181A80000
heap
page read and write
261842C6000
heap
page read and write
2619077A000
trusted library allocation
page read and write
22C77000
heap
page read and write
1F172CD6000
direct allocation
page read and write
E6B000
unkown
page execute and read and write
E10000
trusted library allocation
page read and write
26192600000
trusted library allocation
page read and write
26191F88000
trusted library allocation
page read and write
261945F9000
trusted library allocation
page read and write
261926FB000
trusted library allocation
page read and write
5740000
direct allocation
page execute and read and write
130BDD00000
heap
page read and write
2619249B000
trusted library allocation
page read and write
3E70000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
26F9000
heap
page read and write
9C4000
heap
page read and write
4D6E000
stack
page read and write
3021000
trusted library allocation
page read and write
2619268B000
trusted library allocation
page read and write
F42000
trusted library allocation
page read and write
26192485000
trusted library allocation
page read and write
130BDA5B000
trusted library allocation
page read and write
A29000
unkown
page write copy
31BC000
trusted library allocation
page read and write
EAE000
stack
page read and write
2A4E000
stack
page read and write
7F4000
heap
page read and write
2618ED00000
trusted library allocation
page read and write
26194615000
trusted library allocation
page read and write
26193C22000
trusted library allocation
page read and write
9C4000
heap
page read and write
5380000
direct allocation
page execute and read and write
2EAE000
trusted library allocation
page read and write
2619247B000
trusted library allocation
page read and write
58D000
heap
page read and write
4E6F000
stack
page read and write
26192D45000
trusted library allocation
page read and write
8556000
heap
page read and write
1A00000
direct allocation
page read and write
26192460000
trusted library allocation
page read and write
BCB1ABD000
stack
page read and write
61ED3000
direct allocation
page read and write
FE0000
direct allocation
page read and write
6840000
trusted library allocation
page read and write
357E000
stack
page read and write
3090000
direct allocation
page read and write
26190400000
trusted library allocation
page read and write
6C950000
unkown
page read and write
26192DB8000
trusted library allocation
page read and write
257E000
stack
page read and write
837000
unkown
page readonly
244C000
unkown
page readonly
500B000
trusted library allocation
page read and write
261842C6000
heap
page read and write
44B000
unkown
page execute and read and write
22D0000
heap
page read and write
11CC000
unkown
page execute and read and write
2619238C000
trusted library allocation
page read and write
3E1000
unkown
page execute and write copy
2618F203000
trusted library allocation
page read and write
1C53F000
stack
page read and write
26191FB4000
trusted library allocation
page read and write
6D4A000
heap
page read and write
2619470F000
trusted library allocation
page read and write
D76000
unkown
page execute and read and write
35CF000
stack
page read and write
26192EAE000
trusted library allocation
page read and write
581000
heap
page read and write
4D41000
heap
page read and write
1434000
heap
page read and write
6627000
heap
page read and write
26190209000
trusted library allocation
page read and write
1031000
heap
page read and write
FC0000
direct allocation
page read and write
16A3000
heap
page read and write
D5C000
unkown
page execute and read and write
9C4000
heap
page read and write
26190700000
trusted library allocation
page read and write
F74000
heap
page read and write
4D41000
heap
page read and write
261924CA000
trusted library allocation
page read and write
5CEE000
stack
page read and write
FC4000
heap
page read and write
26194B86000
trusted library allocation
page read and write
26184228000
heap
page read and write
22C5B000
heap
page read and write
400000
unkown
page readonly
26194B00000
trusted library allocation
page read and write
26190711000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
2F10000
direct allocation
page read and write
4CA0000
direct allocation
page read and write
26191F69000
trusted library allocation
page read and write
2618FF0A000
trusted library allocation
page read and write
26191FF1000
trusted library allocation
page read and write
2618EC75000
trusted library allocation
page read and write
1F171624000
heap
page read and write
425E000
stack
page read and write
F6E000
stack
page read and write
FE0000
direct allocation
page read and write
E6E000
unkown
page execute and write copy
BCABEFF000
stack
page read and write
26192DDB000
trusted library allocation
page read and write
1098000
heap
page read and write
7470000
heap
page read and write
890000
direct allocation
page read and write
4DEF000
stack
page read and write
1F1732C9000
heap
page read and write
6D30000
heap
page read and write
3090000
direct allocation
page read and write
2784000
heap
page read and write
198000
stack
page read and write
22C6F000
heap
page read and write
4C50000
direct allocation
page execute and read and write
509E000
trusted library allocation
page read and write
26191FDE000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
130BD7DA000
heap
page read and write
9C4000
heap
page read and write
3E8F000
stack
page read and write
3E0000
unkown
page read and write
D7B87FF000
stack
page read and write
4671000
heap
page read and write
4D6E000
stack
page read and write
9C4000
heap
page read and write
2F10000
direct allocation
page read and write
2170000
heap
page read and write
27A3000
heap
page read and write
5130000
direct allocation
page execute and read and write
401000
unkown
page execute read
130BD700000
remote allocation
page execute read
12E0000
heap
page read and write
9C4000
heap
page read and write
5020000
heap
page read and write
F4B87E000
stack
page read and write
1E539272000
heap
page read and write
1824000
heap
page read and write
2618E624000
trusted library allocation
page read and write
22C9D000
heap
page read and write
26192B00000
trusted library allocation
page read and write
4B11000
heap
page read and write
348F000
stack
page read and write
5470000
direct allocation
page execute and read and write
2618EB2F000
trusted library allocation
page read and write
28D05000
heap
page read and write
1434000
heap
page read and write
139E000
stack
page read and write
130BD8E0000
heap
page readonly
279D000
heap
page read and write
54B0000
direct allocation
page execute and read and write
26181ED7000
trusted library allocation
page read and write
1434000
heap
page read and write
26194E9C000
trusted library allocation
page read and write
699E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
26194B96000
trusted library allocation
page read and write
22C69000
heap
page read and write
BCB3F5F000
stack
page read and write
46CF000
stack
page read and write
1434000
heap
page read and write
10BC000
heap
page read and write
302E000
trusted library allocation
page read and write
BCB345E000
stack
page read and write
BCB459E000
stack
page read and write
26194B1D000
trusted library allocation
page read and write
26193603000
trusted library allocation
page read and write
1434000
heap
page read and write
2F5F000
trusted library allocation
page read and write
419000
unkown
page readonly
130BD900000
trusted library allocation
page read and write
26192452000
trusted library allocation
page read and write
26184B10000
heap
page read and write
1F17142E000
heap
page read and write
9C5000
heap
page read and write
2618E605000
trusted library allocation
page read and write
37CF000
stack
page read and write
67D1000
trusted library allocation
page read and write
1F172D98000
direct allocation
page read and write
2EF42000
heap
page read and write
5600000
direct allocation
page execute and read and write
26194C88000
trusted library allocation
page read and write
13D4000
heap
page read and write
26191FC9000
trusted library allocation
page read and write
22C67000
heap
page read and write
1434000
heap
page read and write
26192DBA000
trusted library allocation
page read and write
3E6E000
stack
page read and write
26192C77000
trusted library allocation
page read and write
2EA0000
direct allocation
page execute and read and write
13AA000
heap
page read and write
27A0000
heap
page read and write
26192C70000
trusted library allocation
page read and write
1F173220000
heap
page read and write
2F10000
direct allocation
page read and write
26192673000
trusted library allocation
page read and write
F48DDB000
stack
page read and write
FF0000
heap
page read and write
26194E1C000
trusted library allocation
page read and write
10C5000
heap
page read and write
4671000
heap
page read and write
370F000
stack
page read and write
261947D6000
trusted library allocation
page read and write
BCB0EBB000
stack
page read and write
1F172AD0000
direct allocation
page read and write
26190721000
trusted library allocation
page read and write
611E000
stack
page read and write
9C000
stack
page read and write
1F173FB1000
heap
page read and write
9C4000
heap
page read and write
261926F5000
trusted library allocation
page read and write
661B000
stack
page read and write
4F4000
unkown
page readonly
1F1701A6000
heap
page read and write
26192794000
trusted library allocation
page read and write
9C4000
heap
page read and write
22C73000
heap
page read and write
26194E24000
trusted library allocation
page read and write
BCAD43E000
stack
page read and write
F74000
heap
page read and write
FC4000
heap
page read and write
26193BF7000
trusted library allocation
page read and write
26194A65000
trusted library allocation
page read and write
2EE9F000
stack
page read and write
26192485000
trusted library allocation
page read and write
BCABF3E000
stack
page read and write
130BD806000
heap
page read and write
6D9B000
trusted library allocation
page read and write
6BE0000
heap
page read and write
19C000
stack
page read and write
4E90000
direct allocation
page execute and read and write
49F000
unkown
page execute and read and write
1F1727A1000
direct allocation
page read and write
BCB2B3D000
stack
page read and write
9C4000
heap
page read and write
261924CA000
trusted library allocation
page read and write
4FAF000
stack
page read and write
FF7000
heap
page read and write
49F000
unkown
page execute and read and write
2F10000
direct allocation
page read and write
26193BA0000
trusted library allocation
page read and write
1F173224000
heap
page read and write
9C4000
heap
page read and write
3F6F000
stack
page read and write
26193903000
trusted library allocation
page read and write
4C8B000
stack
page read and write
162E000
heap
page read and write
261920F0000
trusted library section
page readonly
5720000
direct allocation
page execute and read and write
1C57E000
stack
page read and write
1F16D70B000
heap
page read and write
57D000
heap
page read and write
4C3000
unkown
page read and write
1F172CD0000
direct allocation
page read and write
26D0000
heap
page read and write
1F16F120000
remote allocation
page read and write
432E000
stack
page read and write
27BD000
heap
page execute and read and write
9C4000
heap
page read and write
E58000
heap
page read and write
10A9000
heap
page read and write
97D000
stack
page read and write
58D000
heap
page read and write
22C84000
heap
page read and write
FC4000
heap
page read and write
2618EC18000
trusted library allocation
page read and write
26191FA7000
trusted library allocation
page read and write
2618FE76000
trusted library allocation
page read and write
12FD000
stack
page read and write
35AE000
stack
page read and write
436E000
stack
page read and write
30B0000
heap
page read and write
61EB4000
direct allocation
page read and write
261842B5000
heap
page read and write
7D70000
trusted library allocation
page read and write
22C77000
heap
page read and write
31CE000
stack
page read and write
261924A1000
trusted library allocation
page read and write
34A0000
heap
page read and write
1C7FE000
stack
page read and write
26181F00000
trusted library section
page read and write
1F16D712000
heap
page read and write
26191FC9000
trusted library allocation
page read and write
1F170A27000
heap
page read and write
2618E500000
trusted library allocation
page read and write
BCB355D000
stack
page read and write
9C4000
heap
page read and write
A29000
unkown
page read and write
F4A7FE000
stack
page read and write
3FAE000
stack
page read and write
26192AFB000
trusted library allocation
page read and write
E1D000
trusted library allocation
page execute and read and write
130BDA81000
trusted library allocation
page read and write
89FE000
stack
page read and write
4671000
heap
page read and write
BCB441F000
stack
page read and write
27A2000
heap
page read and write
2618FEB2000
trusted library allocation
page read and write
2618E700000
trusted library allocation
page read and write
26190200000
trusted library allocation
page read and write
26193500000
trusted library allocation
page read and write
3F4F000
stack
page read and write
28CE0000
heap
page read and write
27A8000
heap
page read and write
5190000
direct allocation
page execute and read and write
340F000
stack
page read and write
7FF6C7040000
unkown
page readonly
26181A60000
unclassified section
page readonly
BCB429E000
stack
page read and write
26194BF3000
trusted library allocation
page read and write
414E000
stack
page read and write
8C0000
direct allocation
page read and write
16EA000
heap
page read and write
26181E91000
trusted library allocation
page read and write
F27000
heap
page read and write
1F16D6C6000
heap
page read and write
4E70000
direct allocation
page execute and read and write
2618EC03000
trusted library allocation
page read and write
88E000
unkown
page execute and write copy
4671000
heap
page read and write
1A00000
direct allocation
page read and write
26192765000
trusted library allocation
page read and write
26193800000
trusted library allocation
page read and write
5024000
heap
page read and write
26194725000
trusted library allocation
page read and write
2619472B000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
2619390D000
trusted library allocation
page read and write
26192483000
trusted library allocation
page read and write
95D000
stack
page read and write
634F000
stack
page read and write
26190100000
trusted library allocation
page read and write
4D41000
heap
page read and write
6D80000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
46185FD000
stack
page read and write
1070000
heap
page read and write
16D0000
direct allocation
page read and write
10A9000
heap
page read and write
1434000
heap
page read and write
26194B03000
trusted library allocation
page read and write
36AF000
stack
page read and write
33EE000
stack
page read and write
67B6000
trusted library allocation
page read and write
3CCF000
stack
page read and write
27AE000
heap
page read and write
4D11000
direct allocation
page read and write
F74000
heap
page read and write
BCABA3E000
stack
page read and write
261927F6000
trusted library allocation
page read and write
130BDA00000
trusted library allocation
page read and write
BCA9FEF000
stack
page read and write
16EA000
heap
page read and write
F4AFFE000
unkown
page readonly
2EEA0000
trusted library allocation
page read and write
1434000
heap
page read and write
1E53ADB0000
heap
page read and write
430F000
stack
page read and write
E6D000
unkown
page execute and read and write
3ECE000
stack
page read and write
2618E598000
trusted library allocation
page read and write
1C64F000
stack
page read and write
2887A0504000
trusted library allocation
page read and write
9C4000
heap
page read and write
26181D00000
trusted library allocation
page read and write
5A2000
heap
page read and write
26191FAE000
trusted library allocation
page read and write
26181E0D000
trusted library allocation
page read and write
2114000
heap
page read and write
483E000
stack
page read and write
1F16D759000
heap
page read and write
26193AE5000
trusted library allocation
page read and write
E04000
heap
page read and write
26194D1D000
trusted library allocation
page read and write
1026000
heap
page read and write
2110000
heap
page read and write
494F000
stack
page read and write
1434000
heap
page read and write
EE9000
heap
page read and write
1434000
heap
page read and write
1F16D7B5000
heap
page read and write
41AE000
stack
page read and write
A29000
unkown
page write copy
1434000
heap
page read and write
FD0000
heap
page read and write
2619371B000
trusted library allocation
page read and write
130BDA7A000
trusted library allocation
page read and write
74E0000
heap
page read and write
26195255000
trusted library allocation
page read and write
3E2F000
stack
page read and write
26193598000
trusted library allocation
page read and write
28D8C000
heap
page read and write
FC0000
direct allocation
page read and write
1E539407000
trusted library allocation
page read and write
7F4000
heap
page read and write
4D11000
heap
page read and write
4EA000
heap
page read and write
130BDC0C000
trusted library allocation
page read and write
2618E590000
trusted library allocation
page read and write
26194C96000
trusted library allocation
page read and write
41EF000
stack
page read and write
46183FE000
stack
page read and write
420E000
stack
page read and write
26192CFB000
trusted library allocation
page read and write
1030000
heap
page read and write
1F172CEF000
direct allocation
page read and write
2594A00A000
trusted library allocation
page read and write
7F4000
heap
page read and write
26194D63000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
16BB000
heap
page read and write
26192A9C000
trusted library allocation
page read and write
4FDB000
stack
page read and write
130BD680000
unclassified section
page readonly
26191FC7000
trusted library allocation
page read and write
2618FEC5000
trusted library allocation
page read and write
3AAF000
stack
page read and write
22C77000
heap
page read and write
261907D0000
trusted library allocation
page read and write
3FAE000
stack
page read and write
261842F2000
heap
page read and write
89BC000
stack
page read and write
26391D70000
trusted library section
page readonly
26194C4F000
trusted library allocation
page read and write
3090000
direct allocation
page read and write
31E1000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
1F16D789000
heap
page read and write
1F16D7BE000
heap
page read and write
5F0000
heap
page read and write
EB0000
heap
page read and write
1434000
heap
page read and write
26193AF0000
trusted library allocation
page read and write
16BC000
heap
page read and write
30F6000
trusted library allocation
page read and write
401000
unkown
page execute read
13D4000
heap
page read and write
16D5000
heap
page read and write
510000
heap
page read and write
4671000
heap
page read and write
26192AE9000
trusted library allocation
page read and write
1F16F120000
remote allocation
page read and write
1434000
heap
page read and write
26191FE6000
trusted library allocation
page read and write
BCA9FFE000
stack
page read and write
41FE000
stack
page read and write
26181F60000
heap
page read and write
16D0000
direct allocation
page read and write
51D0000
direct allocation
page execute and read and write
890000
direct allocation
page read and write
7DF0000
trusted library allocation
page execute and read and write
BCB22BD000
stack
page read and write
26181B90000
heap
page read and write
4E41000
heap
page read and write
22C77000
heap
page read and write
4FB1000
heap
page read and write
400000
unkown
page readonly
F48DD8000
stack
page read and write
4B11000
heap
page read and write
56F0000
direct allocation
page execute and read and write
26194C0D000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
2FA5DCF00000
trusted library allocation
page read and write
1C43E000
stack
page read and write
BCB43DE000
stack
page read and write
16D0000
direct allocation
page read and write
9C0000
unkown
page readonly
5640000
direct allocation
page execute and read and write
26192C81000
trusted library allocation
page read and write
11E6000
unkown
page execute and write copy
1434000
heap
page read and write
4D41000
heap
page read and write
26192724000
trusted library allocation
page read and write
22C73000
heap
page read and write
1434000
heap
page read and write
1434000
heap
page read and write
261838BD000
unclassified section
page read and write
4D41000
heap
page read and write
26192360000
trusted library allocation
page read and write
9C5000
heap
page read and write
9C4000
heap
page read and write
4AEE000
stack
page read and write
56AF000
stack
page read and write
2618F27E000
trusted library allocation
page read and write
26192C4E000
trusted library allocation
page read and write
16DF000
heap
page read and write
1434000
heap
page read and write
130BDA69000
trusted library allocation
page read and write
26194CED000
trusted library allocation
page read and write
3090000
direct allocation
page read and write
26181F6A000
heap
page read and write
26192363000
trusted library allocation
page read and write
3D0E000
stack
page read and write
26181F50000
unclassified section
page read and write
22C6A000
heap
page read and write
42FE000
stack
page read and write
F4C0FE000
unkown
page readonly
4D41000
heap
page read and write
4D2F000
stack
page read and write
F74000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4D41000
heap
page read and write
DBD000
stack
page read and write
2B6F000
stack
page read and write
1434000
heap
page read and write
FC4000
heap
page read and write
2F10000
direct allocation
page read and write
51B0000
direct allocation
page execute and read and write
26195244000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
1F172977000
direct allocation
page read and write
9C1000
unkown
page execute and write copy
FDE000
stack
page read and write
4FF0000
trusted library allocation
page read and write
21BE000
stack
page read and write
1F16D759000
heap
page read and write
9C4000
heap
page read and write
10C5000
heap
page read and write
26192D91000
trusted library allocation
page read and write
62F0000
trusted library allocation
page execute and read and write
F74000
heap
page read and write
1F16D72C000
heap
page read and write
261907C2000
trusted library allocation
page read and write
26194E03000
trusted library allocation
page read and write
4FB1000
heap
page read and write
261924CA000
trusted library allocation
page read and write
130BDC1A000
trusted library allocation
page read and write
3480000
direct allocation
page read and write
1F16D78C000
heap
page read and write
2618F1FB000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
1F173244000
heap
page read and write
4E20000
direct allocation
page execute and read and write
7739000
trusted library allocation
page read and write
1A00000
direct allocation
page read and write
6D32000
heap
page read and write
6890000
trusted library allocation
page execute and read and write
26194BE2000
trusted library allocation
page read and write
E04000
heap
page read and write
26193B00000
trusted library allocation
page read and write
432F000
stack
page read and write
A29000
unkown
page write copy
26191EBD000
trusted library allocation
page read and write
4D41000
heap
page read and write
26194B90000
trusted library allocation
page read and write
BCB451A000
stack
page read and write
27A1000
heap
page read and write
6D42000
heap
page read and write
13D4000
heap
page read and write
13D4000
heap
page read and write
30CA000
trusted library allocation
page read and write
2618EC1B000
trusted library allocation
page read and write
1434000
heap
page read and write
5610000
direct allocation
page execute and read and write
1F171C2B000
heap
page read and write
26192763000
trusted library allocation
page read and write
448E000
stack
page read and write
A50000
unkown
page read and write
1824000
heap
page read and write
1F16D712000
heap
page read and write
26191F03000
trusted library allocation
page read and write
1F16D73F000
heap
page read and write
9C4000
heap
page read and write
FE0000
direct allocation
page read and write
4B51000
direct allocation
page read and write
2618EFCA000
heap
page read and write
58D000
heap
page read and write
F90000
heap
page read and write
26194E26000
trusted library allocation
page read and write
6900000
trusted library allocation
page execute and read and write
BCABA7B000
stack
page read and write
6D83000
trusted library allocation
page read and write
308E000
stack
page read and write
297C000
heap
page read and write
26194D5F000
trusted library allocation
page read and write
434D000
stack
page read and write
26194C20000
trusted library allocation
page read and write
BCB20BD000
stack
page read and write
16E5000
heap
page read and write
9C4000
heap
page read and write
261936D2000
trusted library allocation
page read and write
1F173244000
heap
page read and write
1F16D893000
direct allocation
page read and write
1E539534000
heap
page read and write
26193B37000
trusted library allocation
page read and write
261924CA000
trusted library allocation
page read and write
2618F10F000
trusted library allocation
page read and write
9C4000
heap
page read and write
261819F0000
unclassified section
page readonly
1C8FD000
stack
page read and write
1434000
heap
page read and write
62C000
unkown
page execute and read and write
1F171BA7000
heap
page read and write
5180000
trusted library allocation
page read and write
26194E70000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
2618EC7D000
trusted library allocation
page read and write
46CF000
stack
page read and write
26192DB2000
trusted library allocation
page read and write
396E000
stack
page read and write
55C0000
direct allocation
page execute and read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
1824000
heap
page read and write
BCAF872000
stack
page read and write
27A6000
heap
page read and write
3BBE000
stack
page read and write
261842C6000
heap
page read and write
BCB5C9A000
stack
page read and write
22C77000
heap
page read and write
26193AF0000
trusted library allocation
page read and write
26192D95000
trusted library allocation
page read and write
1F170427000
heap
page read and write
2F10000
direct allocation
page read and write
26191ED0000
trusted library allocation
page read and write
26191F69000
trusted library allocation
page read and write
1F170228000
heap
page read and write
3E23000
trusted library allocation
page read and write
581000
heap
page read and write
480000
heap
page read and write
9C4000
heap
page read and write
26194D18000
trusted library allocation
page read and write
27A1000
heap
page read and write
26194BEA000
trusted library allocation
page read and write
9C4000
heap
page read and write
27AF000
heap
page read and write
1434000
heap
page read and write
4D41000
heap
page read and write
9C4000
heap
page read and write
5100000
direct allocation
page execute and read and write
5491000
direct allocation
page read and write
40B000
unkown
page read and write
448E000
stack
page read and write
424F000
stack
page read and write
26191FE6000
trusted library allocation
page read and write
50F1000
heap
page read and write
5130000
direct allocation
page execute and read and write
3BAF000
stack
page read and write
1E53ADD6000
heap
page read and write
26193910000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
26192E6E000
trusted library allocation
page read and write
261927B8000
trusted library allocation
page read and write
26181F65000
heap
page read and write
26191FAE000
trusted library allocation
page read and write
581000
heap
page read and write
401000
unkown
page execute read
26192C8D000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
1434000
heap
page read and write
26191FA0000
trusted library allocation
page read and write
4671000
heap
page read and write
56C0000
direct allocation
page execute and read and write
1434000
heap
page read and write
304F000
stack
page read and write
1F171F9A000
heap
page read and write
4671000
heap
page read and write
26192D68000
trusted library allocation
page read and write
26192751000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
26192DC1000
trusted library allocation
page read and write
2618ECC0000
trusted library allocation
page read and write
1CA90000
heap
page read and write
D7B8FFF000
stack
page read and write
26191FC7000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
2618F2A3000
trusted library allocation
page read and write
325E000
stack
page read and write
7FF6C7347000
unkown
page read and write
58D000
heap
page read and write
1F1734AC000
heap
page read and write
2E56000
trusted library allocation
page read and write
2619272B000
trusted library allocation
page read and write
890000
direct allocation
page read and write
9C4000
heap
page read and write
2DA1000
trusted library allocation
page read and write
342E000
stack
page read and write
7FF6C7040000
unkown
page readonly
3090000
direct allocation
page read and write
1F16D73F000
heap
page read and write
4FB1000
heap
page read and write
2C4F000
stack
page read and write
4671000
heap
page read and write
EC1000
unkown
page execute and write copy
11CC000
unkown
page execute and read and write
1F16D8EA000
direct allocation
page read and write
4ABE000
stack
page read and write
22C61000
heap
page read and write
9C4000
heap
page read and write
5102000
trusted library allocation
page read and write
26F0000
direct allocation
page execute and read and write
26194C12000
trusted library allocation
page read and write
8538000
heap
page read and write
130BD690000
unclassified section
page readonly
3D2E000
stack
page read and write
26181C09000
heap
page read and write
22C77000
heap
page read and write
A50000
unkown
page readonly
1434000
heap
page read and write
55B0000
direct allocation
page execute and read and write
CCF000
unkown
page execute and write copy
26194EFE000
trusted library allocation
page read and write
9C4000
heap
page read and write
26191F33000
trusted library allocation
page read and write
130BD743000
heap
page read and write
26194800000
trusted library allocation
page read and write
26192485000
trusted library allocation
page read and write
26194ADC000
trusted library allocation
page read and write
2618EB03000
trusted library allocation
page read and write
58D000
heap
page read and write
5770000
direct allocation
page execute and read and write
2619247B000
trusted library allocation
page read and write
1F16D732000
heap
page read and write
26194761000
trusted library allocation
page read and write
88BB000
stack
page read and write
4FAF000
stack
page read and write
2618E653000
trusted library allocation
page read and write
3090000
direct allocation
page read and write
28D5B000
heap
page read and write
16D0000
direct allocation
page read and write
9C4000
heap
page read and write
2619226C000
trusted library allocation
page read and write
26194BB8000
trusted library allocation
page read and write
423000
unkown
page readonly
3F6F000
stack
page read and write
10BC000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
E80000
heap
page read and write
685E000
stack
page read and write
26192CA5000
trusted library allocation
page read and write
1F16D7A7000
heap
page read and write
8A0000
heap
page read and write
390F000
stack
page read and write
3F4F000
stack
page read and write
5130000
direct allocation
page execute and read and write
1F16D640000
heap
page read and write
56E0000
direct allocation
page execute and read and write
4D41000
heap
page read and write
22C6A000
heap
page read and write
26192C9C000
trusted library allocation
page read and write
85C000
stack
page read and write
BCB1CBD000
stack
page read and write
26194C61000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
BCB349C000
stack
page read and write
4D41000
heap
page read and write
50E0000
heap
page execute and read and write
1F16A104000
trusted library allocation
page read and write
40969FF000
stack
page read and write
F74000
heap
page read and write
4ACE000
stack
page read and write
8554000
heap
page read and write
26193B72000
trusted library allocation
page read and write
F80000
trusted library allocation
page execute and read and write
1434000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
5330000
direct allocation
page execute and read and write
1F1733F0000
direct allocation
page read and write
1F16D7A1000
heap
page read and write
22C70000
heap
page read and write
E6E000
unkown
page execute and write copy
26191FC7000
trusted library allocation
page read and write
FC4000
heap
page read and write
26194CAE000
trusted library allocation
page read and write
261842EB000
heap
page read and write
26192DA0000
trusted library allocation
page read and write
1CAA0000
heap
page read and write
4671000
heap
page read and write
6528000
trusted library allocation
page read and write
1F16D8B7000
direct allocation
page read and write
BCB421E000
stack
page read and write
26194EB7000
trusted library allocation
page read and write
1F1731F1000
heap
page read and write
2F4F000
stack
page read and write
26192DCD000
trusted library allocation
page read and write
EC0000
unkown
page readonly
49AE000
stack
page read and write
2618F2B0000
trusted library allocation
page read and write
26194B6D000
trusted library allocation
page read and write
581000
heap
page read and write
30B4000
trusted library allocation
page read and write
9C4000
heap
page read and write
2618FE5F000
trusted library allocation
page read and write
1F16D745000
heap
page read and write
E04000
heap
page read and write
16FD000
stack
page read and write
3BB2000
trusted library allocation
page read and write
12DC000
stack
page read and write
26192C56000
trusted library allocation
page read and write
130BDA7D000
trusted library allocation
page read and write
720E000
heap
page read and write
BCB33FC000
stack
page read and write
5100000
trusted library allocation
page read and write
1C6AE000
stack
page read and write
2E40000
heap
page read and write
26192DC9000
trusted library allocation
page read and write
25B0000
heap
page read and write
7F4000
heap
page read and write
74B2000
heap
page read and write
22C69000
heap
page read and write
67C2000
trusted library allocation
page read and write
26194ED6000
trusted library allocation
page read and write
9C4000
heap
page read and write
F22000
unkown
page execute and read and write
1434000
heap
page read and write
40971FF000
stack
page read and write
BCB4A5E000
stack
page read and write
9C4000
heap
page read and write
486E000
stack
page read and write
2619241C000
trusted library allocation
page read and write
2618F03A000
heap
page read and write
1434000
heap
page read and write
7810000
trusted library allocation
page read and write
FE0000
direct allocation
page read and write
30BE000
trusted library allocation
page read and write
540F000
stack
page read and write
2530000
heap
page read and write
26191E03000
trusted library allocation
page read and write
2618EC26000
trusted library allocation
page read and write
9C4000
heap
page read and write
26184210000
heap
page read and write
4671000
heap
page read and write
5320000
direct allocation
page execute and read and write
2618F1EC000
trusted library allocation
page read and write
296B000
heap
page read and write
CCF000
unkown
page execute and read and write
1434000
heap
page read and write
2619249B000
trusted library allocation
page read and write
3E8A000
trusted library allocation
page read and write
17CFA7804000
trusted library allocation
page read and write
410F000
stack
page read and write
408000
unkown
page readonly
41FE000
stack
page read and write
1F0000
heap
page read and write
1F170E28000
heap
page read and write
226E000
stack
page read and write
FC4000
heap
page read and write
1F173FA0000
heap
page read and write
2618F279000
trusted library allocation
page read and write
26192C0F000
trusted library allocation
page read and write
10BC000
heap
page read and write
22C77000
heap
page read and write
2618FEE1000
trusted library allocation
page read and write
2618F29B000
trusted library allocation
page read and write
26191FF1000
trusted library allocation
page read and write
261932E6000
trusted library allocation
page read and write
26184B27000
heap
page read and write
2619477C000
trusted library allocation
page read and write
1824000
heap
page read and write
47E000
stack
page read and write
D77000
unkown
page execute and write copy
3F8E000
stack
page read and write
320F000
stack
page read and write
303B000
trusted library allocation
page read and write
581000
heap
page read and write
26193BFA000
trusted library allocation
page read and write
26194A3D000
trusted library allocation
page read and write
22C9D000
heap
page read and write
160F000
stack
page read and write
3FCF000
stack
page read and write
138D000
unkown
page execute and read and write
5450000
direct allocation
page execute and read and write
26192403000
trusted library allocation
page read and write
22C93000
heap
page read and write
26191F92000
trusted library allocation
page read and write
9C4000
heap
page read and write
1F16D7AA000
heap
page read and write
1049000
heap
page read and write
7F4000
heap
page read and write
1CA8E000
stack
page read and write
130BDA03000
trusted library allocation
page read and write
26181E00000
trusted library allocation
page read and write
FC4000
heap
page read and write
26A0000
direct allocation
page execute and read and write
9C4000
heap
page read and write
26194603000
trusted library allocation
page read and write
780F000
stack
page read and write
257E000
stack
page read and write
2D7A000
trusted library allocation
page read and write
4810000
heap
page read and write
261927BF000
trusted library allocation
page read and write
2618F269000
trusted library allocation
page read and write
9C1000
unkown
page execute and write copy
5310000
direct allocation
page execute and read and write
EC0000
unkown
page read and write
26191FAE000
trusted library allocation
page read and write
1F171DA3000
heap
page read and write
1F16D759000
heap
page read and write
28D8C000
heap
page read and write
1F16D897000
direct allocation
page read and write
FC4000
heap
page read and write
9C4000
heap
page read and write
19EE000
stack
page read and write
6BDC000
stack
page read and write
48CE000
stack
page read and write
493000
unkown
page execute and read and write
1434000
heap
page read and write
6649000
heap
page read and write
26192734000
trusted library allocation
page read and write
26192903000
trusted library allocation
page read and write
4671000
heap
page read and write
35060000
heap
page read and write
26194E2C000
trusted library allocation
page read and write
26192C60000
trusted library allocation
page read and write
2618EF00000
heap
page read and write
289F000
stack
page read and write
26192396000
trusted library allocation
page read and write
1F16D789000
heap
page read and write
435000
unkown
page read and write
587000
unkown
page execute and read and write
1434000
heap
page read and write
40B000
unkown
page write copy
1434000
heap
page read and write
2618FE7C000
trusted library allocation
page read and write
485E000
stack
page read and write
26192DFB000
trusted library allocation
page read and write
26194E76000
trusted library allocation
page read and write
9C4000
heap
page read and write
2619249B000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
26192C7B000
trusted library allocation
page read and write
65CF000
stack
page read and write
16D0000
direct allocation
page read and write
261838B2000
unclassified section
page read and write
There are 3858 hidden memdumps, click here to show them.