IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f4d5066564a8bace5e01e26b05097e8e2375936_864df792_4c0cc867-023f-4594-8a88-ae0828f740aa\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\1000003002\ee7a49fbf0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\enter[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\48f0ec6733.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingCBFCFBFBFB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingIJDGCAEBFI.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
malicious
C:\ProgramData\AKECBFBAEBKJJJJKFCGCBKKEHD
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\BGIJDGCA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\CBGCAFIIECBFIDHIJKFBAKEGDG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CFHIIEHJKKECGCBFIIJD
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\CFIIIJJKJKFHIDGDBAKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAAFBAKECAEGCBFIEGDGIEGIEH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJJEHJJKJEGHJJKEBFBGCBKEHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\IDHDGDHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IEHCBAFIDAECBGCBFHJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_48f0ec6733.exe_e95d1e3d9a7cd1add45d4b74dcaef3dd1ba61b19_38b4e776_114550e8-f51c-4653-b5f0-423b2488f5cf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D80.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 18:10:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E1D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E4D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DD7.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 18:09:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7EF2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F41.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\active-update.xml (copy)
XML 1.0 document, ASCII text, with very long lines (1216), with no line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\active-update.xml.tmp
XML 1.0 document, ASCII text, with very long lines (1216), with no line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\updates\0\update.status
ASCII text
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\2b3e1df9-4f5c-4026-9de4-3c6037b001f0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\428cd943-140d-427e-b85b-a228242a1e6f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\49f74ceb-e6b5-4e79-83a9-65a2fa144df5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4de47f4a-babb-4b4b-b927-e8a504d2a76c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\51ef9c73-de6c-475a-8b08-4e307b33dea5.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6e685579-8f31-43ae-b983-bd526ecacd27.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\747bb18b-c00c-4b88-b113-b1d420341288.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\91d3d70f-9eb8-4386-854c-a4ab02879f03.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\2df0c6d4-ef35-46e3-9220-4446a5b17daa.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66A3E683-D7C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0cd7089b-5209-4a37-a170-1008d98337ae.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\5f9dcf90-6a80-4d55-ba2f-4e77f5406ea6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\73cb7326-9079-400e-9f82-d4e1dd56d864.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7442bae4-7e11-47e7-bd17-c9a0eff37070.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\829165cd-2a92-4eba-b90b-c15dd0416ac1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\91570202-b28b-4a9e-9109-76aaf5e668dc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000004.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000005.ldb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 14, cookie 0x8, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 11, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\MediaDeviceSalts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 6, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 4
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\0cf6023d-0c48-4966-b989-e4ea4bee3881.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\2c00031a-bb81-4a65-a0fd-a3ac55e6a4eb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\38b113f2-5656-4799-925f-70872cbfa83c.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\4e299a95-84dd-4d35-93c5-a6dcd9f555ca.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\75afbbab-1a81-45ce-9f4f-3ed8bbda9fd3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9ab13295-ce85-470d-873d-185086fb2ffc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF44d03.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF46a10.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF4877c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF4a593.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF4e098.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e45390be-7965-4399-95c3-60154c017f89.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\f4d6fe4d-f01b-4763-b26f-be92441471ef.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF483b3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4b60e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4dfae.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF49046.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13366491014122649
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\36ba9d8c-2f4e-46ec-9373-3711516adb62.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\5bae3cb1-3b51-4b2d-9baf-9baab0599ace.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF469a3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF4877c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\db49cd3c-7469-4f55-9fc8-97fe384fb1ce.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\de192d22-37bc-4462-8c59-800ae4ed8543.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 11, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b54006b9-9719-4ddf-b01e-6d7b6ca0815b.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f6dc49b6-c1fc-4cc7-86a6-3701f9baf0c9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\fde22db9-372d-4d96-85de-501cafff87f6.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF431da.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF431e9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF43535.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF45cb3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF47849.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF49f1b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4dfcd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\activity-stream.discovery_stream.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\activity-stream.discovery_stream.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842025116 (copy)
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842025116.tmp
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842026026 (copy)
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842026026.tmp
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842026220 (copy)
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842026220.tmp
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842073252 (copy)
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842073252.tmp
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842073588 (copy)
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842073588.tmp
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074161 (copy)
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074161.tmp
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074183 (copy)
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074183.tmp
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074245 (copy)
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074245.tmp
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074251 (copy)
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074251.tmp
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074301 (copy)
PNG image data, 200 x 200, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\settings\main\quicksuggest\icon-161351842074301.tmp
PNG image data, 200 x 200, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\1f1ad62f-ff7e-49d7-8e04-39db617b0ac4.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\2E3C.tmp\2E3D.tmp\2E3E.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\65e00eb8-fa0d-49f1-b8bc-f4711b61fafa.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\68feb22a-6757-4d89-898c-a5a2f5b8bb7b.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\8716648c-3f5b-4159-9c44-711ea37f546a.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\ba2831a8-3ee9-48c8-80c9-0b333c714255.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_1247697648\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_1247697648\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_1247697648\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_1247697648\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_1247697648\ba2831a8-3ee9-48c8-80c9-0b333c714255.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\1f1ad62f-ff7e-49d7-8e04-39db617b0ac4.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3452_584081962\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 17:10:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 17:10:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 17:10:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 17:10:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jul 26 17:10:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
ASCII text, with very long lines (7240), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
ASCII text, with very long lines (7240), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22685 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22685 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 10, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extension-preferences.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extension-preferences.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (4623), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (4623), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\search.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 787 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\search.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 787 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 15819 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 15819 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 15819 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\1
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 460
ASCII text, with very long lines (3870)
downloaded
Chrome Cache Entry: 461
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 462
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 463
ASCII text, with very long lines (570)
downloaded
Chrome Cache Entry: 464
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 465
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 466
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 467
ASCII text, with very long lines (1694)
downloaded
Chrome Cache Entry: 468
HTML document, ASCII text, with very long lines (687)
downloaded
Chrome Cache Entry: 469
ASCII text, with very long lines (770)
downloaded
Chrome Cache Entry: 470
ASCII text, with very long lines (22718)
downloaded
Chrome Cache Entry: 471
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 472
ASCII text, with very long lines (693)
downloaded
Chrome Cache Entry: 473
ASCII text, with very long lines (405)
downloaded
Chrome Cache Entry: 474
ASCII text, with very long lines (1192)
downloaded
There are 366 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingCBFCFBFBFB.exe"
malicious
C:\Users\user\AppData\RoamingCBFCFBFBFB.exe
"C:\Users\user\AppData\RoamingCBFCFBFBFB.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingIJDGCAEBFI.exe"
malicious
C:\Users\user\AppData\RoamingIJDGCAEBFI.exe
"C:\Users\user\AppData\RoamingIJDGCAEBFI.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\48f0ec6733.exe
"C:\Users\user\AppData\Local\Temp\1000002001\48f0ec6733.exe"
malicious
C:\Users\user\1000003002\ee7a49fbf0.exe
"C:\Users\user\1000003002\ee7a49fbf0.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\2E3C.tmp\2E3D.tmp\2E3E.bat C:\Users\user\1000003002\ee7a49fbf0.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000002001\48f0ec6733.exe
"C:\Users\user\AppData\Local\Temp\1000002001\48f0ec6733.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 2368
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7496 -s 1048
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 --field-trial-handle=2252,i,8316535468258998242,13647816152217596395,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2104,i,9402509172041055831,1536830809750770573,262144 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://www.youtube.com/account
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3020 --field-trial-handle=2744,i,8170982657460856401,12893479799030225772,262144 /prefetch:3
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2268 -parentBuildID 20230927232528 -prefsHandle 2188 -prefMapHandle 2148 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3d9a631-0c4f-4452-8e9e-490c2e469294} 6968 "\\.\pipe\gecko-crash-server-pipe.6968" 16dcc56d910 socket
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6772 --field-trial-handle=2744,i,8170982657460856401,12893479799030225772,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6916 --field-trial-handle=2744,i,8170982657460856401,12893479799030225772,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4548 -parentBuildID 20230927232528 -prefsHandle 4540 -prefMapHandle 4536 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3a73529-841c-43f4-a1e0-97d887784ff3} 6968 "\\.\pipe\gecko-crash-server-pipe.6968" 16ddf13f710 rdd
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-GB --service-sandbox-type=audio --mojo-platform-channel-handle=7960 --field-trial-handle=2744,i,8170982657460856401,12893479799030225772,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8128 --field-trial-handle=2744,i,8170982657460856401,12893479799030225772,262144 /prefetch:8
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
85.28.47.31
malicious
http://185.215.113.16/Jo89Ku7d/index.phpk=U
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php5=
unknown
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://185.215.113.19/ferences.SourceAumide
unknown
malicious
http://85.28.47.31/8405906461a5200c/softokn3.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.phpr(
unknown
malicious
http://85.28.47.31/8405906461a5200c/nss3.dll
85.28.47.31
malicious
http://185.215.113.19/Vi9leo/index.php003002
unknown
malicious
https://img-getpocket.cdn.mozilla.net/direct?url=https%3A%2F%2Fichef.bbci.co.uk%2Fimages%2Fic%2F480x
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/ddb01327-71d3-427b-8f25-2666ca1019bf
34.117.121.53
https://firefox.settings.services.mozilla.com/v1/
34.149.100.209
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/3012260d-8f8d-4863-9be6-03970e37af68
34.117.121.53
https://spocs.getpocket.com/spocs
34.117.188.166
https://www.youtube.com/signin?action_handle_signin%253Dtrue%2526app%253Ddesktop%2526hl%253Den%2526n
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://85.28.47.31/8405906461a5200c/freebl3.dllm$
unknown
https://github.com/mozilla-services/screenshots
unknown
https://www.hotels.com/?locale=en_US&pos=HCOM_US&siteid=300000001&rffrid=sem.hcom.US.AMP.003.00.03.s
unknown
https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/d88601ae-5293-43b2-9eaf-2ab6b
unknown
https://market-trk.com/50/9411?campaign=FF-SOV03-CompareCredit-BoATravel
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
http://85.28.47.31/8405906461a5200c/softokn3.dllA
unknown
http://r11.i.lencr.org/0(
unknown
https://ichef.bbci.co.uk/images/ic/480xn/p0jdbybk.jpg.webp
unknown
http://185.215.113.16/cost/random.exe
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/d6977194-0ec3-4aef-b861-5cb96278213d
34.117.121.53
https://img-getpocket.cdn.mozilla.net/direct?url=https%3A%2F%2Fimgix.bustle.com%2Fuploads%2Fimage%2F
unknown
http://185.215.113.16/stealc/random.exe395d7f
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/bfaa2e89-f7e3-478e-b83d-3bf27fc2c00f
34.117.121.53
http://i.pki.goog/r1.crt0
unknown
https://www.motherjones.com/politics/2024/07/joe-biden-climate-legacy-donald-trump-kamala-harris/?ut
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://eat.hungryroot.com/hungryroot-reset?utm_medium=paid
unknown
https://img-getpocket.cdn.mozilla.net/direct?url=https%3A%2F%2Fs3.us-east-1.amazonaws.com%2Fpocket-c
unknown
https://www.ecosia.org/newtab/
unknown
https://img-getpocket.cdn.mozilla.net/direct?url=https%3A%2F%2Fs3.amazonaws.com%2Fpocket-curatedcorp
unknown
http://i.pki.goog/wr2.crt0
unknown
https://www.google.com/favicon.ico
142.251.32.100
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://bugzilla.mo
unknown
https://shavar.services.mozilla.com/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://www.ebay.ie/
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/d4e275ab-c7a1-4d16-9407-d03d849b8e21
34.117.121.53
https://www.ebay.at/sch/
unknown
https://spocs.getpocket.com/
unknown
https://www.ebay.com/sch/
unknown
https://i.natgeofe.com/n/aa2728ac-4a75-4b3e-9163-2b32a66e9d1d/MM100710_230501_00795_16x9.JPG?w=1200
unknown
https://www.iqiyi.com/
unknown
http://r11.i.lencr.org/0d
unknown
https://tiles-cdn.prod.ads.prod.webservices.mozgcp.net/CAP5k4gWqcBGwir7bEEmBWveLMtvldFu-y_kyO3txFA=.
unknown
http://r3.o.lencr.org
unknown
http://crl.pki.goog/gsr1/gsr1.crl0;
unknown
http://185.215.113.16/cost/random.exe7
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/d7f071e9-d3de-4df6-9079-ca2e3ecddc08
34.117.121.53
https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/2f642ebf-706d-4eac-8c53-46182
unknown
https://d1n0c1ufntxbvh.cloudfront.net/photo/eabcdc61/98254/1200x/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/91ef2bf1-a36b-48dd-914e-195981ce7ea7
34.117.121.53
http://185.215.113.19/002
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/d03657b0-717f-46ce-ac76-f69d851cb204
34.117.121.53
https://account.bellmedia.c
unknown
http://85.28.47.31gl&(
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/021a8f00-3de7-4da0-a723-1e308f3de9f9
34.117.121.53
https://www.google.com/tools/feedback/chat_load.js
unknown
https://login.microsoftonline.com
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/dff96728-c23d-4f24-91c7-9233d01352d4
34.117.121.53
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://www.ebay.nl/sch/
unknown
http://c.pki.goog/r/r1.crl0
unknown
https://support.google.com/inapp/
unknown
http://185.215.113.16/Jo89Ku7d/index.phpx=$
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/7cc0fd66-fa48-46f1-9a0e-537764d9a4da
34.117.121.53
https://apis.google.com
unknown
https://www.ebay.at/
unknown
https://identity.mozilla.com/apps/relay
unknown
https://images.fastcompany.com/image/upload/f_auto
unknown
https://img-getpocket.cdn.mozilla.net/296x148/filters:format(jpeg):quality(60):no_upscale():strip_exif()/https%3A%2F%2Fmedia.wired.com%2Fphotos%2F669ee1db82dcc6be43bb872a%2F191%3A100%2Fw_1280%2Cc_limit%2FAMOC_Laerke_011.jpg
34.120.237.76
https://img-getpocket.cdn.mozilla.net/direct?url=https%3A%2F%2Fs.zkcdn.net%2FAdvertisers%2F8c6ba2700
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
34.117.188.166
https://www.amazon.co.uk/
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/f11c1bba-0d2e-44d8-acb1-e375719dd8b8
34.117.121.53
https://screenshots.firefox.com/
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/c8ad0165-121f-4bc8-bdd1-a2822cb41726
34.117.121.53
https://www.wykop.pl/
unknown
https://tiles-cdn.prod.ads.prod.webservices.mozgcp.net/m6BvG6Rcntmafem2bLfA5IktKm1SEwqO2E4XIjaC12c=.10862.jpg
34.36.165.17
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/quicksuggest/41a4b1d8-9773-4011-ab45-8d749a67cebd
34.117.121.53
https://s3.us-east-1.amazonaws.com/pocket-curatedcorpusapi-prod-images/f9b342d5-c87b-4c3e-a8c4-0609f
unknown
https://www.ebay.com.au/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
spocs.getpocket.com
unknown
malicious
clients2.googleusercontent.com
unknown
malicious
firefox.settings.services.mozilla.com
unknown
malicious
www.youtube.com
unknown
malicious
r3.o.lencr.org
unknown
malicious
detectportal.firefox.com
unknown
malicious
bzib.nelreports.net
unknown
malicious
www.expedia.com
unknown
malicious
o.pki.goog
unknown
malicious
shavar.services.mozilla.com
unknown
malicious
www.reddit.com
unknown
malicious
content-signature-2.cdn.mozilla.net
unknown
malicious
support.mozilla.org
unknown
malicious
push.services.mozilla.com
unknown
malicious
www.facebook.com
unknown
malicious
r11.o.lencr.org
unknown
malicious
img-getpocket.cdn.mozilla.net
unknown
malicious
r10.o.lencr.org
unknown
malicious
firefox-api-proxy.cdn.mozilla.net
unknown
malicious
www.amazon.com
unknown
malicious
accounts.youtube.com
unknown
malicious
www.wikipedia.org
unknown
malicious
getpocket.cdn.mozilla.net
unknown
malicious
firefox-settings-attachments.cdn.mozilla.net
unknown
malicious
example.org
93.184.215.14
chrome.cloudflare-dns.com
162.159.61.3
market-trk.com
104.18.12.104
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
18.65.39.112
prod.pocket.prod.cloudops.mozgcp.net
34.120.5.221
tiles-cdn.prod.ads.prod.webservices.mozgcp.net
34.36.165.17
ww55.affinity.net
34.160.134.7
www.romper.com
143.204.98.82
firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net
34.149.97.1
mitmdetection.services.mozilla.com
143.204.9.50
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
www.jezebel.com
172.67.13.9
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
www.mozorg.moz.works
18.239.17.158
eat.hungryroot.com
159.89.133.227
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
www.google.com
172.217.18.4
www.themarshallproject.org
104.22.69.164
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
img-prod.pocket.prod.cloudops.mozgcp.net
34.120.237.76
twitter.com
104.244.42.1
getpocket.com
143.204.98.129
www.wired.com
108.156.60.57
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
pki-goog.l.google.com
142.250.185.227
youtube-ui.l.google.com
172.217.18.14
attachments.prod.remote-settings.prod.webservices.mozgcp.net
34.117.121.53
www3.l.google.com
142.250.185.238
play.google.com
142.250.185.142
reddit.map.fastly.net
151.101.65.140
d3ag4hukkh62yn.cloudfront.net
99.86.2.175
googlehosted.l.googleusercontent.com
142.250.185.161
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
There are 54 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.31
unknown
Russian Federation
malicious
185.215.113.19
unknown
Portugal
malicious
143.204.9.50
mitmdetection.services.mozilla.com
United States
13.107.246.40
unknown
United States
142.250.80.110
unknown
United States
34.120.237.76
img-prod.pocket.prod.cloudops.mozgcp.net
United States
142.251.40.206
unknown
United States
192.168.2.5
unknown
unknown
162.159.61.3
chrome.cloudflare-dns.com
United States
142.250.185.142
play.google.com
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
172.217.16.142
unknown
United States
34.117.121.53
attachments.prod.remote-settings.prod.webservices.mozgcp.net
United States
34.120.5.221
prod.pocket.prod.cloudops.mozgcp.net
United States
172.217.18.4
www.google.com
United States
185.215.113.16
unknown
Portugal
172.253.62.84
unknown
United States
239.255.255.250
unknown
Reserved
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
23.96.180.189
unknown
United States
172.217.18.14
youtube-ui.l.google.com
United States
152.195.19.97
unknown
United States
34.149.97.1
firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net
United States
172.217.23.110
unknown
United States
142.250.181.238
unknown
United States
34.117.188.166
contile.services.mozilla.com
United States
142.251.32.100
unknown
United States
142.250.185.161
googlehosted.l.googleusercontent.com
United States
142.250.65.195
unknown
United States
172.217.16.206
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
142.251.40.238
unknown
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
18.65.39.112
services.addons.mozilla.org
United States
142.251.40.163
unknown
United States
142.250.186.164
unknown
United States
34.36.165.17
tiles-cdn.prod.ads.prod.webservices.mozgcp.net
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
There are 31 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{6d6da0a1-ca65-8644-276d-7af6e19e6b37}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
48f0ec6733.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ee7a49fbf0.exe
malicious
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
ProgramId
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
FileId
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
LowerCaseLongPath
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
LongPathHash
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
Name
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
OriginalFileName
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
Publisher
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
Version
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
BinFileVersion
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
BinaryType
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
ProductName
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
ProductVersion
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
LinkDate
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
BinProductVersion
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
AppxPackageFullName
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
AppxPackageRelativeId
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
Size
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
Language
\REGISTRY\A\{b8570d58-f316-aa79-6f63-ad506b7645a1}\Root\InventoryApplicationFile\48f0ec6733.exe|b4cec34a48679dd7
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400F27665AC8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\525468
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 158 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
52F0000
direct allocation
page read and write
malicious
24CA000
heap
page read and write
malicious
48F0000
direct allocation
page read and write
malicious
E71000
unkown
page execute and read and write
malicious
4E60000
direct allocation
page read and write
malicious
5010000
direct allocation
page read and write
malicious
2717000
heap
page read and write
malicious
661000
unkown
page execute and read and write
malicious
52D0000
direct allocation
page read and write
malicious
48A0000
direct allocation
page read and write
malicious
661000
unkown
page execute and read and write
malicious
2736000
heap
page read and write
malicious
661000
unkown
page execute and read and write
malicious
B21000
unkown
page execute and read and write
malicious
B21000
unkown
page execute and read and write
malicious
B21000
unkown
page execute and read and write
malicious
4FF0000
direct allocation
page read and write
malicious
4D70000
direct allocation
page read and write
malicious
751000
unkown
page execute and read and write
malicious
16DDF4AA000
trusted library allocation
page read and write
260EA5F0000
heap
page read and write
16DDF3FC000
trusted library allocation
page read and write
22B02198000
heap
page read and write
221E20C8000
trusted library allocation
page read and write
16DCF167000
heap
page read and write
16DDEABA000
trusted library allocation
page read and write
16DDF998000
trusted library allocation
page read and write
4B71000
heap
page read and write
132D000
unkown
page execute and read and write
FB4000
heap
page read and write
16DCF17D000
heap
page read and write
A16000
unkown
page execute and read and write
16DDF988000
trusted library allocation
page read and write
299E000
stack
page read and write
16DDF961000
trusted library allocation
page read and write
22CA3000
heap
page read and write
5000000
direct allocation
page execute and read and write
16DDCE8A000
trusted library allocation
page read and write
16DE68DC000
trusted library allocation
page read and write
16DDDFE8000
trusted library allocation
page read and write
16DEA3BF000
trusted library allocation
page read and write
26FD000
heap
page execute and read and write
16DE6932000
trusted library allocation
page read and write
22B01DE8000
heap
page read and write
16DEF393000
trusted library allocation
page read and write
16DDDBB3000
trusted library allocation
page read and write
16DEA30B000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDA5DD000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DE68F0000
trusted library allocation
page read and write
FB4000
heap
page read and write
48DF000
stack
page read and write
16DDA6CD000
trusted library allocation
page read and write
16DE4700000
trusted library allocation
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DE4730000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
16DEA39D000
trusted library allocation
page read and write
16DDD4C5000
trusted library allocation
page read and write
3DDE000
stack
page read and write
16DCF198000
heap
page read and write
22B0216B000
heap
page read and write
16DDCC9D000
trusted library allocation
page read and write
16DDD4E0000
trusted library allocation
page read and write
16DDF3F8000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDD469000
trusted library allocation
page read and write
2D9E000
stack
page read and write
22C7F000
heap
page read and write
6DE000
stack
page read and write
16DDDB78000
trusted library allocation
page read and write
4421000
heap
page read and write
16DCF188000
heap
page read and write
316F000
stack
page read and write
16DDA51C000
trusted library allocation
page read and write
16DE07A1000
trusted library allocation
page read and write
16DDD4D8000
trusted library allocation
page read and write
6C7FF000
unkown
page write copy
16DE49D2000
trusted library allocation
page read and write
16DE68D7000
trusted library allocation
page read and write
16DDA5AE000
trusted library allocation
page read and write
16DDD4F3000
trusted library allocation
page read and write
22B02140000
heap
page read and write
F70FFFE000
stack
page read and write
16DDCE76000
trusted library allocation
page read and write
16DDDBD3000
trusted library allocation
page read and write
16DE04CA000
trusted library allocation
page read and write
16DE49F8000
trusted library allocation
page read and write
16DE9D90000
trusted library allocation
page read and write
13F0000
heap
page read and write
16DEA27A000
trusted library allocation
page read and write
16DCF197000
heap
page read and write
16DDA6CF000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DE4700000
trusted library allocation
page read and write
16DE03CA000
trusted library allocation
page read and write
16DEA946000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDA557000
trusted library allocation
page read and write
16DDD4BD000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
23EDA0224000
trusted library allocation
page read and write
16DDCECB000
trusted library allocation
page read and write
D24000
heap
page read and write
16DE48BE000
trusted library allocation
page read and write
48DB000
stack
page read and write
16DDCC85000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DEA3E9000
trusted library allocation
page read and write
22C8D000
heap
page read and write
9E4000
heap
page read and write
16DDA5B8000
trusted library allocation
page read and write
1205000
heap
page read and write
FB4000
heap
page read and write
16DCF17D000
heap
page read and write
16DDA5C9000
trusted library allocation
page read and write
16DDA52A000
trusted library allocation
page read and write
16DE5A3C000
trusted library allocation
page read and write
6C621000
unkown
page execute read
16DDDBE6000
trusted library allocation
page read and write
16DE06E1000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
C974EBB000
stack
page read and write
3FAE000
stack
page read and write
16DEAAE8000
trusted library allocation
page read and write
6C581000
unkown
page execute read
16DE0452000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDD4D6000
trusted library allocation
page read and write
16DD912F000
trusted library allocation
page read and write
FCD000
unkown
page execute and write copy
4B70000
heap
page read and write
16DE9DE6000
trusted library allocation
page read and write
5331000
direct allocation
page read and write
4860000
heap
page read and write
16DE637C000
trusted library allocation
page read and write
16DE62E9000
trusted library allocation
page read and write
4B80000
heap
page read and write
16DE07D8000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DCF193000
heap
page read and write
16DD94EC000
trusted library allocation
page read and write
16DCF198000
heap
page read and write
221E1E9F000
unclassified section
page read and write
25F0000
heap
page read and write
4421000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
221E206E000
trusted library allocation
page read and write
16DEA972000
trusted library allocation
page read and write
16DDA68B000
trusted library allocation
page read and write
416F000
stack
page read and write
16DEE3E5000
trusted library allocation
page read and write
19E000
stack
page read and write
396F000
stack
page read and write
22B019F0000
heap
page read and write
16DDF2C0000
trusted library allocation
page read and write
37AE000
stack
page read and write
9E4000
heap
page read and write
5C4000
heap
page read and write
325F000
stack
page read and write
221E2210000
trusted library allocation
page read and write
16DCF184000
heap
page read and write
16DCF17F000
heap
page read and write
16DE4710000
trusted library allocation
page read and write
16DE078B000
trusted library allocation
page read and write
16DDD466000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
523C000
stack
page read and write
6145000
heap
page read and write
16DDF3A5000
trusted library allocation
page read and write
5270DFE000
stack
page read and write
16DDF966000
trusted library allocation
page read and write
5071000
direct allocation
page read and write
16DDF849000
trusted library allocation
page read and write
16DEE287000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDF38F000
trusted library allocation
page read and write
9C000
stack
page read and write
5C4000
heap
page read and write
16DE475D000
trusted library allocation
page read and write
16DEA45D000
trusted library allocation
page read and write
2D9F000
stack
page read and write
16DDE0AE000
trusted library allocation
page read and write
16DDF9D0000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
19C000
stack
page read and write
16DEA209000
trusted library allocation
page read and write
16DE4ABB000
trusted library allocation
page read and write
3F1E000
stack
page read and write
16DCF188000
heap
page read and write
16DDCE4C000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
22B021A7000
heap
page read and write
4B71000
heap
page read and write
16DEE2D2000
trusted library allocation
page read and write
16DDDB4A000
trusted library allocation
page read and write
660000
unkown
page readonly
16DD94A9000
trusted library allocation
page read and write
431E000
stack
page read and write
4B71000
heap
page read and write
5ABE000
stack
page read and write
16DCF192000
heap
page read and write
16DE9752000
trusted library allocation
page read and write
3AAE000
stack
page read and write
5C4000
heap
page read and write
2EF4F000
heap
page read and write
16DEF128000
trusted library allocation
page read and write
16DDDBA6000
trusted library allocation
page read and write
38DF000
stack
page read and write
16DCF195000
heap
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DDE0A4000
trusted library allocation
page read and write
16DE0768000
trusted library allocation
page read and write
16DEA989000
trusted library allocation
page read and write
16DDD49D000
trusted library allocation
page read and write
16DE4B20000
trusted library allocation
page read and write
16DDD37B000
trusted library allocation
page read and write
16DEE258000
trusted library allocation
page read and write
16DDD4E9000
trusted library allocation
page read and write
967000
unkown
page execute and read and write
16DE9DAB000
trusted library allocation
page read and write
16DDCC1B000
trusted library allocation
page read and write
16DE6692000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDDB78000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
16DE99E2000
trusted library allocation
page read and write
16DE4AD4000
trusted library allocation
page read and write
16DE07CC000
trusted library allocation
page read and write
3A8E000
stack
page read and write
2D70000
direct allocation
page read and write
4421000
heap
page read and write
9E4000
heap
page read and write
16DD8BEF000
trusted library allocation
page read and write
16DDF362000
trusted library allocation
page read and write
16DDF3AC000
trusted library allocation
page read and write
16DDCE62000
trusted library allocation
page read and write
16DD94B0000
trusted library allocation
page read and write
341E000
stack
page read and write
244C000
unkown
page readonly
11F4000
heap
page read and write
221E200D000
trusted library allocation
page read and write
16DDF38F000
trusted library allocation
page read and write
E2E000
unkown
page execute and write copy
30B0000
direct allocation
page read and write
446E000
stack
page read and write
16DE48E4000
trusted library allocation
page read and write
391E000
stack
page read and write
16DE4978000
trusted library allocation
page read and write
16DDCEE0000
trusted library allocation
page read and write
22B01579000
trusted library allocation
page read and write
16DDE46B000
trusted library allocation
page read and write
16DDDBA8000
trusted library allocation
page read and write
16DE685E000
trusted library allocation
page read and write
4B71000
heap
page read and write
CA5000
heap
page read and write
221E2136000
heap
page read and write
16DE97BE000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
16DE03F1000
trusted library allocation
page read and write
16DE68A8000
trusted library allocation
page read and write
16DDF961000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
4421000
heap
page read and write
400000
unkown
page readonly
2F2E000
stack
page read and write
C972BBD000
stack
page read and write
2610000
direct allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
16DDDB97000
trusted library allocation
page read and write
291F3940000
heap
page read and write
22C87000
heap
page read and write
38AF000
stack
page read and write
27DF000
stack
page read and write
4421000
heap
page read and write
16DE4732000
trusted library allocation
page read and write
FB4000
heap
page read and write
63E000
unkown
page execute and read and write
97D000
unkown
page execute and write copy
16DEE234000
trusted library allocation
page read and write
16DEA400000
trusted library allocation
page read and write
16DDF898000
trusted library allocation
page read and write
16DDDFEA000
trusted library allocation
page read and write
D01000
heap
page read and write
B89000
unkown
page read and write
13C0000
heap
page read and write
16DCF17F000
heap
page read and write
16DDCC7F000
trusted library allocation
page read and write
5F4000
heap
page read and write
16DED563000
trusted library allocation
page read and write
16DCF195000
heap
page read and write
16DCF19B000
heap
page read and write
16DDCC6C000
trusted library allocation
page read and write
46AE000
stack
page read and write
16DDF2C4000
trusted library allocation
page read and write
16DDF9B0000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
9E4000
heap
page read and write
3E4E000
stack
page read and write
16DE9AE8000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDC9DF000
trusted library allocation
page read and write
16DDDB97000
trusted library allocation
page read and write
16DD94D7000
trusted library allocation
page read and write
8E51000
heap
page read and write
16DE9DDC000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
5070000
direct allocation
page execute and read and write
16DCF188000
heap
page read and write
16DDCEE0000
trusted library allocation
page read and write
22B01D08000
heap
page read and write
14C0000
direct allocation
page read and write
221E2012000
trusted library allocation
page read and write
16DEA27A000
trusted library allocation
page read and write
16DD9123000
trusted library allocation
page read and write
346E000
stack
page read and write
16DDD3CA000
trusted library allocation
page read and write
16DDCC9D000
trusted library allocation
page read and write
16DDDBF1000
trusted library allocation
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DDD4E4000
trusted library allocation
page read and write
16DE06E5000
trusted library allocation
page read and write
413000
unkown
page readonly
16DE66CA000
trusted library allocation
page read and write
16DDCE4C000
trusted library allocation
page read and write
E2E000
unkown
page execute and write copy
9B000
stack
page read and write
16DEA9D1000
trusted library allocation
page read and write
16DE5A7A000
trusted library allocation
page read and write
16DDD43B000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DDF986000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
11E7000
heap
page read and write
5000000
direct allocation
page read and write
FB4000
heap
page read and write
2530000
heap
page read and write
466F000
stack
page read and write
401000
unkown
page execute read
22B02184000
heap
page read and write
16DDD477000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
CAF000
heap
page read and write
16DEE2DE000
trusted library allocation
page read and write
16DCF182000
heap
page read and write
22B021A7000
heap
page read and write
16DD94B0000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDF242000
trusted library allocation
page read and write
16DE4AD9000
trusted library allocation
page read and write
3E6E000
stack
page read and write
16DDCC21000
trusted library allocation
page read and write
16DEA972000
trusted library allocation
page read and write
16DDCC2C000
trusted library allocation
page read and write
16DDDB88000
trusted library allocation
page read and write
16DE6857000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDF3A5000
trusted library allocation
page read and write
16DDC9FA000
trusted library allocation
page read and write
3B2F000
stack
page read and write
22B0217C000
heap
page read and write
2C9E000
stack
page read and write
16DDD4FC000
trusted library allocation
page read and write
16DD94E1000
trusted library allocation
page read and write
22C87000
heap
page read and write
16DDCC32000
trusted library allocation
page read and write
16DDDB72000
trusted library allocation
page read and write
93C000
unkown
page execute and read and write
16DDD4DB000
trusted library allocation
page read and write
16DDA5C7000
trusted library allocation
page read and write
16DDD470000
trusted library allocation
page read and write
16DE66DD000
trusted library allocation
page read and write
1201000
heap
page read and write
16DD9418000
trusted library allocation
page read and write
16DD8BC0000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDDBEE000
trusted library allocation
page read and write
16DDDBAB000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DDF3AF000
trusted library allocation
page read and write
16DDF3A3000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
259E000
stack
page read and write
120D000
heap
page read and write
9E4000
heap
page read and write
4DAE000
stack
page read and write
9E4000
heap
page read and write
16DDCE40000
trusted library allocation
page read and write
16DCF1A0000
heap
page read and write
16DDDBA6000
trusted library allocation
page read and write
9E4000
heap
page read and write
4B71000
heap
page read and write
16DE04C2000
trusted library allocation
page read and write
16DDA53B000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
16DDCE54000
trusted library allocation
page read and write
22C8D000
heap
page read and write
30EE000
stack
page read and write
16DE4865000
trusted library allocation
page read and write
16DDA5B8000
trusted library allocation
page read and write
16DCF1A3000
heap
page read and write
16DDA56F000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDF138000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DEA865000
trusted library allocation
page read and write
419F000
stack
page read and write
16DDE0A0000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
16DDCEA4000
trusted library allocation
page read and write
16DE67CA000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DEA9CC000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
16DE9923000
trusted library allocation
page read and write
16DEA3C2000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
4AB0000
trusted library allocation
page read and write
4421000
heap
page read and write
16DEAAF5000
trusted library allocation
page read and write
16DE4BF3000
trusted library allocation
page read and write
16DDF3F6000
trusted library allocation
page read and write
2540000
heap
page read and write
16DDDBA8000
trusted library allocation
page read and write
16DE9E56000
trusted library allocation
page read and write
16DDF3EE000
trusted library allocation
page read and write
16DDA456000
trusted library allocation
page read and write
268F000
stack
page read and write
16DEE234000
trusted library allocation
page read and write
16DDD483000
trusted library allocation
page read and write
53DD000
stack
page read and write
16DE07D0000
trusted library allocation
page read and write
3BAE000
stack
page read and write
897B000
stack
page read and write
16DE4771000
trusted library allocation
page read and write
16DCF197000
heap
page read and write
16DDA5E8000
trusted library allocation
page read and write
28D3C000
heap
page read and write
16DEA924000
trusted library allocation
page read and write
43EF000
stack
page read and write
16DE9D96000
trusted library allocation
page read and write
16DE04A9000
trusted library allocation
page read and write
16DCF193000
heap
page read and write
9E5000
heap
page read and write
4100000
heap
page read and write
16DD94EC000
trusted library allocation
page read and write
429F000
stack
page read and write
16DD9466000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
D22000
heap
page read and write
52705FE000
unkown
page readonly
302E000
stack
page read and write
16DDCE1F000
trusted library allocation
page read and write
16DDF38F000
trusted library allocation
page read and write
16DDD4C7000
trusted library allocation
page read and write
16DDF355000
trusted library allocation
page read and write
16DCF195000
heap
page read and write
741A000
heap
page read and write
4B71000
heap
page read and write
16DECE14000
trusted library allocation
page read and write
16DDC9FA000
trusted library allocation
page read and write
16DDF2BD000
trusted library allocation
page read and write
530E000
stack
page read and write
9E4000
heap
page read and write
16DDD47F000
trusted library allocation
page read and write
124C000
heap
page read and write
16DE6811000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
16DCF17A000
heap
page read and write
4421000
heap
page read and write
587D000
stack
page read and write
16DDA5AE000
trusted library allocation
page read and write
22B01DB9000
heap
page read and write
16DEA962000
trusted library allocation
page read and write
48E1000
heap
page read and write
3B8F000
stack
page read and write
16DDF4AA000
trusted library allocation
page read and write
97E000
unkown
page execute and write copy
3F6E000
stack
page read and write
16DDCCCF000
trusted library allocation
page read and write
16DDCE40000
trusted library allocation
page read and write
4C0E000
stack
page read and write
16DCF17D000
heap
page read and write
1C920000
heap
page read and write
16DE62E0000
trusted library allocation
page read and write
9E4000
heap
page read and write
A4F000
unkown
page execute and read and write
4B70000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
22B01D5C000
heap
page read and write
C9735D8000
stack
page read and write
C974E7E000
unkown
page readonly
16DCF172000
heap
page read and write
ED9000
unkown
page write copy
16DECC28000
trusted library allocation
page read and write
93B000
unkown
page execute and read and write
16DDF988000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
16DECC35000
trusted library allocation
page read and write
16DE07D4000
trusted library allocation
page read and write
16DEA430000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
221E1DC0000
heap
page read and write
16DEA83E000
trusted library allocation
page read and write
E2E000
unkown
page execute and read and write
22B0217C000
heap
page read and write
49E0000
direct allocation
page execute and read and write
16DE043D000
trusted library allocation
page read and write
16DE68BF000
trusted library allocation
page read and write
16DDD4D8000
trusted library allocation
page read and write
9E4000
heap
page read and write
4FD000
unkown
page execute and read and write
B89000
unkown
page read and write
16DDA33C000
trusted library allocation
page read and write
2C1F000
stack
page read and write
16DDCEC4000
trusted library allocation
page read and write
16DDCEE0000
trusted library allocation
page read and write
E1F000
unkown
page execute and read and write
16DDF486000
trusted library allocation
page read and write
FCB000
unkown
page execute and read and write
3C9F000
stack
page read and write
24B0000
heap
page execute and read and write
16DE68E8000
trusted library allocation
page read and write
1F0000
heap
page read and write
16DE0467000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
4FE000
heap
page read and write
FB4000
heap
page read and write
16DEA8C4000
trusted library allocation
page read and write
16DDF98E000
trusted library allocation
page read and write
2FEF000
stack
page read and write
16DDDB82000
trusted library allocation
page read and write
1227000
heap
page read and write
22B01D60000
heap
page read and write
16DEA950000
trusted library allocation
page read and write
2535000
heap
page read and write
16DCF18E000
heap
page read and write
16DE9974000
trusted library allocation
page read and write
16DDF8F1000
trusted library allocation
page read and write
16DEA3FE000
trusted library allocation
page read and write
FB4000
heap
page read and write
2D60000
heap
page read and write
22B0155C000
trusted library allocation
page read and write
40AF000
stack
page read and write
FB4000
heap
page read and write
16DDDB78000
trusted library allocation
page read and write
16DCF19C000
heap
page read and write
16DDDBE0000
trusted library allocation
page read and write
16DE692A000
trusted library allocation
page read and write
4B71000
heap
page read and write
9E4000
heap
page read and write
16DDF89A000
trusted library allocation
page read and write
16DEA9DA000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
16DCF1A0000
heap
page read and write
16DCF19D000
heap
page read and write
16DDF99B000
trusted library allocation
page read and write
14EB000
heap
page read and write
47AF000
stack
page read and write
16DE6872000
trusted library allocation
page read and write
16DE5A03000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
16DDCC6E000
trusted library allocation
page read and write
16DDD4E9000
trusted library allocation
page read and write
16DE4AFA000
trusted library allocation
page read and write
9E4000
heap
page read and write
46CF000
stack
page read and write
9E4000
heap
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DDF354000
trusted library allocation
page read and write
22D6B000
heap
page read and write
4B71000
heap
page read and write
16DE99EA000
trusted library allocation
page read and write
22C87000
heap
page read and write
9E4000
heap
page read and write
16DE68CE000
trusted library allocation
page read and write
16DECC10000
trusted library allocation
page read and write
CBB000
heap
page read and write
16DEE23E000
trusted library allocation
page read and write
16DDE0BB000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
16DE5A32000
trusted library allocation
page read and write
16DD8BB3000
trusted library allocation
page read and write
354F000
stack
page read and write
14D0000
heap
page read and write
16DE9769000
trusted library allocation
page read and write
16DDCC8E000
trusted library allocation
page read and write
221E1E3A000
heap
page read and write
16DDF97F000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
11F4000
heap
page read and write
16DE045E000
trusted library allocation
page read and write
16DE6212000
trusted library allocation
page read and write
FB4000
heap
page read and write
7DA000
heap
page read and write
16DDCC9E000
trusted library allocation
page read and write
16DDA5BE000
trusted library allocation
page read and write
16DDA34A000
trusted library allocation
page read and write
FB4000
heap
page read and write
1235000
heap
page read and write
16DDD4D6000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
16DECD83000
trusted library allocation
page read and write
16DE4A27000
trusted library allocation
page read and write
16DDCC8B000
trusted library allocation
page read and write
16DEAAEC000
trusted library allocation
page read and write
16DE04FC000
trusted library allocation
page read and write
537E000
stack
page read and write
B82000
unkown
page execute and read and write
16DCF1A6000
heap
page read and write
16DDDBA8000
trusted library allocation
page read and write
16DDDFF9000
trusted library allocation
page read and write
16DE04EE000
trusted library allocation
page read and write
16DE67AE000
trusted library allocation
page read and write
22B01DE9000
heap
page read and write
16DDCE4C000
trusted library allocation
page read and write
5C4000
heap
page read and write
40A0000
direct allocation
page execute and read and write
16DDF1D5000
trusted library allocation
page read and write
16DDD48F000
trusted library allocation
page read and write
16DE9DCD000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
427000
unkown
page write copy
61EB7000
direct allocation
page readonly
16DDF3F6000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
198000
stack
page read and write
16DCF177000
heap
page read and write
16DDA6F3000
trusted library allocation
page read and write
16DE473C000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
16DCE849000
heap
page read and write
11F4000
heap
page read and write
16DDDB8C000
trusted library allocation
page read and write
16DDF362000
trusted library allocation
page read and write
16DDCC7F000
trusted library allocation
page read and write
16DDE4B9000
trusted library allocation
page read and write
5F4000
heap
page read and write
16DDDB95000
trusted library allocation
page read and write
16DDD4DB000
trusted library allocation
page read and write
4B71000
heap
page read and write
540F000
stack
page read and write
16DDDB2A000
trusted library allocation
page read and write
16DD94D7000
trusted library allocation
page read and write
16DDF4C0000
trusted library allocation
page read and write
16DDA5C7000
trusted library allocation
page read and write
4421000
heap
page read and write
D3C000
heap
page read and write
16DEAA7B000
trusted library allocation
page read and write
16DE9AAB000
trusted library allocation
page read and write
3B6E000
stack
page read and write
16DDCC8B000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
16DCF167000
heap
page read and write
FB4000
heap
page read and write
16DDF07D000
trusted library allocation
page read and write
16DE97FC000
trusted library allocation
page read and write
16DDC9DD000
trusted library allocation
page read and write
16DDDBAB000
trusted library allocation
page read and write
16DDDBEB000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE6880000
trusted library allocation
page read and write
16DE6920000
trusted library allocation
page read and write
16DE06ED000
trusted library allocation
page read and write
16DE9AAB000
trusted library allocation
page read and write
16DDD36B000
trusted library allocation
page read and write
16DE04CA000
trusted library allocation
page read and write
22B01577000
trusted library allocation
page read and write
38EE000
stack
page read and write
16DDEAE5000
trusted library allocation
page read and write
16DDDBAA000
trusted library allocation
page read and write
1380000
heap
page read and write
FB4000
heap
page read and write
16DE9780000
trusted library allocation
page read and write
16DDCCB6000
trusted library allocation
page read and write
16DE66AC000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
1CAA0000
heap
page read and write
B82000
unkown
page execute and read and write
221E2232000
trusted library allocation
page read and write
22B01DE0000
heap
page read and write
16DDA4C1000
trusted library allocation
page read and write
2D70000
direct allocation
page read and write
16DDD4D0000
trusted library allocation
page read and write
415E000
stack
page read and write
16DEF36F000
trusted library allocation
page read and write
FB4000
heap
page read and write
2514000
heap
page read and write
4421000
heap
page read and write
16DDD4BC000
trusted library allocation
page read and write
16DDEA6A000
trusted library allocation
page read and write
16DEA968000
trusted library allocation
page read and write
16DE4ABE000
trusted library allocation
page read and write
16DDA5C9000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
16DCF171000
heap
page read and write
4421000
heap
page read and write
16DE4B61000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DE68F2000
trusted library allocation
page read and write
16DDCEAD000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
16DDD4F7000
trusted library allocation
page read and write
16DDF898000
trusted library allocation
page read and write
16DDCC7F000
trusted library allocation
page read and write
B21000
unkown
page execute and write copy
16DEA865000
trusted library allocation
page read and write
7840000
heap
page read and write
CEE000
heap
page read and write
372E000
stack
page read and write
16DDA4CA000
trusted library allocation
page read and write
16DE9AF7000
trusted library allocation
page read and write
587000
unkown
page execute and read and write
16DDD39B000
trusted library allocation
page read and write
16DCF19D000
heap
page read and write
2D60000
heap
page read and write
4D1000
unkown
page execute and read and write
37EE000
stack
page read and write
F10000
heap
page read and write
85A000
unkown
page execute and read and write
11E0000
direct allocation
page read and write
16DD8BBF000
trusted library allocation
page read and write
16DDDB72000
trusted library allocation
page read and write
16DDCC32000
trusted library allocation
page read and write
48E1000
heap
page read and write
16DDA5B8000
trusted library allocation
page read and write
4421000
heap
page read and write
22C7D000
heap
page read and write
22B02169000
heap
page read and write
16DCF175000
heap
page read and write
30B0000
direct allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DDD4B6000
trusted library allocation
page read and write
16DDEA9B000
trusted library allocation
page read and write
16DEA9A1000
trusted library allocation
page read and write
16DEA207000
trusted library allocation
page read and write
16DCF19A000
heap
page read and write
16DDF879000
trusted library allocation
page read and write
16DEA84A000
trusted library allocation
page read and write
16DCF1A6000
heap
page read and write
16DDCE5F000
trusted library allocation
page read and write
16DDF1FA000
trusted library allocation
page read and write
16DE9AF9000
trusted library allocation
page read and write
1C630000
heap
page read and write
FB4000
heap
page read and write
16DDD378000
trusted library allocation
page read and write
16DE68B6000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDD8A3000
trusted library allocation
page read and write
16DDDB78000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
16DDCEC5000
trusted library allocation
page read and write
16DE662C000
trusted library allocation
page read and write
16DCF184000
heap
page read and write
6C9000
unkown
page write copy
22B02184000
heap
page read and write
16DEA9B5000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DEE25A000
trusted library allocation
page read and write
16DDD476000
trusted library allocation
page read and write
6146000
heap
page read and write
16DDF2F6000
trusted library allocation
page read and write
16DDDBE6000
trusted library allocation
page read and write
16DDCCB1000
trusted library allocation
page read and write
16DDF988000
trusted library allocation
page read and write
16DDA5F1000
trusted library allocation
page read and write
16DEA34E000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
16DE978E000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DE07CE000
trusted library allocation
page read and write
D23000
heap
page read and write
16DDDBE3000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DEA9C1000
trusted library allocation
page read and write
16DDF35C000
trusted library allocation
page read and write
4E31000
heap
page read and write
16DCF17F000
heap
page read and write
16DDD4C4000
trusted library allocation
page read and write
16DE5A35000
trusted library allocation
page read and write
16DEE3E5000
trusted library allocation
page read and write
16DDCC14000
trusted library allocation
page read and write
16DE997A000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF296000
trusted library allocation
page read and write
16DE68F0000
trusted library allocation
page read and write
22B01654000
heap
page read and write
B1D000
unkown
page execute and read and write
16DDCC14000
trusted library allocation
page read and write
2EEAF000
stack
page read and write
4421000
heap
page read and write
16DDF879000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
3C9E000
stack
page read and write
16DDF36B000
trusted library allocation
page read and write
16DE5EB5000
trusted library allocation
page read and write
22B01D01000
heap
page read and write
16DDDB69000
trusted library allocation
page read and write
22B015BD000
trusted library allocation
page read and write
16DDCEB4000
trusted library allocation
page read and write
16DE9E4A000
trusted library allocation
page read and write
16DEF375000
trusted library allocation
page read and write
16DE4A3A000
trusted library allocation
page read and write
16DDCC21000
trusted library allocation
page read and write
16DDF988000
trusted library allocation
page read and write
C976EFE000
unkown
page readonly
16DDF3A3000
trusted library allocation
page read and write
16DE06FE000
trusted library allocation
page read and write
49B1000
heap
page read and write
16DEF314000
trusted library allocation
page read and write
16DDDB62000
trusted library allocation
page read and write
37AF000
stack
page read and write
547F000
stack
page read and write
22C87000
heap
page read and write
16DDD360000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
291F3870000
heap
page read and write
16DE9DB0000
trusted library allocation
page read and write
16DDF97B000
trusted library allocation
page read and write
16DDCEB4000
trusted library allocation
page read and write
16DE9E54000
trusted library allocation
page read and write
135E000
stack
page read and write
16DDF988000
trusted library allocation
page read and write
16DEA8CF000
trusted library allocation
page read and write
FB5000
heap
page read and write
16DEA9DA000
trusted library allocation
page read and write
43DF000
stack
page read and write
9E4000
heap
page read and write
16DDF9CB000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDCC14000
trusted library allocation
page read and write
16DEA311000
trusted library allocation
page read and write
FB4000
heap
page read and write
22CAD000
heap
page read and write
14C0000
direct allocation
page read and write
16DDA5DD000
trusted library allocation
page read and write
4E0000
heap
page read and write
2D40000
heap
page read and write
1400000
heap
page read and write
8CDC000
stack
page read and write
16DDA5CB000
trusted library allocation
page read and write
1404000
heap
page read and write
16DDC9A0000
trusted library allocation
page read and write
16DE9AAF000
trusted library allocation
page read and write
16DE68BF000
trusted library allocation
page read and write
A5F000
unkown
page execute and write copy
9E4000
heap
page read and write
16DDD352000
trusted library allocation
page read and write
16DDE07C000
trusted library allocation
page read and write
5C4000
heap
page read and write
4A1C000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
22B01290000
heap
page readonly
9E4000
heap
page read and write
9E4000
heap
page read and write
16DEA9D1000
trusted library allocation
page read and write
16DEAA9C000
trusted library allocation
page read and write
16DDDBEB000
trusted library allocation
page read and write
4E31000
heap
page read and write
16DE6328000
trusted library allocation
page read and write
16DEE3DC000
trusted library allocation
page read and write
16DE9755000
trusted library allocation
page read and write
16DCF184000
heap
page read and write
493000
unkown
page execute and read and write
39DF000
stack
page read and write
16DDDB62000
trusted library allocation
page read and write
16DE9406000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDCC8C000
trusted library allocation
page read and write
B20000
unkown
page readonly
16DDCE5F000
trusted library allocation
page read and write
122F000
heap
page read and write
16DE07CC000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
221E2079000
trusted library allocation
page read and write
16DDDBEB000
trusted library allocation
page read and write
16DE9DC6000
trusted library allocation
page read and write
16DE62D0000
trusted library allocation
page read and write
16DDF3EF000
trusted library allocation
page read and write
9E4000
heap
page read and write
22B01D7D000
heap
page read and write
96E000
unkown
page execute and read and write
16DDCC19000
trusted library allocation
page read and write
22B01400000
trusted library allocation
page read and write
16DE4BB9000
trusted library allocation
page read and write
221E2081000
trusted library allocation
page read and write
16DDF285000
trusted library allocation
page read and write
45FE000
stack
page read and write
9E4000
heap
page read and write
16DCF185000
heap
page read and write
16DE97FC000
trusted library allocation
page read and write
16DDA46C000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDE0B9000
trusted library allocation
page read and write
16DDA59E000
trusted library allocation
page read and write
22C6B000
heap
page read and write
16DE67EF000
trusted library allocation
page read and write
16DDA460000
trusted library allocation
page read and write
16DDF85C000
trusted library allocation
page read and write
22C71000
heap
page read and write
45AE000
stack
page read and write
16DD94A9000
trusted library allocation
page read and write
22C77000
heap
page read and write
16DDA66B000
trusted library allocation
page read and write
16DDF2FE000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
16DE97FC000
trusted library allocation
page read and write
16DE9DD1000
trusted library allocation
page read and write
5F4000
heap
page read and write
4476000
heap
page read and write
16DE6214000
trusted library allocation
page read and write
16DE04FB000
trusted library allocation
page read and write
16DEE3F6000
trusted library allocation
page read and write
16DD91EE000
trusted library allocation
page read and write
16DEA27A000
trusted library allocation
page read and write
22C87000
heap
page read and write
FB4000
heap
page read and write
26EE000
heap
page read and write
22B01DA1000
heap
page read and write
2D50000
direct allocation
page read and write
419E000
stack
page read and write
22C8D000
heap
page read and write
11E0000
direct allocation
page read and write
400000
unkown
page readonly
16DDCC96000
trusted library allocation
page read and write
970000
heap
page read and write
1404000
heap
page read and write
5430000
direct allocation
page execute and read and write
FB4000
heap
page read and write
142E000
heap
page read and write
22C80000
heap
page read and write
16DDF95E000
trusted library allocation
page read and write
16DDCC6C000
trusted library allocation
page read and write
16DEAAFD000
trusted library allocation
page read and write
16DE5D2D000
trusted library allocation
page read and write
22B012B0000
unclassified section
page read and write
366F000
stack
page read and write
1C61F000
stack
page read and write
16DDCC8C000
trusted library allocation
page read and write
660000
unkown
page readonly
16DE9A85000
trusted library allocation
page read and write
FB4000
heap
page read and write
4A6E000
stack
page read and write
16DDDBEE000
trusted library allocation
page read and write
526E37B000
stack
page read and write
16DE4BBA000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DE9D8B000
trusted library allocation
page read and write
4421000
heap
page read and write
E70000
unkown
page readonly
16DEF7CD000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
16DDE0C3000
trusted library allocation
page read and write
16DD94E1000
trusted library allocation
page read and write
4421000
heap
page read and write
4A10000
direct allocation
page execute and read and write
16DDD498000
trusted library allocation
page read and write
16DDA5CD000
trusted library allocation
page read and write
16DDF98E000
trusted library allocation
page read and write
396E000
stack
page read and write
342E000
stack
page read and write
5450000
direct allocation
page execute and read and write
44EE000
stack
page read and write
9E4000
heap
page read and write
16DE6899000
trusted library allocation
page read and write
16DCF171000
heap
page read and write
3F5E000
stack
page read and write
16DDDFE2000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDCCB2000
trusted library allocation
page read and write
16DDCEA4000
trusted library allocation
page read and write
16DED300000
trusted library allocation
page read and write
16DCF1AE000
heap
page read and write
16DE07D2000
trusted library allocation
page read and write
16DEA261000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE4A9E000
trusted library allocation
page read and write
16DE685B000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDA4CA000
trusted library allocation
page read and write
16DDD466000
trusted library allocation
page read and write
16DDDBF1000
trusted library allocation
page read and write
11F4000
heap
page read and write
4BEE000
stack
page read and write
16DDDB7D000
trusted library allocation
page read and write
258E000
stack
page read and write
16DDDBE6000
trusted library allocation
page read and write
422E000
stack
page read and write
3E0F000
stack
page read and write
16DE4A4F000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
3F2E000
stack
page read and write
16DDF8B4000
trusted library allocation
page read and write
4CEF000
stack
page read and write
4A60000
direct allocation
page execute and read and write
16DDD677000
trusted library allocation
page read and write
16DDF343000
trusted library allocation
page read and write
16DDF9A8000
trusted library allocation
page read and write
221E2200000
trusted library allocation
page read and write
16DDD473000
trusted library allocation
page read and write
4421000
heap
page read and write
16DD94B0000
trusted library allocation
page read and write
54DC000
stack
page read and write
16DEAA18000
trusted library allocation
page read and write
25F5000
heap
page read and write
16DDA5C9000
trusted library allocation
page read and write
1C27E000
stack
page read and write
356E000
stack
page read and write
C90000
direct allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
472F000
stack
page read and write
16DE48CC000
trusted library allocation
page read and write
16DE993C000
trusted library allocation
page read and write
16DDA516000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
16DE9E89000
trusted library allocation
page read and write
16DE48E4000
trusted library allocation
page read and write
16DE5BFE000
trusted library allocation
page read and write
16DE9E91000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
16DDD483000
trusted library allocation
page read and write
16DDCC9D000
trusted library allocation
page read and write
16DE4AE4000
trusted library allocation
page read and write
4A2F000
stack
page read and write
D33000
heap
page read and write
16DDF882000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
302F000
stack
page read and write
16DDA532000
trusted library allocation
page read and write
16DDCC14000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
16DE9DA9000
trusted library allocation
page read and write
16DE04FB000
trusted library allocation
page read and write
4A70000
direct allocation
page execute and read and write
2500000
heap
page read and write
16DD941E000
trusted library allocation
page read and write
16DE9AAF000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
16DEA2AA000
trusted library allocation
page read and write
16DE9F1B000
trusted library allocation
page read and write
16DDCC73000
trusted library allocation
page read and write
16DDF9FC000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
3CEF000
stack
page read and write
16DEA283000
trusted library allocation
page read and write
13EE000
stack
page read and write
16DEE20F000
trusted library allocation
page read and write
4B71000
heap
page read and write
52726FE000
unkown
page readonly
5500000
direct allocation
page execute and read and write
417000
unkown
page write copy
4421000
heap
page read and write
1F0000
heap
page read and write
16DCF177000
heap
page read and write
16DDD48F000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
16DE4874000
trusted library allocation
page read and write
16DDA589000
trusted library allocation
page read and write
16DEA923000
trusted library allocation
page read and write
16DEA964000
trusted library allocation
page read and write
FB0000
heap
page read and write
16DE6293000
trusted library allocation
page read and write
2CD0000
heap
page read and write
4421000
heap
page read and write
16DDD4D0000
trusted library allocation
page read and write
62C000
unkown
page execute and read and write
16DDDB72000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
16DDF3A7000
trusted library allocation
page read and write
FF0000
heap
page read and write
3DDF000
stack
page read and write
16DE9AAD000
trusted library allocation
page read and write
16DE4AE7000
trusted library allocation
page read and write
16DE4A41000
trusted library allocation
page read and write
16DE07D0000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
22B01DE3000
heap
page read and write
16DDCC7F000
trusted library allocation
page read and write
16DEA282000
trusted library allocation
page read and write
16DE9A66000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
33AF000
stack
page read and write
16DE9D93000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
16DE4AF6000
trusted library allocation
page read and write
16DEA845000
trusted library allocation
page read and write
16DE9ADF000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF9A8000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDCC9A000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDCCF0000
trusted library allocation
page read and write
16DDC9DD000
trusted library allocation
page read and write
16DCF171000
heap
page read and write
2ADF000
stack
page read and write
16DDDBED000
trusted library allocation
page read and write
16DDCCB1000
trusted library allocation
page read and write
16DDCC18000
trusted library allocation
page read and write
16DEA9BE000
trusted library allocation
page read and write
16DE4A24000
trusted library allocation
page read and write
16DDF3A3000
trusted library allocation
page read and write
16DE68CA000
trusted library allocation
page read and write
F70EFFF000
stack
page read and write
16DDE0B2000
trusted library allocation
page read and write
16DE5A9B000
trusted library allocation
page read and write
413000
unkown
page readonly
DE6000
unkown
page execute and read and write
22B01575000
trusted library allocation
page read and write
446F000
stack
page read and write
16DEA26C000
trusted library allocation
page read and write
16DE6BD9000
trusted library allocation
page read and write
2DDF000
stack
page read and write
16DDF0B6000
trusted library allocation
page read and write
16DDA533000
trusted library allocation
page read and write
E2E000
unkown
page execute and write copy
1C4BF000
stack
page read and write
16DD9123000
trusted library allocation
page read and write
4AB0000
heap
page read and write
16DDD4DB000
trusted library allocation
page read and write
640E000
stack
page read and write
16DDDB74000
trusted library allocation
page read and write
16DE9E5E000
trusted library allocation
page read and write
16DDCE8A000
trusted library allocation
page read and write
11F0000
heap
page read and write
16DECCDF000
trusted library allocation
page read and write
655C1FF000
stack
page read and write
16DEA840000
trusted library allocation
page read and write
4421000
heap
page read and write
5C4000
heap
page read and write
16DDE50A000
trusted library allocation
page read and write
16DECC14000
trusted library allocation
page read and write
16DE62D0000
trusted library allocation
page read and write
16DE5A93000
trusted library allocation
page read and write
2EDF000
stack
page read and write
16DDCE80000
trusted library allocation
page read and write
316E000
stack
page read and write
16DDD863000
trusted library allocation
page read and write
332E000
stack
page read and write
16DDDB3C000
trusted library allocation
page read and write
16DE68DC000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DDF911000
trusted library allocation
page read and write
455E000
stack
page read and write
16DCF19C000
heap
page read and write
16DD94E1000
trusted library allocation
page read and write
16DE66FA000
trusted library allocation
page read and write
16DDCE78000
trusted library allocation
page read and write
291F541F000
heap
page read and write
D23000
heap
page read and write
16DDA5CF000
trusted library allocation
page read and write
16DCF178000
heap
page read and write
16DDA5E7000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
16DEA356000
trusted library allocation
page read and write
16DE9A30000
trusted library allocation
page read and write
16DDCED4000
trusted library allocation
page read and write
16DCF18F000
heap
page read and write
16DDD4AB000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDCEB4000
trusted library allocation
page read and write
16DEA3C2000
trusted library allocation
page read and write
16DEAAF5000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
16DDF87B000
trusted library allocation
page read and write
4D4E000
stack
page read and write
16DDD385000
trusted library allocation
page read and write
550000
heap
page read and write
1150000
direct allocation
page read and write
3B5E000
stack
page read and write
16DE9D9A000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDCEE0000
trusted library allocation
page read and write
22CA3000
heap
page read and write
9E4000
heap
page read and write
16DE9776000
trusted library allocation
page read and write
16DEA2A2000
trusted library allocation
page read and write
16DDA6F1000
trusted library allocation
page read and write
16DD8BC5000
trusted library allocation
page read and write
16DDA469000
trusted library allocation
page read and write
16DDA654000
trusted library allocation
page read and write
16DDF988000
trusted library allocation
page read and write
16DE4BF3000
trusted library allocation
page read and write
4951000
direct allocation
page read and write
1CBA5000
heap
page read and write
16DDF984000
trusted library allocation
page read and write
16DCF1A0000
heap
page read and write
4E30000
heap
page read and write
16DE68E1000
trusted library allocation
page read and write
16DD94A9000
trusted library allocation
page read and write
16DED2CD000
trusted library allocation
page read and write
1C91B000
heap
page read and write
16DCF19C000
heap
page read and write
16DDDB6B000
trusted library allocation
page read and write
16DDE083000
trusted library allocation
page read and write
16DDF99C000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
4B71000
heap
page read and write
526FDFE000
stack
page read and write
4B71000
heap
page read and write
16DCF1A2000
heap
page read and write
16DE4B24000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
16DDDBF1000
trusted library allocation
page read and write
16DDCC95000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DEA981000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DE047C000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
660000
unkown
page read and write
16DDDB2F000
trusted library allocation
page read and write
16DD944E000
trusted library allocation
page read and write
276C000
heap
page read and write
16DDA470000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDF3A5000
trusted library allocation
page read and write
16DCF171000
heap
page read and write
16DDF0B0000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
16DE07A1000
trusted library allocation
page read and write
16DE9EEC000
trusted library allocation
page read and write
16DDD4C7000
trusted library allocation
page read and write
16DD94D7000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DE637C000
trusted library allocation
page read and write
16DCF16F000
heap
page read and write
436F000
stack
page read and write
16DDD4E9000
trusted library allocation
page read and write
11F4000
heap
page read and write
4421000
heap
page read and write
9E4000
heap
page read and write
16DDF8DB000
trusted library allocation
page read and write
494F000
stack
page read and write
16DDA520000
trusted library allocation
page read and write
16DEF66B000
trusted library allocation
page read and write
3A2E000
stack
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DCF19C000
heap
page read and write
16DDCC98000
trusted library allocation
page read and write
9E4000
heap
page read and write
291F3890000
heap
page read and write
16DEA979000
trusted library allocation
page read and write
16DE9A94000
trusted library allocation
page read and write
22B015F9000
trusted library allocation
page read and write
2550000
heap
page read and write
16DCF174000
heap
page read and write
2D50000
direct allocation
page read and write
16DEA27A000
trusted library allocation
page read and write
1404000
heap
page read and write
16DE9DCA000
trusted library allocation
page read and write
16DDA6F5000
trusted library allocation
page read and write
4B71000
heap
page read and write
5470000
direct allocation
page execute and read and write
29DF000
stack
page read and write
16DE0438000
trusted library allocation
page read and write
1205000
heap
page read and write
16DCF17D000
heap
page read and write
16DCF1A2000
heap
page read and write
4F60000
direct allocation
page execute and read and write
6C9000
unkown
page write copy
221E1DE3000
heap
page read and write
16DDE148000
trusted library allocation
page read and write
6C7BF000
unkown
page readonly
4421000
heap
page read and write
16DDD4A6000
trusted library allocation
page read and write
16DDA532000
trusted library allocation
page read and write
16DDD66A000
trusted library allocation
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DDE1D1000
trusted library allocation
page read and write
4B71000
heap
page read and write
FB4000
heap
page read and write
16DEE3F5000
trusted library allocation
page read and write
1404000
heap
page read and write
16DDD4B5000
trusted library allocation
page read and write
CCE000
heap
page read and write
784E000
heap
page read and write
16DEA96E000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DE685E000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
3A4F000
stack
page read and write
4B71000
heap
page read and write
16DCF17A000
heap
page read and write
16DDDFF9000
trusted library allocation
page read and write
16DEAAEC000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DDC935000
trusted library allocation
page read and write
16DDCC62000
trusted library allocation
page read and write
16DDCC42000
trusted library allocation
page read and write
16DE4AC0000
trusted library allocation
page read and write
22B0216D000
heap
page read and write
16DDF2F1000
trusted library allocation
page read and write
16DDA564000
trusted library allocation
page read and write
16DDA4B2000
trusted library allocation
page read and write
2CD7000
heap
page read and write
16DCF185000
heap
page read and write
B20000
unkown
page read and write
4421000
heap
page read and write
16DDD3CA000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DE9AE1000
trusted library allocation
page read and write
9E4000
heap
page read and write
4040000
heap
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DDCC85000
trusted library allocation
page read and write
16DE4BAC000
trusted library allocation
page read and write
16DE4931000
trusted library allocation
page read and write
22C87000
heap
page read and write
16DE685B000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DCF170000
heap
page read and write
16DDDBAA000
trusted library allocation
page read and write
16DDDBE7000
trusted library allocation
page read and write
16DDA6FB000
trusted library allocation
page read and write
16DDF9A8000
trusted library allocation
page read and write
3DAF000
stack
page read and write
16DE4AF6000
trusted library allocation
page read and write
4421000
heap
page read and write
16DE9D9A000
trusted library allocation
page read and write
16DDD368000
trusted library allocation
page read and write
16DE9ADA000
trusted library allocation
page read and write
221E205D000
trusted library allocation
page read and write
16DE06F3000
trusted library allocation
page read and write
11F4000
heap
page read and write
4421000
heap
page read and write
16DDA36C000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
16DEA8D4000
trusted library allocation
page read and write
22B021A7000
heap
page read and write
16DDF97B000
trusted library allocation
page read and write
16DDD475000
trusted library allocation
page read and write
16DD8BDF000
trusted library allocation
page read and write
22C87000
heap
page read and write
16DE9EFB000
trusted library allocation
page read and write
16DDDFAD000
trusted library allocation
page read and write
22C87000
heap
page read and write
16DEA983000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
4B71000
heap
page read and write
16DDD466000
trusted library allocation
page read and write
16DCF16F000
heap
page read and write
16DE6752000
trusted library allocation
page read and write
3BEE000
stack
page read and write
14C0000
direct allocation
page read and write
16DDA59E000
trusted library allocation
page read and write
16DDDB87000
trusted library allocation
page read and write
2FDC000
stack
page read and write
16DDD4BC000
trusted library allocation
page read and write
3DEF000
stack
page read and write
124C000
heap
page read and write
16DE9A82000
trusted library allocation
page read and write
16DEA946000
trusted library allocation
page read and write
16DEA25C000
trusted library allocation
page read and write
22B01523000
trusted library allocation
page read and write
16DE4A8B000
trusted library allocation
page read and write
16DDA6F9000
trusted library allocation
page read and write
16DDD49E000
trusted library allocation
page read and write
16DE679D000
trusted library allocation
page read and write
16DDF36B000
trusted library allocation
page read and write
16DDDFEC000
trusted library allocation
page read and write
2B5E000
stack
page read and write
16DECC00000
trusted library allocation
page read and write
16DEE3F0000
trusted library allocation
page read and write
16DEE2AD000
trusted library allocation
page read and write
16DEA410000
trusted library allocation
page read and write
34EF000
stack
page read and write
16DDDFE8000
trusted library allocation
page read and write
291F5520000
heap
page read and write
16DDA56F000
trusted library allocation
page read and write
260EAA0A000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
379E000
stack
page read and write
291F3A00000
trusted library allocation
page read and write
22C95000
heap
page read and write
16DDC9BA000
trusted library allocation
page read and write
376F000
stack
page read and write
16DD94D7000
trusted library allocation
page read and write
16DE4700000
trusted library allocation
page read and write
16DDD4E6000
trusted library allocation
page read and write
22B01D69000
heap
page read and write
9E4000
heap
page read and write
CEE000
heap
page read and write
2774000
heap
page read and write
16DE5C26000
trusted library allocation
page read and write
16DE99E2000
trusted library allocation
page read and write
16DDF982000
trusted library allocation
page read and write
16DDF2D4000
trusted library allocation
page read and write
16DDD47D000
trusted library allocation
page read and write
16DDDB87000
trusted library allocation
page read and write
9E4000
heap
page read and write
35440000
trusted library allocation
page read and write
16DEA9A1000
trusted library allocation
page read and write
75AE000
heap
page read and write
9E4000
heap
page read and write
4A6F000
stack
page read and write
16DDF9B8000
trusted library allocation
page read and write
16DDE0BB000
trusted library allocation
page read and write
30AF000
stack
page read and write
16DDCC9E000
trusted library allocation
page read and write
16DDD376000
trusted library allocation
page read and write
16DEA989000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDD4E5000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
16DDF36B000
trusted library allocation
page read and write
16DE5A14000
trusted library allocation
page read and write
16DECE03000
trusted library allocation
page read and write
16DDF15B000
trusted library allocation
page read and write
16DDE0B4000
trusted library allocation
page read and write
502B000
stack
page read and write
16DCF188000
heap
page read and write
45EF000
stack
page read and write
16DDF308000
trusted library allocation
page read and write
16DDD495000
trusted library allocation
page read and write
16DDD4C7000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
16DDF35A000
trusted library allocation
page read and write
16DDD4F3000
trusted library allocation
page read and write
40EF000
stack
page read and write
97D000
unkown
page execute and read and write
16DD9171000
trusted library allocation
page read and write
16DDDFF6000
trusted library allocation
page read and write
16DD94D7000
trusted library allocation
page read and write
16DDD359000
trusted library allocation
page read and write
16DDE0AA000
trusted library allocation
page read and write
16DDCC64000
trusted library allocation
page read and write
16DDE1AD000
trusted library allocation
page read and write
16DDE080000
trusted library allocation
page read and write
16DDCE99000
trusted library allocation
page read and write
16DDDFC3000
trusted library allocation
page read and write
322E000
stack
page read and write
330E000
stack
page read and write
2EF57000
heap
page read and write
16DDCEDD000
trusted library allocation
page read and write
16DD91F6000
trusted library allocation
page read and write
16DEA81D000
trusted library allocation
page read and write
16DDF07B000
trusted library allocation
page read and write
16DE9A91000
trusted library allocation
page read and write
125C000
stack
page read and write
FB4000
heap
page read and write
75A0000
heap
page read and write
16DDDBED000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
C90000
direct allocation
page read and write
22C6D000
heap
page read and write
16DEA932000
trusted library allocation
page read and write
16DDD46E000
trusted library allocation
page read and write
9E4000
heap
page read and write
11DE000
heap
page read and write
5C4000
heap
page read and write
16DE4700000
trusted library allocation
page read and write
16DDD36D000
trusted library allocation
page read and write
16DDCEE0000
trusted library allocation
page read and write
16DCF181000
heap
page read and write
22B01A12000
heap
page read and write
16DDA5F0000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DD94A9000
trusted library allocation
page read and write
22B01B10000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DD949D000
trusted library allocation
page read and write
16DDE502000
trusted library allocation
page read and write
3DEE000
stack
page read and write
16DDD382000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
16DDCEFD000
trusted library allocation
page read and write
16DE0782000
trusted library allocation
page read and write
2C5F000
stack
page read and write
9E4000
heap
page read and write
16DDF98E000
trusted library allocation
page read and write
221E1E30000
heap
page read and write
4B71000
heap
page read and write
22B02181000
heap
page read and write
27CF000
stack
page read and write
16DDF396000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
16DE9D9A000
trusted library allocation
page read and write
16DDF3A9000
trusted library allocation
page read and write
16DE68AC000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
16DDCE4C000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
3FAF000
stack
page read and write
16DE07D0000
trusted library allocation
page read and write
16DE5BEF000
trusted library allocation
page read and write
16DDF285000
trusted library allocation
page read and write
B20000
unkown
page read and write
16DECE7A000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DDF4E7000
trusted library allocation
page read and write
16DDA5E6000
trusted library allocation
page read and write
1236000
heap
page read and write
16DCE8E7000
heap
page read and write
A47000
unkown
page execute and read and write
16DCF16E000
heap
page read and write
16DDD475000
trusted library allocation
page read and write
16DED2B9000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
16DDDBA6000
trusted library allocation
page read and write
16DEA941000
trusted library allocation
page read and write
278C000
heap
page read and write
16DDCC7A000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DCF167000
heap
page read and write
16DCF1A1000
heap
page read and write
448D000
stack
page read and write
11F4000
heap
page read and write
16DD9171000
trusted library allocation
page read and write
16DE5A93000
trusted library allocation
page read and write
22B01D69000
heap
page read and write
16DE68C4000
trusted library allocation
page read and write
512F000
stack
page read and write
16DD949D000
trusted library allocation
page read and write
16DDF911000
trusted library allocation
page read and write
16DDCC73000
trusted library allocation
page read and write
B8B000
unkown
page execute and read and write
527D000
stack
page read and write
1150000
direct allocation
page read and write
16DDF9B0000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DE478E000
trusted library allocation
page read and write
22C7E000
heap
page read and write
16DEE24E000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
35AE000
stack
page read and write
97E000
unkown
page execute and write copy
16DCF16A000
heap
page read and write
B82000
unkown
page execute and read and write
16DDF38F000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DCF169000
heap
page read and write
3E1E000
stack
page read and write
16DDDFC3000
trusted library allocation
page read and write
16DDD4FD000
trusted library allocation
page read and write
16DEA964000
trusted library allocation
page read and write
22C8D000
heap
page read and write
4FF0000
heap
page read and write
16DCF184000
heap
page read and write
16DE624A000
trusted library allocation
page read and write
16DDF28C000
trusted library allocation
page read and write
16DEA25C000
trusted library allocation
page read and write
4B88000
heap
page read and write
16DE4710000
trusted library allocation
page read and write
16DDC9C3000
trusted library allocation
page read and write
C9756FE000
stack
page read and write
16DDCEF0000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDD366000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
49B1000
heap
page read and write
16DE5A14000
trusted library allocation
page read and write
1C23F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
16DDF993000
trusted library allocation
page read and write
16DEA9C3000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDEA80000
trusted library allocation
page read and write
16DE9E9E000
trusted library allocation
page read and write
1C58E000
stack
page read and write
16DEA49B000
trusted library allocation
page read and write
16DE5BBD000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
16DDF8D5000
trusted library allocation
page read and write
16DD94C4000
trusted library allocation
page read and write
5F4000
heap
page read and write
C5E000
heap
page read and write
22B0217C000
heap
page read and write
2D50000
direct allocation
page read and write
16DDC99E000
trusted library allocation
page read and write
379F000
stack
page read and write
16DDF985000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
291F3949000
heap
page read and write
22B01567000
trusted library allocation
page read and write
423000
unkown
page readonly
16DDCC7A000
trusted library allocation
page read and write
16DDDB82000
trusted library allocation
page read and write
16DE9AE8000
trusted library allocation
page read and write
9E4000
heap
page read and write
22B015BF000
trusted library allocation
page read and write
16DDA5C5000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
1201000
heap
page read and write
CEE000
heap
page read and write
16DDCE8A000
trusted library allocation
page read and write
16DDF13D000
trusted library allocation
page read and write
16DDDF8A000
trusted library allocation
page read and write
16DDCE78000
trusted library allocation
page read and write
16DDD49A000
trusted library allocation
page read and write
4470000
heap
page read and write
452F000
stack
page read and write
16DE0795000
trusted library allocation
page read and write
16DDDB91000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
16DDA6FE000
trusted library allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
96E000
unkown
page execute and read and write
16DE4B61000
trusted library allocation
page read and write
2F1E000
stack
page read and write
16DDA6FE000
trusted library allocation
page read and write
22C71000
heap
page read and write
54E0000
direct allocation
page execute and read and write
16DE9ADF000
trusted library allocation
page read and write
16DDCC26000
trusted library allocation
page read and write
16DDCE40000
trusted library allocation
page read and write
FB5000
heap
page read and write
16DDC9D8000
trusted library allocation
page read and write
16DDCC98000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
22C87000
heap
page read and write
47EE000
stack
page read and write
16DDF358000
trusted library allocation
page read and write
9D0000
heap
page read and write
16DDC9A3000
trusted library allocation
page read and write
16DE477A000
trusted library allocation
page read and write
56FF000
stack
page read and write
16DDF861000
trusted library allocation
page read and write
16DEF100000
trusted library allocation
page read and write
4F40000
direct allocation
page execute and read and write
16DDD4E4000
trusted library allocation
page read and write
16DDE136000
trusted library allocation
page read and write
49B1000
heap
page read and write
16DEF130000
trusted library allocation
page read and write
16DECC93000
trusted library allocation
page read and write
16DDCE8F000
trusted library allocation
page read and write
5C4000
heap
page read and write
221E2219000
trusted library allocation
page read and write
2EAF000
stack
page read and write
16DD912F000
trusted library allocation
page read and write
16DDF97B000
trusted library allocation
page read and write
16DDF4C0000
trusted library allocation
page read and write
16DDCE60000
trusted library allocation
page read and write
16DECC6F000
trusted library allocation
page read and write
D39000
heap
page read and write
306F000
stack
page read and write
654E000
stack
page read and write
16DED600000
trusted library allocation
page read and write
16DDF989000
trusted library allocation
page read and write
48E0000
heap
page read and write
54A0000
direct allocation
page execute and read and write
16DEA999000
trusted library allocation
page read and write
FB4000
heap
page read and write
9E4000
heap
page read and write
1254000
heap
page read and write
5470000
direct allocation
page execute and read and write
16DDA569000
trusted library allocation
page read and write
16DDE08E000
trusted library allocation
page read and write
44AF000
stack
page read and write
16DDF088000
trusted library allocation
page read and write
16DDD37D000
trusted library allocation
page read and write
4B71000
heap
page read and write
1C83D000
stack
page read and write
16DDE287000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF9B5000
trusted library allocation
page read and write
16DDD368000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DE4A9E000
trusted library allocation
page read and write
6C2000
unkown
page execute and read and write
16DDD4AB000
trusted library allocation
page read and write
2E2E000
stack
page read and write
28D1F000
heap
page read and write
16DEA7C4000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDCE53000
trusted library allocation
page read and write
16DDF981000
trusted library allocation
page read and write
16DDF837000
trusted library allocation
page read and write
16DECCF7000
trusted library allocation
page read and write
16DE499E000
trusted library allocation
page read and write
302E000
stack
page read and write
22C85000
heap
page read and write
221E2134000
heap
page read and write
16DDA5A8000
trusted library allocation
page read and write
16DDF0AC000
trusted library allocation
page read and write
16DDF269000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDDB32000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
16DDF998000
trusted library allocation
page read and write
16DDD4E4000
trusted library allocation
page read and write
16DE6857000
trusted library allocation
page read and write
9E4000
heap
page read and write
6C9000
unkown
page read and write
16DDA586000
trusted library allocation
page read and write
16DDD6FE000
trusted library allocation
page read and write
406E000
stack
page read and write
4A10000
direct allocation
page execute and read and write
16DDA5BE000
trusted library allocation
page read and write
16DD9413000
trusted library allocation
page read and write
22C7A000
heap
page read and write
9E4000
heap
page read and write
9E4000
heap
page read and write
9E4000
heap
page read and write
16DDCEFD000
trusted library allocation
page read and write
1404000
heap
page read and write
13CF000
stack
page read and write
16DDD4F3000
trusted library allocation
page read and write
5C4000
heap
page read and write
2EF4A000
heap
page read and write
1205000
heap
page read and write
352E000
stack
page read and write
16DECDF4000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
16DDF993000
trusted library allocation
page read and write
4B71000
heap
page read and write
221E2010000
trusted library allocation
page read and write
16DEAA9C000
trusted library allocation
page read and write
16DE0495000
trusted library allocation
page read and write
4E31000
heap
page read and write
16DDCE8A000
trusted library allocation
page read and write
16DD94A9000
trusted library allocation
page read and write
16DE4797000
trusted library allocation
page read and write
16DE0782000
trusted library allocation
page read and write
16DE6756000
trusted library allocation
page read and write
16DDA6FE000
trusted library allocation
page read and write
7850000
heap
page read and write
FB4000
heap
page read and write
135D000
stack
page read and write
16DE68BF000
trusted library allocation
page read and write
11AE000
stack
page read and write
52C0000
direct allocation
page read and write
4B71000
heap
page read and write
22B021A7000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
16DE9DB9000
trusted library allocation
page read and write
16DE4AE7000
trusted library allocation
page read and write
16DCF167000
heap
page read and write
16DDF9B8000
trusted library allocation
page read and write
3F4F000
stack
page read and write
55BF000
stack
page read and write
16DDE079000
trusted library allocation
page read and write
16DDE18F000
trusted library allocation
page read and write
16DDA51F000
trusted library allocation
page read and write
16DE4ADA000
trusted library allocation
page read and write
406F000
stack
page read and write
14DB000
heap
page read and write
16DE9AFB000
trusted library allocation
page read and write
53D0000
heap
page read and write
22B01D5F000
heap
page read and write
16DDCCCE000
trusted library allocation
page read and write
6C800000
unkown
page read and write
221E2047000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
661000
unkown
page execute and write copy
16DDC9FA000
trusted library allocation
page read and write
16DE04F8000
trusted library allocation
page read and write
16DEA204000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
9E4000
heap
page read and write
3FAE000
stack
page read and write
31EF000
stack
page read and write
33EF000
stack
page read and write
16DDC9FA000
trusted library allocation
page read and write
49B1000
heap
page read and write
22C7A000
heap
page read and write
28D33000
heap
page read and write
75B0000
heap
page read and write
2610000
direct allocation
page read and write
16DCF188000
heap
page read and write
4421000
heap
page read and write
16DE9DA5000
trusted library allocation
page read and write
16DDF97B000
trusted library allocation
page read and write
16DDCED4000
trusted library allocation
page read and write
523D000
stack
page read and write
6C580000
unkown
page readonly
16DE9F15000
trusted library allocation
page read and write
22C79000
heap
page read and write
16DE67C4000
trusted library allocation
page read and write
16DCF196000
heap
page read and write
16DE5BD6000
trusted library allocation
page read and write
312F000
stack
page read and write
16DCF1A0000
heap
page read and write
16DDA632000
trusted library allocation
page read and write
16DE9DA2000
trusted library allocation
page read and write
16DE9AE7000
trusted library allocation
page read and write
16DE99EA000
trusted library allocation
page read and write
35241000
heap
page read and write
16DE621A000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
291F541D000
heap
page read and write
16DDD49A000
trusted library allocation
page read and write
16DE67CC000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
16DDE080000
trusted library allocation
page read and write
1015000
heap
page read and write
16DDE48B000
trusted library allocation
page read and write
16DDA6F6000
trusted library allocation
page read and write
16DE5D93000
trusted library allocation
page read and write
16DDD4D0000
trusted library allocation
page read and write
16DE67EF000
trusted library allocation
page read and write
9E4000
heap
page read and write
350F0000
heap
page read and write
16DDA673000
trusted library allocation
page read and write
FCD000
unkown
page execute and write copy
16DDCC73000
trusted library allocation
page read and write
16DDD37D000
trusted library allocation
page read and write
16DE68BF000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
3CCF000
stack
page read and write
16DDF9C2000
trusted library allocation
page read and write
16DE9D8B000
trusted library allocation
page read and write
16DE07D2000
trusted library allocation
page read and write
2700000
heap
page read and write
22C7E000
heap
page read and write
16DD91D6000
trusted library allocation
page read and write
244C000
unkown
page readonly
16DD94EC000
trusted library allocation
page read and write
143F000
stack
page read and write
16DDA5E6000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDCC0E000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
16DDA5B6000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
CA3000
heap
page read and write
16DDD39B000
trusted library allocation
page read and write
16DE66C7000
trusted library allocation
page read and write
22B02198000
heap
page read and write
16DDF98A000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDD4B5000
trusted library allocation
page read and write
16DDCEE0000
trusted library allocation
page read and write
16DDF095000
trusted library allocation
page read and write
16DDA34A000
trusted library allocation
page read and write
7B2000
unkown
page execute and read and write
16DE97D5000
trusted library allocation
page read and write
655B9FF000
stack
page read and write
38AF000
stack
page read and write
16DE68E8000
trusted library allocation
page read and write
5030000
direct allocation
page execute and read and write
16DE978E000
trusted library allocation
page read and write
6C5FD000
unkown
page readonly
3E2F000
stack
page read and write
2EF52000
heap
page read and write
16DDA673000
trusted library allocation
page read and write
16DDA5C9000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE9A3A000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
22C94000
heap
page read and write
16DE04C4000
trusted library allocation
page read and write
16DDCCB1000
trusted library allocation
page read and write
16DDF937000
trusted library allocation
page read and write
16DDCC94000
trusted library allocation
page read and write
2555000
heap
page read and write
16DD94DB000
trusted library allocation
page read and write
2B1E000
stack
page read and write
16DDE0B9000
trusted library allocation
page read and write
16DEE25F000
trusted library allocation
page read and write
1C93D000
stack
page read and write
557000
heap
page read and write
16DE03CE000
trusted library allocation
page read and write
16DDF4D4000
trusted library allocation
page read and write
16DDF96C000
trusted library allocation
page read and write
16DDA4A8000
trusted library allocation
page read and write
FB4000
heap
page read and write
1C51E000
stack
page read and write
16DE628E000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DE66FA000
trusted library allocation
page read and write
FB4000
heap
page read and write
63E000
unkown
page execute and read and write
16DDD49E000
trusted library allocation
page read and write
3D6E000
stack
page read and write
42AF000
stack
page read and write
FB4000
heap
page read and write
16DDA4A8000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
16DDC9FA000
trusted library allocation
page read and write
16DDA692000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDD363000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DE9EA3000
trusted library allocation
page read and write
16DDDBA6000
trusted library allocation
page read and write
16DE9DDA000
trusted library allocation
page read and write
16DDCE60000
trusted library allocation
page read and write
35241000
heap
page read and write
9E4000
heap
page read and write
16DDA4D4000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
16DDD724000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
EDB000
unkown
page execute and read and write
22B01D69000
heap
page read and write
16DDF8CD000
trusted library allocation
page read and write
16DDA5BE000
trusted library allocation
page read and write
1235000
heap
page read and write
16DCF188000
heap
page read and write
16DE473C000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
16DDF866000
trusted library allocation
page read and write
1C68E000
stack
page read and write
11F4000
heap
page read and write
16DE628E000
trusted library allocation
page read and write
16DEA8B5000
trusted library allocation
page read and write
16DDD37D000
trusted library allocation
page read and write
16DDDB85000
trusted library allocation
page read and write
16DDF882000
trusted library allocation
page read and write
407F000
stack
page read and write
16DDF305000
trusted library allocation
page read and write
16DDF9AF000
trusted library allocation
page read and write
16DEA95D000
trusted library allocation
page read and write
16DDCE39000
trusted library allocation
page read and write
16DEA47C000
trusted library allocation
page read and write
16DDF36B000
trusted library allocation
page read and write
16DDC9A3000
trusted library allocation
page read and write
D18000
heap
page read and write
42EF000
stack
page read and write
1235000
heap
page read and write
4B71000
heap
page read and write
16DDA5C0000
trusted library allocation
page read and write
3AEE000
stack
page read and write
16DDCE4C000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
16DEA3C4000
trusted library allocation
page read and write
16DDA5F1000
trusted library allocation
page read and write
16DDF9B5000
trusted library allocation
page read and write
D3B000
heap
page read and write
16DCF18F000
heap
page read and write
16DDCC64000
trusted library allocation
page read and write
22B01DE8000
heap
page read and write
B89000
unkown
page read and write
16DE62E0000
trusted library allocation
page read and write
16DE67FA000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DEA269000
trusted library allocation
page read and write
4A90000
direct allocation
page execute and read and write
FCD000
unkown
page execute and write copy
93B000
unkown
page execute and read and write
16DE67BC000
trusted library allocation
page read and write
16DE4AC0000
trusted library allocation
page read and write
16DDC963000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
16DDCC73000
trusted library allocation
page read and write
16DE68B4000
trusted library allocation
page read and write
16DEA968000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
5C4000
heap
page read and write
179F000
stack
page read and write
11F4000
heap
page read and write
16DE48BE000
trusted library allocation
page read and write
16DEA981000
trusted library allocation
page read and write
52715FE000
unkown
page readonly
16DE9AB3000
trusted library allocation
page read and write
5F4000
heap
page read and write
FB4000
heap
page read and write
16DEA2CE000
trusted library allocation
page read and write
2DA0000
heap
page read and write
16DDEA74000
trusted library allocation
page read and write
16DDCC64000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DE6293000
trusted library allocation
page read and write
16DE68E8000
trusted library allocation
page read and write
22C6B000
heap
page read and write
16DDCEED000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
6C805000
unkown
page readonly
16DCF18E000
heap
page read and write
4660000
heap
page read and write
16DE4730000
trusted library allocation
page read and write
4FEE000
stack
page read and write
16DE976E000
trusted library allocation
page read and write
22C84000
heap
page read and write
16DDD4D0000
trusted library allocation
page read and write
48EF000
stack
page read and write
FB4000
heap
page read and write
16DE045A000
trusted library allocation
page read and write
2C3C000
stack
page read and write
66CE000
stack
page read and write
11F4000
heap
page read and write
22C94000
heap
page read and write
35EE000
stack
page read and write
C90000
direct allocation
page read and write
16DEA9A1000
trusted library allocation
page read and write
16DDEAA2000
trusted library allocation
page read and write
16DDCEAD000
trusted library allocation
page read and write
16DDDB82000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DCF19A000
heap
page read and write
16DCF173000
heap
page read and write
1CA90000
heap
page read and write
16DDCE39000
trusted library allocation
page read and write
16DDA5E6000
trusted library allocation
page read and write
16DDDFBB000
trusted library allocation
page read and write
16DEE2A7000
trusted library allocation
page read and write
16DDE0BB000
trusted library allocation
page read and write
16DE99E2000
trusted library allocation
page read and write
29DE000
stack
page read and write
16DECCD0000
trusted library allocation
page read and write
16DDF1FC000
trusted library allocation
page read and write
16DE04DA000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDDBBD000
trusted library allocation
page read and write
16DDDB5D000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
4421000
heap
page read and write
16DEF495000
trusted library allocation
page read and write
16DD91F6000
trusted library allocation
page read and write
382E000
stack
page read and write
16DDA5B8000
trusted library allocation
page read and write
16DE4B6A000
trusted library allocation
page read and write
16DEA9BE000
trusted library allocation
page read and write
11DE000
heap
page read and write
16DE4A89000
trusted library allocation
page read and write
16DE077C000
trusted library allocation
page read and write
16DDA6CF000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF956000
trusted library allocation
page read and write
16DE4B98000
trusted library allocation
page read and write
22C6D000
heap
page read and write
4F00000
direct allocation
page execute and read and write
16DEA8F6000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DDF853000
trusted library allocation
page read and write
16DE9DEE000
trusted library allocation
page read and write
16DDDB33000
trusted library allocation
page read and write
16DEE2CC000
trusted library allocation
page read and write
22B01B60000
heap
page read and write
16DE9AC7000
trusted library allocation
page read and write
54BE000
stack
page read and write
54F0000
direct allocation
page execute and read and write
16DDD4E6000
trusted library allocation
page read and write
16DED0B5000
trusted library allocation
page read and write
260EA700000
heap
page read and write
16DE5A75000
trusted library allocation
page read and write
3A6E000
stack
page read and write
22CAD000
heap
page read and write
16DCF17A000
heap
page read and write
5C4000
heap
page read and write
16DDF8F1000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
16DDF84B000
trusted library allocation
page read and write
16DDA4CA000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
16DDD49A000
trusted library allocation
page read and write
16DDCE90000
trusted library allocation
page read and write
16DDDFF6000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDF36C000
trusted library allocation
page read and write
16DEE3E5000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
5C4000
heap
page read and write
36AF000
stack
page read and write
16DEE217000
trusted library allocation
page read and write
16DDDB41000
trusted library allocation
page read and write
16DCF19B000
heap
page read and write
16DDDB95000
trusted library allocation
page read and write
16DE4A6C000
trusted library allocation
page read and write
16DD9426000
trusted library allocation
page read and write
16DCF184000
heap
page read and write
16DDCE5A000
trusted library allocation
page read and write
16DDCC09000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE0480000
trusted library allocation
page read and write
16DEA47A000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
16DE68FC000
trusted library allocation
page read and write
16DDD4E9000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
33DF000
stack
page read and write
16DCF167000
heap
page read and write
16DDD4FD000
trusted library allocation
page read and write
3A2E000
stack
page read and write
16DDA532000
trusted library allocation
page read and write
28DF000
stack
page read and write
42DF000
stack
page read and write
4B71000
heap
page read and write
16DE9ADF000
trusted library allocation
page read and write
16DCF195000
heap
page read and write
16DEA979000
trusted library allocation
page read and write
16DEA9AC000
trusted library allocation
page read and write
16DCF1AA000
heap
page read and write
25C0000
direct allocation
page execute and read and write
16DE4700000
trusted library allocation
page read and write
16DE67C8000
trusted library allocation
page read and write
F8E000
stack
page read and write
F20000
heap
page read and write
16DDCC14000
trusted library allocation
page read and write
16DDF86C000
trusted library allocation
page read and write
16DDA5C7000
trusted library allocation
page read and write
49DF000
stack
page read and write
C90000
direct allocation
page read and write
16DDDB78000
trusted library allocation
page read and write
52736FE000
unkown
page readonly
16DDCC94000
trusted library allocation
page read and write
16DDCCF1000
trusted library allocation
page read and write
16DDCE98000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
48AE000
stack
page read and write
7BF000
heap
page read and write
291F3B07000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DECCFB000
trusted library allocation
page read and write
351F000
stack
page read and write
16DDD4D9000
trusted library allocation
page read and write
4060000
heap
page read and write
400000
unkown
page readonly
16DDA56F000
trusted library allocation
page read and write
9E4000
heap
page read and write
527163E000
stack
page read and write
452F000
stack
page read and write
16DDCC7F000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
4B71000
heap
page read and write
16DE4B9C000
trusted library allocation
page read and write
16DDC9C3000
trusted library allocation
page read and write
16DDDB64000
trusted library allocation
page read and write
16DDA564000
trusted library allocation
page read and write
16DDF4C3000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DD9171000
trusted library allocation
page read and write
16DE9AAD000
trusted library allocation
page read and write
16DEA972000
trusted library allocation
page read and write
16DDF360000
trusted library allocation
page read and write
16DED800000
trusted library allocation
page read and write
22B02198000
heap
page read and write
16DDDBAA000
trusted library allocation
page read and write
22C62000
heap
page read and write
16DECE93000
trusted library allocation
page read and write
400000
unkown
page readonly
16DDA6F6000
trusted library allocation
page read and write
2517000
heap
page read and write
291F5405000
heap
page read and write
16DECDE6000
trusted library allocation
page read and write
16DDDB95000
trusted library allocation
page read and write
16DCF16F000
heap
page read and write
47EE000
stack
page read and write
ED9000
unkown
page read and write
22C85000
heap
page read and write
16DEA97E000
trusted library allocation
page read and write
9C000
stack
page read and write
16DDF9B5000
trusted library allocation
page read and write
16DDF4D4000
trusted library allocation
page read and write
16DE9763000
trusted library allocation
page read and write
16DCF19B000
heap
page read and write
FB4000
heap
page read and write
16DDE0BB000
trusted library allocation
page read and write
16DEE3D9000
trusted library allocation
page read and write
260EA7D0000
heap
page read and write
16DE9E72000
trusted library allocation
page read and write
16DDD36B000
trusted library allocation
page read and write
16DDCE3E000
trusted library allocation
page read and write
4FF4000
heap
page read and write
16DDA470000
trusted library allocation
page read and write
16DE62EE000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
16DDD4D6000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDDBBB000
trusted library allocation
page read and write
16DDF2D4000
trusted library allocation
page read and write
16DEA8CD000
trusted library allocation
page read and write
2FDF000
stack
page read and write
16DDDBAB000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
22B01D8A000
heap
page read and write
16DE078B000
trusted library allocation
page read and write
16DE4B7E000
trusted library allocation
page read and write
16DCF1A6000
heap
page read and write
16DDA50D000
trusted library allocation
page read and write
28CD0000
heap
page read and write
16DDDBA6000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
16DE68E0000
trusted library allocation
page read and write
16DECDEC000
trusted library allocation
page read and write
16DE5A7A000
trusted library allocation
page read and write
16DE03FD000
trusted library allocation
page read and write
2D70000
direct allocation
page read and write
5C4000
heap
page read and write
26E0000
heap
page read and write
16DE9935000
trusted library allocation
page read and write
16DE6692000
trusted library allocation
page read and write
16DDD48B000
trusted library allocation
page read and write
447C000
heap
page read and write
442E000
stack
page read and write
16DEA264000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
16DDDFF9000
trusted library allocation
page read and write
16DDCE31000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
291F5419000
heap
page read and write
16DDF3A5000
trusted library allocation
page read and write
16DEE2E5000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
3F6F000
stack
page read and write
FB4000
heap
page read and write
221E2237000
trusted library allocation
page read and write
16DDE0B9000
trusted library allocation
page read and write
16DE623C000
trusted library allocation
page read and write
16DDCCF1000
trusted library allocation
page read and write
10FE000
stack
page read and write
542F000
stack
page read and write
16DE9780000
trusted library allocation
page read and write
16DDF3B1000
trusted library allocation
page read and write
419000
unkown
page readonly
22B0150C000
trusted library allocation
page read and write
16DCF181000
heap
page read and write
526E378000
stack
page read and write
16DE07D6000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
22B01D69000
heap
page read and write
16DDDBE6000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DDD350000
trusted library allocation
page read and write
4BCF000
stack
page read and write
33DE000
stack
page read and write
53D5000
heap
page read and write
16DDCC96000
trusted library allocation
page read and write
E17000
unkown
page execute and read and write
16DDA6FB000
trusted library allocation
page read and write
16DCF18D000
heap
page read and write
16DEA3C6000
trusted library allocation
page read and write
16DCF19A000
heap
page read and write
16DE4AF3000
trusted library allocation
page read and write
16DDA6CA000
trusted library allocation
page read and write
16DCF1A8000
heap
page read and write
49B0000
heap
page read and write
46A000
unkown
page execute and read and write
1254000
heap
page read and write
16DCF17D000
heap
page read and write
16DE6847000
trusted library allocation
page read and write
16DEA94E000
trusted library allocation
page read and write
16DEE29F000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
32AE000
stack
page read and write
16DDA6CD000
trusted library allocation
page read and write
97D000
unkown
page execute and write copy
16DDDB6B000
trusted library allocation
page read and write
28DA5000
heap
page read and write
16DDF98A000
trusted library allocation
page read and write
392E000
stack
page read and write
16DDA5DD000
trusted library allocation
page read and write
22B012EA000
heap
page read and write
9E4000
heap
page read and write
9E4000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
FB5000
heap
page read and write
16DDDBEA000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
16DEA827000
trusted library allocation
page read and write
B89000
unkown
page write copy
16DDA5DE000
trusted library allocation
page read and write
16DEA209000
trusted library allocation
page read and write
16DE9DB2000
trusted library allocation
page read and write
16DE4B9A000
trusted library allocation
page read and write
FB4000
heap
page read and write
9E4000
heap
page read and write
16DDCED4000
trusted library allocation
page read and write
16DCF18F000
heap
page read and write
16DE4B92000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
45CE000
stack
page read and write
4B71000
heap
page read and write
16DE9772000
trusted library allocation
page read and write
4200000
heap
page read and write
418E000
stack
page read and write
8E50000
heap
page read and write
16DEAA27000
trusted library allocation
page read and write
16DDA590000
trusted library allocation
page read and write
4A70000
direct allocation
page execute and read and write
244C000
unkown
page readonly
4471000
heap
page read and write
2EAF000
stack
page read and write
221E1CD0000
heap
page read and write
16DDA465000
trusted library allocation
page read and write
13DB000
heap
page read and write
16DEA7AF000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
FB4000
heap
page read and write
16DE48ED000
trusted library allocation
page read and write
16DECC00000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
C974E3E000
stack
page read and write
16DCF177000
heap
page read and write
FB4000
heap
page read and write
16DDA5B8000
trusted library allocation
page read and write
16DE9E89000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
16DDF3F0000
trusted library allocation
page read and write
311F000
stack
page read and write
16DDCC42000
trusted library allocation
page read and write
3067000
heap
page read and write
16DDDB6B000
trusted library allocation
page read and write
FB4000
heap
page read and write
3CAE000
stack
page read and write
16DDCEFE000
trusted library allocation
page read and write
53E0000
heap
page read and write
4080000
direct allocation
page execute and read and write
28D30000
heap
page read and write
16DD94A9000
trusted library allocation
page read and write
11B5000
heap
page read and write
16DE4793000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
16DE9AF7000
trusted library allocation
page read and write
16DDDFB3000
trusted library allocation
page read and write
31EE000
stack
page read and write
22B01D6C000
heap
page read and write
16DE077C000
trusted library allocation
page read and write
221E220A000
trusted library allocation
page read and write
16DDA6A6000
trusted library allocation
page read and write
16DDF3FB000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
16DE9DA2000
trusted library allocation
page read and write
16DE9A8E000
trusted library allocation
page read and write
49B1000
heap
page read and write
16DE62DC000
trusted library allocation
page read and write
16DE4B98000
trusted library allocation
page read and write
650F000
stack
page read and write
16DE6857000
trusted library allocation
page read and write
16DDDB8F000
trusted library allocation
page read and write
16DDA510000
trusted library allocation
page read and write
16DDDFE8000
trusted library allocation
page read and write
16DDF38F000
trusted library allocation
page read and write
16DDF9A0000
trusted library allocation
page read and write
16DEF7B9000
trusted library allocation
page read and write
4B71000
heap
page read and write
1404000
heap
page read and write
16DDD4D8000
trusted library allocation
page read and write
16DE68AE000
trusted library allocation
page read and write
16DE4BE6000
trusted library allocation
page read and write
16DDDFC3000
trusted library allocation
page read and write
16DCF167000
heap
page read and write
16DE62DC000
trusted library allocation
page read and write
16DDDB85000
trusted library allocation
page read and write
16DE6872000
trusted library allocation
page read and write
16DEA957000
trusted library allocation
page read and write
16DDCCF0000
trusted library allocation
page read and write
16DDF33E000
trusted library allocation
page read and write
16DCF167000
heap
page read and write
16DD948D000
trusted library allocation
page read and write
16DE9761000
trusted library allocation
page read and write
16DE66AC000
trusted library allocation
page read and write
16DE97E6000
trusted library allocation
page read and write
16DDD368000
trusted library allocation
page read and write
16DE9DBB000
trusted library allocation
page read and write
16DDD498000
trusted library allocation
page read and write
456E000
stack
page read and write
2530000
heap
page read and write
16DD9490000
trusted library allocation
page read and write
9E4000
heap
page read and write
1233000
heap
page read and write
16DE992D000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
4B71000
heap
page read and write
9E4000
heap
page read and write
513E000
stack
page read and write
16DDD3CA000
trusted library allocation
page read and write
22C6A000
heap
page read and write
11E0000
direct allocation
page read and write
4B71000
heap
page read and write
16DE04BD000
trusted library allocation
page read and write
16DDCED4000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDCC6C000
trusted library allocation
page read and write
41EF000
stack
page read and write
54B0000
direct allocation
page execute and read and write
22B01D5C000
heap
page read and write
16DCE920000
heap
page read and write
16DDDFF6000
trusted library allocation
page read and write
16DEA96A000
trusted library allocation
page read and write
900000
heap
page read and write
16DDE455000
trusted library allocation
page read and write
16DDEAAD000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
16DDA586000
trusted library allocation
page read and write
16DEE3F8000
trusted library allocation
page read and write
2EDF000
stack
page read and write
16DDDBC1000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDE0B3000
trusted library allocation
page read and write
16DDA460000
trusted library allocation
page read and write
16DE07AB000
trusted library allocation
page read and write
282F000
stack
page read and write
FB4000
heap
page read and write
16DE4728000
trusted library allocation
page read and write
145B000
heap
page read and write
16DE977A000
trusted library allocation
page read and write
16DDCC96000
trusted library allocation
page read and write
16DDDFA2000
trusted library allocation
page read and write
3C2E000
stack
page read and write
4421000
heap
page read and write
3F2F000
stack
page read and write
16DDF358000
trusted library allocation
page read and write
5F4000
heap
page read and write
5000000
direct allocation
page read and write
2752000
heap
page read and write
16DDCC3C000
trusted library allocation
page read and write
4471000
heap
page read and write
9E4000
heap
page read and write
3F8E000
stack
page read and write
16DDDFE8000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
16DE4BEE000
trusted library allocation
page read and write
16DDF38F000
trusted library allocation
page read and write
16DDF984000
trusted library allocation
page read and write
4A70000
direct allocation
page execute and read and write
6AAE000
stack
page read and write
16DE68EC000
trusted library allocation
page read and write
D0C000
unkown
page execute and read and write
22B021A9000
heap
page read and write
221E1CAE000
remote allocation
page execute read
16DDD6C5000
trusted library allocation
page read and write
5F4000
heap
page read and write
4B71000
heap
page read and write
16DDF49E000
trusted library allocation
page read and write
16DDDBA6000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DCF185000
heap
page read and write
16DDE0B0000
trusted library allocation
page read and write
9E5000
heap
page read and write
16DDF2C4000
trusted library allocation
page read and write
361F000
stack
page read and write
16DDCED4000
trusted library allocation
page read and write
16DDD498000
trusted library allocation
page read and write
4421000
heap
page read and write
7BF000
stack
page read and write
16DEA2B3000
trusted library allocation
page read and write
16DD949A000
trusted library allocation
page read and write
16DDDF95000
trusted library allocation
page read and write
16DCF187000
heap
page read and write
16DDE0BB000
trusted library allocation
page read and write
3E2E000
stack
page read and write
4A50000
direct allocation
page execute and read and write
16DDCC9E000
trusted library allocation
page read and write
16DCF18F000
heap
page read and write
9E5000
heap
page read and write
412E000
stack
page read and write
1470000
heap
page read and write
16DDF3A3000
trusted library allocation
page read and write
16DDDFE8000
trusted library allocation
page read and write
16DDA5E8000
trusted library allocation
page read and write
16DDD4F7000
trusted library allocation
page read and write
16DCF170000
heap
page read and write
16DDD445000
trusted library allocation
page read and write
22C8D000
heap
page read and write
11F4000
heap
page read and write
16DE07D6000
trusted library allocation
page read and write
16DE4AF3000
trusted library allocation
page read and write
16DEA32D000
trusted library allocation
page read and write
16DDDFF6000
trusted library allocation
page read and write
4BAF000
stack
page read and write
FB4000
heap
page read and write
16DE4BA1000
trusted library allocation
page read and write
22B02161000
heap
page read and write
16DDD48F000
trusted library allocation
page read and write
16DDF38F000
trusted library allocation
page read and write
16DEF300000
trusted library allocation
page read and write
FB4000
heap
page read and write
22C87000
heap
page read and write
5A7000
unkown
page execute and read and write
22B01564000
trusted library allocation
page read and write
3E6F000
stack
page read and write
16DCF188000
heap
page read and write
4A2F000
stack
page read and write
40AE000
stack
page read and write
1404000
heap
page read and write
6CB000
unkown
page execute and read and write
16DEA9FA000
trusted library allocation
page read and write
3EAE000
stack
page read and write
16DE684B000
trusted library allocation
page read and write
16DDCC8C000
trusted library allocation
page read and write
16DDA59E000
trusted library allocation
page read and write
16DE6857000
trusted library allocation
page read and write
16DDA6AB000
trusted library allocation
page read and write
16DD949D000
trusted library allocation
page read and write
16DDCCF0000
trusted library allocation
page read and write
16DDE0B9000
trusted library allocation
page read and write
22B02181000
heap
page read and write
16DDCC85000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
11F4000
heap
page read and write
22B01C0B000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
8D00000
heap
page read and write
16DDF235000
trusted library allocation
page read and write
22CA2000
heap
page read and write
492E000
stack
page read and write
22B01DA8000
heap
page read and write
B89000
unkown
page write copy
16DDD4D6000
trusted library allocation
page read and write
16DE9A44000
trusted library allocation
page read and write
1404000
heap
page read and write
FB4000
heap
page read and write
16DCF17F000
heap
page read and write
FB4000
heap
page read and write
16DDF35F000
trusted library allocation
page read and write
16DE4B86000
trusted library allocation
page read and write
16DDF2F6000
trusted library allocation
page read and write
7850000
heap
page read and write
16DEF6B1000
trusted library allocation
page read and write
2557000
heap
page read and write
174F000
stack
page read and write
16DDA5C9000
trusted library allocation
page read and write
2C5E000
stack
page read and write
4E2F000
stack
page read and write
16DEE24A000
trusted library allocation
page read and write
16DDA6FE000
trusted library allocation
page read and write
16DCF170000
heap
page read and write
4421000
heap
page read and write
9E4000
heap
page read and write
16DEA340000
trusted library allocation
page read and write
16DDF988000
trusted library allocation
page read and write
16DDEAE3000
trusted library allocation
page read and write
16DEE219000
trusted library allocation
page read and write
291F395E000
heap
page read and write
16DE5A00000
trusted library allocation
page read and write
16DDF986000
trusted library allocation
page read and write
400000
unkown
page readonly
1220000
heap
page read and write
444E000
stack
page read and write
22C87000
heap
page read and write
F710FFE000
stack
page read and write
16DE68F2000
trusted library allocation
page read and write
16DE4728000
trusted library allocation
page read and write
FB4000
heap
page read and write
2D50000
direct allocation
page read and write
16DDCEA4000
trusted library allocation
page read and write
16DDF3A5000
trusted library allocation
page read and write
22C85000
heap
page read and write
16DE9DAB000
trusted library allocation
page read and write
22B01D5F000
heap
page read and write
16DE6310000
trusted library allocation
page read and write
457F000
stack
page read and write
16DDCC3C000
trusted library allocation
page read and write
16DE97DF000
trusted library allocation
page read and write
2D90000
direct allocation
page execute and read and write
416F000
stack
page read and write
16DEE2C8000
trusted library allocation
page read and write
16DEA2D5000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
16DDF175000
trusted library allocation
page read and write
6C2000
unkown
page execute and read and write
16DE68BF000
trusted library allocation
page read and write
121F000
heap
page read and write
16DECCFB000
trusted library allocation
page read and write
1201000
heap
page read and write
30AE000
stack
page read and write
16DE04EC000
trusted library allocation
page read and write
16DDDFE5000
trusted library allocation
page read and write
668F000
stack
page read and write
E17000
unkown
page execute and read and write
4B71000
heap
page read and write
16DDA564000
trusted library allocation
page read and write
16DDD486000
trusted library allocation
page read and write
16DEA3D9000
trusted library allocation
page read and write
22B01DF1000
heap
page read and write
22B01DF2000
heap
page read and write
16DDCE32000
trusted library allocation
page read and write
496E000
stack
page read and write
16DD9500000
trusted library allocation
page read and write
4B71000
heap
page read and write
5C4000
heap
page read and write
16DDEAF8000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
16DE99EA000
trusted library allocation
page read and write
492F000
stack
page read and write
16DCF18E000
heap
page read and write
221E20AF000
trusted library allocation
page read and write
16DE477A000
trusted library allocation
page read and write
16DEA493000
trusted library allocation
page read and write
22B01D6C000
heap
page read and write
16DDDB8C000
trusted library allocation
page read and write
16DDF4D2000
trusted library allocation
page read and write
16DE62FD000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
16DDF861000
trusted library allocation
page read and write
16DEA964000
trusted library allocation
page read and write
16DDCC6C000
trusted library allocation
page read and write
16DE68C4000
trusted library allocation
page read and write
4421000
heap
page read and write
16DECE3C000
trusted library allocation
page read and write
16DE68FC000
trusted library allocation
page read and write
16DEA336000
trusted library allocation
page read and write
16DE9747000
trusted library allocation
page read and write
362F000
stack
page read and write
4140000
heap
page read and write
465F000
stack
page read and write
16DDF362000
trusted library allocation
page read and write
16DDF358000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
16DDA4F2000
trusted library allocation
page read and write
760000
heap
page read and write
144B000
heap
page read and write
16DE4A51000
trusted library allocation
page read and write
FB4000
heap
page read and write
E17000
unkown
page execute and read and write
16DDA62C000
trusted library allocation
page read and write
16DE68C1000
trusted library allocation
page read and write
16DDCE54000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DEA432000
trusted library allocation
page read and write
16DE9AFB000
trusted library allocation
page read and write
16DEA207000
trusted library allocation
page read and write
16DDA56F000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDA4D4000
trusted library allocation
page read and write
16DDCCCE000
trusted library allocation
page read and write
16DDCC64000
trusted library allocation
page read and write
16DE48F1000
trusted library allocation
page read and write
9E4000
heap
page read and write
61E00000
direct allocation
page execute and read and write
16DDC931000
trusted library allocation
page read and write
16DEA981000
trusted library allocation
page read and write
16DE4A44000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
FB4000
heap
page read and write
319E000
stack
page read and write
16DEE221000
trusted library allocation
page read and write
271D000
heap
page execute and read and write
31AE000
stack
page read and write
16DE9EC5000
trusted library allocation
page read and write
E70000
unkown
page read and write
48E1000
heap
page read and write
96E000
unkown
page execute and read and write
16DECCD0000
trusted library allocation
page read and write
FB4000
heap
page read and write
1CAB0000
heap
page read and write
22B01D63000
heap
page read and write
1227000
heap
page read and write
16DDCE4C000
trusted library allocation
page read and write
16DDD4FD000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
22C79000
heap
page read and write
FB4000
heap
page read and write
660000
unkown
page read and write
2B6F000
stack
page read and write
292F000
stack
page read and write
16DDF9B6000
trusted library allocation
page read and write
16DEA979000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE48E4000
trusted library allocation
page read and write
476E000
stack
page read and write
16DDDBC5000
trusted library allocation
page read and write
16DE9ECB000
trusted library allocation
page read and write
16DEA9B2000
trusted library allocation
page read and write
16DDD37D000
trusted library allocation
page read and write
16DDD477000
trusted library allocation
page read and write
194000
stack
page read and write
16DDF9B8000
trusted library allocation
page read and write
16DCF18D000
heap
page read and write
16DDD48B000
trusted library allocation
page read and write
16DDE165000
trusted library allocation
page read and write
16DDDBDE000
trusted library allocation
page read and write
16DE9E4D000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
16DE07DA000
trusted library allocation
page read and write
FB4000
heap
page read and write
315E000
stack
page read and write
16DDF1B3000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
4421000
heap
page read and write
221E2640000
heap
page read and write
11F4000
heap
page read and write
1254000
heap
page read and write
2765000
heap
page read and write
4F90000
direct allocation
page execute and read and write
16DCF17A000
heap
page read and write
16DDDBCA000
trusted library allocation
page read and write
16DDD4D0000
trusted library allocation
page read and write
16DDA527000
trusted library allocation
page read and write
C972B3B000
stack
page read and write
16DDA5DE000
trusted library allocation
page read and write
16DDC9DD000
trusted library allocation
page read and write
16DDEAEB000
trusted library allocation
page read and write
16DDA5F0000
trusted library allocation
page read and write
22B01C12000
trusted library allocation
page read and write
16DDA64B000
trusted library allocation
page read and write
16DE9EE4000
trusted library allocation
page read and write
16DE4963000
trusted library allocation
page read and write
22B021A7000
heap
page read and write
16DE689A000
trusted library allocation
page read and write
3CAE000
stack
page read and write
E6E000
stack
page read and write
16DEF33C000
trusted library allocation
page read and write
221E20CB000
trusted library allocation
page read and write
16DDA6C5000
trusted library allocation
page read and write
16DDF36B000
trusted library allocation
page read and write
16DEE250000
trusted library allocation
page read and write
16DDA5E2000
trusted library allocation
page read and write
16DECC3C000
trusted library allocation
page read and write
16DDF1B1000
trusted library allocation
page read and write
1C7CE000
stack
page read and write
16DE68B4000
trusted library allocation
page read and write
4B6F000
stack
page read and write
3A6F000
stack
page read and write
493000
unkown
page execute and read and write
16DDA5CE000
trusted library allocation
page read and write
4D0F000
stack
page read and write
16DE9A94000
trusted library allocation
page read and write
16DDA510000
trusted library allocation
page read and write
16DEA82A000
trusted library allocation
page read and write
16DDE4C7000
trusted library allocation
page read and write
16DCF16F000
heap
page read and write
16DDA673000
trusted library allocation
page read and write
16DE6633000
trusted library allocation
page read and write
16DDD477000
trusted library allocation
page read and write
16DDF985000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
16DCF170000
heap
page read and write
52E0000
direct allocation
page read and write
FB4000
heap
page read and write
9E4000
heap
page read and write
11F4000
heap
page read and write
2330000
heap
page read and write
5180000
direct allocation
page execute and read and write
22B01D60000
heap
page read and write
4A10000
direct allocation
page execute and read and write
63CF000
stack
page read and write
1404000
heap
page read and write
D17000
heap
page read and write
16DDE0C1000
trusted library allocation
page read and write
16DE07D8000
trusted library allocation
page read and write
16DDF9B6000
trusted library allocation
page read and write
9E4000
heap
page read and write
FB4000
heap
page read and write
22B01DE8000
heap
page read and write
16DDD336000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
27EE000
heap
page read and write
C6E000
stack
page read and write
440000
heap
page read and write
11F4000
heap
page read and write
16DDA59E000
trusted library allocation
page read and write
16DEA204000
trusted library allocation
page read and write
16DE4A36000
trusted library allocation
page read and write
16DDE09C000
trusted library allocation
page read and write
3CAF000
stack
page read and write
34AE000
stack
page read and write
37EF000
stack
page read and write
113E000
stack
page read and write
16DDF3EE000
trusted library allocation
page read and write
FB4000
heap
page read and write
22C80000
heap
page read and write
48F1000
heap
page read and write
16DDCE11000
trusted library allocation
page read and write
16DEA271000
trusted library allocation
page read and write
16DE04E2000
trusted library allocation
page read and write
42CE000
stack
page read and write
4B71000
heap
page read and write
16DDF9B6000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
4B71000
heap
page read and write
33AF000
stack
page read and write
16DDCC1C000
trusted library allocation
page read and write
16DEA82C000
trusted library allocation
page read and write
3513C000
stack
page read and write
16DE9AE1000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DDA5C9000
trusted library allocation
page read and write
291F3C54000
heap
page read and write
4430000
heap
page read and write
1150000
direct allocation
page read and write
9E4000
heap
page read and write
16DE9AAD000
trusted library allocation
page read and write
9E4000
heap
page read and write
28D21000
heap
page read and write
116A000
heap
page read and write
16DDE505000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
16DDD49E000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
16DDD100000
trusted library allocation
page read and write
16DDD481000
trusted library allocation
page read and write
3C6F000
stack
page read and write
16DDE0C1000
trusted library allocation
page read and write
16DDA675000
trusted library allocation
page read and write
16DEE230000
trusted library allocation
page read and write
291F396F000
heap
page read and write
251D000
heap
page read and write
16DDCC24000
trusted library allocation
page read and write
16DE03E6000
trusted library allocation
page read and write
16DDA670000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DE9DDC000
trusted library allocation
page read and write
4B71000
heap
page read and write
4421000
heap
page read and write
FB4000
heap
page read and write
451F000
stack
page read and write
16DE9A8B000
trusted library allocation
page read and write
401000
unkown
page execute read
E40000
heap
page read and write
5470000
direct allocation
page execute and read and write
22CA3000
heap
page read and write
54D0000
direct allocation
page execute and read and write
16DE9E95000
trusted library allocation
page read and write
484E000
stack
page read and write
16DDCE4C000
trusted library allocation
page read and write
16DCF170000
heap
page read and write
16DEA82F000
trusted library allocation
page read and write
4421000
heap
page read and write
16DCF17F000
heap
page read and write
16DDA527000
trusted library allocation
page read and write
43CF000
stack
page read and write
16DDF1EF000
trusted library allocation
page read and write
16DE07D2000
trusted library allocation
page read and write
16DD9475000
trusted library allocation
page read and write
16DDA699000
trusted library allocation
page read and write
16DEA993000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDCC2F000
trusted library allocation
page read and write
16DD94B0000
trusted library allocation
page read and write
16DDA625000
trusted library allocation
page read and write
303F000
stack
page read and write
5B0000
direct allocation
page read and write
22C87000
heap
page read and write
4A40000
direct allocation
page execute and read and write
16DCF16A000
heap
page read and write
16DE6854000
trusted library allocation
page read and write
291F3780000
heap
page read and write
16DCF169000
heap
page read and write
16DDDBED000
trusted library allocation
page read and write
16DE4710000
trusted library allocation
page read and write
16DDF8A8000
trusted library allocation
page read and write
59BD000
stack
page read and write
221E1DF0000
heap
page read and write
16DD8B9E000
trusted library allocation
page read and write
132F000
unkown
page execute and write copy
16DDDBCA000
trusted library allocation
page read and write
16DDCCA0000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
16DE9744000
trusted library allocation
page read and write
16DE975F000
trusted library allocation
page read and write
16DE5A9B000
trusted library allocation
page read and write
16DD9426000
trusted library allocation
page read and write
16DD9176000
trusted library allocation
page read and write
C80000
heap
page read and write
9E4000
heap
page read and write
5150000
direct allocation
page execute and read and write
16DE9E76000
trusted library allocation
page read and write
11F4000
heap
page read and write
11F4000
heap
page read and write
16DDA34A000
trusted library allocation
page read and write
526E2FE000
unkown
page readonly
16DE68CA000
trusted library allocation
page read and write
16DE67CA000
trusted library allocation
page read and write
4F1000
unkown
page execute and read and write
4421000
heap
page read and write
16DED0B9000
trusted library allocation
page read and write
16DDA6FE000
trusted library allocation
page read and write
221E1E80000
heap
page readonly
16DE66BC000
trusted library allocation
page read and write
16DDCC31000
trusted library allocation
page read and write
16DCF1A6000
heap
page read and write
16DE68FC000
trusted library allocation
page read and write
16DE9E83000
trusted library allocation
page read and write
16DDA5E2000
trusted library allocation
page read and write
16DE6634000
trusted library allocation
page read and write
2BAE000
stack
page read and write
23EDA021E000
trusted library allocation
page read and write
16DE9DA9000
trusted library allocation
page read and write
16DDCC31000
trusted library allocation
page read and write
2500000
heap
page read and write
C90000
direct allocation
page read and write
16DE67BC000
trusted library allocation
page read and write
1C6CE000
stack
page read and write
16DE68AE000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
16DDF06F000
trusted library allocation
page read and write
16DDA5D7000
trusted library allocation
page read and write
9E4000
heap
page read and write
9E4000
heap
page read and write
124D000
heap
page read and write
16DE9DB5000
trusted library allocation
page read and write
16DDA5AB000
trusted library allocation
page read and write
4B71000
heap
page read and write
FCB000
unkown
page execute and read and write
16DE9428000
trusted library allocation
page read and write
25A0000
heap
page read and write
16DEF62D000
trusted library allocation
page read and write
16DDCC92000
trusted library allocation
page read and write
16DD9490000
trusted library allocation
page read and write
16DDF4D0000
trusted library allocation
page read and write
16DDD48F000
trusted library allocation
page read and write
22B01DB9000
heap
page read and write
16DDF82C000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DDCED4000
trusted library allocation
page read and write
42DE000
stack
page read and write
16DDCE30000
trusted library allocation
page read and write
16DDE09B000
trusted library allocation
page read and write
26DE000
stack
page read and write
2CEE000
stack
page read and write
97D000
unkown
page execute and read and write
417000
unkown
page read and write
16DE975B000
trusted library allocation
page read and write
16DE9E68000
trusted library allocation
page read and write
16DE044E000
trusted library allocation
page read and write
16DE07DA000
trusted library allocation
page read and write
2DDE000
stack
page read and write
16DEE21B000
trusted library allocation
page read and write
4421000
heap
page read and write
16DEA993000
trusted library allocation
page read and write
16DE975D000
trusted library allocation
page read and write
2EDC000
stack
page read and write
9E4000
heap
page read and write
4FD000
stack
page read and write
358E000
stack
page read and write
269F000
stack
page read and write
4B71000
heap
page read and write
22B01DF1000
heap
page read and write
655C9FF000
stack
page read and write
5F4000
heap
page read and write
16DE68E7000
trusted library allocation
page read and write
16DE9D92000
trusted library allocation
page read and write
6C9000
unkown
page write copy
16DDF8CD000
trusted library allocation
page read and write
CCC000
heap
page read and write
16DE4728000
trusted library allocation
page read and write
16DDA510000
trusted library allocation
page read and write
16DEA968000
trusted library allocation
page read and write
3A1E000
stack
page read and write
16DDCCCB000
trusted library allocation
page read and write
FB5000
heap
page read and write
E2F000
unkown
page execute and write copy
16DDF97E000
trusted library allocation
page read and write
221E1E90000
unclassified section
page read and write
16DDF986000
trusted library allocation
page read and write
16DCF172000
heap
page read and write
16DCF173000
heap
page read and write
16DEA97E000
trusted library allocation
page read and write
FB4000
heap
page read and write
116E000
heap
page read and write
16DDD4E9000
trusted library allocation
page read and write
16DDA696000
trusted library allocation
page read and write
16DE686D000
trusted library allocation
page read and write
434E000
stack
page read and write
51A0000
direct allocation
page execute and read and write
402F000
stack
page read and write
22B012BF000
unclassified section
page read and write
1227000
heap
page read and write
16DDA5A8000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
492E000
stack
page read and write
16DE04C2000
trusted library allocation
page read and write
408F000
stack
page read and write
16DDD4E4000
trusted library allocation
page read and write
16DDA6CF000
trusted library allocation
page read and write
16DEE29E000
trusted library allocation
page read and write
16DDE0A0000
trusted library allocation
page read and write
16DE67FA000
trusted library allocation
page read and write
38DE000
stack
page read and write
16DDDBA8000
trusted library allocation
page read and write
368F000
stack
page read and write
118D000
unkown
page execute and read and write
9E4000
heap
page read and write
52C0000
direct allocation
page read and write
16DDCC21000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
16DDDBEE000
trusted library allocation
page read and write
16DDD36E000
trusted library allocation
page read and write
4CFF000
stack
page read and write
16DDF8BF000
trusted library allocation
page read and write
4421000
heap
page read and write
16DE68CE000
trusted library allocation
page read and write
16DE97E6000
trusted library allocation
page read and write
16DD949D000
trusted library allocation
page read and write
16DDF8E6000
trusted library allocation
page read and write
4421000
heap
page read and write
4B71000
heap
page read and write
16DE628A000
trusted library allocation
page read and write
16DDF3DF000
trusted library allocation
page read and write
6C60E000
unkown
page read and write
16DE03E0000
trusted library allocation
page read and write
16DE97DF000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF342000
trusted library allocation
page read and write
221E1DE0000
heap
page read and write
16DE9D9F000
trusted library allocation
page read and write
16DDD470000
trusted library allocation
page read and write
4FA000
heap
page read and write
4421000
heap
page read and write
22B01220000
heap
page read and write
6C9000
unkown
page read and write
16DE9DD5000
trusted library allocation
page read and write
16DE9770000
trusted library allocation
page read and write
16DDA5A8000
trusted library allocation
page read and write
22B01B27000
unkown
page execute read
16DDDB78000
trusted library allocation
page read and write
16DE4A8B000
trusted library allocation
page read and write
32AE000
stack
page read and write
34EF000
stack
page read and write
16DE9975000
trusted library allocation
page read and write
16DE9D9C000
trusted library allocation
page read and write
16DDA6FE000
trusted library allocation
page read and write
597D000
stack
page read and write
16DE9DA9000
trusted library allocation
page read and write
22C95000
heap
page read and write
97D000
unkown
page execute and write copy
FB4000
heap
page read and write
16DDA52A000
trusted library allocation
page read and write
49B1000
heap
page read and write
16DCF18E000
heap
page read and write
16DEA98D000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDF961000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDDB8D000
trusted library allocation
page read and write
16DDA699000
trusted library allocation
page read and write
221E2072000
trusted library allocation
page read and write
F70E7FA000
stack
page read and write
16DDD498000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
339F000
stack
page read and write
9E4000
heap
page read and write
16DCF1A2000
heap
page read and write
16DDA66B000
trusted library allocation
page read and write
5F4000
heap
page read and write
16DE5DB1000
trusted library allocation
page read and write
16DE68FC000
trusted library allocation
page read and write
D39000
heap
page read and write
11E0000
direct allocation
page read and write
16DDF278000
trusted library allocation
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DE06FE000
trusted library allocation
page read and write
11F4000
heap
page read and write
4D60000
direct allocation
page read and write
16DE67F4000
trusted library allocation
page read and write
D02000
heap
page read and write
16DDF9B8000
trusted library allocation
page read and write
406E000
stack
page read and write
16DEA3EF000
trusted library allocation
page read and write
D18000
heap
page read and write
526EDD8000
stack
page read and write
16DE0441000
trusted library allocation
page read and write
5C1C000
stack
page read and write
16DE07AB000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
16DDD4F3000
trusted library allocation
page read and write
16DD94EC000
trusted library allocation
page read and write
16DDE47E000
trusted library allocation
page read and write
422F000
stack
page read and write
22B02184000
heap
page read and write
16DCF184000
heap
page read and write
16DCF1A1000
heap
page read and write
C90000
direct allocation
page read and write
16DD8B98000
trusted library allocation
page read and write
16DDF977000
trusted library allocation
page read and write
16DDCC8C000
trusted library allocation
page read and write
16DDA5E6000
trusted library allocation
page read and write
22B01548000
trusted library allocation
page read and write
4421000
heap
page read and write
16DEE295000
trusted library allocation
page read and write
3D2E000
stack
page read and write
16DDF9D0000
trusted library allocation
page read and write
16DDCC85000
trusted library allocation
page read and write
16DDDBA8000
trusted library allocation
page read and write
28D7C000
heap
page read and write
1419000
heap
page read and write
16DD94B0000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
22C79000
heap
page read and write
16DDEADF000
trusted library allocation
page read and write
16DDA4D4000
trusted library allocation
page read and write
72A000
stack
page read and write
16DDA5B1000
trusted library allocation
page read and write
16DEE2BD000
trusted library allocation
page read and write
16DE68EC000
trusted library allocation
page read and write
4B6F000
stack
page read and write
16DCF16F000
heap
page read and write
16DCF178000
heap
page read and write
DD0000
heap
page read and write
16DEA822000
trusted library allocation
page read and write
16DDDB56000
trusted library allocation
page read and write
16DDCEE0000
trusted library allocation
page read and write
22B01500000
trusted library allocation
page read and write
16DE5ECD000
trusted library allocation
page read and write
16DDF36C000
trusted library allocation
page read and write
16DE67CC000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
16DE48D4000
trusted library allocation
page read and write
BFD000
unkown
page execute and write copy
16DDD4AA000
trusted library allocation
page read and write
1455000
heap
page read and write
75A1000
heap
page read and write
16DCF17D000
heap
page read and write
16DDDB69000
trusted library allocation
page read and write
D0C000
unkown
page execute and read and write
16DE9900000
trusted library allocation
page read and write
16DDA599000
trusted library allocation
page read and write
16DE62DC000
trusted library allocation
page read and write
444F000
stack
page read and write
22B01110000
unclassified section
page readonly
D32000
heap
page read and write
221E1C20000
unclassified section
page readonly
16DEE2C8000
trusted library allocation
page read and write
16DDCC8E000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DEA989000
trusted library allocation
page read and write
16DDDB57000
trusted library allocation
page read and write
16DE66BC000
trusted library allocation
page read and write
16DE686D000
trusted library allocation
page read and write
16DDDB7E000
trusted library allocation
page read and write
16DD9454000
trusted library allocation
page read and write
1C73F000
stack
page read and write
16DDD4D3000
trusted library allocation
page read and write
500000
unkown
page execute and read and write
16DDF9A0000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
221E1C90000
remote allocation
page read and write
16DE07D4000
trusted library allocation
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
FB5000
heap
page read and write
16DCF182000
heap
page read and write
16DE06FE000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
16DDD337000
trusted library allocation
page read and write
16DDF9CB000
trusted library allocation
page read and write
16DE9DC3000
trusted library allocation
page read and write
16DDF360000
trusted library allocation
page read and write
22B02199000
heap
page read and write
22B0158D000
trusted library allocation
page read and write
22B021A7000
heap
page read and write
16DDD4FD000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
16DE679D000
trusted library allocation
page read and write
16DDA5A8000
trusted library allocation
page read and write
16DCF18F000
heap
page read and write
1414000
heap
page read and write
16DE9DC6000
trusted library allocation
page read and write
9E4000
heap
page read and write
3040000
heap
page read and write
16DE9F12000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
16DE07CE000
trusted library allocation
page read and write
16DEA25F000
trusted library allocation
page read and write
8BF000
stack
page read and write
16DDCC21000
trusted library allocation
page read and write
24A7000
heap
page read and write
16DDDB82000
trusted library allocation
page read and write
16DEA336000
trusted library allocation
page read and write
221E207B000
trusted library allocation
page read and write
16DDCE54000
trusted library allocation
page read and write
16DDF95B000
trusted library allocation
page read and write
16DE68D5000
trusted library allocation
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DDDB95000
trusted library allocation
page read and write
E2E000
unkown
page execute and read and write
16DE48D7000
trusted library allocation
page read and write
16DE97D1000
trusted library allocation
page read and write
289E000
stack
page read and write
16DE685E000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DE6864000
trusted library allocation
page read and write
16DE494C000
trusted library allocation
page read and write
16DEA97E000
trusted library allocation
page read and write
22B01B04000
unkown
page execute read
16DEA968000
trusted library allocation
page read and write
16DCF16F000
heap
page read and write
16DDD472000
trusted library allocation
page read and write
FB4000
heap
page read and write
35240000
heap
page read and write
16DCF17A000
heap
page read and write
16DDF9C2000
trusted library allocation
page read and write
16DE685E000
trusted library allocation
page read and write
16DE477C000
trusted library allocation
page read and write
E2F000
unkown
page execute and write copy
16DE477C000
trusted library allocation
page read and write
16DCF16F000
heap
page read and write
355E000
stack
page read and write
22B01DE0000
heap
page read and write
16DE6855000
trusted library allocation
page read and write
37AE000
stack
page read and write
16DDD374000
trusted library allocation
page read and write
16DD9444000
trusted library allocation
page read and write
16DE68D7000
trusted library allocation
page read and write
67CF000
stack
page read and write
16DDA5A5000
trusted library allocation
page read and write
3AAF000
stack
page read and write
4B71000
heap
page read and write
85A000
unkown
page execute and read and write
16DDE0C1000
trusted library allocation
page read and write
16DDD4B5000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
42EE000
stack
page read and write
16DDF3A9000
trusted library allocation
page read and write
16DDE127000
trusted library allocation
page read and write
1236000
heap
page read and write
6C620000
unkown
page readonly
16DE4A0F000
trusted library allocation
page read and write
16DE49AA000
trusted library allocation
page read and write
16DDD469000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDD47D000
trusted library allocation
page read and write
221E1E92000
unclassified section
page read and write
16DDD4E6000
trusted library allocation
page read and write
4A2F000
stack
page read and write
16DCF186000
heap
page read and write
16DDA4CA000
trusted library allocation
page read and write
16DE9E6E000
trusted library allocation
page read and write
22CA3000
heap
page read and write
16DCF167000
heap
page read and write
16DDD4D8000
trusted library allocation
page read and write
16DE06FE000
trusted library allocation
page read and write
4B90000
heap
page read and write
11F4000
heap
page read and write
16DDE1FC000
trusted library allocation
page read and write
16DE07D8000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DCF167000
heap
page read and write
16DE6235000
trusted library allocation
page read and write
16DDA343000
trusted library allocation
page read and write
440E000
stack
page read and write
16DD91EE000
trusted library allocation
page read and write
4421000
heap
page read and write
FB4000
heap
page read and write
16DDD378000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
4421000
heap
page read and write
16DEA2F8000
trusted library allocation
page read and write
16DDA5E6000
trusted library allocation
page read and write
22B01C00000
trusted library allocation
page read and write
22B01AF0000
heap
page read and write
40CE000
stack
page read and write
4A50000
direct allocation
page execute and read and write
5C4000
heap
page read and write
22C87000
heap
page read and write
16DCF198000
heap
page read and write
16DE477C000
trusted library allocation
page read and write
4471000
heap
page read and write
4B71000
heap
page read and write
16DDF919000
trusted library allocation
page read and write
1C97E000
stack
page read and write
1404000
heap
page read and write
16DEA95A000
trusted library allocation
page read and write
16DECE9B000
trusted library allocation
page read and write
16DE471A000
trusted library allocation
page read and write
16DE48ED000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
16DEA2D7000
trusted library allocation
page read and write
16DE9EB1000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
1B0000
heap
page read and write
C30000
heap
page read and write
9E4000
heap
page read and write
16DDDBC3000
trusted library allocation
page read and write
16DDD46E000
trusted library allocation
page read and write
16DDCEC4000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
16DDC98D000
trusted library allocation
page read and write
16DDDBAA000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
16DDDBBB000
trusted library allocation
page read and write
16DDF9D0000
trusted library allocation
page read and write
32EF000
stack
page read and write
16DDF2F1000
trusted library allocation
page read and write
E1F000
unkown
page execute and read and write
16DE68F0000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DDF38A000
trusted library allocation
page read and write
16DDF25A000
trusted library allocation
page read and write
16DECC7A000
trusted library allocation
page read and write
16DE5BDB000
trusted library allocation
page read and write
1E5000
heap
page read and write
FB4000
heap
page read and write
16DDCEB4000
trusted library allocation
page read and write
16DCF169000
heap
page read and write
9E5000
heap
page read and write
8AB000
stack
page read and write
16DEE295000
trusted library allocation
page read and write
16DDDBCA000
trusted library allocation
page read and write
48E1000
heap
page read and write
16DDD3CA000
trusted library allocation
page read and write
22B012E0000
heap
page read and write
16DE6883000
trusted library allocation
page read and write
16DDDB71000
trusted library allocation
page read and write
16DDF9B5000
trusted library allocation
page read and write
FB4000
heap
page read and write
11F4000
heap
page read and write
16DE9AAB000
trusted library allocation
page read and write
22B02169000
heap
page read and write
4421000
heap
page read and write
16DDF9B4000
trusted library allocation
page read and write
4A90000
direct allocation
page execute and read and write
16DDA5E2000
trusted library allocation
page read and write
16DDD4F4000
trusted library allocation
page read and write
16DDEA8C000
trusted library allocation
page read and write
16DDCEFD000
trusted library allocation
page read and write
258E000
stack
page read and write
4B71000
heap
page read and write
16DDF9B6000
trusted library allocation
page read and write
4E7E000
stack
page read and write
16DCF175000
heap
page read and write
456E000
stack
page read and write
16DDEADB000
trusted library allocation
page read and write
16DEA9B8000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDCC7F000
trusted library allocation
page read and write
16DEAA98000
trusted library allocation
page read and write
2A1E000
stack
page read and write
16DE041A000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
22B02198000
heap
page read and write
16DDA569000
trusted library allocation
page read and write
16DE04BB000
trusted library allocation
page read and write
16DE9DB8000
trusted library allocation
page read and write
16DEA91D000
trusted library allocation
page read and write
22B0152F000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
16DE475D000
trusted library allocation
page read and write
16DDD439000
trusted library allocation
page read and write
342F000
stack
page read and write
16DEA3FA000
trusted library allocation
page read and write
2FAE000
stack
page read and write
194000
stack
page read and write
16DE9ECB000
trusted library allocation
page read and write
376F000
stack
page read and write
420E000
stack
page read and write
16DDCC21000
trusted library allocation
page read and write
16DDCC85000
trusted library allocation
page read and write
16DCF19D000
heap
page read and write
16DCF177000
heap
page read and write
16DEA979000
trusted library allocation
page read and write
16DE48BC000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
16DDF8A0000
trusted library allocation
page read and write
4D60000
direct allocation
page read and write
16DDCC1F000
trusted library allocation
page read and write
16DDA371000
trusted library allocation
page read and write
16DE6854000
trusted library allocation
page read and write
16DCF184000
heap
page read and write
16DCF186000
heap
page read and write
4F20000
direct allocation
page execute and read and write
514F000
stack
page read and write
16DDDBE6000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDDBED000
trusted library allocation
page read and write
5F80000
heap
page read and write
9E4000
heap
page read and write
16DDF262000
trusted library allocation
page read and write
1C44E000
stack
page read and write
4A10000
direct allocation
page execute and read and write
16DDCEBD000
trusted library allocation
page read and write
22B01B00000
unkown
page execute read
401000
unkown
page execute read
76B9000
heap
page read and write
16DECCE5000
trusted library allocation
page read and write
22B02161000
heap
page read and write
16DCF16F000
heap
page read and write
5000000
direct allocation
page read and write
435000
unkown
page read and write
16DDA67C000
trusted library allocation
page read and write
16DDF985000
trusted library allocation
page read and write
16DDD4D8000
trusted library allocation
page read and write
16DDA56F000
trusted library allocation
page read and write
16DDC9BA000
trusted library allocation
page read and write
16DDD4AB000
trusted library allocation
page read and write
4E9E000
stack
page read and write
9E4000
heap
page read and write
5C4000
heap
page read and write
16DEA3E9000
trusted library allocation
page read and write
FB4000
heap
page read and write
664F000
stack
page read and write
11E0000
direct allocation
page read and write
51D0000
direct allocation
page execute and read and write
16DD949D000
trusted library allocation
page read and write
16DE48F1000
trusted library allocation
page read and write
16DE6BF9000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DEE3D4000
trusted library allocation
page read and write
4421000
heap
page read and write
16DE4A51000
trusted library allocation
page read and write
16DEE25A000
trusted library allocation
page read and write
16DDCC64000
trusted library allocation
page read and write
16DE4928000
trusted library allocation
page read and write
16DE9767000
trusted library allocation
page read and write
16DDD4E9000
trusted library allocation
page read and write
55D000
heap
page read and write
532E000
stack
page read and write
22C7A000
heap
page read and write
16DDCC85000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
16DD91FB000
trusted library allocation
page read and write
4F9F000
stack
page read and write
16DCF1A0000
heap
page read and write
690F000
stack
page read and write
4421000
heap
page read and write
16DDEA97000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
51A0000
direct allocation
page execute and read and write
37CF000
stack
page read and write
16DCF172000
heap
page read and write
16DEA306000
trusted library allocation
page read and write
16DDF956000
trusted library allocation
page read and write
442F000
stack
page read and write
16DDCC10000
trusted library allocation
page read and write
352F000
stack
page read and write
16DDDB95000
trusted library allocation
page read and write
16DDC9F4000
trusted library allocation
page read and write
16DDD4C5000
trusted library allocation
page read and write
16DE68E3000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
D39000
heap
page read and write
16DE9EFB000
trusted library allocation
page read and write
16DDD4E3000
trusted library allocation
page read and write
16DDD4E9000
trusted library allocation
page read and write
16DDCED4000
trusted library allocation
page read and write
16DDF97A000
trusted library allocation
page read and write
16DDF2BD000
trusted library allocation
page read and write
6CB000
unkown
page execute and read and write
9E4000
heap
page read and write
16DDEAEF000
trusted library allocation
page read and write
9E5000
heap
page read and write
16DECC30000
trusted library allocation
page read and write
16DEA991000
trusted library allocation
page read and write
16DDF8A0000
trusted library allocation
page read and write
16DEF7B5000
trusted library allocation
page read and write
4F7E000
stack
page read and write
16DE9DEE000
trusted library allocation
page read and write
16DDF4E7000
trusted library allocation
page read and write
1235000
heap
page read and write
9E4000
heap
page read and write
4B71000
heap
page read and write
4421000
heap
page read and write
4421000
heap
page read and write
16DDD47B000
trusted library allocation
page read and write
16DDCC21000
trusted library allocation
page read and write
351E000
stack
page read and write
16DDF38A000
trusted library allocation
page read and write
16DD8B90000
trusted library allocation
page read and write
9E4000
heap
page read and write
FB4000
heap
page read and write
16DDF396000
trusted library allocation
page read and write
16DDD47D000
trusted library allocation
page read and write
16DE4728000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDA470000
trusted library allocation
page read and write
16DCF198000
heap
page read and write
16DCF172000
heap
page read and write
22C85000
heap
page read and write
16DE471E000
trusted library allocation
page read and write
16DDF3E2000
trusted library allocation
page read and write
16DEE278000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
16DE6300000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
16DE9428000
trusted library allocation
page read and write
221E1EA0000
heap
page read and write
16DCF177000
heap
page read and write
75B0000
heap
page read and write
16DDCC33000
trusted library allocation
page read and write
5F4000
heap
page read and write
315F000
stack
page read and write
486F000
stack
page read and write
249E000
stack
page read and write
16DEE3E9000
trusted library allocation
page read and write
26DE000
stack
page read and write
16DDA564000
trusted library allocation
page read and write
22B02198000
heap
page read and write
14C000
stack
page read and write
16DDF3AC000
trusted library allocation
page read and write
16DDDB8F000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDCC25000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
1CAA1000
heap
page read and write
423000
unkown
page readonly
386E000
stack
page read and write
5B0000
direct allocation
page read and write
366E000
stack
page read and write
D3F000
heap
page read and write
16DEAAF0000
trusted library allocation
page read and write
16DDDBAA000
trusted library allocation
page read and write
16DDA65E000
trusted library allocation
page read and write
640000
heap
page read and write
2D67000
heap
page read and write
16DEF526000
trusted library allocation
page read and write
16DDD4D3000
trusted library allocation
page read and write
52C0000
direct allocation
page read and write
16DEF323000
trusted library allocation
page read and write
16DDF888000
trusted library allocation
page read and write
16DE628E000
trusted library allocation
page read and write
16DDF305000
trusted library allocation
page read and write
4B71000
heap
page read and write
3BCE000
stack
page read and write
16DDA59E000
trusted library allocation
page read and write
16DE4A9C000
trusted library allocation
page read and write
38EE000
stack
page read and write
144E000
stack
page read and write
16DE6846000
trusted library allocation
page read and write
16DDDB61000
trusted library allocation
page read and write
16DDF191000
trusted library allocation
page read and write
6C7FE000
unkown
page read and write
16DDF986000
trusted library allocation
page read and write
16DE4BEE000
trusted library allocation
page read and write
9E4000
heap
page read and write
28D5C000
heap
page read and write
31CF000
stack
page read and write
16DDA699000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DEA25C000
trusted library allocation
page read and write
16DDA4F2000
trusted library allocation
page read and write
394E000
stack
page read and write
22B01102000
remote allocation
page execute read
16DE6864000
trusted library allocation
page read and write
16DDF3AC000
trusted library allocation
page read and write
16DDD4BD000
trusted library allocation
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
39EF000
stack
page read and write
16DDD383000
trusted library allocation
page read and write
19E000
stack
page read and write
14C0000
direct allocation
page read and write
16DDD6C5000
trusted library allocation
page read and write
16DDF982000
trusted library allocation
page read and write
15C958703000
trusted library allocation
page read and write
16DE4A45000
trusted library allocation
page read and write
22C76000
heap
page read and write
16DDCC73000
trusted library allocation
page read and write
16DDE0B3000
trusted library allocation
page read and write
3EEF000
stack
page read and write
16DEE22A000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
16DEA873000
trusted library allocation
page read and write
16DE5BC7000
trusted library allocation
page read and write
16DDD6FE000
trusted library allocation
page read and write
16DDA5F1000
trusted library allocation
page read and write
16DEE2AD000
trusted library allocation
page read and write
16DDF98F000
trusted library allocation
page read and write
16DE9784000
trusted library allocation
page read and write
16DECE35000
trusted library allocation
page read and write
2F6F000
stack
page read and write
4B71000
heap
page read and write
2CBE000
stack
page read and write
38EF000
stack
page read and write
28D75000
heap
page read and write
1CA7E000
stack
page read and write
16DDCC7F000
trusted library allocation
page read and write
409E000
stack
page read and write
16DDCC73000
trusted library allocation
page read and write
F7107FF000
stack
page read and write
16DE67F4000
trusted library allocation
page read and write
16DEA475000
trusted library allocation
page read and write
16DDF9A2000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE9425000
trusted library allocation
page read and write
16DE4983000
trusted library allocation
page read and write
16DDF87B000
trusted library allocation
page read and write
16DDDBBA000
trusted library allocation
page read and write
16DE4AF3000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE67C4000
trusted library allocation
page read and write
DE6000
unkown
page execute and read and write
16DDF242000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
16DE06F3000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
22C6B000
heap
page read and write
16DDA527000
trusted library allocation
page read and write
16DDE0B2000
trusted library allocation
page read and write
16DE4AFA000
trusted library allocation
page read and write
16DCF169000
heap
page read and write
16DE6930000
trusted library allocation
page read and write
16DEE272000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
41AD000
stack
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DDA699000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
16DEA435000
trusted library allocation
page read and write
106E000
stack
page read and write
3CDE000
stack
page read and write
16DE9AFE000
trusted library allocation
page read and write
5B1D000
stack
page read and write
479F000
stack
page read and write
2CDE000
heap
page read and write
16DDEAA7000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DDC9BA000
trusted library allocation
page read and write
16DD949A000
trusted library allocation
page read and write
16DEA2F0000
trusted library allocation
page read and write
16DDCEC4000
trusted library allocation
page read and write
28D89000
heap
page read and write
FB4000
heap
page read and write
16DE97AE000
trusted library allocation
page read and write
16DE9E93000
trusted library allocation
page read and write
16DEA96E000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
4E31000
heap
page read and write
22B01600000
trusted library section
page readonly
661000
unkown
page execute and write copy
37DE000
stack
page read and write
2D50000
direct allocation
page read and write
9E4000
heap
page read and write
16DE5B95000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DE48E7000
trusted library allocation
page read and write
8CE0000
heap
page read and write
4E31000
heap
page read and write
270A000
heap
page read and write
2620000
heap
page read and write
16DCF170000
heap
page read and write
16DE9DAE000
trusted library allocation
page read and write
16DE9993000
trusted library allocation
page read and write
221E20EA000
trusted library allocation
page read and write
16DDDBE7000
trusted library allocation
page read and write
16DDF3EE000
trusted library allocation
page read and write
16DEA46F000
trusted library allocation
page read and write
390F000
stack
page read and write
16DDCED4000
trusted library allocation
page read and write
16DDF3EE000
trusted library allocation
page read and write
16DDA51F000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDDFC3000
trusted library allocation
page read and write
118D000
unkown
page execute and write copy
22B01D8A000
heap
page read and write
16DE976C000
trusted library allocation
page read and write
16DDF3A3000
trusted library allocation
page read and write
16DEA95A000
trusted library allocation
page read and write
4D2E000
stack
page read and write
2F3C48D0000
trusted library allocation
page execute read
CD4000
heap
page read and write
16DCF17A000
heap
page read and write
16DE62D0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
16DDA5BE000
trusted library allocation
page read and write
16DDE085000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
16DE68A0000
trusted library allocation
page read and write
16DED0CD000
trusted library allocation
page read and write
4B80000
heap
page read and write
16DDA69F000
trusted library allocation
page read and write
22C87000
heap
page read and write
7841000
heap
page read and write
1450000
heap
page read and write
16DDF9C2000
trusted library allocation
page read and write
16DDCEE0000
trusted library allocation
page read and write
16DEA993000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DDF8C3000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDF296000
trusted library allocation
page read and write
16DE6232000
trusted library allocation
page read and write
16DEA8B9000
trusted library allocation
page read and write
16DEA991000
trusted library allocation
page read and write
16DE66CA000
trusted library allocation
page read and write
76B000
heap
page read and write
16DE4AD4000
trusted library allocation
page read and write
16DE9AFB000
trusted library allocation
page read and write
16DDE0C1000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
16DE5A32000
trusted library allocation
page read and write
1404000
heap
page read and write
16DE9769000
trusted library allocation
page read and write
291F3C50000
heap
page read and write
16DE99D7000
trusted library allocation
page read and write
16DE685B000
trusted library allocation
page read and write
375F000
stack
page read and write
1150000
direct allocation
page read and write
9E4000
heap
page read and write
16DE4BA1000
trusted library allocation
page read and write
22B1F000
heap
page read and write
16DE68F2000
trusted library allocation
page read and write
4421000
heap
page read and write
5C4000
heap
page read and write
16DCF17D000
heap
page read and write
4A70000
direct allocation
page execute and read and write
16DE9E70000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
1150000
direct allocation
page read and write
FB4000
heap
page read and write
221E202E000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DE97DF000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
16DDDF9D000
trusted library allocation
page read and write
16DDC990000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
22C87000
heap
page read and write
16DDA665000
trusted library allocation
page read and write
16DDE136000
trusted library allocation
page read and write
1205000
heap
page read and write
16DCF184000
heap
page read and write
16DDF2C7000
trusted library allocation
page read and write
16DE07DA000
trusted library allocation
page read and write
16DDCCB5000
trusted library allocation
page read and write
123C000
stack
page read and write
16DE9DE6000
trusted library allocation
page read and write
16DDA33C000
trusted library allocation
page read and write
16DD8BEF000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
16DEAAE8000
trusted library allocation
page read and write
16DDF360000
trusted library allocation
page read and write
16DEA943000
trusted library allocation
page read and write
16DDA5C5000
trusted library allocation
page read and write
148A000
heap
page read and write
16DCF16F000
heap
page read and write
B1D000
unkown
page execute and read and write
16DDDB3D000
trusted library allocation
page read and write
16DEA2FE000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DCF1A0000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
16DE62FD000
trusted library allocation
page read and write
16DDDB52000
trusted library allocation
page read and write
16DDF9FC000
trusted library allocation
page read and write
4ED0000
direct allocation
page execute and read and write
4421000
heap
page read and write
1201000
heap
page read and write
362F000
stack
page read and write
4421000
heap
page read and write
16DDF988000
trusted library allocation
page read and write
16DDF99C000
trusted library allocation
page read and write
660000
unkown
page read and write
16DE9D8C000
trusted library allocation
page read and write
16DCF191000
heap
page read and write
16DE475D000
trusted library allocation
page read and write
16DDF362000
trusted library allocation
page read and write
13D0000
heap
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DDCE99000
trusted library allocation
page read and write
16DDE0B0000
trusted library allocation
page read and write
16DDA5A8000
trusted library allocation
page read and write
291F3B0A000
trusted library allocation
page read and write
3FE0000
heap
page read and write
436E000
stack
page read and write
16DDD4D6000
trusted library allocation
page read and write
221E1C30000
unclassified section
page readonly
16DCF17F000
heap
page read and write
16DE49BF000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
9E4000
heap
page read and write
16DDDBCA000
trusted library allocation
page read and write
22B0155F000
trusted library allocation
page read and write
16DCF175000
heap
page read and write
22B01D60000
heap
page read and write
1CA2F000
stack
page read and write
4BBB000
stack
page read and write
6920000
heap
page read and write
425F000
stack
page read and write
16DE078B000
trusted library allocation
page read and write
16DE0422000
trusted library allocation
page read and write
16DDDB86000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDA677000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
16DE4714000
trusted library allocation
page read and write
16DCF191000
heap
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DEA9DD000
trusted library allocation
page read and write
2CAF000
stack
page read and write
16DDF8A8000
trusted library allocation
page read and write
16DDD4D8000
trusted library allocation
page read and write
316E000
stack
page read and write
16DDF8C3000
trusted library allocation
page read and write
16DEA983000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
11D0000
heap
page read and write
16DDE0AE000
trusted library allocation
page read and write
16DEE3D6000
trusted library allocation
page read and write
16DCF19C000
heap
page read and write
16DDA6F3000
trusted library allocation
page read and write
352E000
stack
page read and write
16DDF961000
trusted library allocation
page read and write
16DE9E5A000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDCC24000
trusted library allocation
page read and write
16DE9932000
trusted library allocation
page read and write
85A000
unkown
page execute and read and write
16DEA8D4000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
272F000
stack
page read and write
16DCF1A1000
heap
page read and write
16DEAA23000
trusted library allocation
page read and write
16DE4BAC000
trusted library allocation
page read and write
221E221B000
trusted library allocation
page read and write
4421000
heap
page read and write
4421000
heap
page read and write
492E000
stack
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DDCC04000
trusted library allocation
page read and write
22CAD000
heap
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DE042D000
trusted library allocation
page read and write
16DDA52A000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
1480000
heap
page read and write
2DA7000
heap
page read and write
16DEA352000
trusted library allocation
page read and write
16DE97E6000
trusted library allocation
page read and write
16DDF1FC000
trusted library allocation
page read and write
16DDA5B8000
trusted library allocation
page read and write
4B71000
heap
page read and write
FB4000
heap
page read and write
4421000
heap
page read and write
16DDF38F000
trusted library allocation
page read and write
16DDA625000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDA696000
trusted library allocation
page read and write
16DDA677000
trusted library allocation
page read and write
16DDD4E4000
trusted library allocation
page read and write
16DDF9D9000
trusted library allocation
page read and write
16DDF3D6000
trusted library allocation
page read and write
16DDF9AF000
trusted library allocation
page read and write
16DDA5CD000
trusted library allocation
page read and write
16DD94C4000
trusted library allocation
page read and write
22C87000
heap
page read and write
16DD91F6000
trusted library allocation
page read and write
221E2097000
trusted library allocation
page read and write
22B01DF1000
heap
page read and write
16DE4961000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
16DEA400000
trusted library allocation
page read and write
16DDD466000
trusted library allocation
page read and write
16DDA6A8000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDE4CF000
trusted library allocation
page read and write
16DE9D9C000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
16DDCEED000
trusted library allocation
page read and write
16DE68A8000
trusted library allocation
page read and write
FB4000
heap
page read and write
260EA900000
trusted library allocation
page read and write
415F000
stack
page read and write
16DECDC7000
trusted library allocation
page read and write
16DE9AF1000
trusted library allocation
page read and write
2FEF000
stack
page read and write
16DEA414000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
22C87000
heap
page read and write
16DDCC73000
trusted library allocation
page read and write
16DEF17C000
trusted library allocation
page read and write
16DDF4BC000
trusted library allocation
page read and write
16DE48F6000
trusted library allocation
page read and write
16DDF966000
trusted library allocation
page read and write
FB4000
heap
page read and write
B1D000
unkown
page execute and read and write
9E4000
heap
page read and write
22B01DFC000
heap
page read and write
16DDCC8B000
trusted library allocation
page read and write
16DE9A24000
trusted library allocation
page read and write
16DEA993000
trusted library allocation
page read and write
16DDCC73000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
16DDF956000
trusted library allocation
page read and write
1235000
heap
page read and write
16DEA941000
trusted library allocation
page read and write
16DEF6B5000
trusted library allocation
page read and write
16DDF99D000
trusted library allocation
page read and write
16DE4B52000
trusted library allocation
page read and write
16DE48EA000
trusted library allocation
page read and write
16DEA991000
trusted library allocation
page read and write
22B01DB2000
heap
page read and write
16DDD376000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
16DE99D7000
trusted library allocation
page read and write
16DEE228000
trusted library allocation
page read and write
10BE000
stack
page read and write
5C4000
heap
page read and write
405F000
stack
page read and write
16DDD4DE000
trusted library allocation
page read and write
466F000
stack
page read and write
16DEA9C1000
trusted library allocation
page read and write
16DE9E6C000
trusted library allocation
page read and write
16DECDFB000
trusted library allocation
page read and write
16DE5A6F000
trusted library allocation
page read and write
4E51000
heap
page read and write
16DDDB82000
trusted library allocation
page read and write
16DDDB78000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDC9BF000
trusted library allocation
page read and write
16DE6920000
trusted library allocation
page read and write
16DEA962000
trusted library allocation
page read and write
16DDF8B4000
trusted library allocation
page read and write
16DDCE3E000
trusted library allocation
page read and write
16DDF362000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
CEE000
heap
page read and write
301E000
stack
page read and write
16DE5A6F000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
16DDDFC3000
trusted library allocation
page read and write
16DE9D9F000
trusted library allocation
page read and write
16DCF191000
heap
page read and write
16DDF993000
trusted library allocation
page read and write
16DDDB95000
trusted library allocation
page read and write
16DE495F000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDE0C1000
trusted library allocation
page read and write
16DDDBEE000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DEA328000
trusted library allocation
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DDD47D000
trusted library allocation
page read and write
16DDD352000
trusted library allocation
page read and write
36EE000
stack
page read and write
16DE4AD9000
trusted library allocation
page read and write
16DE4BAA000
trusted library allocation
page read and write
16DDF4C6000
trusted library allocation
page read and write
16DE9AB3000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
1404000
heap
page read and write
28D39000
heap
page read and write
16DDF9A0000
trusted library allocation
page read and write
16DEA91B000
trusted library allocation
page read and write
16DE0475000
trusted library allocation
page read and write
16DD94EC000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
16DEA950000
trusted library allocation
page read and write
537E000
stack
page read and write
2D50000
direct allocation
page read and write
16DDD4D6000
trusted library allocation
page read and write
49AF000
stack
page read and write
16DDDBEA000
trusted library allocation
page read and write
22B01D00000
heap
page read and write
9E4000
heap
page read and write
16DE9AE1000
trusted library allocation
page read and write
16DDA5E2000
trusted library allocation
page read and write
122F000
heap
page read and write
16DDA6C5000
trusted library allocation
page read and write
16DCF167000
heap
page read and write
16DE9997000
trusted library allocation
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DDD4DE000
trusted library allocation
page read and write
16DECCEF000
trusted library allocation
page read and write
16DE0434000
trusted library allocation
page read and write
16DECC9B000
trusted library allocation
page read and write
122F000
heap
page read and write
16DEE21E000
trusted library allocation
page read and write
16DE9AF9000
trusted library allocation
page read and write
16DDE0A4000
trusted library allocation
page read and write
22CA2000
heap
page read and write
274A000
heap
page read and write
40D0000
direct allocation
page read and write
16DDD48F000
trusted library allocation
page read and write
22B01503000
trusted library allocation
page read and write
16DDE157000
trusted library allocation
page read and write
22B01D64000
heap
page read and write
2F6E000
stack
page read and write
4204000
heap
page read and write
BFB000
unkown
page execute and read and write
22B0216B000
heap
page read and write
16DDA5D0000
trusted library allocation
page read and write
16DEF335000
trusted library allocation
page read and write
16DDCC73000
trusted library allocation
page read and write
16DD91FE000
trusted library allocation
page read and write
16DDD38A000
trusted library allocation
page read and write
22B01DE8000
heap
page read and write
16DDF160000
trusted library allocation
page read and write
E2F000
unkown
page execute and write copy
16DDE0F2000
trusted library allocation
page read and write
16DEE295000
trusted library allocation
page read and write
16DE9E76000
trusted library allocation
page read and write
16DCF192000
heap
page read and write
22C77000
heap
page read and write
5B0000
direct allocation
page read and write
3B2F000
stack
page read and write
16DDF9B6000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
4B71000
heap
page read and write
16DE9AFE000
trusted library allocation
page read and write
16DE695E000
trusted library allocation
page read and write
16DE69D7000
trusted library allocation
page read and write
16DE4714000
trusted library allocation
page read and write
16DDD47D000
trusted library allocation
page read and write
260E000
stack
page read and write
291F3B00000
trusted library allocation
page read and write
16DE9409000
trusted library allocation
page read and write
48EF000
stack
page read and write
4421000
heap
page read and write
16DDF355000
trusted library allocation
page read and write
16DDE4B2000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDDB82000
trusted library allocation
page read and write
16DDF986000
trusted library allocation
page read and write
16DCF1A0000
heap
page read and write
16DDA5C7000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
2DAB000
heap
page read and write
16DDDB3B000
trusted library allocation
page read and write
16DE5C4E000
trusted library allocation
page read and write
16DDE132000
trusted library allocation
page read and write
148E000
heap
page read and write
3BEF000
stack
page read and write
16DDC9BF000
trusted library allocation
page read and write
16DDD4E0000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
9E4000
heap
page read and write
16DDA6FB000
trusted library allocation
page read and write
16DDF355000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
16DCF171000
heap
page read and write
9E4000
heap
page read and write
16DDDBED000
trusted library allocation
page read and write
16DDD469000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
16DDCCB3000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
25CE000
stack
page read and write
16DE97AE000
trusted library allocation
page read and write
16DECCF7000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
16DE692C000
trusted library allocation
page read and write
2510000
heap
page read and write
6BB0000
heap
page read and write
16DE48ED000
trusted library allocation
page read and write
5C4000
heap
page read and write
7BB000
unkown
page execute and read and write
16DE5A3C000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
16DE6203000
trusted library allocation
page read and write
16DDCC87000
trusted library allocation
page read and write
16DDA5D7000
trusted library allocation
page read and write
16DDF4C3000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DEA273000
trusted library allocation
page read and write
32DE000
stack
page read and write
16DEE232000
trusted library allocation
page read and write
16DE4BEB000
trusted library allocation
page read and write
5180000
direct allocation
page execute and read and write
16DDF3AF000
trusted library allocation
page read and write
16DDF35B000
trusted library allocation
page read and write
16DDF2F1000
trusted library allocation
page read and write
16DE4B9C000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
16DDD4E9000
trusted library allocation
page read and write
527167E000
unkown
page readonly
9E4000
heap
page read and write
16DEA3D9000
trusted library allocation
page read and write
FB4000
heap
page read and write
432E000
stack
page read and write
16DDA6FB000
trusted library allocation
page read and write
16DEE22A000
trusted library allocation
page read and write
16DCF17F000
heap
page read and write
16DCF188000
heap
page read and write
16DEAAA0000
trusted library allocation
page read and write
16DD9161000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
16DDA36C000
trusted library allocation
page read and write
16DE68FC000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
16DDA697000
trusted library allocation
page read and write
CB0000
heap
page read and write
16DDCC25000
trusted library allocation
page read and write
16DDC9AF000
trusted library allocation
page read and write
16DEA273000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDCC62000
trusted library allocation
page read and write
16DEE3E1000
trusted library allocation
page read and write
16DE9A62000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
660000
unkown
page readonly
71B000
stack
page read and write
4E51000
heap
page read and write
16DDD376000
trusted library allocation
page read and write
11F4000
heap
page read and write
3A5E000
stack
page read and write
16DE9A3A000
trusted library allocation
page read and write
16DE9AF6000
trusted library allocation
page read and write
CCF000
heap
page read and write
16DE994C000
trusted library allocation
page read and write
16DE9ABD000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
22B01D7F000
heap
page read and write
11F4000
heap
page read and write
16DDF3A3000
trusted library allocation
page read and write
16DDF04F000
trusted library allocation
page read and write
329E000
stack
page read and write
16DE04C4000
trusted library allocation
page read and write
16DEAA98000
trusted library allocation
page read and write
16DDDFF1000
trusted library allocation
page read and write
16DDCE8A000
trusted library allocation
page read and write
539000
heap
page read and write
16DE9903000
trusted library allocation
page read and write
16DE9ADA000
trusted library allocation
page read and write
16DE5A23000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF833000
trusted library allocation
page read and write
16DE49A2000
trusted library allocation
page read and write
16DDC9BF000
trusted library allocation
page read and write
4B71000
heap
page read and write
291F5417000
heap
page read and write
344E000
stack
page read and write
16DDD498000
trusted library allocation
page read and write
16DEAA85000
trusted library allocation
page read and write
FB5000
heap
page read and write
157F000
stack
page read and write
2CAF000
stack
page read and write
16DDF855000
trusted library allocation
page read and write
16DE04A1000
trusted library allocation
page read and write
51D0000
direct allocation
page execute and read and write
401000
unkown
page execute read
28D27000
heap
page read and write
480F000
stack
page read and write
1C8CE000
stack
page read and write
221E2023000
trusted library allocation
page read and write
16DE4775000
trusted library allocation
page read and write
16DE9AE8000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
34DF000
stack
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DE9D95000
trusted library allocation
page read and write
16DEA273000
trusted library allocation
page read and write
16DE68F2000
trusted library allocation
page read and write
B21000
unkown
page execute and write copy
4ACE000
stack
page read and write
16DDF989000
trusted library allocation
page read and write
16DE9E5A000
trusted library allocation
page read and write
16DDF36B000
trusted library allocation
page read and write
16DE4BC8000
trusted library allocation
page read and write
2D6E000
heap
page read and write
16DDCC7F000
trusted library allocation
page read and write
405E000
stack
page read and write
1010000
heap
page read and write
16DDC9BF000
trusted library allocation
page read and write
16DDDBBD000
trusted library allocation
page read and write
16DDDFE8000
trusted library allocation
page read and write
D11000
heap
page read and write
22C85000
heap
page read and write
16DDD466000
trusted library allocation
page read and write
11DA000
heap
page read and write
22C79000
heap
page read and write
16DE07CC000
trusted library allocation
page read and write
3A1F000
stack
page read and write
16DDDFE8000
trusted library allocation
page read and write
16DDCC6C000
trusted library allocation
page read and write
16DEA7B2000
trusted library allocation
page read and write
16DDF3F0000
trusted library allocation
page read and write
332F000
stack
page read and write
36EF000
stack
page read and write
B21000
unkown
page execute and write copy
16DDD498000
trusted library allocation
page read and write
4D3E000
stack
page read and write
9E4000
heap
page read and write
16DE4BC4000
trusted library allocation
page read and write
E2E000
unkown
page execute and read and write
16DE66DD000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDCE78000
trusted library allocation
page read and write
16DEA999000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
329F000
stack
page read and write
16DDCC66000
trusted library allocation
page read and write
FB4000
heap
page read and write
22B01090000
unclassified section
page readonly
16DDDB74000
trusted library allocation
page read and write
D10000
heap
page read and write
16DCF16F000
heap
page read and write
3EEF000
stack
page read and write
5F4000
heap
page read and write
16DDDBF1000
trusted library allocation
page read and write
16DEA983000
trusted library allocation
page read and write
16DE9AFE000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DCF17F000
heap
page read and write
16DE67AC000
trusted library allocation
page read and write
2E9F000
stack
page read and write
8E0000
heap
page read and write
9E4000
heap
page read and write
2E6F000
stack
page read and write
16DEA932000
trusted library allocation
page read and write
5C4000
heap
page read and write
22B01DAA000
heap
page read and write
4C70000
trusted library allocation
page read and write
696B000
stack
page read and write
291F3970000
heap
page read and write
33EE000
stack
page read and write
16DDD65B000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DEA2B4000
trusted library allocation
page read and write
16DDCC6C000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
16DEA2AD000
trusted library allocation
page read and write
16DE635D000
trusted library allocation
page read and write
16DE68DB000
trusted library allocation
page read and write
16DE6872000
trusted library allocation
page read and write
16DEE2D2000
trusted library allocation
page read and write
10FD000
stack
page read and write
3CEE000
stack
page read and write
16DDA5E2000
trusted library allocation
page read and write
3D2F000
stack
page read and write
61ECD000
direct allocation
page readonly
B00000
direct allocation
page read and write
22C81000
heap
page read and write
16DDDB8F000
trusted library allocation
page read and write
402F000
stack
page read and write
9E4000
heap
page read and write
16DE4BAA000
trusted library allocation
page read and write
16DDCE39000
trusted library allocation
page read and write
16DDA53B000
trusted library allocation
page read and write
16DDF03D000
trusted library allocation
page read and write
16DDD3CA000
trusted library allocation
page read and write
462E000
stack
page read and write
16DEE2AD000
trusted library allocation
page read and write
16DEA8BC000
trusted library allocation
page read and write
16DEF4DB000
trusted library allocation
page read and write
16DE48EA000
trusted library allocation
page read and write
16DEA9B5000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
16DE4A13000
trusted library allocation
page read and write
16DE9DEB000
trusted library allocation
page read and write
1201000
heap
page read and write
5420000
direct allocation
page execute and read and write
16DDDBDE000
trusted library allocation
page read and write
8BBE000
stack
page read and write
16DDF9C2000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
16DDDBEE000
trusted library allocation
page read and write
22C83000
heap
page read and write
55FE000
stack
page read and write
22B01240000
heap
page read and write
5C4000
heap
page read and write
16DCF188000
heap
page read and write
16DE9E8D000
trusted library allocation
page read and write
16DE6310000
trusted library allocation
page read and write
16DDA5B5000
trusted library allocation
page read and write
22C85000
heap
page read and write
16DDA5C9000
trusted library allocation
page read and write
16DEA273000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
D24000
heap
page read and write
458F000
stack
page read and write
16DDA5DE000
trusted library allocation
page read and write
9E4000
heap
page read and write
221E1CB0000
unclassified section
page readonly
16DE9E58000
trusted library allocation
page read and write
416F000
stack
page read and write
16DD94E1000
trusted library allocation
page read and write
16DDA665000
trusted library allocation
page read and write
22C83000
heap
page read and write
16DDD48F000
trusted library allocation
page read and write
16DDF36C000
trusted library allocation
page read and write
9E4000
heap
page read and write
46AF000
stack
page read and write
16DE4BA4000
trusted library allocation
page read and write
16DDF35A000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DDA5AE000
trusted library allocation
page read and write
52E0000
direct allocation
page read and write
1C92E000
stack
page read and write
16DDD4D8000
trusted library allocation
page read and write
401000
unkown
page execute read
144E000
stack
page read and write
4D60000
direct allocation
page read and write
16DE9933000
trusted library allocation
page read and write
16DD9477000
trusted library allocation
page read and write
16DECE32000
trusted library allocation
page read and write
16DDCCCA000
trusted library allocation
page read and write
16DDF961000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDCC64000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDA5B6000
trusted library allocation
page read and write
117E000
unkown
page execute and read and write
61ED4000
direct allocation
page readonly
6C612000
unkown
page readonly
16DEE2C8000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDF982000
trusted library allocation
page read and write
469E000
stack
page read and write
22B01640000
trusted library allocation
page read and write
16DDA480000
trusted library allocation
page read and write
B8B000
unkown
page execute and read and write
16DE4A9C000
trusted library allocation
page read and write
16DEF4C7000
trusted library allocation
page read and write
16DDDBE7000
trusted library allocation
page read and write
16DE6330000
trusted library allocation
page read and write
442E000
stack
page read and write
2EEB000
stack
page read and write
16DE4AF6000
trusted library allocation
page read and write
16DE48D7000
trusted library allocation
page read and write
16DDE44E000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
FB4000
heap
page read and write
16DDD4E9000
trusted library allocation
page read and write
BAC000
stack
page read and write
4421000
heap
page read and write
2F3C48D0000
trusted library allocation
page execute read
16DCF171000
heap
page read and write
16DDF97A000
trusted library allocation
page read and write
5AD000
unkown
page execute and read and write
16DDCC8C000
trusted library allocation
page read and write
16DCF17A000
heap
page read and write
16DEE224000
trusted library allocation
page read and write
16DDA4A8000
trusted library allocation
page read and write
1C7CE000
stack
page read and write
16DDA4DB000
trusted library allocation
page read and write
C972B7E000
unkown
page readonly
16DCF177000
heap
page read and write
16DEA8DB000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
49B1000
heap
page read and write
5460000
direct allocation
page execute and read and write
11F4000
heap
page read and write
16DDCC85000
trusted library allocation
page read and write
16DE03D9000
trusted library allocation
page read and write
6C9000
unkown
page read and write
3B6F000
stack
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DE495B000
trusted library allocation
page read and write
16DDA6F6000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DE496D000
trusted library allocation
page read and write
5051000
direct allocation
page read and write
16DDF3F6000
trusted library allocation
page read and write
16DDC928000
trusted library allocation
page read and write
16DDE507000
trusted library allocation
page read and write
2CEE000
stack
page read and write
11F4000
heap
page read and write
16DDF85C000
trusted library allocation
page read and write
4B71000
heap
page read and write
9E4000
heap
page read and write
16DDDB97000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDF9B0000
trusted library allocation
page read and write
16DDA5AE000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DDA4A8000
trusted library allocation
page read and write
16DDCC2D000
trusted library allocation
page read and write
16DCF186000
heap
page read and write
16DDCC0D000
trusted library allocation
page read and write
16DEA873000
trusted library allocation
page read and write
16DDA456000
trusted library allocation
page read and write
301F000
stack
page read and write
16DDD39B000
trusted library allocation
page read and write
22B0156F000
trusted library allocation
page read and write
22C85000
heap
page read and write
16DE06D1000
trusted library allocation
page read and write
22B01DF1000
heap
page read and write
4EC1000
direct allocation
page read and write
22C87000
heap
page read and write
2BFF000
stack
page read and write
16DECCB4000
trusted library allocation
page read and write
16DDCC6C000
trusted library allocation
page read and write
9E4000
heap
page read and write
14AE000
stack
page read and write
16DEE23D000
trusted library allocation
page read and write
16DEA83D000
trusted library allocation
page read and write
16DDDBA9000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
76B0000
heap
page read and write
16DDF2BD000
trusted library allocation
page read and write
750000
unkown
page read and write
16DDCC7F000
trusted library allocation
page read and write
16DDCC8E000
trusted library allocation
page read and write
16DE9D9C000
trusted library allocation
page read and write
16DE9AC7000
trusted library allocation
page read and write
120C000
heap
page read and write
16DDCEFD000
trusted library allocation
page read and write
4F0000
heap
page read and write
16DDCE4C000
trusted library allocation
page read and write
16DDCE40000
trusted library allocation
page read and write
655B9FC000
stack
page read and write
16DE4BC4000
trusted library allocation
page read and write
FB4000
heap
page read and write
6A6C000
stack
page read and write
16DDD4F4000
trusted library allocation
page read and write
221E2130000
heap
page read and write
B1F000
unkown
page execute and write copy
16DE4A89000
trusted library allocation
page read and write
B89000
unkown
page write copy
7410000
heap
page read and write
16DEF39B000
trusted library allocation
page read and write
9E4000
heap
page read and write
9E4000
heap
page read and write
16DCF199000
heap
page read and write
16DDDB82000
trusted library allocation
page read and write
1160000
heap
page read and write
16DE9EEC000
trusted library allocation
page read and write
2D2E000
stack
page read and write
9E4000
heap
page read and write
221E20B7000
trusted library allocation
page read and write
16DE07FE000
trusted library allocation
page read and write
16DDD4D8000
trusted library allocation
page read and write
16DDD4AB000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
967000
unkown
page execute and read and write
16DDDBA8000
trusted library allocation
page read and write
4EAF000
stack
page read and write
9E4000
heap
page read and write
419000
unkown
page readonly
9E5000
heap
page read and write
16DEA981000
trusted library allocation
page read and write
13D0000
heap
page read and write
9E4000
heap
page read and write
1E0000
heap
page read and write
45BE000
stack
page read and write
1C68F000
stack
page read and write
8A7C000
stack
page read and write
16DDF9B5000
trusted library allocation
page read and write
221E1F00000
trusted library allocation
page read and write
16DE6328000
trusted library allocation
page read and write
16DDA562000
trusted library allocation
page read and write
16DEE3F0000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
E1F000
unkown
page execute and read and write
16DE4BA4000
trusted library allocation
page read and write
16DDF919000
trusted library allocation
page read and write
16DDF92F000
trusted library allocation
page read and write
16DDA527000
trusted library allocation
page read and write
16DE9772000
trusted library allocation
page read and write
16DEA26B000
trusted library allocation
page read and write
661000
unkown
page execute and write copy
16DEA9B2000
trusted library allocation
page read and write
22C83000
heap
page read and write
43AE000
stack
page read and write
16DE07AB000
trusted library allocation
page read and write
16DE682F000
trusted library allocation
page read and write
16DDA371000
trusted library allocation
page read and write
221E205B000
trusted library allocation
page read and write
11F4000
heap
page read and write
4FB0000
heap
page read and write
16DCF188000
heap
page read and write
270E000
heap
page read and write
16DDCE90000
trusted library allocation
page read and write
9E0000
heap
page read and write
221E2221000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DDA5B8000
trusted library allocation
page read and write
16DE4710000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
5200000
direct allocation
page execute and read and write
62B000
stack
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DE5EB9000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DE635D000
trusted library allocation
page read and write
22B01DF1000
heap
page read and write
5271EFE000
stack
page read and write
16DDF9A5000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DEE2A7000
trusted library allocation
page read and write
16DDD4E9000
trusted library allocation
page read and write
62C000
unkown
page execute and read and write
16DDD677000
trusted library allocation
page read and write
16DDCC8C000
trusted library allocation
page read and write
28CF0000
heap
page read and write
16DE9EC2000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE5A03000
trusted library allocation
page read and write
40EE000
stack
page read and write
16DDF3A5000
trusted library allocation
page read and write
16DECE75000
trusted library allocation
page read and write
16DDD667000
trusted library allocation
page read and write
2627000
heap
page read and write
FB4000
heap
page read and write
5450000
direct allocation
page execute and read and write
16DCF17D000
heap
page read and write
5C4000
heap
page read and write
30B0000
direct allocation
page read and write
22B01D6C000
heap
page read and write
16DDCC96000
trusted library allocation
page read and write
16DE9DE6000
trusted library allocation
page read and write
456E000
stack
page read and write
16DCF174000
heap
page read and write
16DDD37E000
trusted library allocation
page read and write
3060000
heap
page read and write
22B01650000
heap
page read and write
16DE978E000
trusted library allocation
page read and write
16DE9784000
trusted library allocation
page read and write
16DDDFE5000
trusted library allocation
page read and write
16DE68F2000
trusted library allocation
page read and write
4E4F000
stack
page read and write
16DCF19D000
heap
page read and write
16DE9AFE000
trusted library allocation
page read and write
16DE68C8000
trusted library allocation
page read and write
16DE6872000
trusted library allocation
page read and write
16DEA95E000
trusted library allocation
page read and write
16DDDB82000
trusted library allocation
page read and write
16DE4886000
trusted library allocation
page read and write
16DEA264000
trusted library allocation
page read and write
16DE476B000
trusted library allocation
page read and write
16DCF190000
heap
page read and write
16DDD472000
trusted library allocation
page read and write
4421000
heap
page read and write
4B71000
heap
page read and write
C974DFE000
unkown
page readonly
16DDD368000
trusted library allocation
page read and write
16DDA665000
trusted library allocation
page read and write
16DDF853000
trusted library allocation
page read and write
16DE9954000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DEA90C000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
2A6E000
stack
page read and write
9E4000
heap
page read and write
4421000
heap
page read and write
5C4000
heap
page read and write
16DE67A0000
trusted library allocation
page read and write
16DDF3A7000
trusted library allocation
page read and write
16DDF296000
trusted library allocation
page read and write
22C85000
heap
page read and write
11F4000
heap
page read and write
16DD94C4000
trusted library allocation
page read and write
16DDF89A000
trusted library allocation
page read and write
16DDD371000
trusted library allocation
page read and write
4B71000
heap
page read and write
114B000
unkown
page execute and read and write
16DDC9FA000
trusted library allocation
page read and write
16DCF198000
heap
page read and write
7B9000
unkown
page write copy
22B015CF000
trusted library allocation
page read and write
16DEE2BD000
trusted library allocation
page read and write
16DE4AE4000
trusted library allocation
page read and write
16DE4BCD000
trusted library allocation
page read and write
E71000
unkown
page execute and write copy
16DE996F000
trusted library allocation
page read and write
16DDA5C2000
trusted library allocation
page read and write
16DEAAF0000
trusted library allocation
page read and write
16DD94B0000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DD94EC000
trusted library allocation
page read and write
16DDCC25000
trusted library allocation
page read and write
16DEA999000
trusted library allocation
page read and write
16DCE871000
heap
page read and write
16DE4BCC000
trusted library allocation
page read and write
16DE48CE000
trusted library allocation
page read and write
5C4000
heap
page read and write
22B01586000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DCF188000
heap
page read and write
11DF000
heap
page read and write
5060000
direct allocation
page execute and read and write
9E4000
heap
page read and write
16DDE12A000
trusted library allocation
page read and write
16DEA960000
trusted library allocation
page read and write
22B012C0000
trusted library allocation
page read and write
16DEA9B5000
trusted library allocation
page read and write
16DCF16A000
heap
page read and write
22B01512000
trusted library allocation
page read and write
50EF000
stack
page read and write
22C8D000
heap
page read and write
16DEE3DD000
trusted library allocation
page read and write
16DE9AF9000
trusted library allocation
page read and write
16DD94D7000
trusted library allocation
page read and write
221E2062000
trusted library allocation
page read and write
9E4000
heap
page read and write
47AF000
stack
page read and write
5220000
direct allocation
page execute and read and write
16DDE1A1000
trusted library allocation
page read and write
16DDF966000
trusted library allocation
page read and write
426E000
stack
page read and write
16DDD49D000
trusted library allocation
page read and write
16DDF172000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
16DEA43C000
trusted library allocation
page read and write
16DD94D7000
trusted library allocation
page read and write
16DDCC85000
trusted library allocation
page read and write
22B01D5F000
heap
page read and write
42EE000
stack
page read and write
4421000
heap
page read and write
16DCF17A000
heap
page read and write
D3C000
stack
page read and write
260EAB80000
heap
page read and write
39EF000
stack
page read and write
4B71000
heap
page read and write
16DDCC9D000
trusted library allocation
page read and write
221E2000000
trusted library allocation
page read and write
16DCF194000
heap
page read and write
16DDE14C000
trusted library allocation
page read and write
16DDC9A3000
trusted library allocation
page read and write
16DDD4B8000
trusted library allocation
page read and write
16DD91F6000
trusted library allocation
page read and write
16DE9409000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
16DCF177000
heap
page read and write
16DDDFBD000
trusted library allocation
page read and write
16DDD46E000
trusted library allocation
page read and write
16DDF9A1000
trusted library allocation
page read and write
16DE684B000
trusted library allocation
page read and write
16DDF9A0000
trusted library allocation
page read and write
52716FE000
unkown
page readonly
51C0000
direct allocation
page execute and read and write
16DE48B6000
trusted library allocation
page read and write
16DDF98F000
trusted library allocation
page read and write
3C5F000
stack
page read and write
16DDF985000
trusted library allocation
page read and write
16DE62ED000
trusted library allocation
page read and write
35AF000
stack
page read and write
16DDD47A000
trusted library allocation
page read and write
4470000
heap
page read and write
A5E000
unkown
page execute and write copy
402E000
stack
page read and write
16DCF188000
heap
page read and write
16DEA318000
trusted library allocation
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DDDB3D000
trusted library allocation
page read and write
356F000
stack
page read and write
16DE4B52000
trusted library allocation
page read and write
FB4000
heap
page read and write
5C4000
heap
page read and write
3FEE000
stack
page read and write
16DDC9DF000
trusted library allocation
page read and write
16DDDB4E000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
16DD947E000
trusted library allocation
page read and write
16DEA9A1000
trusted library allocation
page read and write
16DDF938000
trusted library allocation
page read and write
16DE68E3000
trusted library allocation
page read and write
16DDC9A6000
trusted library allocation
page read and write
1C910000
heap
page read and write
53E4000
heap
page read and write
16DEA9B2000
trusted library allocation
page read and write
16DD9490000
trusted library allocation
page read and write
260EAA00000
trusted library allocation
page read and write
366E000
stack
page read and write
16DDDBE3000
trusted library allocation
page read and write
16DDA5A5000
trusted library allocation
page read and write
16DEA39D000
trusted library allocation
page read and write
16DE68D7000
trusted library allocation
page read and write
1404000
heap
page read and write
16DE6215000
trusted library allocation
page read and write
16DE68AE000
trusted library allocation
page read and write
16DE476F000
trusted library allocation
page read and write
16DEA999000
trusted library allocation
page read and write
22B01592000
trusted library allocation
page read and write
16DDDB57000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDF9B8000
trusted library allocation
page read and write
16DDCC09000
trusted library allocation
page read and write
4CE000
stack
page read and write
16DDF0DE000
trusted library allocation
page read and write
16DDD466000
trusted library allocation
page read and write
16DDF97B000
trusted library allocation
page read and write
16DEA9CC000
trusted library allocation
page read and write
3F2E000
stack
page read and write
16DEE228000
trusted library allocation
page read and write
369E000
stack
page read and write
11DA000
heap
page read and write
16DEF332000
trusted library allocation
page read and write
16DE4BB5000
trusted library allocation
page read and write
1C37F000
stack
page read and write
FB4000
heap
page read and write
16DDDBDE000
trusted library allocation
page read and write
118E000
unkown
page execute and write copy
31AF000
stack
page read and write
16DCF17D000
heap
page read and write
16DDD36D000
trusted library allocation
page read and write
16DDD48B000
trusted library allocation
page read and write
3EDF000
stack
page read and write
16DDF8B8000
trusted library allocation
page read and write
16DCF1A7000
heap
page read and write
16DDF2FE000
trusted library allocation
page read and write
16DECC5D000
trusted library allocation
page read and write
2739000
heap
page read and write
498E000
stack
page read and write
16DDE0B7000
trusted library allocation
page read and write
1404000
heap
page read and write
4421000
heap
page read and write
16DDDB8F000
trusted library allocation
page read and write
22B01DE1000
heap
page read and write
16DDDFF2000
trusted library allocation
page read and write
16DDF38A000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DCF188000
heap
page read and write
16DE6961000
trusted library allocation
page read and write
CB0000
heap
page read and write
FB4000
heap
page read and write
16DDF3A3000
trusted library allocation
page read and write
16DDA531000
trusted library allocation
page read and write
16DEE211000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
16DDCC94000
trusted library allocation
page read and write
7B9000
unkown
page read and write
16DE03D4000
trusted library allocation
page read and write
16DE686D000
trusted library allocation
page read and write
16DEA964000
trusted library allocation
page read and write
1C3BE000
stack
page read and write
573E000
stack
page read and write
16DEA8DD000
trusted library allocation
page read and write
4570000
trusted library allocation
page read and write
4E31000
heap
page read and write
16DDF38A000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDE4AA000
trusted library allocation
page read and write
30C0000
heap
page read and write
16DE9A7E000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DE479B000
trusted library allocation
page read and write
533B000
stack
page read and write
16DE6781000
trusted library allocation
page read and write
16DE0486000
trusted library allocation
page read and write
16DE66C7000
trusted library allocation
page read and write
22B01D5C000
heap
page read and write
2EEB000
stack
page read and write
16DE6790000
trusted library allocation
page read and write
16DDD49D000
trusted library allocation
page read and write
3C6F000
stack
page read and write
16DDA5E2000
trusted library allocation
page read and write
16DE68E3000
trusted library allocation
page read and write
16DE685B000
trusted library allocation
page read and write
16DDF9B6000
trusted library allocation
page read and write
28FE000
stack
page read and write
967000
unkown
page execute and read and write
22CAD000
heap
page read and write
9E4000
heap
page read and write
22B02198000
heap
page read and write
16DDDFC3000
trusted library allocation
page read and write
16DE9D8B000
trusted library allocation
page read and write
16DCF170000
heap
page read and write
16DDA5C5000
trusted library allocation
page read and write
16DE9E74000
trusted library allocation
page read and write
16DE68B6000
trusted library allocation
page read and write
16DDF362000
trusted library allocation
page read and write
16DDCE8A000
trusted library allocation
page read and write
3B6E000
stack
page read and write
16DDE0B9000
trusted library allocation
page read and write
16DDCC7A000
trusted library allocation
page read and write
16DE67A0000
trusted library allocation
page read and write
16DDDB5F000
trusted library allocation
page read and write
16DE97BB000
trusted library allocation
page read and write
2D67000
heap
page read and write
16DCF170000
heap
page read and write
1150000
direct allocation
page read and write
16DDD378000
trusted library allocation
page read and write
16DE4730000
trusted library allocation
page read and write
16DDDB4C000
trusted library allocation
page read and write
5F4000
heap
page read and write
13BE000
stack
page read and write
16DE4B6A000
trusted library allocation
page read and write
DA0000
heap
page read and write
FB4000
heap
page read and write
16DE4ABB000
trusted library allocation
page read and write
4421000
heap
page read and write
2D50000
direct allocation
page read and write
16DDCE78000
trusted library allocation
page read and write
16DE6762000
trusted library allocation
page read and write
16DDF988000
trusted library allocation
page read and write
16DDDB8F000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDCC73000
trusted library allocation
page read and write
16DDCCCA000
trusted library allocation
page read and write
16DE675A000
trusted library allocation
page read and write
16DDF3D2000
trusted library allocation
page read and write
16DDE0BB000
trusted library allocation
page read and write
4E3F000
stack
page read and write
16DDDBED000
trusted library allocation
page read and write
1205000
heap
page read and write
260EA6E0000
heap
page read and write
16DE5C03000
trusted library allocation
page read and write
93B000
unkown
page execute and read and write
16DDD39B000
trusted library allocation
page read and write
16DCF188000
heap
page read and write
51F0000
direct allocation
page execute and read and write
C20000
heap
page read and write
16DE9A6F000
trusted library allocation
page read and write
16DDDB72000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
16DE9D9C000
trusted library allocation
page read and write
2A2F000
stack
page read and write
16DEE22A000
trusted library allocation
page read and write
16DE6851000
trusted library allocation
page read and write
16DDCE4C000
trusted library allocation
page read and write
16DDE492000
trusted library allocation
page read and write
16DDDB3B000
trusted library allocation
page read and write
441E000
stack
page read and write
5C4000
heap
page read and write
2DEF000
stack
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DEE3D3000
trusted library allocation
page read and write
16DE9DE6000
trusted library allocation
page read and write
16DE9780000
trusted library allocation
page read and write
16DDF986000
trusted library allocation
page read and write
5F4000
heap
page read and write
16DDA5C0000
trusted library allocation
page read and write
106A000
unkown
page execute and read and write
16DE62E0000
trusted library allocation
page read and write
16DDA4F2000
trusted library allocation
page read and write
43EE000
stack
page read and write
11F4000
heap
page read and write
16DDA5A8000
trusted library allocation
page read and write
16DEE2CC000
trusted library allocation
page read and write
52E0000
direct allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
16DEA3F1000
trusted library allocation
page read and write
16DED2B5000
trusted library allocation
page read and write
16DDCC1C000
trusted library allocation
page read and write
16DE0794000
trusted library allocation
page read and write
4421000
heap
page read and write
B20000
unkown
page readonly
26EA000
heap
page read and write
16DD9171000
trusted library allocation
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DDF4C6000
trusted library allocation
page read and write
16DDA456000
trusted library allocation
page read and write
16DCF169000
heap
page read and write
22C8C000
heap
page read and write
16DCE8FB000
heap
page read and write
16DDDFF9000
trusted library allocation
page read and write
3B1F000
stack
page read and write
9E4000
heap
page read and write
133D000
stack
page read and write
124C000
heap
page read and write
9E4000
heap
page read and write
53D6000
heap
page read and write
9E4000
heap
page read and write
FB4000
heap
page read and write
4A8F000
stack
page read and write
4280000
heap
page read and write
16DDDBD3000
trusted library allocation
page read and write
16DE685E000
trusted library allocation
page read and write
16DDDFC4000
trusted library allocation
page read and write
5F4000
heap
page read and write
16DCF19D000
heap
page read and write
FCB000
unkown
page execute and read and write
16DE046B000
trusted library allocation
page read and write
16DDF044000
trusted library allocation
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DEA9EE000
trusted library allocation
page read and write
16DDCEE0000
trusted library allocation
page read and write
16DE4B82000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DE48E7000
trusted library allocation
page read and write
16DDDFE8000
trusted library allocation
page read and write
16DE04C6000
trusted library allocation
page read and write
16DEA9DD000
trusted library allocation
page read and write
16DE07D6000
trusted library allocation
page read and write
28DA6000
heap
page read and write
441F000
stack
page read and write
16DDD49E000
trusted library allocation
page read and write
22B012B2000
unclassified section
page read and write
D0C000
unkown
page execute and read and write
16DDDBAA000
trusted library allocation
page read and write
19D000
stack
page read and write
6680000
heap
page read and write
9E4000
heap
page read and write
4100000
heap
page read and write
5F0000
heap
page read and write
5C4000
heap
page read and write
16DE68F2000
trusted library allocation
page read and write
16DE4B9A000
trusted library allocation
page read and write
48F0000
heap
page read and write
FB4000
heap
page read and write
16DDF3EE000
trusted library allocation
page read and write
16DEAAFD000
trusted library allocation
page read and write
16DDDFF9000
trusted library allocation
page read and write
16DDCCF1000
trusted library allocation
page read and write
1235000
heap
page read and write
16DEA960000
trusted library allocation
page read and write
16DE4735000
trusted library allocation
page read and write
22C87000
heap
page read and write
16DE4AD7000
trusted library allocation
page read and write
16DDDB8C000
trusted library allocation
page read and write
5160000
direct allocation
page execute and read and write
16DE9A94000
trusted library allocation
page read and write
3A2F000
stack
page read and write
5080000
direct allocation
page execute and read and write
FB4000
heap
page read and write
C974EFE000
unkown
page readonly
16DDDB3D000
trusted library allocation
page read and write
16DE4703000
trusted library allocation
page read and write
16DD94E1000
trusted library allocation
page read and write
16DDF2FE000
trusted library allocation
page read and write
16DDA69B000
trusted library allocation
page read and write
16DE9DA7000
trusted library allocation
page read and write
FB4000
heap
page read and write
22B02169000
heap
page read and write
1C40F000
stack
page read and write
4A10000
direct allocation
page execute and read and write
16DDCC96000
trusted library allocation
page read and write
16DDD48F000
trusted library allocation
page read and write
16DDD4D6000
trusted library allocation
page read and write
36CE000
stack
page read and write
16DD941B000
trusted library allocation
page read and write
16DDA343000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DE48EA000
trusted library allocation
page read and write
16DEE21B000
trusted library allocation
page read and write
16DDE08E000
trusted library allocation
page read and write
16DE4700000
trusted library allocation
page read and write
16DDC943000
trusted library allocation
page read and write
16DDA465000
trusted library allocation
page read and write
16DD947D000
trusted library allocation
page read and write
16DE9A65000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
1254000
heap
page read and write
1C78D000
stack
page read and write
2D50000
direct allocation
page read and write
16DE9DA7000
trusted library allocation
page read and write
16DEA972000
trusted library allocation
page read and write
16DE49AE000
trusted library allocation
page read and write
16DE6293000
trusted library allocation
page read and write
2EF58000
heap
page read and write
16DDF98E000
trusted library allocation
page read and write
16DDD4D3000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
16DDCE80000
trusted library allocation
page read and write
1254000
heap
page read and write
16DEE3D7000
trusted library allocation
page read and write
16DE993C000
trusted library allocation
page read and write
49F000
unkown
page execute and read and write
52716BE000
stack
page read and write
11C1000
heap
page read and write
C90000
direct allocation
page read and write
C972BFE000
unkown
page readonly
16DDA4D4000
trusted library allocation
page read and write
41CE000
stack
page read and write
11F4000
heap
page read and write
62CE000
stack
page read and write
5C4000
heap
page read and write
16DEA98D000
trusted library allocation
page read and write
427000
unkown
page write copy
16DE4732000
trusted library allocation
page read and write
6D5B000
stack
page read and write
22B01DF1000
heap
page read and write
16DEA933000
trusted library allocation
page read and write
192000
stack
page read and write
9E4000
heap
page read and write
16DEA989000
trusted library allocation
page read and write
16DE07D4000
trusted library allocation
page read and write
16DDCE62000
trusted library allocation
page read and write
16DDA456000
trusted library allocation
page read and write
16DEA98D000
trusted library allocation
page read and write
28D1D000
heap
page read and write
4A6E000
stack
page read and write
22C85000
heap
page read and write
16DDA6F0000
trusted library allocation
page read and write
16DEA836000
trusted library allocation
page read and write
16DE4B24000
trusted library allocation
page read and write
16DD94C4000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDCC9A000
trusted library allocation
page read and write
16DDE27E000
trusted library allocation
page read and write
16DEA8BC000
trusted library allocation
page read and write
16DDF396000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
16DDD39B000
trusted library allocation
page read and write
42AE000
stack
page read and write
16DDF9B0000
trusted library allocation
page read and write
16DE9DCA000
trusted library allocation
page read and write
16DDD466000
trusted library allocation
page read and write
16DEE242000
trusted library allocation
page read and write
16DCF178000
heap
page read and write
47EF000
stack
page read and write
16DECC75000
trusted library allocation
page read and write
392F000
stack
page read and write
16DE621B000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
430F000
stack
page read and write
16DDF36B000
trusted library allocation
page read and write
41AF000
stack
page read and write
16DDD4E4000
trusted library allocation
page read and write
4C4000
unkown
page execute and read and write
1227000
heap
page read and write
750000
unkown
page readonly
1E0000
heap
page read and write
C9766FE000
stack
page read and write
16DDF986000
trusted library allocation
page read and write
16DDF988000
trusted library allocation
page read and write
16DDD47D000
trusted library allocation
page read and write
1140000
heap
page read and write
22B01DE0000
heap
page read and write
16DDDB5D000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DDA660000
trusted library allocation
page read and write
11F4000
heap
page read and write
B20000
unkown
page readonly
5351000
direct allocation
page read and write
4B71000
heap
page read and write
5B0000
direct allocation
page read and write
16DDF961000
trusted library allocation
page read and write
22B01C05000
trusted library allocation
page read and write
16DE4AFA000
trusted library allocation
page read and write
16DE5A75000
trusted library allocation
page read and write
16DECDD2000
trusted library allocation
page read and write
16DEA8C4000
trusted library allocation
page read and write
16DDCE8A000
trusted library allocation
page read and write
22B01D5F000
heap
page read and write
16DDDFF6000
trusted library allocation
page read and write
16DE689A000
trusted library allocation
page read and write
1235000
heap
page read and write
16DDF4F9000
trusted library allocation
page read and write
16DDF9AF000
trusted library allocation
page read and write
16DCF19A000
heap
page read and write
6140000
heap
page read and write
16DCF17D000
heap
page read and write
16DDDB95000
trusted library allocation
page read and write
16DE68EC000
trusted library allocation
page read and write
CCD000
heap
page read and write
16DDE0A0000
trusted library allocation
page read and write
16DDF8D5000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDCE9A000
trusted library allocation
page read and write
16DDCC62000
trusted library allocation
page read and write
16DE9E5C000
trusted library allocation
page read and write
4043000
heap
page read and write
C9745FE000
stack
page read and write
16DE0765000
trusted library allocation
page read and write
16DDA34A000
trusted library allocation
page read and write
16DE4700000
trusted library allocation
page read and write
16DDA371000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDF343000
trusted library allocation
page read and write
16DD8BCE000
trusted library allocation
page read and write
6CB000
unkown
page execute and read and write
16DE6883000
trusted library allocation
page read and write
16DDF8E8000
trusted library allocation
page read and write
4AAE000
stack
page read and write
16DCF191000
heap
page read and write
16DE9AF9000
trusted library allocation
page read and write
1C54F000
stack
page read and write
16DDF998000
trusted library allocation
page read and write
4BFE000
stack
page read and write
16DDD4C4000
trusted library allocation
page read and write
4473000
heap
page read and write
16DDF4BC000
trusted library allocation
page read and write
11F4000
heap
page read and write
16DCF168000
heap
page read and write
6C2000
unkown
page execute and read and write
97E000
unkown
page execute and write copy
16DDF358000
trusted library allocation
page read and write
76A0000
heap
page read and write
16DDF9AF000
trusted library allocation
page read and write
16DDA343000
trusted library allocation
page read and write
22C79000
heap
page read and write
16DDF4D0000
trusted library allocation
page read and write
1C90D000
stack
page read and write
5470000
direct allocation
page execute and read and write
16DEA9AC000
trusted library allocation
page read and write
504E000
stack
page read and write
16DECDE6000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
244C000
unkown
page readonly
4A70000
direct allocation
page execute and read and write
16DE6864000
trusted library allocation
page read and write
16DE6330000
trusted library allocation
page read and write
63E000
unkown
page execute and read and write
16DEA98D000
trusted library allocation
page read and write
5A0000
heap
page read and write
1C80E000
stack
page read and write
3D9F000
stack
page read and write
FB4000
heap
page read and write
16DDDB95000
trusted library allocation
page read and write
305E000
stack
page read and write
16DEE2D2000
trusted library allocation
page read and write
365F000
stack
page read and write
16DDD4D8000
trusted library allocation
page read and write
221E2217000
trusted library allocation
page read and write
16DCF184000
heap
page read and write
16DE5D6B000
trusted library allocation
page read and write
4B71000
heap
page read and write
FB4000
heap
page read and write
16DDF2F6000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
11E0000
direct allocation
page read and write
16DE9ABD000
trusted library allocation
page read and write
11C2000
heap
page read and write
260EAA07000
trusted library allocation
page read and write
16DE9DEB000
trusted library allocation
page read and write
16DDCCAE000
trusted library allocation
page read and write
16DDF97A000
trusted library allocation
page read and write
16DDCCCA000
trusted library allocation
page read and write
16DDCC64000
trusted library allocation
page read and write
16DEF15D000
trusted library allocation
page read and write
16DDDB95000
trusted library allocation
page read and write
16DE4730000
trusted library allocation
page read and write
F70F7FF000
stack
page read and write
16DEA27D000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
16DDF8E8000
trusted library allocation
page read and write
16DE4ABE000
trusted library allocation
page read and write
16DE5EB5000
trusted library allocation
page read and write
41CF000
stack
page read and write
2610000
direct allocation
page read and write
46AE000
stack
page read and write
16DDE0BD000
trusted library allocation
page read and write
5C4000
heap
page read and write
9E4000
heap
page read and write
16DE68C1000
trusted library allocation
page read and write
16DCF17D000
heap
page read and write
61ECC000
direct allocation
page read and write
16DEA983000
trusted library allocation
page read and write
16DDF8B8000
trusted library allocation
page read and write
16DDCC9A000
trusted library allocation
page read and write
9E5000
heap
page read and write
16DE9E95000
trusted library allocation
page read and write
16DDA5A0000
trusted library allocation
page read and write
22B02198000
heap
page read and write
16DDCE5F000
trusted library allocation
page read and write
16DCF16F000
heap
page read and write
5040000
direct allocation
page execute and read and write
1177000
unkown
page execute and read and write
9E4000
heap
page read and write
16DE9A6F000
trusted library allocation
page read and write
16DDF97A000
trusted library allocation
page read and write
C50000
heap
page read and write
16DE0769000
trusted library allocation
page read and write
16DDA5E2000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
9E4000
heap
page read and write
16DE97AE000
trusted library allocation
page read and write
22C60000
heap
page read and write
16DDD4E0000
trusted library allocation
page read and write
16DEDA00000
trusted library allocation
page read and write
16DE9915000
trusted library allocation
page read and write
9E4000
heap
page read and write
8E4C000
stack
page read and write
16DDDBD6000
trusted library allocation
page read and write
16DDCC62000
trusted library allocation
page read and write
3DEE000
stack
page read and write
16DDF8BF000
trusted library allocation
page read and write
22C79000
heap
page read and write
16DCF171000
heap
page read and write
16DEE2A7000
trusted library allocation
page read and write
16DE9AF1000
trusted library allocation
page read and write
4B71000
heap
page read and write
FB4000
heap
page read and write
16DCF197000
heap
page read and write
16DDCED8000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
16DDDBCA000
trusted library allocation
page read and write
43C000
unkown
page execute and read and write
16DEA8E2000
trusted library allocation
page read and write
16DEA428000
trusted library allocation
page read and write
16DECE00000
trusted library allocation
page read and write
521000
heap
page read and write
16DDF0C6000
trusted library allocation
page read and write
16DE9DD1000
trusted library allocation
page read and write
16DDDBE8000
trusted library allocation
page read and write
16DEAA38000
trusted library allocation
page read and write
16DE67C8000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
16DDA371000
trusted library allocation
page read and write
346F000
stack
page read and write
16DDF2C4000
trusted library allocation
page read and write
9E4000
heap
page read and write
11D0000
heap
page read and write
4B71000
heap
page read and write
16DDCCCA000
trusted library allocation
page read and write
312F000
stack
page read and write
680E000
stack
page read and write
306E000
stack
page read and write
16DDF38A000
trusted library allocation
page read and write
22BC0000
heap
page read and write
9E4000
heap
page read and write
16DDD4BC000
trusted library allocation
page read and write
16DE68BF000
trusted library allocation
page read and write
16DDDB3C000
trusted library allocation
page read and write
16DE9E87000
trusted library allocation
page read and write
16DE473C000
trusted library allocation
page read and write
16DE477C000
trusted library allocation
page read and write
16DDCE4C000
trusted library allocation
page read and write
16DDF2D4000
trusted library allocation
page read and write
4471000
heap
page read and write
16DDE1CB000
trusted library allocation
page read and write
382F000
stack
page read and write
16DCF19C000
heap
page read and write
41DE000
stack
page read and write
16DDCE5F000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
16DCF170000
heap
page read and write
5C4000
heap
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
16DDD47B000
trusted library allocation
page read and write
1CBA0000
trusted library allocation
page read and write
122F000
heap
page read and write
30B0000
direct allocation
page read and write
16DD9171000
trusted library allocation
page read and write
2B1F000
stack
page read and write
B20000
unkown
page read and write
4B71000
heap
page read and write
16DD949A000
trusted library allocation
page read and write
16DE4703000
trusted library allocation
page read and write
22B010A0000
unclassified section
page readonly
16DDCC21000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
16DEA259000
trusted library allocation
page read and write
326F000
stack
page read and write
16DDCEE0000
trusted library allocation
page read and write
16DDA36C000
trusted library allocation
page read and write
16DE4AD7000
trusted library allocation
page read and write
EFD000
stack
page read and write
5450000
direct allocation
page execute and read and write
33EE000
stack
page read and write
DE6000
unkown
page execute and read and write
2D50000
direct allocation
page read and write
16DDDB8C000
trusted library allocation
page read and write
16DDF3AC000
trusted library allocation
page read and write
16DDD3A1000
trusted library allocation
page read and write
4B71000
heap
page read and write
FB4000
heap
page read and write
16DEF303000
trusted library allocation
page read and write
16DDA564000
trusted library allocation
page read and write
336E000
stack
page read and write
9AA000
stack
page read and write
16DDF86C000
trusted library allocation
page read and write
22B02198000
heap
page read and write
16DCF17F000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
FB5000
heap
page read and write
16DDCC3C000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
16DDDBAA000
trusted library allocation
page read and write
16DDD4D6000
trusted library allocation
page read and write
658E000
stack
page read and write
16DDA36C000
trusted library allocation
page read and write
16DCF18E000
heap
page read and write
16DE6857000
trusted library allocation
page read and write
16DE9AF1000
trusted library allocation
page read and write
46EE000
stack
page read and write
30B0000
direct allocation
page read and write
1F0000
heap
page read and write
16DEE2CC000
trusted library allocation
page read and write
16DDCED4000
trusted library allocation
page read and write
16DCF197000
heap
page read and write
16DDA4E2000
trusted library allocation
page read and write
1404000
heap
page read and write
4E51000
heap
page read and write
2D30000
heap
page read and write
41AE000
stack
page read and write
FB4000
heap
page read and write
16DEA8CF000
trusted library allocation
page read and write
5160000
direct allocation
page execute and read and write
340F000
stack
page read and write
16DE4A6C000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DE4BD8000
trusted library allocation
page read and write
22B01130000
heap
page read and write
401F000
stack
page read and write
16DDF98E000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
16DDA5E2000
trusted library allocation
page read and write
16DCE8D5000
heap
page read and write
16DDCEFD000
trusted library allocation
page read and write
16DDF97E000
trusted library allocation
page read and write
16DDF3EB000
trusted library allocation
page read and write
16DECC03000
trusted library allocation
page read and write
16DDDB8C000
trusted library allocation
page read and write
221E2068000
trusted library allocation
page read and write
16DDA470000
trusted library allocation
page read and write
147E000
stack
page read and write
4E50000
heap
page read and write
16DCF17A000
heap
page read and write
16DECDFD000
trusted library allocation
page read and write
16DE5DB5000
trusted library allocation
page read and write
22B01DFC000
heap
page read and write
FB4000
heap
page read and write
116F000
stack
page read and write
16DDDB8D000
trusted library allocation
page read and write
1F0000
heap
page read and write
16DDCC92000
trusted library allocation
page read and write
16DE4732000
trusted library allocation
page read and write
FB4000
heap
page read and write
16DE4B2D000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDC92D000
trusted library allocation
page read and write
16DDE0C1000
trusted library allocation
page read and write
16DECC7C000
trusted library allocation
page read and write
36AE000
stack
page read and write
16DDCEA5000
trusted library allocation
page read and write
16DDCE90000
trusted library allocation
page read and write
16DE9D8D000
trusted library allocation
page read and write
3B5F000
stack
page read and write
16DE68FC000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
16DE475D000
trusted library allocation
page read and write
16DDEA87000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
16DDE0B9000
trusted library allocation
page read and write
16DDCC15000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
16DDE085000
trusted library allocation
page read and write
16DDDB95000
trusted library allocation
page read and write
1254000
heap
page read and write
16DE0795000
trusted library allocation
page read and write
16DDD39B000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DE9DDE000
trusted library allocation
page read and write
16DE5D55000
trusted library allocation
page read and write
16DEA9C3000
trusted library allocation
page read and write
16DDCC6C000
trusted library allocation
page read and write
16DDF96C000
trusted library allocation
page read and write
16DDF0BE000
trusted library allocation
page read and write
4421000
heap
page read and write
16DDDB95000
trusted library allocation
page read and write
16DDA696000
trusted library allocation
page read and write
16DDCC62000
trusted library allocation
page read and write
16DDEA90000
trusted library allocation
page read and write
16DDC9BA000
trusted library allocation
page read and write
16DDCE3D000
trusted library allocation
page read and write
3F1F000
stack
page read and write
22C71000
heap
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
4A70000
direct allocation
page execute and read and write
751000
unkown
page execute and write copy
16DE9DDA000
trusted library allocation
page read and write
16DDDBF1000
trusted library allocation
page read and write
ED2000
unkown
page execute and read and write
16DEF110000
trusted library allocation
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
291F5400000
heap
page read and write
16DE06ED000
trusted library allocation
page read and write
16DDCC9A000
trusted library allocation
page read and write
16DE9DDE000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
4B71000
heap
page read and write
16DDF9CB000
trusted library allocation
page read and write
16DDA5C5000
trusted library allocation
page read and write
16DDD4C7000
trusted library allocation
page read and write
32AF000
stack
page read and write
16DE68EC000
trusted library allocation
page read and write
16DDF855000
trusted library allocation
page read and write
16DEA9B2000
trusted library allocation
page read and write
16DDF9CB000
trusted library allocation
page read and write
16DDF961000
trusted library allocation
page read and write
16DDF988000
trusted library allocation
page read and write
16DDDBED000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DDD4D8000
trusted library allocation
page read and write
5C0000
heap
page read and write
4421000
heap
page read and write
11DD000
heap
page read and write
22B02184000
heap
page read and write
16DDF993000
trusted library allocation
page read and write
11E0000
direct allocation
page read and write
30B0000
direct allocation
page read and write
16DDA6F3000
trusted library allocation
page read and write
16DDCC92000
trusted library allocation
page read and write
16DDD4BC000
trusted library allocation
page read and write
16DDA4A8000
trusted library allocation
page read and write
16DEA824000
trusted library allocation
page read and write
22B01DE3000
heap
page read and write
16DE9E5E000
trusted library allocation
page read and write
16DDF9A2000
trusted library allocation
page read and write
16DDF888000
trusted library allocation
page read and write
16DDC9FA000
trusted library allocation
page read and write
16DDD372000
trusted library allocation
page read and write
30C7000
heap
page read and write
4A80000
direct allocation
page execute and read and write
221E1EC0000
unclassified section
page readonly
22B01DFC000
heap
page read and write
16DE04F0000
trusted library allocation
page read and write
4901000
direct allocation
page read and write
22B01D7D000
heap
page read and write
2F3C4901000
trusted library allocation
page execute read
16DEA84D000
trusted library allocation
page read and write
16DDA646000
trusted library allocation
page read and write
16DDCC66000
trusted library allocation
page read and write
16DE5A00000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
3B9E000
stack
page read and write
FB4000
heap
page read and write
22C8D000
heap
page read and write
326F000
stack
page read and write
16DDF844000
trusted library allocation
page read and write
18C000
stack
page read and write
16DE693A000
trusted library allocation
page read and write
16DE9AFB000
trusted library allocation
page read and write
16DEF4D6000
trusted library allocation
page read and write
16DDA5C9000
trusted library allocation
page read and write
16DDD4F4000
trusted library allocation
page read and write
16DE5ECD000
trusted library allocation
page read and write
470E000
stack
page read and write
16DDCC62000
trusted library allocation
page read and write
16DE684F000
trusted library allocation
page read and write
9E4000
heap
page read and write
5450000
direct allocation
page execute and read and write
16DDDBE0000
trusted library allocation
page read and write
D24000
heap
page read and write
FB4000
heap
page read and write
16DDD469000
trusted library allocation
page read and write
16DE6BF3000
trusted library allocation
page read and write
526E3FE000
unkown
page readonly
16DDF4D2000
trusted library allocation
page read and write
16DE977C000
trusted library allocation
page read and write
16DDD4E6000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
16DEA97E000
trusted library allocation
page read and write
16DE68E3000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
16DDE09C000
trusted library allocation
page read and write
16DE4735000
trusted library allocation
page read and write
B1F000
unkown
page execute and write copy
9E4000
heap
page read and write
11F4000
heap
page read and write
16DDCE40000
trusted library allocation
page read and write
16DE9975000
trusted library allocation
page read and write
4330000
heap
page read and write
16DDF360000
trusted library allocation
page read and write
2BAE000
stack
page read and write
11F4000
heap
page read and write
16DDE471000
trusted library allocation
page read and write
16DE9784000
trusted library allocation
page read and write
526E2BC000
stack
page read and write
16DEE228000
trusted library allocation
page read and write
16DE9914000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
4FD000
stack
page read and write
16DDCE78000
trusted library allocation
page read and write
16DDCC14000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
16DDDFBB000
trusted library allocation
page read and write
16DEA8B2000
trusted library allocation
page read and write
16DDA6FB000
trusted library allocation
page read and write
16DE9DA2000
trusted library allocation
page read and write
22B021A7000
heap
page read and write
16DEA8B2000
trusted library allocation
page read and write
C5A000
heap
page read and write
16DCF18C000
heap
page read and write
5B0000
direct allocation
page read and write
16DDF8E0000
trusted library allocation
page read and write
16DECE6F000
trusted library allocation
page read and write
8ABE000
stack
page read and write
16DDDBE0000
trusted library allocation
page read and write
4F50000
direct allocation
page execute and read and write
16DECC32000
trusted library allocation
page read and write
16DDA456000
trusted library allocation
page read and write
16DE04D0000
trusted library allocation
page read and write
32CF000
stack
page read and write
16DDF973000
trusted library allocation
page read and write
16DDF500000
trusted library allocation
page read and write
16DEA2CE000
trusted library allocation
page read and write
24A0000
heap
page read and write
16DD8BEF000
trusted library allocation
page read and write
16DCF186000
heap
page read and write
430000
heap
page read and write
8D4C000
stack
page read and write
16DDE1DB000
trusted library allocation
page read and write
16DDA5A5000
trusted library allocation
page read and write
16DDD4DE000
trusted library allocation
page read and write
16DDF9D0000
trusted library allocation
page read and write
16DDA5A8000
trusted library allocation
page read and write
221E2003000
trusted library allocation
page read and write
4B71000
heap
page read and write
5490000
direct allocation
page execute and read and write
16DDC9FA000
trusted library allocation
page read and write
16DE68A7000
trusted library allocation
page read and write
16DDE0C1000
trusted library allocation
page read and write
16DDC9FA000
trusted library allocation
page read and write
16DDD4D0000
trusted library allocation
page read and write
16DEA84D000
trusted library allocation
page read and write
B8B000
unkown
page execute and read and write
16DD9482000
trusted library allocation
page read and write
16DEAAA0000
trusted library allocation
page read and write
A5E000
unkown
page execute and read and write
16DE9759000
trusted library allocation
page read and write
16DE686D000
trusted library allocation
page read and write
14B0000
heap
page read and write
16DE48B4000
trusted library allocation
page read and write
16DDCC6C000
trusted library allocation
page read and write
260EA7D9000
heap
page read and write
482E000
stack
page read and write
16DEA3FA000
trusted library allocation
page read and write
16DE4BBA000
trusted library allocation
page read and write
22B01D5F000
heap
page read and write
16DE68F0000
trusted library allocation
page read and write
16DE687C000
trusted library allocation
page read and write
40B0000
direct allocation
page read and write
16DE07FE000
trusted library allocation
page read and write
9E4000
heap
page read and write
16DE9776000
trusted library allocation
page read and write
16DEA264000
trusted library allocation
page read and write
16DE04F0000
trusted library allocation
page read and write
4DD1000
direct allocation
page read and write
16DDF866000
trusted library allocation
page read and write
FB4000
heap
page read and write
365E000
stack
page read and write
16DEA2E1000
trusted library allocation
page read and write
16DE4775000
trusted library allocation
page read and write
16DDF8E6000
trusted library allocation
page read and write
16DDA5A5000
trusted library allocation
page read and write
16DE5A35000
trusted library allocation
page read and write
16DCF1A6000
heap
page read and write
2F2F000
stack
page read and write
16DDA5D7000
trusted library allocation
page read and write
47DE000
stack
page read and write
16DDF065000
trusted library allocation
page read and write
16DEA96A000
trusted library allocation
page read and write
22B01510000
trusted library allocation
page read and write
3D0E000
stack
page read and write
16DE9D9F000
trusted library allocation
page read and write
22C83000
heap
page read and write
16DE48E7000
trusted library allocation
page read and write
221E221D000
trusted library allocation
page read and write
3523C000
stack
page read and write
16DDF3EE000
trusted library allocation
page read and write
16DEE22D000
trusted library allocation
page read and write
16DE4A3B000
trusted library allocation
page read and write
427000
unkown
page write copy
39AE000
stack
page read and write
16DDD47D000
trusted library allocation
page read and write
16DDF8ED000
trusted library allocation
page read and write
16DD8B81000
trusted library allocation
page read and write
8E72000
heap
page read and write
22C95000
heap
page read and write
FB4000
heap
page read and write
16DDDB61000
trusted library allocation
page read and write
41EE000
stack
page read and write
32EE000
stack
page read and write
16DE6200000
trusted library allocation
page read and write
16DE06F2000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
16DCF174000
heap
page read and write
16DECCDA000
trusted library allocation
page read and write
4B71000
heap
page read and write
4421000
heap
page read and write
9E4000
heap
page read and write
16DE9F00000
trusted library allocation
page read and write
291F3963000
heap
page read and write
16DCF1A0000
heap
page read and write
49F000
unkown
page execute and read and write
22B01D4D000
heap
page read and write
9C000
stack
page read and write
5F4000
heap
page read and write
16DE5EB9000
trusted library allocation
page read and write
389F000
stack
page read and write
16DDD31C000
trusted library allocation
page read and write
75E000
stack
page read and write
583F000
stack
page read and write
16DDCE8A000
trusted library allocation
page read and write
1489000
heap
page read and write
2DAE000
stack
page read and write
16DDCE8A000
trusted library allocation
page read and write
16DDF362000
trusted library allocation
page read and write
16DE999B000
trusted library allocation
page read and write
16DDF993000
trusted library allocation
page read and write
16DEE28C000
trusted library allocation
page read and write
16DDF3A5000
trusted library allocation
page read and write
6BAE000
stack
page read and write
16DDF36C000
trusted library allocation
page read and write
16DCF185000
heap
page read and write
16DCE882000
heap
page read and write
16DDEB00000
trusted library allocation
page read and write
16DDCC26000
trusted library allocation
page read and write
4B71000
heap
page read and write
11F4000
heap
page read and write
16DEE29F000
trusted library allocation
page read and write
16DE6300000
trusted library allocation
page read and write
2C7E000
stack
page read and write
16DE9975000
trusted library allocation
page read and write
16DDCCCF000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
16DCF185000
heap
page read and write
22B0216B000
heap
page read and write
16DDCC26000
trusted library allocation
page read and write
22C87000
heap
page read and write
C2F000
stack
page read and write
16DE07CE000
trusted library allocation
page read and write
48E000
stack
page read and write
16DEA991000
trusted library allocation
page read and write
22C85000
heap
page read and write
16DDDF8E000
trusted library allocation
page read and write
2D5F000
stack
page read and write
16DDF938000
trusted library allocation
page read and write
16DEE3F5000
trusted library allocation
page read and write
4421000
heap
page read and write
16DE9E8D000
trusted library allocation
page read and write
22B01DE9000
heap
page read and write
4421000
heap
page read and write
16DDA460000
trusted library allocation
page read and write
3DAF000
stack
page read and write
16DEE2C2000
trusted library allocation
page read and write
16DDDBF1000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
22B01562000
trusted library allocation
page read and write
16DCF178000
heap
page read and write
16DCF198000
heap
page read and write
16DDA5A8000
trusted library allocation
page read and write
16DDF8E4000
trusted library allocation
page read and write
16DDF9B8000
trusted library allocation
page read and write
C975EFE000
unkown
page readonly
6EB0000
trusted library allocation
page read and write
16DDF9CB000
trusted library allocation
page read and write
16DDA51E000
trusted library allocation
page read and write
16DDF9A1000
trusted library allocation
page read and write
16DDCE8A000
trusted library allocation
page read and write
16DE684F000
trusted library allocation
page read and write
3BAF000
stack
page read and write
16DDF993000
trusted library allocation
page read and write
16DD94B0000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
16DDD47D000
trusted library allocation
page read and write
4420000
heap
page read and write
16DDA6F6000
trusted library allocation
page read and write
16DDCE76000
trusted library allocation
page read and write
5C4000
heap
page read and write
16DE9D8E000
trusted library allocation
page read and write
16DDCED4000
trusted library allocation
page read and write
97D000
unkown
page execute and read and write
30B0000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
16DDE49F000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
16DDA6CD000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
16DE49C9000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
D3F000
heap
page read and write
244C000
unkown
page readonly
16DEE20F000
trusted library allocation
page read and write
423000
unkown
page readonly
F70E7FF000
stack
page read and write
16DDD4E9000
trusted library allocation
page read and write
16DDCEB5000
trusted library allocation
page read and write
63E000
stack
page read and write
11F4000
heap
page read and write
1CAA1000
heap
page read and write
16DDDB33000
trusted library allocation
page read and write
16DD9171000
trusted library allocation
page read and write
30AE000
stack
page read and write
9E4000
heap
page read and write
16DDF8E0000
trusted library allocation
page read and write
5272EFE000
stack
page read and write
CEE000
heap
page read and write
16DE68FC000
trusted library allocation
page read and write
244C000
unkown
page readonly
16DDCCCA000
trusted library allocation
page read and write
CC9000
heap
page read and write
16DDCC26000
trusted library allocation
page read and write
16DE4B28000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
16DEA403000
trusted library allocation
page read and write
22C71000
heap
page read and write
16DDCC31000
trusted library allocation
page read and write
B1F000
unkown
page execute and write copy
430F000
stack
page read and write
4421000
heap
page read and write
380E000
stack
page read and write
291F5404000
heap
page read and write
432F000
stack
page read and write
16DE68AE000
trusted library allocation
page read and write
16DE04FB000
trusted library allocation
page read and write
16DDF891000
trusted library allocation
page read and write
2EDAE000
stack
page read and write
16DDCE9F000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
16DEA9B5000
trusted library allocation
page read and write
16DEF37A000
trusted library allocation
page read and write
22C95000
heap
page read and write
16DDA56F000
trusted library allocation
page read and write
16DDA6C5000
trusted library allocation
page read and write
3FB0000
direct allocation
page read and write
16DDD4E6000
trusted library allocation
page read and write
16DCF171000
heap
page read and write
FB4000
heap
page read and write
7AA000
heap
page read and write
16DDE270000
trusted library allocation
page read and write
There are 5641 hidden memdumps, click here to show them.