IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1005522001\28d9ab8742.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1005523001\3daf81f16e.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1005525001\be33d1b9ea.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DocumentsECBGHCGCBK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFHDHCAAKECFIDHIEBAKFCGCFC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKJKJEHJJDAKECBFCGID
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\EBFHJEGDAFHIJKECFBKJJKJJDH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECGDBAEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x37, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\FCFBGIDAEHCFIDGCBGII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IJECBGIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFIDAFBFBKFHJJKEHIEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\be33d1b9ea.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\06503723-96ef-4c9c-ad16-366882bea405.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\47bd670f-57e1-4580-9a82-1ed0be18aba5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5799ef2d-cbbc-425a-b9b3-bef1d958ee38.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5e509f95-6e53-47af-8de1-bbbb0ae91f45.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\64734da3-8538-4c87-84b8-60d17bd962aa.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7bea8035-fc88-42c6-a96c-01f755e55806.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\972569aa-e89f-45d3-847c-654b5aa234b4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0376c42f-9d4c-45c2-91aa-e45c91c47be9.tmp
Unicode text, UTF-8 text, with very long lines (17478), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\2f2cd048-c5bb-4d93-aa71-754329f45479.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\36be39c9-ce72-449a-b039-4da8eccabb17.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\4a4f5ae1-7eb8-4e6d-a901-2f483def14ff.tmp
Unicode text, UTF-8 text, with very long lines (17478), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\63371515-ef15-4dbe-89f0-371fa002e4ad.tmp
Unicode text, UTF-8 text, with very long lines (16720), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\85e1641a-f793-4d61-8556-db1cca7ac1d8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\0e09cae2-b3ca-49c8-af40-a29526af4444.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\1cd793a4-84ce-4281-bae5-9922c89686e5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\2809fa5d-b248-40ad-a965-788110893cfa.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\555488f0-285e-45fa-af74-79ca97dd529a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\841e702c-755f-4236-abd2-b2b3336fdcf0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF395f8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3e7c1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF45928.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries~RF48029.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\c319d351-9c97-4e59-8e19-6f1d12888655.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fb0bc18b-c6f9-45a6-837f-f7a3bc04b27e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3cdd0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4151a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF48fa9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3ef14.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF3f732.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\0f4f4dec-5efc-4bdd-94a2-e309d6d32110.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\12c8907e-77ec-4d41-9916-1fddcc704a26.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\72b6756c-117f-40eb-bc18-713e5c9e0bbd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\9654487d-6611-487e-aa16-ce212515b839.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\970f0a17-62cd-4bf8-9b6d-8c68bcaae05f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3e7c1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF45909.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries~RF48029.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\f3a9fb01-bc51-400d-9e3d-c4ba94a50640.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\aadebd6d-f95d-421f-947f-1fafa0d0908c.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\c95e4a4e-eca1-4806-8bd3-dc5c182566b7.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\dc9b586b-c8fb-4eaa-9a6e-ba078ac1e41d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37cb3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37f33.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a569.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3cde0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF48f7b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4f2b9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bf2e0099-e27f-413e-a404-6f75054fe666.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\252940de-3261-45a4-9b4f-1215c431a309.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\a39e4585-315f-48e6-96fe-8cde51bea2e4.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\fa9e83a7-c46e-4a2d-aa46-32081f3b5f79.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir8132_1237928049\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir8132_1237928049\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir8132_1237928049\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir8132_1237928049\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir8132_1237928049\fa9e83a7-c46e-4a2d-aa46-32081f3b5f79.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 138 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=1884,i,13590626300903968152,15304544705898681332,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2412 --field-trial-handle=2280,i,8263969002267575968,18168452341544240962,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2764 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=5352 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6968 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7404 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7404 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:8
malicious
C:\Users\user\DocumentsECBGHCGCBK.exe
"C:\Users\user\DocumentsECBGHCGCBK.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1005522001\28d9ab8742.exe
"C:\Users\user\AppData\Local\Temp\1005522001\28d9ab8742.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005523001\3daf81f16e.exe
"C:\Users\user\AppData\Local\Temp\1005523001\3daf81f16e.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=4128 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:3
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7000 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1005522001\28d9ab8742.exe
"C:\Users\user\AppData\Local\Temp\1005522001\28d9ab8742.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005525001\be33d1b9ea.exe
"C:\Users\user\AppData\Local\Temp\1005525001\be33d1b9ea.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005523001\3daf81f16e.exe
"C:\Users\user\AppData\Local\Temp\1005523001\3daf81f16e.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005525001\be33d1b9ea.exe
"C:\Users\user\AppData\Local\Temp\1005525001\be33d1b9ea.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005522001\28d9ab8742.exe
"C:\Users\user\AppData\Local\Temp\1005522001\28d9ab8742.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005523001\3daf81f16e.exe
"C:\Users\user\AppData\Local\Temp\1005523001\3daf81f16e.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005525001\be33d1b9ea.exe
"C:\Users\user\AppData\Local\Temp\1005525001\be33d1b9ea.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6568 --field-trial-handle=1952,i,7432511471498911834,11913331449728836615,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\DocumentsECBGHCGCBK.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=g9lbYg_WDvLO&l=e
unknown
https://marshal-zhukov.com/(_
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=h6HMV-M6cfAX&a
unknown
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=f9Xv_dG_70Ca&l=english
unknown
http://185.215.113.206(
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ntp.msn.cn/edge/ntp
unknown
https://navygenerayk.store:443/api
unknown
http://185.215.113.206/ws
unknown
https://aefd.nelreports.net/api/report?cat=bingcsp
unknown
fadehairucw.store
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1731325230045&w=0&anoncknm=app_anon&NoResponseBody=true
40.79.167.8
https://www.instagram.com
unknown
https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=1Zpka7DM_TWk&l=english
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=ij4Q-MLeHxnJ&l=engl
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
unknown
founpiuer.store
https://outlook.office.com/mail/compose?isExtension=true
unknown
http://185.215.113.16/steam/random.exeP&/
unknown
https://s.ytimg.com;
unknown
https://marshal-zhukov.com/:f
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://i.y.qq.com/n2/m/index.html
unknown
https://www.deezer.com/
unknown
185.215.113.206/c4becf79229cb002.php
https://web.telegram.org/
unknown
https://steamcommunity.com/profiles/76561199724331900
23.50.98.133
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=fK65ckRAjZr-&
unknown
https://store.s
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/c4becf79229cb002.php37
unknown
https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=1vfyNnvUqkgy&l=engl
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://avatars.fastly.steamstatic.com/fef49e7
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206/fB
unknown
https://lv.queniujq.cn
unknown
https://excel.new?from=EdgeM365Shoreline
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://www.youtube.com/
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1731325229335&w=0&anoncknm=app_anon&NoResponseBody=true
40.79.167.8
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.185.206
http://185.215.113.16/8x
unknown
https://community.fa
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://chromewebstore.google.com/
unknown
https://srtb.msn.cn/
unknown
http://185.215.113.16/off/def.exe
unknown
https://chrome.google.com/webstore/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=g2Zx7e0yBV_M&l=english
unknown
https://marshal-zhukov.com/zf
unknown
https://bard.google.com/
unknown
https://assets.msn.cn/resolver/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://marshal-zhukov.com/apioa
unknown
https://browser.events.data.msn.com/
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/g
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
https://www.office.com
unknown
http://185.215.113.206/c4becf79229cb002.php001
unknown
https://outlook.live.com/mail/0/
unknown
https://help.steampowered.com/en/
unknown
http://185.215.113.206/c4becf79229cb002.phpg
unknown
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://185.215.113.206/c4becf79229cb002.phph
unknown
https://ntp.msn.com/edge/ntp
unknown
https://assets.msn.com/resolver/
unknown
http://185.215.113.206/c4becf79229cb002.php/X
unknown
presticitpo.store
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
https://recaptcha.net/recaptcha/;
unknown
https://tidal.com/
unknown
https://marshal-zhukov.com/apiCQYHoC
unknown
https://marshal-zhukov.com/apio
unknown
https://ntp.msn.com
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=ftiDdX_V0QeB&l=englis
unknown
https://marshal-zhukov.com/apiu
unknown
https://marshal-zhukov.com/eiom
unknown
https://sb.scorecardresearch.com/b2?rn=1731325227261&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=1817CCD1391B64C11978D9E5387965A3&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null
18.238.49.99
https://gaana.com/
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.youtube.com3
unknown
https://marshal-zhukov.com/))TR
unknown
http://x1.c.lencr.org/0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
scriptyprefej.store
unknown
malicious
chrome.cloudflare-dns.com
162.159.61.3
steamcommunity.com
23.50.98.133
plus.l.google.com
142.250.185.206
play.google.com
142.250.181.238
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.244.18.32
www.google.com
142.250.185.100
marshal-zhukov.com
188.114.97.3
googlehosted.l.googleusercontent.com
216.58.206.33
sni1gl.wpc.nucdn.net
152.199.21.175
assets.msn.com
unknown
c.msn.com
unknown
ntp.msn.com
unknown
assets2.msn.com
unknown
navygenerayk.store
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
presticitpo.store
unknown
founpiuer.store
unknown
thumbystriw.store
unknown
necklacedmny.store
unknown
apis.google.com
unknown
api.msn.com
unknown
crisiwarny.store
unknown
fadehairucw.store
unknown
There are 16 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
23.192.247.89
unknown
United States
malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
13.107.246.40
unknown
United States
192.168.2.8
unknown
unknown
142.250.185.100
www.google.com
United States
192.168.2.9
unknown
unknown
192.168.2.4
unknown
unknown
162.159.61.3
chrome.cloudflare-dns.com
United States
23.219.161.135
unknown
United States
23.209.72.39
unknown
United States
23.33.40.143
unknown
United States
20.110.205.119
unknown
United States
23.33.40.146
unknown
United States
18.244.18.32
sb.scorecardresearch.com
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
188.114.97.3
marshal-zhukov.com
European Union
20.96.153.111
unknown
United States
104.117.182.56
unknown
United States
127.0.0.1
unknown
unknown
142.250.185.206
plus.l.google.com
United States
192.168.2.17
unknown
unknown
216.58.206.33
googlehosted.l.googleusercontent.com
United States
192.168.2.16
unknown
unknown
18.238.49.99
unknown
United States
142.250.181.238
play.google.com
United States
40.79.167.8
unknown
United States
204.79.197.219
unknown
United States
172.64.41.3
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
23.50.98.133
steamcommunity.com
United States
There are 23 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
28d9ab8742.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3daf81f16e.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
be33d1b9ea.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197670
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds
EdgeMUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
MUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197670
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{C89E2069-AF13-46DB-9E39-216131494B87}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197670
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197670
WindowTabManagerFileMappingId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 145 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
52C0000
direct allocation
page read and write
malicious
41000
unkown
page execute and read and write
malicious
C7E000
heap
page read and write
malicious
52C0000
direct allocation
page read and write
malicious
13BB000
heap
page read and write
malicious
911000
unkown
page execute and read and write
malicious
5100000
direct allocation
page read and write
malicious
4B70000
direct allocation
page read and write
malicious
5E01000
trusted library allocation
page execute and read and write
malicious
146E000
heap
page read and write
malicious
911000
unkown
page execute and read and write
malicious
F78000
heap
page read and write
malicious
153B000
heap
page read and write
malicious
8270000
direct allocation
page read and write
malicious
1A1000
unkown
page execute and read and write
malicious
911000
unkown
page execute and read and write
malicious
461000
unkown
page execute and read and write
malicious
BE0000
direct allocation
page read and write
1664000
heap
page read and write
5BA1000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
E0B000
unkown
page execute and write copy
2BDF000
stack
page read and write
4F01000
heap
page read and write
130E000
stack
page read and write
6E6000
unkown
page execute and write copy
344E000
stack
page read and write
5CE3000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
D94000
heap
page read and write
47A1000
heap
page read and write
38FF000
stack
page read and write
29F0000
heap
page read and write
106B000
unkown
page execute and write copy
4711000
heap
page read and write
540E000
stack
page read and write
5ECB000
trusted library allocation
page read and write
4BD0000
direct allocation
page read and write
5E92000
trusted library allocation
page read and write
361F000
stack
page read and write
306000
unkown
page execute and read and write
4ECF000
stack
page read and write
13C4000
heap
page read and write
11B1000
unkown
page execute and read and write
1024000
heap
page read and write
5420000
direct allocation
page execute and read and write
5EBA000
trusted library allocation
page read and write
D94000
heap
page read and write
A2000
unkown
page execute and write copy
29DE000
stack
page read and write
431E000
stack
page read and write
4BE1000
heap
page read and write
3160000
heap
page read and write
D94000
heap
page read and write
4E0F000
stack
page read and write
4C61000
heap
page read and write
46D0000
heap
page read and write
1024000
heap
page read and write
747000
unkown
page execute and write copy
1D1A8000
heap
page read and write
2EDF000
stack
page read and write
29E0000
direct allocation
page read and write
385F000
stack
page read and write
4C61000
heap
page read and write
391E000
stack
page read and write
C4F000
heap
page read and write
4700000
direct allocation
page read and write
4E31000
heap
page read and write
527F000
stack
page read and write
1024000
heap
page read and write
4B00000
heap
page read and write
114D000
unkown
page execute and read and write
C5E000
heap
page read and write
1D1A8000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
1194000
heap
page read and write
4431000
heap
page read and write
1524000
heap
page read and write
1194000
heap
page read and write
F40000
direct allocation
page read and write
4BE1000
heap
page read and write
1024000
heap
page read and write
3F4E000
stack
page read and write
5953000
trusted library allocation
page read and write
29E0000
direct allocation
page read and write
53BD000
stack
page read and write
40000
unkown
page readonly
523F000
stack
page read and write
46F1000
heap
page read and write
4F7E000
stack
page read and write
954000
heap
page read and write
5C8B000
trusted library allocation
page read and write
436E000
stack
page read and write
4D4E000
stack
page read and write
F54000
heap
page read and write
11E7000
heap
page read and write
DC7000
unkown
page execute and read and write
1664000
heap
page read and write
1024000
heap
page read and write
4830000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
1664000
heap
page read and write
1524000
heap
page read and write
4BE1000
heap
page read and write
495E000
stack
page read and write
56C0000
direct allocation
page read and write
17B8000
heap
page read and write
5E96000
trusted library allocation
page execute and read and write
52A1000
heap
page read and write
576A000
trusted library allocation
page read and write
954000
heap
page read and write
4E21000
heap
page read and write
FAF000
unkown
page execute and write copy
FAA000
unkown
page execute and read and write
5EA8000
trusted library allocation
page read and write
5710000
heap
page read and write
1D1AE000
heap
page read and write
11A7000
unkown
page execute and write copy
990000
heap
page read and write
6DE0000
heap
page execute and read and write
235BF000
stack
page read and write
5EDB000
trusted library allocation
page read and write
47CE000
stack
page read and write
3A4E000
stack
page read and write
5390000
direct allocation
page read and write
575A000
trusted library allocation
page read and write
186F000
heap
page read and write
4A70000
direct allocation
page execute and read and write
651000
unkown
page execute and read and write
F6E000
unkown
page execute and read and write
AB000
unkown
page execute and write copy
4E21000
heap
page read and write
8B5000
stack
page read and write
13C4000
heap
page read and write
1D1B1000
heap
page read and write
4B30000
remote allocation
page read and write
1664000
heap
page read and write
407F000
stack
page read and write
5B93000
trusted library allocation
page read and write
40000
unkown
page readonly
5ECB000
trusted library allocation
page read and write
B14000
heap
page read and write
308F000
stack
page read and write
1162000
unkown
page execute and read and write
28AF000
stack
page read and write
1D1A9000
heap
page read and write
4D0A000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
3EDE000
stack
page read and write
13C4000
heap
page read and write
4700000
direct allocation
page read and write
33DF000
stack
page read and write
4C61000
heap
page read and write
76D000
unkown
page execute and write copy
D94000
heap
page read and write
4BE1000
heap
page read and write
1024000
heap
page read and write
1079000
unkown
page execute and write copy
1194000
unkown
page execute and write copy
8E0000
heap
page read and write
47A1000
heap
page read and write
F54000
heap
page read and write
401E000
stack
page read and write
17CF000
stack
page read and write
1CACF000
stack
page read and write
5EBA000
trusted library allocation
page read and write
1202000
heap
page read and write
343E000
stack
page read and write
679000
unkown
page execute and write copy
1869000
heap
page read and write
57DE000
stack
page read and write
17BA000
heap
page read and write
F40000
direct allocation
page read and write
4C61000
heap
page read and write
52FE000
stack
page read and write
4E20000
direct allocation
page read and write
4BE1000
heap
page read and write
BE0000
direct allocation
page read and write
46F1000
heap
page read and write
4BE1000
heap
page read and write
260F000
stack
page read and write
441F000
stack
page read and write
4530000
trusted library allocation
page read and write
1024000
heap
page read and write
4E20000
heap
page read and write
1D1B0000
heap
page read and write
5EBB000
trusted library allocation
page read and write
5EC5000
trusted library allocation
page read and write
54BE000
stack
page read and write
F70000
unkown
page execute and read and write
FA0000
unkown
page read and write
52A1000
heap
page read and write
128B000
heap
page read and write
F50000
heap
page read and write
3CCF000
stack
page read and write
1429000
heap
page read and write
1203000
heap
page read and write
61E00000
direct allocation
page execute and read and write
366F000
stack
page read and write
F28000
unkown
page execute and read and write
4A10000
direct allocation
page execute and read and write
5ECB000
trusted library allocation
page read and write
23F000
unkown
page execute and read and write
5310000
direct allocation
page read and write
DC7000
unkown
page execute and write copy
5739000
trusted library allocation
page read and write
4CB000
unkown
page execute and read and write
185D000
heap
page read and write
1025000
heap
page read and write
47A1000
heap
page read and write
429E000
stack
page read and write
4BE1000
heap
page read and write
415E000
stack
page read and write
4C61000
heap
page read and write
110C000
unkown
page execute and read and write
1524000
heap
page read and write
E0C000
unkown
page execute and write copy
4D70000
direct allocation
page execute and read and write
52A1000
heap
page read and write
5EAB000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
63B000
unkown
page execute and read and write
45BE000
stack
page read and write
FBF000
unkown
page execute and read and write
D60000
unkown
page read and write
5788000
trusted library allocation
page read and write
1194000
heap
page read and write
F54000
heap
page read and write
5B34000
trusted library allocation
page read and write
4431000
heap
page read and write
16FF000
stack
page read and write
68E000
unkown
page execute and read and write
F54000
heap
page read and write
3CEE000
stack
page read and write
573A000
trusted library allocation
page read and write
6EEE000
stack
page read and write
F70000
unkown
page execute and read and write
11DF000
heap
page read and write
2F3E000
stack
page read and write
571B000
trusted library allocation
page read and write
2F8F000
stack
page read and write
292C000
stack
page read and write
5510000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
1194000
heap
page read and write
1524000
heap
page read and write
572E000
stack
page read and write
56E4000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
4711000
heap
page read and write
11C2000
heap
page read and write
B5C000
unkown
page execute and read and write
371F000
stack
page read and write
3BCE000
stack
page read and write
5070000
direct allocation
page read and write
1D1CB000
heap
page read and write
55E0000
trusted library allocation
page read and write
46F1000
heap
page read and write
4BE1000
heap
page read and write
2CC000
stack
page read and write
5ECB000
trusted library allocation
page read and write
5321000
heap
page read and write
1024000
heap
page read and write
4BE1000
heap
page read and write
1524000
heap
page read and write
B14000
heap
page read and write
56F3000
trusted library allocation
page read and write
4EBD000
stack
page read and write
4C61000
heap
page read and write
5736000
trusted library allocation
page read and write
1524000
heap
page read and write
5F13000
trusted library allocation
page read and write
9A4000
heap
page read and write
4C61000
heap
page read and write
5EA8000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
47A1000
heap
page read and write
5EA6000
trusted library allocation
page read and write
954000
heap
page read and write
354E000
stack
page read and write
1D79D000
stack
page read and write
57D0000
trusted library allocation
page read and write
1D18B000
heap
page read and write
1D03F000
stack
page read and write
D94000
heap
page read and write
45EE000
stack
page read and write
1149000
unkown
page execute and write copy
56EB000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
311E000
stack
page read and write
6B3000
unkown
page execute and write copy
46F1000
heap
page read and write
124A000
unkown
page execute and write copy
5E8F000
trusted library allocation
page read and write
CEB000
unkown
page execute and read and write
5EAB000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
5100000
direct allocation
page read and write
29AE000
stack
page read and write
1B4F000
stack
page read and write
5EDD000
trusted library allocation
page read and write
631E000
stack
page read and write
26C000
unkown
page execute and read and write
2A2E0000
heap
page read and write
41EE000
stack
page read and write
13C4000
heap
page read and write
4E31000
heap
page read and write
4F01000
heap
page read and write
2A2E1000
heap
page read and write
5ECD000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
11F8000
unkown
page execute and write copy
401E000
stack
page read and write
1D1C9000
heap
page read and write
31C0000
heap
page read and write
F4F000
unkown
page execute and read and write
CD1000
heap
page read and write
1024000
heap
page read and write
5722000
trusted library allocation
page read and write
38EF000
stack
page read and write
5420000
direct allocation
page execute and read and write
954000
heap
page read and write
48B0000
direct allocation
page execute and read and write
F96000
unkown
page execute and read and write
575A000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
F54000
heap
page read and write
5EEB000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
CEC000
heap
page read and write
CE1000
heap
page read and write
52A1000
heap
page read and write
1524000
heap
page read and write
4C61000
heap
page read and write
29EB000
heap
page read and write
5761000
trusted library allocation
page read and write
FA0000
unkown
page read and write
5700000
trusted library allocation
page read and write
3B4F000
stack
page read and write
CD1000
heap
page read and write
3C8F000
stack
page read and write
9D3000
heap
page read and write
1524000
heap
page read and write
46F1000
heap
page read and write
2E8F000
stack
page read and write
355E000
stack
page read and write
4E21000
heap
page read and write
1030000
unkown
page execute and read and write
4E21000
heap
page read and write
186B000
heap
page read and write
11AF000
unkown
page execute and write copy
112F000
unkown
page execute and read and write
5711000
trusted library allocation
page read and write
13C4000
heap
page read and write
1174000
unkown
page execute and read and write
1024000
heap
page read and write
3F6F000
stack
page read and write
4BE1000
heap
page read and write
39DE000
stack
page read and write
5F0C000
trusted library allocation
page read and write
339F000
stack
page read and write
D94000
heap
page read and write
2EEF000
stack
page read and write
AB000
unkown
page execute and read and write
1664000
heap
page read and write
18CE000
stack
page read and write
5EBA000
trusted library allocation
page read and write
1024000
heap
page read and write
F40000
direct allocation
page read and write
1524000
heap
page read and write
FA2000
unkown
page execute and read and write
954000
heap
page read and write
13C4000
heap
page read and write
364F000
stack
page read and write
39EE000
stack
page read and write
13C4000
heap
page read and write
83D0000
direct allocation
page execute and read and write
426F000
stack
page read and write
50BE000
stack
page read and write
954000
heap
page read and write
1149000
unkown
page execute and write copy
382E000
stack
page read and write
425F000
stack
page read and write
4D60000
heap
page read and write
5711000
trusted library allocation
page read and write
3E3E000
stack
page read and write
5719000
trusted library allocation
page read and write
F81000
unkown
page execute and write copy
13C4000
heap
page read and write
5D2E000
stack
page read and write
4F01000
heap
page read and write
5460000
direct allocation
page execute and read and write
5711000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
304E000
stack
page read and write
4E31000
heap
page read and write
4720000
heap
page read and write
1524000
heap
page read and write
5732000
trusted library allocation
page read and write
4EF0000
direct allocation
page execute and read and write
1194000
heap
page read and write
56FF000
trusted library allocation
page read and write
4D6000
unkown
page execute and read and write
468E000
stack
page read and write
5EBB000
trusted library allocation
page read and write
1024000
heap
page read and write
66A0000
heap
page read and write
5F0B000
trusted library allocation
page read and write
45CE000
stack
page read and write
681000
unkown
page execute and write copy
1024000
heap
page read and write
3A8E000
stack
page read and write
334000
unkown
page execute and write copy
33C000
unkown
page execute and write copy
56F2000
trusted library allocation
page read and write
5EAA000
trusted library allocation
page read and write
9A0000
heap
page read and write
4CCF000
stack
page read and write
CD1000
heap
page read and write
CE1000
heap
page read and write
13C4000
heap
page read and write
479F000
stack
page read and write
575A000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
61EB4000
direct allocation
page read and write
3F0F000
stack
page read and write
CEC000
heap
page read and write
13C4000
heap
page read and write
1874000
heap
page read and write
5782000
trusted library allocation
page read and write
5ECD000
trusted library allocation
page read and write
1664000
heap
page read and write
954000
heap
page read and write
13C4000
heap
page read and write
5860000
trusted library allocation
page execute and read and write
5ECB000
trusted library allocation
page read and write
4BE1000
heap
page read and write
5EB4000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
1D1CD000
heap
page read and write
4E31000
heap
page read and write
37CE000
stack
page read and write
1520000
heap
page read and write
708000
unkown
page execute and write copy
1D8FE000
stack
page read and write
6CB5E000
unkown
page read and write
13A0000
heap
page read and write
429E000
stack
page read and write
4BE1000
heap
page read and write
46F1000
heap
page read and write
5EB4000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
4D70000
direct allocation
page execute and read and write
CC3000
heap
page read and write
11D1000
unkown
page execute and read and write
306E000
stack
page read and write
A2000
unkown
page execute and write copy
D40000
direct allocation
page read and write
5ECC000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
8685000
heap
page read and write
3DAE000
stack
page read and write
F70000
heap
page read and write
49EF000
stack
page read and write
368E000
stack
page read and write
556B000
trusted library allocation
page execute and read and write
4E21000
heap
page read and write
4D0F000
stack
page read and write
5E83000
trusted library allocation
page read and write
3ADF000
stack
page read and write
1524000
heap
page read and write
4E21000
heap
page read and write
D94000
heap
page read and write
F40000
direct allocation
page read and write
3C9F000
stack
page read and write
1524000
heap
page read and write
C7E000
heap
page read and write
5718000
trusted library allocation
page read and write
1169000
unkown
page execute and write copy
CE4000
heap
page read and write
5711000
trusted library allocation
page read and write
5270000
heap
page read and write
CE4000
heap
page read and write
117F000
heap
page read and write
CC1000
heap
page read and write
4DFE000
stack
page read and write
11FA000
unkown
page execute and read and write
13C4000
heap
page read and write
1866000
heap
page read and write
418F000
stack
page read and write
4920000
heap
page read and write
5E82000
trusted library allocation
page read and write
F4F000
unkown
page execute and read and write
57C9000
trusted library allocation
page read and write
5EC3000
trusted library allocation
page read and write
4E31000
heap
page read and write
4C61000
heap
page read and write
11E4000
heap
page read and write
4B6E000
stack
page read and write
57A3000
trusted library allocation
page read and write
1D7AD000
stack
page read and write
581E000
stack
page read and write
4C61000
heap
page read and write
13C4000
heap
page read and write
F40000
direct allocation
page read and write
4700000
direct allocation
page read and write
576A000
trusted library allocation
page read and write
1D1A9000
heap
page read and write
575B000
trusted library allocation
page read and write
1024000
heap
page read and write
5709000
trusted library allocation
page read and write
D94000
heap
page read and write
1D1B1000
heap
page read and write
328E000
stack
page read and write
56E1000
trusted library allocation
page read and write
3AEF000
stack
page read and write
55E4000
trusted library allocation
page read and write
CE1000
heap
page read and write
4BE1000
heap
page read and write
4C2000
unkown
page execute and read and write
4BD0000
direct allocation
page read and write
1D38E000
stack
page read and write
575A000
trusted library allocation
page read and write
754000
unkown
page execute and write copy
1100000
direct allocation
page read and write
DBB000
unkown
page execute and read and write
D61000
unkown
page execute and read and write
1079000
unkown
page execute and write copy
954000
heap
page read and write
5CA8000
trusted library allocation
page read and write
1024000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
C7E000
heap
page read and write
3A1E000
stack
page read and write
11D6000
heap
page read and write
1024000
heap
page read and write
5ECB000
trusted library allocation
page read and write
C30000
heap
page read and write
446F000
stack
page read and write
43DF000
stack
page read and write
FA0000
unkown
page read and write
5EA5000
trusted library allocation
page read and write
33EF000
stack
page read and write
35EF000
stack
page read and write
4BE1000
heap
page read and write
340F000
stack
page read and write
3F6E000
stack
page read and write
2B2F000
stack
page read and write
1524000
heap
page read and write
5715000
trusted library allocation
page read and write
4C0E000
stack
page read and write
55C8000
trusted library allocation
page read and write
14EE000
stack
page read and write
124A000
unkown
page execute and read and write
5ECB000
trusted library allocation
page read and write
D94000
heap
page read and write
105F000
unkown
page execute and write copy
13C4000
heap
page read and write
3EEE000
stack
page read and write
1024000
heap
page read and write
5600000
trusted library allocation
page read and write
3DCF000
stack
page read and write
1194000
heap
page read and write
CEE000
heap
page read and write
5340000
heap
page read and write
1024000
heap
page read and write
6FA000
unkown
page execute and read and write
6CB70000
unkown
page readonly
4E31000
heap
page read and write
56F6000
trusted library allocation
page read and write
33FF000
stack
page read and write
954000
heap
page read and write
4711000
heap
page read and write
4E20000
direct allocation
page read and write
440F000
stack
page read and write
52A1000
heap
page read and write
5C40000
trusted library allocation
page read and write
1024000
heap
page read and write
1664000
heap
page read and write
4EF0000
direct allocation
page read and write
C60000
direct allocation
page read and write
3230000
direct allocation
page read and write
DC5000
unkown
page execute and write copy
123C000
unkown
page execute and write copy
5737000
trusted library allocation
page read and write
4E31000
heap
page read and write
186D000
heap
page read and write
910000
unkown
page read and write
5ECB000
trusted library allocation
page read and write
F54000
heap
page read and write
1D196000
heap
page read and write
86DD000
heap
page read and write
F2A000
unkown
page execute and write copy
56E1000
trusted library allocation
page read and write
2DEE000
stack
page read and write
5F08000
trusted library allocation
page read and write
1189000
unkown
page execute and read and write
1664000
heap
page read and write
1664000
heap
page read and write
5290000
direct allocation
page read and write
FD5000
unkown
page execute and read and write
551D000
stack
page read and write
461F000
stack
page read and write
378F000
stack
page read and write
5BBE000
trusted library allocation
page read and write
119E000
unkown
page execute and read and write
415F000
stack
page read and write
4E20000
direct allocation
page read and write
5EBB000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
4BE1000
heap
page read and write
4C61000
heap
page read and write
1869000
heap
page read and write
46F1000
heap
page read and write
4E20000
direct allocation
page read and write
2FB000
unkown
page execute and read and write
5711000
trusted library allocation
page read and write
5F3C000
trusted library allocation
page read and write
48F0000
heap
page read and write
2EEE000
stack
page read and write
56EB000
trusted library allocation
page read and write
C7C000
heap
page read and write
5CC8000
trusted library allocation
page read and write
1184000
unkown
page execute and read and write
4BE1000
heap
page read and write
867C000
heap
page read and write
D94000
heap
page read and write
1024000
heap
page read and write
56E4000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
3D5F000
stack
page read and write
3A3F000
stack
page read and write
29D000
unkown
page execute and read and write
266E000
stack
page read and write
135D000
stack
page read and write
3E0E000
stack
page read and write
5EBB000
trusted library allocation
page read and write
414F000
stack
page read and write
1878000
heap
page read and write
112E000
heap
page read and write
2AC0000
remote allocation
page read and write
1053000
unkown
page execute and write copy
4E31000
heap
page read and write
1161000
unkown
page execute and write copy
605D000
trusted library allocation
page read and write
706E000
stack
page read and write
56F5000
trusted library allocation
page read and write
1024000
heap
page read and write
259000
unkown
page execute and write copy
1524000
heap
page read and write
4BE1000
heap
page read and write
954000
heap
page read and write
117F000
unkown
page execute and write copy
1024000
heap
page read and write
5A79000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
61E01000
direct allocation
page execute read
56FC000
trusted library allocation
page read and write
62A000
unkown
page execute and read and write
17F0000
heap
page read and write
571F000
trusted library allocation
page read and write
480E000
stack
page read and write
68C5000
trusted library allocation
page read and write
11ED000
heap
page read and write
4EF0000
direct allocation
page read and write
829C000
stack
page read and write
4C61000
heap
page read and write
1024000
heap
page read and write
38DF000
stack
page read and write
5E83000
trusted library allocation
page read and write
5290000
direct allocation
page read and write
44DF000
stack
page read and write
1524000
heap
page read and write
D94000
heap
page read and write
48C7000
trusted library allocation
page execute and read and write
1194000
heap
page read and write
5E92000
trusted library allocation
page read and write
1D1B6000
heap
page read and write
11B1000
unkown
page execute and read and write
4E30000
heap
page read and write
50BF000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
13C4000
heap
page read and write
4E21000
heap
page read and write
2EDE000
stack
page read and write
573D000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
1061000
unkown
page execute and write copy
CDC000
heap
page read and write
29EE000
heap
page read and write
1D11C000
stack
page read and write
FA0000
unkown
page readonly
52C0000
direct allocation
page read and write
FF2000
unkown
page execute and read and write
12BF000
heap
page read and write
2DC0000
direct allocation
page read and write
4C61000
heap
page read and write
4BE1000
heap
page read and write
4C61000
heap
page read and write
124C000
unkown
page execute and write copy
C60000
direct allocation
page read and write
57D0000
trusted library allocation
page read and write
1194000
heap
page read and write
571B000
trusted library allocation
page read and write
4BE1000
heap
page read and write
5A71000
trusted library allocation
page read and write
13C4000
heap
page read and write
A40000
heap
page read and write
575C000
trusted library allocation
page read and write
1524000
heap
page read and write
4711000
heap
page read and write
F83000
unkown
page execute and read and write
F54000
heap
page read and write
571B000
trusted library allocation
page read and write
6F2E000
stack
page read and write
1705000
heap
page read and write
5E91000
trusted library allocation
page read and write
371F000
stack
page read and write
1234000
unkown
page execute and write copy
1D46D000
stack
page read and write
5EB0000
trusted library allocation
page read and write
2DDB000
heap
page read and write
954000
heap
page read and write
5744000
trusted library allocation
page read and write
23286000
heap
page read and write
4F20000
direct allocation
page read and write
C7F000
stack
page read and write
D94000
heap
page read and write
1194000
heap
page read and write
5E9B000
trusted library allocation
page read and write
D40000
direct allocation
page read and write
362E000
stack
page read and write
52FB000
stack
page read and write
2AD0000
heap
page read and write
434E000
stack
page read and write
5EFC000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
B48000
unkown
page execute and read and write
1D1B6000
heap
page read and write
4F10000
heap
page read and write
146A000
heap
page read and write
1664000
heap
page read and write
5ECB000
trusted library allocation
page read and write
1024000
heap
page read and write
4C61000
heap
page read and write
13EE000
stack
page read and write
5EBC000
trusted library allocation
page read and write
1024000
heap
page read and write
328F000
stack
page read and write
1D1BE000
heap
page read and write
13C4000
heap
page read and write
4E0E000
stack
page read and write
5878000
trusted library allocation
page read and write
32AF000
stack
page read and write
56F5000
trusted library allocation
page read and write
2DC0000
direct allocation
page read and write
4BE1000
heap
page read and write
46C1000
heap
page read and write
5ECB000
trusted library allocation
page read and write
CFE000
stack
page read and write
1024000
heap
page read and write
1161000
unkown
page execute and write copy
4D5F000
stack
page read and write
138E000
stack
page read and write
5EC5000
trusted library allocation
page read and write
100E000
stack
page read and write
1D1CD000
heap
page read and write
4C5B000
stack
page read and write
1024000
heap
page read and write
34AF000
stack
page read and write
56FD000
trusted library allocation
page read and write
124C000
unkown
page execute and write copy
6CC1000
heap
page read and write
37CF000
stack
page read and write
52C0000
direct allocation
page read and write
5EE7000
trusted library allocation
page read and write
365E000
stack
page read and write
110E000
unkown
page execute and write copy
573A000
trusted library allocation
page read and write
4FBB000
trusted library allocation
page read and write
13C4000
heap
page read and write
3167000
heap
page read and write
571B000
trusted library allocation
page read and write
40CE000
stack
page read and write
CD1000
heap
page read and write
FE6000
unkown
page execute and read and write
B7000
unkown
page execute and write copy
56C0000
direct allocation
page read and write
46F1000
heap
page read and write
3EDF000
stack
page read and write
5EA7000
trusted library allocation
page read and write
954000
heap
page read and write
5BA5000
stack
page read and write
484E000
stack
page read and write
DFC000
unkown
page execute and read and write
A0E000
stack
page read and write
5A7C000
trusted library allocation
page read and write
123C000
unkown
page execute and write copy
5380000
remote allocation
page read and write
D94000
heap
page read and write
4EF0000
direct allocation
page read and write
3ECF000
stack
page read and write
93A000
stack
page read and write
4BE1000
heap
page read and write
3EAF000
stack
page read and write
46F1000
heap
page read and write
4BE1000
heap
page read and write
1CEDE000
stack
page read and write
5705000
trusted library allocation
page read and write
5EF7000
trusted library allocation
page read and write
1524000
heap
page read and write
5E95000
trusted library allocation
page read and write
1524000
heap
page read and write
4711000
heap
page read and write
1024000
heap
page read and write
4C60000
heap
page read and write
5740000
trusted library allocation
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
5EBB000
trusted library allocation
page read and write
378F000
stack
page read and write
43DE000
stack
page read and write
1194000
heap
page read and write
1100000
direct allocation
page read and write
575A000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
5A74000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
1061000
unkown
page execute and write copy
56F8000
trusted library allocation
page read and write
468F000
stack
page read and write
FB8000
heap
page read and write
1524000
heap
page read and write
13C4000
heap
page read and write
1664000
heap
page read and write
6055000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
46BF000
stack
page read and write
69B000
unkown
page execute and write copy
338F000
stack
page read and write
576A000
trusted library allocation
page read and write
1024000
heap
page read and write
34DE000
stack
page read and write
5E79000
trusted library allocation
page read and write
2BE000
unkown
page execute and read and write
315B000
stack
page read and write
68A4000
trusted library allocation
page read and write
17F3000
heap
page read and write
1D197000
heap
page read and write
2D80000
heap
page read and write
5ECB000
trusted library allocation
page read and write
465F000
stack
page read and write
574A000
trusted library allocation
page read and write
46F1000
heap
page read and write
954000
heap
page read and write
575A000
trusted library allocation
page read and write
1180000
unkown
page execute and read and write
CD5000
heap
page read and write
983000
heap
page read and write
5A7A000
trusted library allocation
page read and write
4854000
trusted library allocation
page read and write
2DBE000
stack
page read and write
29F7000
heap
page read and write
114A000
unkown
page execute and read and write
13C4000
heap
page read and write
3BEE000
stack
page read and write
131E000
stack
page read and write
1524000
heap
page read and write
1100000
direct allocation
page read and write
1194000
heap
page read and write
576A000
trusted library allocation
page read and write
393E000
stack
page read and write
124A000
unkown
page execute and read and write
1024000
heap
page read and write
52A1000
heap
page read and write
56E9000
trusted library allocation
page read and write
F57000
unkown
page execute and read and write
5A78000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
CE8000
heap
page read and write
432F000
stack
page read and write
4E20000
direct allocation
page read and write
23251000
heap
page read and write
367F000
stack
page read and write
4C61000
heap
page read and write
4BE1000
heap
page read and write
48B0000
direct allocation
page read and write
569E000
stack
page read and write
38CF000
stack
page read and write
1024000
heap
page read and write
1D17F000
stack
page read and write
F54000
unkown
page execute and write copy
FEF000
unkown
page execute and write copy
46F1000
heap
page read and write
13C4000
heap
page read and write
D40000
direct allocation
page read and write
5744000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
DB9000
unkown
page write copy
5EBF000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
1D1B0000
heap
page read and write
1D1AE000
heap
page read and write
46C1000
heap
page read and write
5290000
direct allocation
page read and write
1D1A7000
heap
page read and write
4711000
heap
page read and write
11D1000
unkown
page execute and read and write
1D1A0000
heap
page read and write
573C000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
1194000
heap
page read and write
365F000
stack
page read and write
1524000
heap
page read and write
11D7000
heap
page read and write
4C61000
heap
page read and write
DC6000
unkown
page execute and read and write
5761000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
5EAB000
trusted library allocation
page read and write
1D1CD000
heap
page read and write
124C000
unkown
page execute and write copy
4CDF000
stack
page read and write
4911000
heap
page read and write
5700000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
62D6000
heap
page read and write
4E31000
heap
page read and write
1024000
heap
page read and write
4BE1000
heap
page read and write
42DF000
stack
page read and write
5EBB000
trusted library allocation
page read and write
1D1A3000
heap
page read and write
5EC7000
trusted library allocation
page read and write
1010000
unkown
page execute and read and write
61ECC000
direct allocation
page read and write
17DB000
heap
page read and write
11DF000
heap
page read and write
4BE1000
heap
page read and write
5620000
heap
page read and write
4C9000
unkown
page write copy
4E4F000
stack
page read and write
6CC4000
trusted library allocation
page read and write
4E31000
heap
page read and write
1194000
heap
page read and write
1524000
heap
page read and write
5E92000
trusted library allocation
page read and write
D40000
direct allocation
page read and write
5EBC000
trusted library allocation
page read and write
1869000
heap
page read and write
1D1CD000
heap
page read and write
FE7000
unkown
page execute and write copy
D94000
heap
page read and write
4A00000
direct allocation
page execute and read and write
57E4000
trusted library allocation
page read and write
361E000
stack
page read and write
1025000
heap
page read and write
755000
unkown
page execute and read and write
5EEB000
trusted library allocation
page read and write
46F1000
heap
page read and write
1024000
heap
page read and write
1664000
heap
page read and write
105F000
unkown
page execute and write copy
5430000
heap
page read and write
4E40000
heap
page read and write
13C4000
heap
page read and write
4F80000
direct allocation
page execute and read and write
D94000
heap
page read and write
62D0000
heap
page read and write
5310000
direct allocation
page read and write
5ECB000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
13C4000
heap
page read and write
5B22000
trusted library allocation
page read and write
322F000
stack
page read and write
224000
unkown
page execute and read and write
56C0000
direct allocation
page read and write
5BAE000
stack
page read and write
5EBB000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
DC5000
unkown
page execute and write copy
FA2000
unkown
page execute and read and write
3F2F000
stack
page read and write
2DC0000
direct allocation
page read and write
1270000
heap
page read and write
83C000
stack
page read and write
46C1000
heap
page read and write
1024000
heap
page read and write
2F9F000
stack
page read and write
FD1000
unkown
page execute and write copy
181C000
heap
page read and write
2AA0000
direct allocation
page read and write
1D1A8000
heap
page read and write
3B1E000
stack
page read and write
4BE1000
heap
page read and write
F5A000
heap
page read and write
11E7000
heap
page read and write
4C61000
heap
page read and write
409E000
stack
page read and write
B14000
heap
page read and write
56C0000
direct allocation
page read and write
1524000
heap
page read and write
4C61000
heap
page read and write
185D000
heap
page read and write
C7C000
heap
page read and write
404E000
stack
page read and write
5B6F000
trusted library allocation
page read and write
4BE1000
heap
page read and write
F40000
direct allocation
page read and write
4C61000
heap
page read and write
4A30000
direct allocation
page execute and read and write
1A0000
unkown
page read and write
2DC0000
direct allocation
page read and write
14E4000
heap
page read and write
D94000
heap
page read and write
5CA6000
trusted library allocation
page read and write
4E21000
heap
page read and write
8F0000
heap
page read and write
FBF000
unkown
page execute and read and write
276F000
stack
page read and write
5EBB000
trusted library allocation
page read and write
60C9000
trusted library allocation
page read and write
13C4000
heap
page read and write
57A2000
trusted library allocation
page read and write
13C4000
heap
page read and write
C28000
heap
page read and write
4E21000
heap
page read and write
1355000
heap
page read and write
954000
heap
page read and write
575F000
trusted library allocation
page read and write
1D1B1000
heap
page read and write
116C000
unkown
page execute and read and write
1025000
heap
page read and write
430E000
stack
page read and write
5ECB000
trusted library allocation
page read and write
335000
unkown
page execute and read and write
2AA0000
direct allocation
page read and write
A78000
heap
page read and write
325F000
stack
page read and write
5B31000
trusted library allocation
page read and write
799D000
stack
page read and write
58DE000
stack
page read and write
1024000
heap
page read and write
D3B000
stack
page read and write
579C000
stack
page read and write
186B000
heap
page read and write
56EF000
trusted library allocation
page read and write
1234000
unkown
page execute and write copy
288000
unkown
page execute and write copy
4F10000
direct allocation
page execute and read and write
1024000
heap
page read and write
464F000
stack
page read and write
4BD0000
direct allocation
page read and write
408E000
stack
page read and write
5E74000
trusted library allocation
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
57B1000
trusted library allocation
page read and write
5E37000
trusted library allocation
page execute and read and write
419F000
stack
page read and write
1524000
heap
page read and write
3C4F000
stack
page read and write
17F3000
heap
page read and write
FF2000
unkown
page execute and read and write
5A75000
trusted library allocation
page read and write
299E000
stack
page read and write
4E21000
heap
page read and write
4E21000
heap
page read and write
33A000
unkown
page execute and read and write
1024000
heap
page read and write
315E000
stack
page read and write
1524000
heap
page read and write
1194000
unkown
page execute and write copy
478F000
stack
page read and write
F54000
heap
page read and write
7BD000
stack
page read and write
4C61000
heap
page read and write
1024000
heap
page read and write
1D65D000
stack
page read and write
4A30000
direct allocation
page execute and read and write
23210000
trusted library allocation
page read and write
67B4000
trusted library allocation
page read and write
5136000
direct allocation
page read and write
270000
unkown
page execute and read and write
46F1000
heap
page read and write
CE3000
heap
page read and write
5ECB000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
1D4EE000
stack
page read and write
46F1000
heap
page read and write
351F000
stack
page read and write
13C4000
heap
page read and write
5782000
trusted library allocation
page read and write
F54000
heap
page read and write
954000
heap
page read and write
481E000
stack
page read and write
1D1BF000
heap
page read and write
40AF000
stack
page read and write
4CAE000
stack
page read and write
4CB000
unkown
page execute and write copy
4E31000
heap
page read and write
5749000
trusted library allocation
page read and write
376E000
stack
page read and write
1869000
heap
page read and write
5ECB000
trusted library allocation
page read and write
655F000
stack
page read and write
575B000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
1D2BE000
stack
page read and write
5EBC000
trusted library allocation
page read and write
F83000
unkown
page execute and read and write
5A77000
trusted library allocation
page read and write
DBB000
unkown
page execute and write copy
3B0F000
stack
page read and write
56E2000
trusted library allocation
page read and write
3A0F000
stack
page read and write
4E21000
heap
page read and write
F4C000
stack
page read and write
13C4000
heap
page read and write
60B0000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
954000
heap
page read and write
46F1000
heap
page read and write
1D1B1000
heap
page read and write
1DA04000
heap
page read and write
56E1000
trusted library allocation
page read and write
3DDF000
stack
page read and write
56F0000
trusted library allocation
page read and write
4E21000
heap
page read and write
3C8F000
stack
page read and write
4BE1000
heap
page read and write
2CBF000
stack
page read and write
F40000
direct allocation
page read and write
CE8000
heap
page read and write
954000
heap
page read and write
46F1000
heap
page read and write
575F000
trusted library allocation
page read and write
1024000
heap
page read and write
5B97000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
1524000
heap
page read and write
13DE000
stack
page read and write
5729000
trusted library allocation
page read and write
341E000
stack
page read and write
5C29000
trusted library allocation
page read and write
4700000
direct allocation
page read and write
1524000
heap
page read and write
4C61000
heap
page read and write
2AC0000
direct allocation
page execute and read and write
5480000
direct allocation
page read and write
1524000
heap
page read and write
4910000
heap
page read and write
494E000
stack
page read and write
46F1000
heap
page read and write
3B8E000
stack
page read and write
5EA6000
trusted library allocation
page read and write
58D9000
trusted library allocation
page read and write
1194000
heap
page read and write
1390000
heap
page read and write
1187000
unkown
page execute and write copy
1D1C5000
heap
page read and write
D30000
heap
page read and write
49FE000
stack
page read and write
4C61000
heap
page read and write
13C4000
heap
page read and write
1524000
heap
page read and write
356E000
stack
page read and write
5CF8000
trusted library allocation
page read and write
2A9F000
stack
page read and write
DB9000
unkown
page write copy
11BC000
unkown
page execute and write copy
A7A000
heap
page read and write
1D19D000
heap
page read and write
29E7000
heap
page read and write
5EB0000
trusted library allocation
page read and write
1524000
heap
page read and write
3D6F000
stack
page read and write
1D1B1000
heap
page read and write
4EEF000
stack
page read and write
11D3000
unkown
page execute and read and write
55FA000
trusted library allocation
page execute and read and write
4C61000
heap
page read and write
42FF000
stack
page read and write
CE4000
heap
page read and write
489F000
stack
page read and write
4BD0000
direct allocation
page read and write
F54000
heap
page read and write
D94000
heap
page read and write
4C80000
direct allocation
page execute and read and write
1024000
heap
page read and write
4F00000
direct allocation
page execute and read and write
420E000
stack
page read and write
13C4000
heap
page read and write
60B8000
trusted library allocation
page read and write
69C000
unkown
page execute and write copy
4FFB000
trusted library allocation
page read and write
1010000
unkown
page execute and read and write
CDB000
heap
page read and write
6CC0000
heap
page read and write
645000
unkown
page execute and read and write
51F0000
direct allocation
page execute and read and write
5B68000
trusted library allocation
page read and write
4E21000
heap
page read and write
B14000
heap
page read and write
575F000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
5321000
heap
page read and write
105F000
unkown
page execute and write copy
B03000
heap
page read and write
4E21000
heap
page read and write
5EC5000
trusted library allocation
page read and write
1D1BF000
heap
page read and write
F4F000
unkown
page execute and write copy
11DD000
unkown
page execute and read and write
50CC000
trusted library allocation
page read and write
461000
unkown
page execute and write copy
5580000
trusted library allocation
page read and write
470E000
stack
page read and write
432E000
stack
page read and write
FDE000
unkown
page execute and write copy
11E7000
heap
page read and write
5761000
trusted library allocation
page read and write
105F000
unkown
page execute and write copy
57A2000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
575A000
trusted library allocation
page read and write
10EE000
stack
page read and write
BE0000
direct allocation
page read and write
5732000
trusted library allocation
page read and write
119E000
unkown
page execute and read and write
124C000
unkown
page execute and write copy
5290000
direct allocation
page read and write
35AE000
stack
page read and write
56F5000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
350E000
stack
page read and write
46F1000
heap
page read and write
56E5000
trusted library allocation
page read and write
5610000
trusted library allocation
page execute and read and write
5871000
trusted library allocation
page read and write
B5C000
unkown
page execute and read and write
5722000
trusted library allocation
page read and write
D94000
heap
page read and write
576A000
trusted library allocation
page read and write
1024000
heap
page read and write
451E000
stack
page read and write
295F000
stack
page read and write
47A1000
heap
page read and write
4700000
direct allocation
page read and write
1194000
heap
page read and write
1D66D000
stack
page read and write
4F20000
direct allocation
page read and write
FAA000
unkown
page execute and write copy
CDB000
heap
page read and write
6CD55000
unkown
page readonly
1D1AB000
heap
page read and write
12DD000
heap
page read and write
5714000
trusted library allocation
page read and write
1024000
heap
page read and write
1024000
heap
page read and write
1145000
unkown
page execute and write copy
E0B000
unkown
page execute and write copy
1182000
unkown
page execute and write copy
232B2000
heap
page read and write
3BAE000
stack
page read and write
33C000
unkown
page execute and write copy
4D90000
direct allocation
page read and write
4BE1000
heap
page read and write
F40000
direct allocation
page read and write
56E8000
trusted library allocation
page read and write
55CE000
stack
page read and write
F40000
direct allocation
page read and write
4E20000
direct allocation
page read and write
FB6000
unkown
page execute and write copy
FB8000
unkown
page execute and write copy
DC6000
unkown
page execute and read and write
D94000
heap
page read and write
41DE000
stack
page read and write
4E50000
heap
page read and write
954000
heap
page read and write
52A1000
heap
page read and write
5A70000
trusted library allocation
page read and write
1D1A9000
heap
page read and write
4E21000
heap
page read and write
6DC000
unkown
page execute and write copy
4F20000
direct allocation
page read and write
4E21000
heap
page read and write
954000
heap
page read and write
D40000
direct allocation
page read and write
5EBB000
trusted library allocation
page read and write
CEC000
heap
page read and write
2B3000
unkown
page execute and read and write
1660000
heap
page read and write
4BD0000
direct allocation
page read and write
389E000
stack
page read and write
1D1AB000
heap
page read and write
454F000
stack
page read and write
5440000
heap
page read and write
4BE1000
heap
page read and write
13C4000
heap
page read and write
1524000
heap
page read and write
5718000
trusted library allocation
page read and write
5ED6000
trusted library allocation
page read and write
46F1000
heap
page read and write
546F000
stack
page read and write
83C0000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
5E97000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
1517000
heap
page read and write
13C4000
heap
page read and write
1024000
heap
page read and write
4BD0000
direct allocation
page read and write
4BE1000
heap
page read and write
307C000
stack
page read and write
3DCE000
stack
page read and write
93D000
stack
page read and write
5310000
direct allocation
page read and write
1D1CD000
heap
page read and write
4C61000
heap
page read and write
570C000
trusted library allocation
page read and write
405E000
stack
page read and write
1171000
heap
page read and write
4C5F000
stack
page read and write
1D1A8000
heap
page read and write
1D24E000
stack
page read and write
13C4000
heap
page read and write
110E000
unkown
page execute and write copy
4E31000
heap
page read and write
56F2000
trusted library allocation
page read and write
4DCF000
stack
page read and write
6DC0000
heap
page read and write
32BF000
stack
page read and write
61DB000
trusted library allocation
page execute and read and write
354E000
stack
page read and write
5EAE000
trusted library allocation
page read and write
1148000
unkown
page execute and read and write
5B76000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
1575000
heap
page read and write
458F000
stack
page read and write
5743000
trusted library allocation
page read and write
4711000
heap
page read and write
F2E000
stack
page read and write
D40000
direct allocation
page read and write
2DD0000
heap
page read and write
5B32000
trusted library allocation
page read and write
4700000
direct allocation
page read and write
A30000
heap
page read and write
58B3000
trusted library allocation
page read and write
160E000
stack
page read and write
34D000
unkown
page execute and write copy
56FC000
trusted library allocation
page read and write
339E000
stack
page read and write
5EBB000
trusted library allocation
page read and write
3B6F000
stack
page read and write
910000
unkown
page readonly
5EE3000
trusted library allocation
page read and write
57A0000
heap
page execute and read and write
5ECB000
trusted library allocation
page read and write
1194000
heap
page read and write
A40000
heap
page read and write
3B1E000
stack
page read and write
56EF000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
F57000
unkown
page execute and read and write
D94000
heap
page read and write
112A000
heap
page read and write
40000
unkown
page read and write
58C000
stack
page read and write
42EF000
stack
page read and write
1194000
heap
page read and write
5EAB000
trusted library allocation
page read and write
1D1B1000
heap
page read and write
1664000
heap
page read and write
FD1000
unkown
page execute and write copy
187E000
heap
page read and write
5A71000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
4F01000
heap
page read and write
3CEF000
stack
page read and write
4BE1000
heap
page read and write
DF2000
unkown
page execute and read and write
5722000
trusted library allocation
page read and write
5E6F000
stack
page read and write
4E21000
heap
page read and write
571B000
trusted library allocation
page read and write
56C0000
direct allocation
page read and write
571A000
trusted library allocation
page read and write
3E9F000
stack
page read and write
5321000
heap
page read and write
5BA9000
trusted library allocation
page read and write
60B1000
trusted library allocation
page read and write
CD2000
heap
page read and write
1182000
unkown
page execute and write copy
575F000
trusted library allocation
page read and write
1D01D000
stack
page read and write
5290000
direct allocation
page read and write
100C000
unkown
page execute and write copy
4711000
heap
page read and write
1194000
heap
page read and write
1024000
heap
page read and write
5290000
direct allocation
page read and write
FAF000
unkown
page execute and write copy
56EB000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
34C000
unkown
page execute and write copy
C4F000
heap
page read and write
57E4000
trusted library allocation
page read and write
528E000
stack
page read and write
4E40000
heap
page read and write
FA2000
unkown
page execute and write copy
5A73000
trusted library allocation
page read and write
411F000
stack
page read and write
6DCE000
stack
page read and write
4A80000
heap
page read and write
5711000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
380E000
stack
page read and write
575D000
trusted library allocation
page read and write
114C000
unkown
page execute and write copy
1024000
heap
page read and write
10F0000
heap
page read and write
13C4000
heap
page read and write
575F000
trusted library allocation
page read and write
4F01000
heap
page read and write
4B30000
remote allocation
page read and write
5A79000
trusted library allocation
page read and write
1664000
heap
page read and write
31EE000
stack
page read and write
40BE000
stack
page read and write
51F0000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
B14000
heap
page read and write
575F000
trusted library allocation
page read and write
1CC4D000
stack
page read and write
48CB000
trusted library allocation
page execute and read and write
2F0E000
stack
page read and write
5E92000
trusted library allocation
page read and write
11D2000
unkown
page execute and write copy
4C61000
heap
page read and write
57B2000
trusted library allocation
page read and write
5EE2000
trusted library allocation
page read and write
3C1F000
stack
page read and write
1524000
heap
page read and write
954000
heap
page read and write
5510000
direct allocation
page execute and read and write
7BC000
stack
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
35DF000
stack
page read and write
65B000
unkown
page execute and write copy
46F1000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
5EBB000
trusted library allocation
page read and write
327000
unkown
page execute and write copy
23B000
unkown
page execute and write copy
480E000
stack
page read and write
CD8000
heap
page read and write
954000
heap
page read and write
124A000
unkown
page execute and write copy
5500000
direct allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
DC7000
unkown
page execute and write copy
1D89E000
stack
page read and write
3097000
heap
page read and write
570C000
trusted library allocation
page read and write
E0C000
unkown
page execute and write copy
F96000
unkown
page execute and read and write
1024000
heap
page read and write
41EF000
stack
page read and write
46F0000
heap
page read and write
566F000
stack
page read and write
34C000
unkown
page execute and write copy
124A000
unkown
page execute and write copy
4CBD000
stack
page read and write
586D000
trusted library allocation
page read and write
3EDE000
stack
page read and write
1D1B5000
heap
page read and write
4B5E000
stack
page read and write
400F000
stack
page read and write
353F000
stack
page read and write
1194000
heap
page read and write
1024000
heap
page read and write
5EBA000
trusted library allocation
page read and write
5290000
direct allocation
page read and write
5A1F000
stack
page read and write
F54000
heap
page read and write
954000
heap
page read and write
1024000
heap
page read and write
1024000
heap
page read and write
13C4000
heap
page read and write
45AF000
stack
page read and write
2BDF000
stack
page read and write
75C000
unkown
page execute and write copy
28EE000
stack
page read and write
36EE000
stack
page read and write
560D000
stack
page read and write
D94000
heap
page read and write
D94000
heap
page read and write
4C61000
heap
page read and write
5EBB000
trusted library allocation
page read and write
FDF000
unkown
page execute and read and write
6CD4E000
unkown
page read and write
378E000
stack
page read and write
F4F000
unkown
page execute and write copy
5290000
direct allocation
page read and write
5ECB000
trusted library allocation
page read and write
2DC0000
direct allocation
page read and write
1024000
heap
page read and write
3FDF000
stack
page read and write
1D9FE000
stack
page read and write
46F1000
heap
page read and write
52FD000
stack
page read and write
4ACE000
stack
page read and write
51BF000
stack
page read and write
F54000
heap
page read and write
3A0F000
stack
page read and write
2AC0000
remote allocation
page read and write
187E000
heap
page read and write
56F5000
trusted library allocation
page read and write
255000
unkown
page execute and read and write
361E000
stack
page read and write
D7E000
stack
page read and write
DFC000
unkown
page execute and read and write
2344D000
stack
page read and write
17C5000
heap
page read and write
32CE000
stack
page read and write
5710000
trusted library allocation
page read and write
FAF000
unkown
page execute and write copy
F81000
unkown
page execute and write copy
5E96000
trusted library allocation
page read and write
56D0000
heap
page read and write
1D1AE000
heap
page read and write
1524000
heap
page read and write
56C0000
direct allocation
page read and write
3D9E000
stack
page read and write
5ECB000
trusted library allocation
page read and write
94E000
heap
page read and write
5E90000
trusted library allocation
page read and write
579A000
trusted library allocation
page read and write
13C4000
heap
page read and write
4E20000
direct allocation
page read and write
1D1B6000
heap
page read and write
1D1BF000
heap
page read and write
5EC2000
trusted library allocation
page read and write
5580000
direct allocation
page execute and read and write
321F000
stack
page read and write
5A72000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
5747000
trusted library allocation
page read and write
5EED000
trusted library allocation
page read and write
1048000
heap
page read and write
443F000
stack
page read and write
326F000
stack
page read and write
3E6E000
stack
page read and write
1524000
heap
page read and write
34EE000
stack
page read and write
4BB0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
58A1000
trusted library allocation
page read and write
CD1000
heap
page read and write
4911000
heap
page read and write
23668000
heap
page read and write
2E2E000
stack
page read and write
389E000
stack
page read and write
374F000
stack
page read and write
C52000
heap
page read and write
5290000
direct allocation
page read and write
4F20000
direct allocation
page read and write
ACC000
heap
page read and write
1664000
heap
page read and write
4A9E000
stack
page read and write
4A4E000
stack
page read and write
5ECF000
trusted library allocation
page read and write
53FF000
stack
page read and write
4BE1000
heap
page read and write
5EBB000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
1780000
heap
page read and write
1024000
heap
page read and write
1162000
unkown
page execute and read and write
5A73000
trusted library allocation
page read and write
2F6E000
stack
page read and write
6025000
trusted library allocation
page read and write
47A1000
heap
page read and write
1873000
heap
page read and write
5380000
remote allocation
page read and write
3DDE000
stack
page read and write
4911000
heap
page read and write
1194000
heap
page read and write
1024000
heap
page read and write
394E000
stack
page read and write
64F000
unkown
page execute and write copy
46F1000
heap
page read and write
4E31000
heap
page read and write
335F000
stack
page read and write
5EBA000
trusted library allocation
page read and write
47A1000
heap
page read and write
576B000
trusted library allocation
page read and write
2D87000
heap
page read and write
5EAB000
trusted library allocation
page read and write
1D56D000
stack
page read and write
6CD0000
heap
page read and write
954000
heap
page read and write
5320000
heap
page read and write
5B55000
trusted library allocation
page read and write
5EED000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
1D1C1000
heap
page read and write
C60000
direct allocation
page read and write
58BB000
trusted library allocation
page read and write
FA2000
unkown
page execute and read and write
9A6000
unkown
page execute and read and write
DC7000
unkown
page execute and read and write
311E000
stack
page read and write
275F000
stack
page read and write
8FD000
stack
page read and write
5310000
direct allocation
page read and write
46F1000
heap
page read and write
5290000
direct allocation
page read and write
32CF000
stack
page read and write
11CB000
unkown
page execute and write copy
5ECB000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
FE0000
unkown
page execute and write copy
4CC0000
direct allocation
page execute and read and write
FA0000
heap
page read and write
954000
heap
page read and write
404F000
stack
page read and write
3D2D000
stack
page read and write
33AE000
stack
page read and write
5310000
direct allocation
page read and write
5711000
trusted library allocation
page read and write
4E31000
heap
page read and write
5EBA000
trusted library allocation
page read and write
4E21000
heap
page read and write
8D0000
direct allocation
page read and write
46CE000
stack
page read and write
4E31000
heap
page read and write
56F2000
trusted library allocation
page read and write
1D1A5000
heap
page read and write
1D197000
heap
page read and write
1024000
heap
page read and write
62BD000
trusted library allocation
page read and write
17F9000
heap
page read and write
5290000
direct allocation
page read and write
1D1A9000
heap
page read and write
1197000
unkown
page execute and write copy
BEE000
stack
page read and write
4BE1000
heap
page read and write
1024000
heap
page read and write
536E000
stack
page read and write
389F000
stack
page read and write
399F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
117F000
stack
page read and write
5E90000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
37FE000
stack
page read and write
1125000
unkown
page execute and read and write
4A90000
direct allocation
page execute and read and write
1234000
unkown
page execute and write copy
52A1000
heap
page read and write
1578000
heap
page read and write
2D7E000
stack
page read and write
4E20000
direct allocation
page read and write
3CAF000
stack
page read and write
4BD0000
direct allocation
page read and write
EFC000
stack
page read and write
51F0000
direct allocation
page execute and read and write
56C0000
direct allocation
page read and write
1024000
heap
page read and write
BE0000
direct allocation
page read and write
5ECB000
trusted library allocation
page read and write
3F5E000
stack
page read and write
392F000
stack
page read and write
4A7C000
stack
page read and write
4D5000
unkown
page execute and write copy
D94000
heap
page read and write
1D1A9000
heap
page read and write
13F9000
heap
page read and write
1524000
heap
page read and write
4BCF000
stack
page read and write
4D7000
unkown
page execute and write copy
995000
heap
page read and write
D60000
unkown
page read and write
396E000
stack
page read and write
1194000
heap
page read and write
13C4000
heap
page read and write
1664000
heap
page read and write
954000
heap
page read and write
1024000
heap
page read and write
1524000
heap
page read and write
1100000
direct allocation
page read and write
5702000
trusted library allocation
page read and write
F70000
unkown
page execute and read and write
5B98000
trusted library allocation
page read and write
3F1F000
stack
page read and write
3FDF000
stack
page read and write
460000
unkown
page read and write
AA6000
heap
page read and write
4A60000
direct allocation
page execute and read and write
576A000
trusted library allocation
page read and write
3CCE000
stack
page read and write
3B4E000
stack
page read and write
5C08000
trusted library allocation
page read and write
68A2000
trusted library allocation
page read and write
4C6F000
stack
page read and write
F54000
heap
page read and write
261000
unkown
page execute and write copy
13C4000
heap
page read and write
1024000
heap
page read and write
756000
unkown
page execute and write copy
FAA000
unkown
page execute and read and write
296E000
stack
page read and write
5EBB000
trusted library allocation
page read and write
1024000
heap
page read and write
5A73000
trusted library allocation
page read and write
5ECD000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
1024000
heap
page read and write
4BF1000
trusted library allocation
page read and write
F54000
heap
page read and write
B14000
heap
page read and write
11BE000
unkown
page execute and read and write
490F000
stack
page read and write
1D1BF000
heap
page read and write
6CD0000
heap
page read and write
127F000
stack
page read and write
1D18E000
heap
page read and write
56EB000
trusted library allocation
page read and write
110E000
unkown
page execute and write copy
46F1000
heap
page read and write
13C4000
heap
page read and write
D94000
heap
page read and write
141E000
stack
page read and write
5711000
trusted library allocation
page read and write
5E89000
trusted library allocation
page read and write
52C0000
direct allocation
page read and write
1D197000
heap
page read and write
F43000
unkown
page execute and read and write
43CF000
stack
page read and write
31C7000
heap
page read and write
1024000
heap
page read and write
954000
heap
page read and write
4A30000
direct allocation
page execute and read and write
2DC0000
direct allocation
page read and write
4C61000
heap
page read and write
106B000
unkown
page execute and write copy
15A8000
heap
page read and write
5260000
direct allocation
page execute and read and write
954000
heap
page read and write
285F000
stack
page read and write
52A1000
heap
page read and write
76C000
unkown
page execute and read and write
1D1C8000
heap
page read and write
61ED0000
direct allocation
page read and write
62D000
unkown
page execute and write copy
5D0F000
trusted library allocation
page read and write
4E21000
heap
page read and write
5E8B000
trusted library allocation
page read and write
EDE000
stack
page read and write
150E000
stack
page read and write
5EAF000
trusted library allocation
page read and write
5EBE000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
D61000
unkown
page execute and write copy
B5C000
unkown
page execute and read and write
1024000
heap
page read and write
112F000
unkown
page execute and write copy
4E38000
heap
page read and write
1D5FF000
stack
page read and write
47A1000
heap
page read and write
1858000
heap
page read and write
5740000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
CDA000
heap
page read and write
FB2000
unkown
page execute and write copy
83E0000
direct allocation
page execute and read and write
5ECB000
trusted library allocation
page read and write
491F000
stack
page read and write
422E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
EFA000
stack
page read and write
56FE000
trusted library allocation
page read and write
2328F000
heap
page read and write
36BE000
stack
page read and write
316F000
stack
page read and write
2D5E000
stack
page read and write
1150000
heap
page read and write
52A1000
heap
page read and write
13A0000
heap
page read and write
FB2000
unkown
page execute and write copy
11DD000
unkown
page execute and read and write
46F1000
heap
page read and write
5EF4000
trusted library allocation
page read and write
46F1000
heap
page read and write
4E31000
heap
page read and write
32CE000
stack
page read and write
B80000
heap
page read and write
2CAE000
stack
page read and write
1524000
heap
page read and write
575A000
trusted library allocation
page read and write
60E9000
trusted library allocation
page read and write
5EED000
trusted library allocation
page read and write
52A1000
heap
page read and write
31B0000
heap
page read and write
F8D000
unkown
page execute and write copy
1100000
direct allocation
page read and write
1524000
heap
page read and write
13C4000
heap
page read and write
1D1AE000
heap
page read and write
4EF0000
direct allocation
page read and write
402E000
stack
page read and write
176F000
stack
page read and write
484D000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
C5E000
stack
page read and write
123C000
unkown
page execute and write copy
D94000
heap
page read and write
86EE000
heap
page read and write
3F7E000
stack
page read and write
F40000
direct allocation
page read and write
1024000
heap
page read and write
48E0000
direct allocation
page execute and read and write
4D60000
trusted library allocation
page read and write
418F000
stack
page read and write
9B9000
heap
page read and write
34C000
unkown
page execute and read and write
116E000
unkown
page execute and write copy
46F1000
heap
page read and write
F6F000
unkown
page execute and write copy
F40000
direct allocation
page read and write
588B000
trusted library allocation
page read and write
31AE000
stack
page read and write
4BE1000
heap
page read and write
B08000
heap
page read and write
954000
heap
page read and write
9D3000
stack
page read and write
D94000
heap
page read and write
F96000
unkown
page execute and read and write
5722000
trusted library allocation
page read and write
5E92000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
4EF0000
direct allocation
page read and write
B7000
unkown
page execute and write copy
2F2F000
stack
page read and write
657000
unkown
page execute and read and write
2CFE000
stack
page read and write
476F000
stack
page read and write
C60000
direct allocation
page read and write
D40000
direct allocation
page read and write
5B3D000
trusted library allocation
page read and write
1525000
heap
page read and write
5EA8000
trusted library allocation
page read and write
41FE000
stack
page read and write
5EAA000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
29C0000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
14F0000
heap
page read and write
4D60000
direct allocation
page execute and read and write
1024000
heap
page read and write
1524000
heap
page read and write
2AFF000
stack
page read and write
1194000
heap
page read and write
1D41F000
stack
page read and write
FB8000
unkown
page execute and write copy
106B000
unkown
page execute and write copy
17BC000
heap
page read and write
17F8000
heap
page read and write
4431000
heap
page read and write
576A000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
571A000
trusted library allocation
page read and write
682000
unkown
page execute and read and write
4F20000
direct allocation
page read and write
B48000
unkown
page execute and read and write
1187000
unkown
page execute and write copy
726000
unkown
page execute and read and write
17D5000
heap
page read and write
1524000
heap
page read and write
5749000
trusted library allocation
page read and write
3F8E000
stack
page read and write
429F000
stack
page read and write
5EA9000
trusted library allocation
page read and write
1024000
heap
page read and write
1D76C000
stack
page read and write
D94000
heap
page read and write
FA6000
unkown
page write copy
2D7E000
stack
page read and write
5794000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
D61000
unkown
page execute and write copy
5ECB000
trusted library allocation
page read and write
119E000
unkown
page execute and read and write
FEF000
unkown
page execute and write copy
82DE000
stack
page read and write
41000
unkown
page execute and write copy
13C4000
heap
page read and write
1024000
heap
page read and write
5BF1000
trusted library allocation
page read and write
F63000
unkown
page execute and write copy
1024000
heap
page read and write
3AAE000
stack
page read and write
575A000
trusted library allocation
page read and write
4BE1000
heap
page read and write
48A0000
trusted library allocation
page read and write
1024000
heap
page read and write
11EF000
heap
page read and write
124A000
unkown
page execute and read and write
1350000
heap
page read and write
4F10000
direct allocation
page execute and read and write
52BD000
stack
page read and write
174D000
heap
page read and write
4C61000
heap
page read and write
51F0000
direct allocation
page execute and read and write
D94000
heap
page read and write
5B6A000
trusted library allocation
page read and write
48E0000
trusted library allocation
page read and write
441E000
stack
page read and write
FB2000
unkown
page execute and write copy
5290000
direct allocation
page read and write
56C0000
direct allocation
page read and write
4CCE000
stack
page read and write
5F08000
trusted library allocation
page read and write
17D0000
heap
page read and write
4BD0000
direct allocation
page read and write
83DE000
stack
page read and write
2A190000
heap
page read and write
46F1000
heap
page read and write
4E31000
heap
page read and write
1D1CA000
heap
page read and write
5B7A000
trusted library allocation
page read and write
5EEB000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
325E000
stack
page read and write
56FD000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
5EFA000
trusted library allocation
page read and write
4BE1000
heap
page read and write
5ED9000
trusted library allocation
page read and write
4D0E000
stack
page read and write
5A7F000
trusted library allocation
page read and write
BDC000
stack
page read and write
FB7000
unkown
page execute and read and write
5A70000
trusted library allocation
page read and write
48EE000
stack
page read and write
4E1F000
stack
page read and write
575F000
trusted library allocation
page read and write
1194000
heap
page read and write
5EBA000
trusted library allocation
page read and write
20A000
unkown
page execute and read and write
327000
unkown
page execute and write copy
56E5000
trusted library allocation
page read and write
CE1000
heap
page read and write
1161000
unkown
page execute and write copy
575F000
trusted library allocation
page read and write
178B000
heap
page read and write
47A1000
heap
page read and write
468F000
stack
page read and write
5EA5000
trusted library allocation
page read and write
13C4000
heap
page read and write
C31000
heap
page read and write
3DEF000
stack
page read and write
232D2000
heap
page read and write
11AF000
unkown
page execute and write copy
2A5E000
stack
page read and write
1024000
heap
page read and write
5C7A000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
41CF000
stack
page read and write
56E1000
trusted library allocation
page read and write
543E000
stack
page read and write
4C61000
heap
page read and write
4F20000
direct allocation
page read and write
576B000
trusted library allocation
page read and write
11DB000
unkown
page execute and write copy
4FA0000
direct allocation
page execute and read and write
576A000
trusted library allocation
page read and write
21B000
unkown
page execute and read and write
29E0000
heap
page read and write
13C4000
heap
page read and write
112F000
unkown
page execute and read and write
4C61000
heap
page read and write
31AF000
stack
page read and write
4C61000
heap
page read and write
1194000
heap
page read and write
46F1000
heap
page read and write
11A7000
unkown
page execute and write copy
4CA0000
direct allocation
page execute and read and write
F54000
heap
page read and write
47A1000
heap
page read and write
1D1BF000
heap
page read and write
503E000
stack
page read and write
CE4000
heap
page read and write
5EEA000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
C60000
direct allocation
page read and write
D94000
heap
page read and write
6E8000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
1D1B6000
heap
page read and write
F81000
unkown
page execute and write copy
D60000
unkown
page readonly
4E31000
heap
page read and write
16D0000
heap
page read and write
8060000
heap
page read and write
1D1CD000
heap
page read and write
4E31000
heap
page read and write
1024000
heap
page read and write
5B67000
trusted library allocation
page read and write
52A1000
heap
page read and write
5EA5000
trusted library allocation
page read and write
5E7E000
trusted library allocation
page read and write
B14000
heap
page read and write
13C4000
heap
page read and write
4C61000
heap
page read and write
67B6000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
FAA000
unkown
page execute and write copy
105F000
unkown
page execute and write copy
C5E000
heap
page read and write
F73000
heap
page read and write
1524000
heap
page read and write
E0C000
unkown
page execute and write copy
FA0000
unkown
page readonly
1524000
heap
page read and write
4E21000
heap
page read and write
1148000
unkown
page execute and read and write
375E000
stack
page read and write
3C9E000
stack
page read and write
F46000
unkown
page execute and read and write
11BC000
unkown
page execute and write copy
C10000
heap
page read and write
1593000
heap
page read and write
1194000
heap
page read and write
5722000
trusted library allocation
page read and write
1194000
heap
page read and write
1524000
heap
page read and write
5722000
trusted library allocation
page read and write
3E0E000
stack
page read and write
4E31000
heap
page read and write
985000
heap
page read and write
5A73000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
F5E000
heap
page read and write
53F0000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
4C61000
heap
page read and write
3D9E000
stack
page read and write
5E80000
trusted library allocation
page read and write
52A1000
heap
page read and write
13C4000
heap
page read and write
910000
unkown
page read and write
CBC000
heap
page read and write
5EAB000
trusted library allocation
page read and write
1664000
heap
page read and write
411F000
stack
page read and write
4BE1000
heap
page read and write
1024000
heap
page read and write
1D1AE000
heap
page read and write
3B8F000
stack
page read and write
FE6000
unkown
page execute and read and write
52A1000
heap
page read and write
33CE000
stack
page read and write
D94000
heap
page read and write
46C1000
heap
page read and write
13C4000
heap
page read and write
4C61000
heap
page read and write
9A6000
unkown
page execute and read and write
5718000
trusted library allocation
page read and write
A30000
heap
page read and write
4F20000
direct allocation
page read and write
1024000
heap
page read and write
439E000
stack
page read and write
1024000
heap
page read and write
1165000
heap
page read and write
399F000
stack
page read and write
5EA6000
trusted library allocation
page read and write
B0B000
stack
page read and write
2BFF000
stack
page read and write
4BE1000
heap
page read and write
46F1000
heap
page read and write
8BF000
stack
page read and write
3F0E000
stack
page read and write
D40000
direct allocation
page read and write
1524000
heap
page read and write
1D1A3000
heap
page read and write
5008000
trusted library allocation
page read and write
1024000
heap
page read and write
1664000
heap
page read and write
56C0000
direct allocation
page read and write
5290000
direct allocation
page read and write
1169000
unkown
page execute and write copy
1524000
heap
page read and write
4F20000
direct allocation
page read and write
26F000
unkown
page execute and write copy
5070000
direct allocation
page read and write
1349000
stack
page read and write
1024000
heap
page read and write
4E21000
heap
page read and write
1524000
heap
page read and write
5E96000
trusted library allocation
page read and write
3F3F000
stack
page read and write
340E000
stack
page read and write
4F3D000
stack
page read and write
11D8000
heap
page read and write
1664000
heap
page read and write
4C61000
heap
page read and write
FA6000
unkown
page write copy
1664000
heap
page read and write
4711000
heap
page read and write
4A5F000
stack
page read and write
5718000
trusted library allocation
page read and write
544E000
stack
page read and write
1194000
heap
page read and write
46F1000
heap
page read and write
1524000
heap
page read and write
83F0000
direct allocation
page execute and read and write
5BB1000
trusted library allocation
page read and write
36AF000
stack
page read and write
26E000
unkown
page execute and read and write
356F000
stack
page read and write
575A000
trusted library allocation
page read and write
114A000
unkown
page execute and read and write
4E20000
direct allocation
page read and write
F54000
heap
page read and write
1524000
heap
page read and write
13C4000
heap
page read and write
579A000
trusted library allocation
page read and write
17AF000
heap
page read and write
C2F000
heap
page read and write
13C4000
heap
page read and write
5100000
direct allocation
page read and write
954000
heap
page read and write
FA6000
unkown
page write copy
75C000
unkown
page execute and write copy
C14000
heap
page read and write
5470000
direct allocation
page execute and read and write
5C15000
trusted library allocation
page read and write
336F000
stack
page read and write
990000
heap
page read and write
5F0C000
trusted library allocation
page read and write
1024000
heap
page read and write
1024000
heap
page read and write
FD5000
unkown
page execute and read and write
1024000
heap
page read and write
452E000
stack
page read and write
3FEF000
stack
page read and write
3C5E000
stack
page read and write
4C61000
heap
page read and write
F2A000
unkown
page execute and write copy
100C000
unkown
page execute and write copy
1524000
heap
page read and write
4A20000
direct allocation
page execute and read and write
1100000
direct allocation
page read and write
1770000
heap
page read and write
1194000
heap
page read and write
581B000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
4F0F000
stack
page read and write
B00000
heap
page read and write
56E5000
trusted library allocation
page read and write
6CD4F000
unkown
page write copy
1169000
unkown
page execute and write copy
CD1000
heap
page read and write
1D1AE000
heap
page read and write
5B63000
trusted library allocation
page read and write
5B75000
trusted library allocation
page read and write
46F1000
heap
page read and write
1D1B5000
heap
page read and write
2D8000
unkown
page execute and write copy
4A8F000
stack
page read and write
4711000
heap
page read and write
CC9000
heap
page read and write
4E31000
heap
page read and write
2EFF000
stack
page read and write
125C000
stack
page read and write
5E79000
trusted library allocation
page read and write
4BD0000
direct allocation
page read and write
5430000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
5FB5000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
56E5000
trusted library allocation
page read and write
29EF000
stack
page read and write
576A000
trusted library allocation
page read and write
329F000
stack
page read and write
5ECB000
trusted library allocation
page read and write
5154000
heap
page read and write
392E000
stack
page read and write
BE0000
direct allocation
page read and write
5A7B000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
2C6F000
stack
page read and write
1D19B000
heap
page read and write
E0B000
unkown
page execute and write copy
FCE000
unkown
page execute and write copy
DC6000
unkown
page execute and read and write
5EB7000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
4F20000
direct allocation
page read and write
576A000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
13C4000
heap
page read and write
17FB000
heap
page read and write
46C1000
heap
page read and write
83B000
stack
page read and write
57C8000
trusted library allocation
page read and write
1D1CD000
heap
page read and write
11BB000
unkown
page execute and read and write
1186000
unkown
page execute and read and write
46F1000
heap
page read and write
5A77000
trusted library allocation
page read and write
11BE000
unkown
page execute and read and write
489C000
stack
page read and write
17AA000
heap
page read and write
11C2000
heap
page read and write
954000
heap
page read and write
13C4000
heap
page read and write
4C61000
heap
page read and write
570C000
trusted library allocation
page read and write
AB7000
heap
page read and write
11BE000
unkown
page execute and read and write
1100000
direct allocation
page read and write
52A1000
heap
page read and write
31BE000
stack
page read and write
323000
unkown
page execute and write copy
1D1AA000
heap
page read and write
1186000
unkown
page execute and read and write
4B8E000
stack
page read and write
2A1DC000
stack
page read and write
1149000
unkown
page execute and write copy
17FF000
heap
page read and write
F6F000
unkown
page execute and write copy
53CC000
stack
page read and write
43EE000
stack
page read and write
4700000
direct allocation
page read and write
4C61000
heap
page read and write
4711000
heap
page read and write
60ED000
trusted library allocation
page read and write
440E000
stack
page read and write
1524000
heap
page read and write
C7E000
heap
page read and write
46CE000
stack
page read and write
BE0000
direct allocation
page read and write
4EF0000
direct allocation
page read and write
52C0000
direct allocation
page read and write
1524000
heap
page read and write
1D2A1000
heap
page read and write
FAE000
unkown
page execute and read and write
46C1000
heap
page read and write
33CF000
stack
page read and write
3F4F000
stack
page read and write
2D3E000
stack
page read and write
4BE1000
heap
page read and write
1869000
heap
page read and write
1808000
heap
page read and write
D40000
direct allocation
page read and write
5ED4000
trusted library allocation
page read and write
56C0000
direct allocation
page read and write
911000
unkown
page execute and write copy
123C000
unkown
page execute and write copy
A2000
unkown
page execute and write copy
9BF000
unkown
page execute and read and write
11FA000
unkown
page execute and read and write
444E000
stack
page read and write
11F8000
unkown
page execute and write copy
C60000
direct allocation
page read and write
4E21000
heap
page read and write
5ED1000
trusted library allocation
page read and write
5F0B000
trusted library allocation
page read and write
69B000
unkown
page execute and read and write
F64000
unkown
page execute and read and write
46F1000
heap
page read and write
575A000
trusted library allocation
page read and write
1024000
heap
page read and write
F54000
heap
page read and write
4E31000
heap
page read and write
4D70000
direct allocation
page execute and read and write
11BB000
unkown
page execute and read and write
4C61000
heap
page read and write
CE8000
heap
page read and write
107A000
unkown
page execute and write copy
3F1E000
stack
page read and write
11EC000
heap
page read and write
1869000
heap
page read and write
D40000
direct allocation
page read and write
C60000
direct allocation
page read and write
5EBA000
trusted library allocation
page read and write
460000
unkown
page readonly
591E000
stack
page read and write
1524000
heap
page read and write
1D1B1000
heap
page read and write
F54000
heap
page read and write
390E000
stack
page read and write
385F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
4BD0000
direct allocation
page read and write
5C2C000
stack
page read and write
46F1000
heap
page read and write
56F3000
trusted library allocation
page read and write
5321000
heap
page read and write
1858000
heap
page read and write
6CCE000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
13C4000
heap
page read and write
9BF000
unkown
page execute and read and write
5B29000
trusted library allocation
page read and write
1664000
heap
page read and write
469F000
stack
page read and write
8230000
trusted library allocation
page read and write
1664000
heap
page read and write
3C5E000
stack
page read and write
32FE000
stack
page read and write
4E20000
direct allocation
page read and write
12D2000
heap
page read and write
1524000
heap
page read and write
1030000
unkown
page execute and read and write
13C4000
heap
page read and write
940000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
1024000
heap
page read and write
B14000
heap
page read and write
11B9000
unkown
page execute and write copy
4E31000
heap
page read and write
1125000
unkown
page execute and read and write
364E000
stack
page read and write
5F10000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
4E27000
trusted library allocation
page read and write
4850000
trusted library allocation
page read and write
5380000
remote allocation
page read and write
11ED000
heap
page read and write
575A000
trusted library allocation
page read and write
1A1000
unkown
page execute and write copy
4BD0000
direct allocation
page read and write
B14000
heap
page read and write
5ECB000
trusted library allocation
page read and write
4700000
direct allocation
page read and write
2DC0000
direct allocation
page read and write
6A8000
unkown
page execute and write copy
408E000
stack
page read and write
575A000
trusted library allocation
page read and write
46F1000
heap
page read and write
FEF000
unkown
page execute and write copy
4C61000
heap
page read and write
FB8000
unkown
page execute and write copy
4C61000
heap
page read and write
1D19F000
heap
page read and write
3B9E000
stack
page read and write
CEE000
heap
page read and write
56E1000
trusted library allocation
page read and write
67B2000
trusted library allocation
page read and write
34DF000
stack
page read and write
1D5AD000
stack
page read and write
82A6000
direct allocation
page read and write
11CB000
unkown
page execute and write copy
770000
heap
page read and write
1664000
heap
page read and write
48C0000
trusted library allocation
page read and write
1877000
heap
page read and write
56F7000
trusted library allocation
page read and write
231000
unkown
page execute and read and write
4E21000
heap
page read and write
3E1E000
stack
page read and write
1024000
heap
page read and write
1869000
heap
page read and write
307000
unkown
page execute and read and write
114C000
unkown
page execute and write copy
388F000
stack
page read and write
5E9B000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
5390000
direct allocation
page read and write
1808000
heap
page read and write
5440000
direct allocation
page execute and read and write
4BAC000
stack
page read and write
1024000
heap
page read and write
1024000
heap
page read and write
3F4D000
stack
page read and write
4BE1000
heap
page read and write
447E000
stack
page read and write
350F000
stack
page read and write
23273000
heap
page read and write
5E92000
trusted library allocation
page read and write
4C61000
heap
page read and write
48B0000
trusted library allocation
page read and write
11AF000
unkown
page execute and write copy
46F1000
heap
page read and write
5870000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
448E000
stack
page read and write
405F000
stack
page read and write
83F000
unkown
page execute and write copy
4C90000
direct allocation
page execute and read and write
5EB8000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
690000
unkown
page execute and read and write
1D1B1000
heap
page read and write
5803000
trusted library allocation
page read and write
2DA000
unkown
page execute and read and write
5ECB000
trusted library allocation
page read and write
5EC5000
trusted library allocation
page read and write
1024000
heap
page read and write
11D6000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
4E21000
heap
page read and write
354F000
stack
page read and write
4F01000
heap
page read and write
5E7C000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
4BCE000
stack
page read and write
E9E000
stack
page read and write
4C9000
unkown
page write copy
1194000
heap
page read and write
1D1AB000
heap
page read and write
2FDF000
stack
page read and write
F8D000
unkown
page execute and write copy
125C000
stack
page read and write
5A5D000
stack
page read and write
1060000
unkown
page execute and read and write
5020000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
5E8F000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
5EDA000
trusted library allocation
page read and write
318F000
stack
page read and write
99E000
unkown
page execute and read and write
1524000
heap
page read and write
CE8000
heap
page read and write
358E000
stack
page read and write
1D34F000
stack
page read and write
1194000
heap
page read and write
CDB000
heap
page read and write
1524000
heap
page read and write
513E000
stack
page read and write
F6C000
unkown
page execute and write copy
368E000
stack
page read and write
53E3000
trusted library allocation
page execute and read and write
41BF000
stack
page read and write
C60000
direct allocation
page read and write
418E000
stack
page read and write
3B8E000
stack
page read and write
13C4000
heap
page read and write
CE6000
heap
page read and write
39CF000
stack
page read and write
1CD4F000
stack
page read and write
F40000
direct allocation
page read and write
576A000
trusted library allocation
page read and write
A7D000
heap
page read and write
11C2000
heap
page read and write
4C61000
heap
page read and write
46F1000
heap
page read and write
11D6000
heap
page read and write
1664000
heap
page read and write
114A000
unkown
page execute and read and write
575F000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
37EF000
stack
page read and write
B9E000
stack
page read and write
1866000
heap
page read and write
1664000
heap
page read and write
6CC000
unkown
page execute and write copy
37EE000
stack
page read and write
56C0000
direct allocation
page read and write
CE2000
heap
page read and write
5E92000
trusted library allocation
page read and write
1024000
heap
page read and write
340E000
stack
page read and write
FA2000
unkown
page execute and write copy
575E000
trusted library allocation
page read and write
494F000
stack
page read and write
4BE1000
heap
page read and write
1187000
unkown
page execute and write copy
1196000
unkown
page execute and read and write
F54000
heap
page read and write
4BD0000
direct allocation
page read and write
54F0000
direct allocation
page execute and read and write
C5E000
heap
page read and write
BE0000
direct allocation
page read and write
4E21000
heap
page read and write
5440000
direct allocation
page execute and read and write
4F01000
heap
page read and write
CC5000
heap
page read and write
4EF0000
direct allocation
page read and write
379F000
stack
page read and write
5EC2000
trusted library allocation
page read and write
4BE1000
heap
page read and write
F43000
unkown
page execute and read and write
5E7E000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
5321000
heap
page read and write
11D2000
unkown
page execute and write copy
910000
unkown
page read and write
174D000
heap
page read and write
3080000
heap
page read and write
5729000
trusted library allocation
page read and write
1024000
heap
page read and write
1194000
heap
page read and write
117F000
unkown
page execute and write copy
351E000
stack
page read and write
5A71000
trusted library allocation
page read and write
5F1C000
trusted library allocation
page read and write
1194000
heap
page read and write
5729000
trusted library allocation
page read and write
2C8000
unkown
page execute and read and write
23666000
heap
page read and write
2DC0000
direct allocation
page read and write
1869000
heap
page read and write
FD1000
unkown
page execute and write copy
2AEF000
stack
page read and write
5701000
trusted library allocation
page read and write
D60000
unkown
page readonly
5B1D000
trusted library allocation
page read and write
3E4E000
stack
page read and write
D61000
unkown
page execute and read and write
360F000
stack
page read and write
572D000
trusted library allocation
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
4F20000
direct allocation
page read and write
2A9E000
stack
page read and write
1024000
heap
page read and write
F57000
unkown
page execute and read and write
CEC000
heap
page read and write
572A000
trusted library allocation
page read and write
669F000
stack
page read and write
2CFF000
stack
page read and write
517E000
stack
page read and write
55D3000
trusted library allocation
page execute and read and write
1524000
heap
page read and write
5B04000
trusted library allocation
page read and write
C52000
heap
page read and write
46F1000
heap
page read and write
14C7000
heap
page read and write
575A000
trusted library allocation
page read and write
B14000
heap
page read and write
2F2E000
stack
page read and write
4C61000
heap
page read and write
1194000
unkown
page execute and write copy
4F20000
direct allocation
page read and write
1D1AE000
heap
page read and write
2F9000
unkown
page execute and write copy
4C61000
heap
page read and write
575A000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
4C61000
heap
page read and write
4B30000
remote allocation
page read and write
13C4000
heap
page read and write
4711000
heap
page read and write
5E88000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
1194000
heap
page read and write
170B000
heap
page read and write
30DF000
stack
page read and write
1D610000
heap
page read and write
5F9D000
trusted library allocation
page read and write
1524000
heap
page read and write
114D000
unkown
page execute and read and write
E5C000
stack
page read and write
52A1000
heap
page read and write
4BE1000
heap
page read and write
32DE000
stack
page read and write
4E21000
heap
page read and write
4BE1000
heap
page read and write
5711000
trusted library allocation
page read and write
1D1B0000
heap
page read and write
4BE1000
heap
page read and write
49DF000
stack
page read and write
576A000
trusted library allocation
page read and write
5E97000
trusted library allocation
page read and write
2DEF000
stack
page read and write
11D3000
unkown
page execute and read and write
954000
heap
page read and write
1060000
unkown
page execute and read and write
1664000
heap
page read and write
FAA000
unkown
page execute and write copy
550F000
stack
page read and write
DB9000
unkown
page write copy
4EF0000
direct allocation
page read and write
1182000
unkown
page execute and write copy
1194000
heap
page read and write
334000
unkown
page execute and write copy
11B9000
unkown
page execute and write copy
4A30000
direct allocation
page execute and read and write
4C61000
heap
page read and write
5BC8000
trusted library allocation
page read and write
3090000
heap
page read and write
4843000
trusted library allocation
page execute and read and write
5711000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
57AA000
trusted library allocation
page read and write
42CE000
stack
page read and write
51FE000
stack
page read and write
46C1000
heap
page read and write
3BBE000
stack
page read and write
13C4000
heap
page read and write
47A1000
heap
page read and write
574D000
trusted library allocation
page read and write
48BA000
trusted library allocation
page execute and read and write
4860000
direct allocation
page read and write
ACC000
heap
page read and write
5A70000
trusted library allocation
page read and write
954000
heap
page read and write
1355000
stack
page read and write
349F000
stack
page read and write
556F000
trusted library allocation
page read and write
1024000
heap
page read and write
950000
heap
page read and write
1872000
heap
page read and write
1024000
heap
page read and write
3E9F000
stack
page read and write
1869000
heap
page read and write
4BE1000
heap
page read and write
2DC0000
direct allocation
page read and write
46F1000
heap
page read and write
FE7000
unkown
page execute and write copy
D40000
direct allocation
page read and write
4A4F000
stack
page read and write
41000
unkown
page execute and write copy
83F0000
direct allocation
page execute and read and write
1524000
heap
page read and write
CD4000
heap
page read and write
1185000
unkown
page execute and write copy
17D8000
heap
page read and write
5400000
direct allocation
page read and write
1866000
heap
page read and write
1664000
heap
page read and write
1510000
heap
page read and write
5715000
trusted library allocation
page read and write
4BE1000
heap
page read and write
1100000
direct allocation
page read and write
1D1A7000
heap
page read and write
401F000
stack
page read and write
FD0000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
DBB000
unkown
page execute and read and write
1100000
direct allocation
page read and write
4EF0000
direct allocation
page read and write
5ECB000
trusted library allocation
page read and write
48CF000
stack
page read and write
FA6000
unkown
page write copy
298000
unkown
page execute and write copy
5711000
trusted library allocation
page read and write
856B000
stack
page read and write
F6C000
unkown
page execute and write copy
BF0000
heap
page read and write
5310000
direct allocation
page read and write
11DB000
unkown
page execute and write copy
5EAB000
trusted library allocation
page read and write
1D5EF000
stack
page read and write
1194000
heap
page read and write
6D8D000
stack
page read and write
5E70000
trusted library allocation
page read and write
187D000
heap
page read and write
6CB4D000
unkown
page readonly
5E92000
trusted library allocation
page read and write
86E1000
heap
page read and write
D94000
heap
page read and write
1024000
heap
page read and write
57C8000
trusted library allocation
page read and write
F2A000
unkown
page execute and write copy
1664000
heap
page read and write
5EF2000
trusted library allocation
page read and write
5ED7000
trusted library allocation
page read and write
390E000
stack
page read and write
D40000
direct allocation
page read and write
33DE000
stack
page read and write
11DE000
stack
page read and write
1184000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
6CAD1000
unkown
page execute read
4D90000
direct allocation
page read and write
5EFC000
trusted library allocation
page read and write
2DC0000
direct allocation
page read and write
2AC0000
remote allocation
page read and write
48DE000
stack
page read and write
5A70000
trusted library allocation
page read and write
1D1B1000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
469E000
stack
page read and write
D10000
heap
page read and write
D90000
heap
page read and write
5B43000
trusted library allocation
page read and write
20D000
unkown
page execute and write copy
1D24E000
stack
page read and write
F4F000
unkown
page execute and write copy
2DC0000
direct allocation
page read and write
1024000
heap
page read and write
42DE000
stack
page read and write
5510000
direct allocation
page execute and read and write
186F000
heap
page read and write
4BE1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
13C4000
heap
page read and write
106E000
stack
page read and write
573F000
trusted library allocation
page read and write
46F1000
heap
page read and write
FB1000
unkown
page execute and read and write
B5000
unkown
page execute and write copy
30AE000
stack
page read and write
5B10000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
FB6000
unkown
page execute and write copy
4E31000
heap
page read and write
4C61000
heap
page read and write
454F000
stack
page read and write
5280000
direct allocation
page execute and read and write
5EBA000
trusted library allocation
page read and write
4911000
heap
page read and write
498E000
stack
page read and write
1D1AE000
heap
page read and write
56C0000
direct allocation
page read and write
4F20000
direct allocation
page read and write
1024000
heap
page read and write
56C0000
direct allocation
page read and write
5EB5000
trusted library allocation
page read and write
105F000
unkown
page execute and write copy
2DC0000
direct allocation
page read and write
4710000
heap
page read and write
5F09000
trusted library allocation
page read and write
13B0000
heap
page read and write
3E0F000
stack
page read and write
5BF4000
trusted library allocation
page read and write
1CE9F000
stack
page read and write
A4B000
heap
page read and write
920000
heap
page read and write
4E31000
heap
page read and write
B7E000
stack
page read and write
C6D000
heap
page read and write
55BE000
stack
page read and write
F54000
heap
page read and write
4F8F000
stack
page read and write
46F1000
heap
page read and write
1524000
heap
page read and write
342F000
stack
page read and write
56F3000
trusted library allocation
page read and write
F54000
heap
page read and write
BFE000
heap
page read and write
FE7000
unkown
page execute and write copy
94A000
heap
page read and write
462F000
stack
page read and write
954000
heap
page read and write
61ECD000
direct allocation
page readonly
1CFDD000
stack
page read and write
1189000
unkown
page execute and read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
416E000
stack
page read and write
49EF000
stack
page read and write
46F1000
heap
page read and write
13C4000
heap
page read and write
428F000
stack
page read and write
4B1F000
stack
page read and write
13C4000
heap
page read and write
4BDE000
stack
page read and write
1D19E000
heap
page read and write
5BCA000
trusted library allocation
page read and write
451F000
stack
page read and write
4E31000
heap
page read and write
A45000
heap
page read and write
5460000
direct allocation
page execute and read and write
1869000
heap
page read and write
CEB000
unkown
page execute and read and write
13C4000
heap
page read and write
39DF000
stack
page read and write
604D000
trusted library allocation
page read and write
38CF000
stack
page read and write
4BE1000
heap
page read and write
D94000
heap
page read and write
440F000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
56F5000
trusted library allocation
page read and write
1145000
unkown
page execute and write copy
1354000
stack
page read and write
3C5F000
stack
page read and write
13C4000
heap
page read and write
5890000
heap
page execute and read and write
1866000
heap
page read and write
56C0000
direct allocation
page read and write
FE0000
unkown
page execute and write copy
38DE000
stack
page read and write
1194000
heap
page read and write
F54000
unkown
page execute and write copy
4E31000
heap
page read and write
117E000
heap
page read and write
56FF000
trusted library allocation
page read and write
6DE000
unkown
page execute and read and write
4B7E000
stack
page read and write
47DF000
stack
page read and write
13C4000
heap
page read and write
311F000
stack
page read and write
575B000
trusted library allocation
page read and write
FB7000
unkown
page execute and read and write
52F6000
direct allocation
page read and write
5A73000
trusted library allocation
page read and write
DC7000
unkown
page execute and read and write
4BE1000
heap
page read and write
954000
heap
page read and write
5747000
trusted library allocation
page read and write
3D9F000
stack
page read and write
1D1B1000
heap
page read and write
5710000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
56E1000
trusted library allocation
page read and write
117F000
unkown
page execute and write copy
3A1F000
stack
page read and write
AB000
unkown
page execute and write copy
4BD0000
direct allocation
page read and write
1D1A3000
heap
page read and write
4E31000
heap
page read and write
5EBB000
trusted library allocation
page read and write
60AE000
stack
page read and write
4BE1000
heap
page read and write
4C8F000
stack
page read and write
E0B000
unkown
page execute and read and write
5A7B000
trusted library allocation
page read and write
123C000
unkown
page execute and write copy
1524000
heap
page read and write
3C8E000
stack
page read and write
5520000
direct allocation
page execute and read and write
172E000
stack
page read and write
F54000
heap
page read and write
60E3000
trusted library allocation
page read and write
4F40000
direct allocation
page execute and read and write
954000
heap
page read and write
41CE000
stack
page read and write
5530000
direct allocation
page execute and read and write
425F000
stack
page read and write
2AD7000
heap
page read and write
1D38E000
stack
page read and write
5ED4000
trusted library allocation
page read and write
13C4000
heap
page read and write
4C61000
heap
page read and write
323000
unkown
page execute and write copy
1A0000
unkown
page readonly
36AE000
stack
page read and write
375E000
stack
page read and write
13C4000
heap
page read and write
1024000
heap
page read and write
1D197000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
5EF2000
trusted library allocation
page read and write
375F000
stack
page read and write
4E21000
heap
page read and write
4E31000
heap
page read and write
4BE1000
heap
page read and write
312E000
stack
page read and write
F54000
heap
page read and write
F28000
unkown
page execute and read and write
4E21000
heap
page read and write
5EC7000
trusted library allocation
page read and write
4700000
direct allocation
page read and write
52F6000
direct allocation
page read and write
2E5F000
stack
page read and write
576A000
trusted library allocation
page read and write
1D1AE000
heap
page read and write
573F000
trusted library allocation
page read and write
4C61000
heap
page read and write
6038000
trusted library allocation
page execute and read and write
5955000
trusted library allocation
page read and write
1053000
unkown
page execute and write copy
11AE000
unkown
page execute and read and write
FE6000
unkown
page execute and read and write
311F000
stack
page read and write
1524000
heap
page read and write
106B000
unkown
page execute and write copy
55D0000
direct allocation
page execute and read and write
5321000
heap
page read and write
F54000
heap
page read and write
3E2E000
stack
page read and write
1194000
heap
page read and write
FA6000
unkown
page write copy
1D1CD000
heap
page read and write
332E000
stack
page read and write
186B000
heap
page read and write
1197000
unkown
page execute and write copy
1194000
heap
page read and write
DB9000
unkown
page write copy
46CE000
stack
page read and write
67D5000
trusted library allocation
page read and write
4E32000
heap
page read and write
1079000
unkown
page execute and write copy
13C4000
heap
page read and write
FAA000
unkown
page execute and write copy
1664000
heap
page read and write
3B2E000
stack
page read and write
1CB0E000
stack
page read and write
D94000
heap
page read and write
954000
heap
page read and write
3D8F000
stack
page read and write
13C4000
heap
page read and write
5550000
direct allocation
page execute and read and write
1CD9E000
stack
page read and write
5430000
direct allocation
page execute and read and write
5EB5000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
1196000
unkown
page execute and read and write
34DE000
stack
page read and write
1664000
heap
page read and write
99E000
unkown
page execute and read and write
5ED4000
trusted library allocation
page read and write
1869000
heap
page read and write
4E3D000
stack
page read and write
1D1A9000
heap
page read and write
458E000
stack
page read and write
FAA000
unkown
page execute and write copy
1D1A9000
heap
page read and write
4F70000
direct allocation
page execute and read and write
F6F000
unkown
page execute and write copy
FCE000
unkown
page execute and write copy
2D3E000
stack
page read and write
645E000
stack
page read and write
1524000
heap
page read and write
52A0000
direct allocation
page execute and read and write
23310000
trusted library allocation
page read and write
3B7F000
stack
page read and write
1D1A8000
heap
page read and write
44EF000
stack
page read and write
47A1000
heap
page read and write
30DF000
stack
page read and write
329E000
stack
page read and write
1524000
heap
page read and write
135D000
stack
page read and write
947000
unkown
page execute and read and write
4CD0000
direct allocation
page execute and read and write
13C4000
heap
page read and write
17AF000
heap
page read and write
5E83000
trusted library allocation
page read and write
3EC000
unkown
page execute and read and write
1024000
heap
page read and write
1024000
heap
page read and write
C7E000
heap
page read and write
1530000
heap
page read and write
34CF000
stack
page read and write
4C61000
heap
page read and write
1718000
heap
page read and write
4700000
direct allocation
page read and write
439F000
stack
page read and write
13C4000
heap
page read and write
5510000
direct allocation
page execute and read and write
2AC000
unkown
page execute and write copy
58C3000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
5510000
direct allocation
page execute and read and write
56E8000
trusted library allocation
page read and write
46EF000
stack
page read and write
56FD000
trusted library allocation
page read and write
11D1000
unkown
page execute and read and write
911000
unkown
page execute and write copy
1024000
heap
page read and write
1024000
heap
page read and write
1184000
unkown
page execute and read and write
1174000
unkown
page execute and read and write
123C000
unkown
page execute and write copy
4EF0000
direct allocation
page read and write
5702000
trusted library allocation
page read and write
42CF000
stack
page read and write
572D000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
4E21000
heap
page read and write
1D20F000
stack
page read and write
C19000
heap
page read and write
4F10000
direct allocation
page execute and read and write
1202000
heap
page read and write
A9000
unkown
page write copy
4F00000
heap
page read and write
13C4000
heap
page read and write
65F000
unkown
page execute and read and write
C60000
direct allocation
page read and write
3DCF000
stack
page read and write
186C000
heap
page read and write
46C1000
heap
page read and write
3A6E000
stack
page read and write
E0B000
unkown
page execute and read and write
1D197000
heap
page read and write
114C000
unkown
page execute and write copy
23662000
heap
page read and write
1194000
heap
page read and write
CC5000
heap
page read and write
576A000
trusted library allocation
page read and write
53B0000
heap
page read and write
43AF000
stack
page read and write
3C6E000
stack
page read and write
1866000
heap
page read and write
F0E000
stack
page read and write
328F000
stack
page read and write
1180000
unkown
page execute and read and write
4A1E000
stack
page read and write
FAA000
unkown
page execute and read and write
6AA000
unkown
page execute and read and write
566E000
stack
page read and write
1D197000
heap
page read and write
17BA000
heap
page read and write
3B5E000
stack
page read and write
4B2F000
stack
page read and write
553F000
stack
page read and write
480E000
stack
page read and write
1330000
heap
page read and write
4E31000
heap
page read and write
FE8000
unkown
page execute and read and write
1664000
heap
page read and write
52B0000
heap
page read and write
56F5000
trusted library allocation
page read and write
2BEF000
stack
page read and write
D94000
heap
page read and write
5EC6000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
1024000
heap
page read and write
106B000
unkown
page execute and write copy
5ECF000
trusted library allocation
page read and write
2C6000
unkown
page execute and write copy
110B000
stack
page read and write
5F1F000
trusted library allocation
page read and write
2FEE000
stack
page read and write
53F4000
trusted library allocation
page read and write
50D7000
trusted library allocation
page read and write
F4F000
unkown
page execute and read and write
4BE1000
heap
page read and write
13C4000
heap
page read and write
23210000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
2365A000
heap
page read and write
4BE1000
heap
page read and write
F64000
unkown
page execute and read and write
8063000
heap
page read and write
1524000
heap
page read and write
4A40000
direct allocation
page execute and read and write
76C000
unkown
page execute and write copy
13C4000
heap
page read and write
DF2000
unkown
page execute and read and write
465E000
stack
page read and write
1194000
heap
page read and write
5310000
direct allocation
page read and write
2AB0000
direct allocation
page execute and read and write
4C61000
heap
page read and write
4BE0000
heap
page execute and read and write
2DDF000
stack
page read and write
5F02000
trusted library allocation
page read and write
46F1000
heap
page read and write
CD6000
heap
page read and write
6CD50000
unkown
page read and write
38AE000
stack
page read and write
5310000
direct allocation
page read and write
4C61000
heap
page read and write
1024000
heap
page read and write
3A2F000
stack
page read and write
5E8F000
trusted library allocation
page read and write
4BE1000
heap
page read and write
50E4000
trusted library allocation
page read and write
954000
heap
page read and write
13C4000
heap
page read and write
56FF000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
187B000
heap
page read and write
FA0000
unkown
page readonly
1024000
heap
page read and write
1524000
heap
page read and write
442F000
stack
page read and write
5772000
trusted library allocation
page read and write
33C000
unkown
page execute and write copy
11AE000
unkown
page execute and read and write
3CCE000
stack
page read and write
A9000
unkown
page write copy
13C4000
heap
page read and write
1024000
heap
page read and write
2627000
heap
page read and write
3C1E000
stack
page read and write
F63000
unkown
page execute and write copy
3BAF000
stack
page read and write
5750000
trusted library allocation
page read and write
5708000
trusted library allocation
page read and write
8F7000
heap
page read and write
47A1000
heap
page read and write
390F000
stack
page read and write
5752000
trusted library allocation
page read and write
6B7000
unkown
page execute and read and write
1664000
heap
page read and write
6D3000
unkown
page execute and read and write
FB1000
unkown
page execute and read and write
107A000
unkown
page execute and write copy
3DFE000
stack
page read and write
4700000
direct allocation
page read and write
8270000
direct allocation
page read and write
13C4000
heap
page read and write
5ECB000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
114F000
stack
page read and write
645000
unkown
page execute and write copy
FD5000
unkown
page execute and read and write
F28000
unkown
page execute and read and write
406F000
stack
page read and write
1196000
unkown
page execute and read and write
F6C000
unkown
page execute and write copy
947000
unkown
page execute and read and write
4E21000
heap
page read and write
234BE000
stack
page read and write
3C2F000
stack
page read and write
FB7000
unkown
page execute and read and write
56FE000
trusted library allocation
page read and write
1120000
heap
page read and write
5440000
direct allocation
page execute and read and write
9D8000
stack
page read and write
13C4000
heap
page read and write
1D1CB000
heap
page read and write
6154000
heap
page read and write
570A000
trusted library allocation
page read and write
954000
heap
page read and write
1C9CE000
stack
page read and write
5BDE000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
48AF000
stack
page read and write
2DD7000
heap
page read and write
1524000
heap
page read and write
5480000
direct allocation
page read and write
5722000
trusted library allocation
page read and write
1D1BF000
heap
page read and write
39AF000
stack
page read and write
3A5E000
stack
page read and write
3D8000
unkown
page execute and read and write
112F000
unkown
page execute and write copy
FAA000
unkown
page execute and write copy
5E88000
trusted library allocation
page read and write
5E92000
trusted library allocation
page read and write
46F1000
heap
page read and write
1524000
heap
page read and write
444E000
stack
page read and write
56E2000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
342E000
stack
page read and write
B6000
unkown
page execute and read and write
46F1000
heap
page read and write
1148000
unkown
page execute and read and write
13C4000
heap
page read and write
4C61000
heap
page read and write
A2000
unkown
page execute and read and write
1524000
heap
page read and write
5EDD000
trusted library allocation
page read and write
9A6000
unkown
page execute and read and write
319F000
stack
page read and write
4EFE000
stack
page read and write
335F000
stack
page read and write
5709000
trusted library allocation
page read and write
CE8000
heap
page read and write
37DE000
stack
page read and write
2BC000
unkown
page execute and write copy
1024000
heap
page read and write
1524000
heap
page read and write
E0B000
unkown
page execute and read and write
56E1000
trusted library allocation
page read and write
52A1000
heap
page read and write
1D1AD000
heap
page read and write
5885000
trusted library allocation
page read and write
42AE000
stack
page read and write
1664000
heap
page read and write
303E000
stack
page read and write
1020000
heap
page read and write
1D20F000
stack
page read and write
1079000
unkown
page execute and read and write
4A8E000
stack
page read and write
1524000
heap
page read and write
5E97000
trusted library allocation
page read and write
11FA000
unkown
page execute and read and write
11A7000
unkown
page execute and write copy
62D5000
heap
page read and write
1024000
heap
page read and write
3247000
heap
page read and write
F6E000
unkown
page execute and read and write
37BF000
stack
page read and write
2D1F000
stack
page read and write
2A2E000
stack
page read and write
ACA000
heap
page read and write
1D8AE000
stack
page read and write
1524000
heap
page read and write
AB000
unkown
page execute and write copy
14B0000
heap
page read and write
4B8F000
stack
page read and write
5E8E000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
14FA000
stack
page read and write
F8E000
stack
page read and write
FBF000
unkown
page execute and read and write
412F000
stack
page read and write
D94000
heap
page read and write
5BA1000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
FDF000
unkown
page execute and read and write
4E21000
heap
page read and write
67A000
unkown
page execute and read and write
479E000
stack
page read and write
BFA000
heap
page read and write
947000
unkown
page execute and read and write
1524000
heap
page read and write
5EAB000
trusted library allocation
page read and write
1524000
heap
page read and write
5ECB000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
1524000
heap
page read and write
5E83000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
1194000
heap
page read and write
1D197000
heap
page read and write
40AE000
stack
page read and write
CEE000
heap
page read and write
5E72000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
17BC000
heap
page read and write
1D1B1000
heap
page read and write
13C4000
heap
page read and write
4C61000
heap
page read and write
C3E000
heap
page read and write
5796000
trusted library allocation
page read and write
1D1AE000
heap
page read and write
5EBB000
trusted library allocation
page read and write
C71000
heap
page read and write
1D1B5000
heap
page read and write
2FDE000
stack
page read and write
3D5F000
stack
page read and write
DBB000
unkown
page execute and write copy
5EAF000
trusted library allocation
page execute and read and write
F6E000
unkown
page execute and read and write
114D000
unkown
page execute and read and write
41000
unkown
page execute and write copy
1024000
heap
page read and write
1030000
unkown
page execute and read and write
13C4000
heap
page read and write
232C9000
heap
page read and write
301E000
stack
page read and write
4A30000
direct allocation
page execute and read and write
4E21000
heap
page read and write
1D1CA000
heap
page read and write
46F1000
heap
page read and write
4E21000
heap
page read and write
13E0000
heap
page read and write
F83000
unkown
page execute and read and write
2DC0000
direct allocation
page read and write
1100000
direct allocation
page read and write
71B000
unkown
page execute and read and write
5A74000
trusted library allocation
page read and write
5E8F000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5E7E000
trusted library allocation
page read and write
13C4000
heap
page read and write
56FD000
trusted library allocation
page read and write
2327D000
heap
page read and write
FB6000
unkown
page execute and write copy
44AE000
stack
page read and write
1D1BF000
heap
page read and write
D94000
heap
page read and write
F40000
direct allocation
page read and write
4DEE000
stack
page read and write
57EA000
trusted library allocation
page read and write
F63000
unkown
page execute and write copy
4F20000
direct allocation
page read and write
CEE000
heap
page read and write
5870000
trusted library allocation
page read and write
52A1000
heap
page read and write
5EE1000
trusted library allocation
page read and write
4810000
trusted library allocation
page read and write
1D180000
heap
page read and write
5E71000
trusted library allocation
page read and write
FDE000
unkown
page execute and write copy
B48000
unkown
page execute and read and write
F45000
unkown
page execute and write copy
B14000
heap
page read and write
716E000
stack
page read and write
1524000
heap
page read and write
8DC000
stack
page read and write
1CC0F000
stack
page read and write
954000
heap
page read and write
5EF4000
trusted library allocation
page read and write
5150000
heap
page read and write
513E000
stack
page read and write
334000
unkown
page execute and write copy
1061000
unkown
page execute and write copy
1024000
heap
page read and write
5BA8000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5EE7000
trusted library allocation
page read and write
1194000
heap
page read and write
5EC8000
trusted library allocation
page read and write
1D600000
heap
page read and write
5E97000
trusted library allocation
page read and write
4CB0000
direct allocation
page execute and read and write
1024000
heap
page read and write
1524000
heap
page read and write
1079000
unkown
page execute and read and write
5A76000
trusted library allocation
page read and write
4E31000
heap
page read and write
1194000
heap
page read and write
430E000
stack
page read and write
4BE1000
heap
page read and write
D40000
direct allocation
page read and write
576A000
trusted library allocation
page read and write
C1F000
stack
page read and write
4E21000
heap
page read and write
575A000
trusted library allocation
page read and write
307E000
stack
page read and write
46F1000
heap
page read and write
556E000
stack
page read and write
457F000
stack
page read and write
56F2000
trusted library allocation
page read and write
5FAE000
stack
page read and write
1524000
heap
page read and write
52F0000
direct allocation
page read and write
4BE1000
heap
page read and write
CBE000
stack
page read and write
11AE000
unkown
page execute and read and write
25A000
unkown
page execute and read and write
112F000
unkown
page execute and read and write
1510000
heap
page read and write
40EE000
stack
page read and write
2ADE000
stack
page read and write
1024000
heap
page read and write
11EF000
heap
page read and write
17B8000
heap
page read and write
11BC000
unkown
page execute and write copy
B14000
heap
page read and write
2CEF000
stack
page read and write
100C000
unkown
page execute and write copy
A9000
unkown
page write copy
1162000
unkown
page execute and read and write
303F000
stack
page read and write
37CE000
stack
page read and write
4C7F000
stack
page read and write
4E21000
heap
page read and write
5A79000
trusted library allocation
page read and write
466E000
stack
page read and write
5E83000
trusted library allocation
page read and write
364F000
stack
page read and write
27AE000
stack
page read and write
1524000
heap
page read and write
86F7000
heap
page read and write
4E31000
heap
page read and write
9BF000
unkown
page execute and read and write
4BE1000
heap
page read and write
110C000
unkown
page execute and read and write
DFC000
unkown
page execute and read and write
13C4000
heap
page read and write
2DAF000
stack
page read and write
4B8E000
stack
page read and write
3B4F000
stack
page read and write
573C000
trusted library allocation
page read and write
1460000
heap
page read and write
1079000
unkown
page execute and read and write
12B9000
heap
page read and write
4C61000
heap
page read and write
1185000
unkown
page execute and write copy
4E20000
direct allocation
page read and write
41CE000
stack
page read and write
4C61000
heap
page read and write
5711000
trusted library allocation
page read and write
4E31000
heap
page read and write
D2E000
stack
page read and write
CDB000
heap
page read and write
47F0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
5F34000
trusted library allocation
page read and write
D61000
unkown
page execute and write copy
FCE000
unkown
page execute and write copy
CE8000
heap
page read and write
56FD000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
1024000
heap
page read and write
1524000
heap
page read and write
D40000
direct allocation
page read and write
158D000
heap
page read and write
5470000
trusted library allocation
page read and write
1186000
unkown
page execute and read and write
5763000
trusted library allocation
page read and write
1024000
heap
page read and write
3ADF000
stack
page read and write
D61000
unkown
page execute and read and write
5B2B000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
5F0000
heap
page read and write
1024000
heap
page read and write
47CF000
stack
page read and write
33CF000
stack
page read and write
11DB000
unkown
page execute and write copy
1664000
heap
page read and write
11DD000
unkown
page execute and read and write
16DB000
heap
page read and write
5EBB000
trusted library allocation
page read and write
4A3E000
stack
page read and write
641F000
stack
page read and write
630000
heap
page read and write
3F0F000
stack
page read and write
1D1B1000
heap
page read and write
4D63000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
1D6AE000
stack
page read and write
3A4E000
stack
page read and write
4F30000
trusted library allocation
page read and write
46C1000
heap
page read and write
28A000
unkown
page execute and read and write
4C61000
heap
page read and write
4700000
direct allocation
page read and write
5B89000
trusted library allocation
page read and write
47A1000
heap
page read and write
29D0000
direct allocation
page execute and read and write
1808000
heap
page read and write
4E21000
heap
page read and write
3B5F000
stack
page read and write
2365E000
heap
page read and write
ECF000
stack
page read and write
1024000
heap
page read and write
5EBB000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
299E000
stack
page read and write
4B4F000
stack
page read and write
1723000
heap
page read and write
13C4000
heap
page read and write
5EBC000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
1524000
heap
page read and write
38CE000
stack
page read and write
35DF000
stack
page read and write
117A000
heap
page read and write
1100000
direct allocation
page read and write
F54000
heap
page read and write
576A000
trusted library allocation
page read and write
1024000
heap
page read and write
47A1000
heap
page read and write
4EF0000
direct allocation
page read and write
6CAD0000
unkown
page readonly
576A000
trusted library allocation
page read and write
4EF7000
trusted library allocation
page read and write
F54000
heap
page read and write
5711000
trusted library allocation
page read and write
1D48F000
stack
page read and write
1025000
heap
page read and write
46C0000
heap
page read and write
225000
unkown
page execute and write copy
330E000
stack
page read and write
1024000
heap
page read and write
33C000
unkown
page execute and write copy
576B000
trusted library allocation
page read and write
459E000
stack
page read and write
5EDB000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
316F000
stack
page read and write
1524000
heap
page read and write
306F000
stack
page read and write
1170000
heap
page read and write
61ED3000
direct allocation
page read and write
5EED000
trusted library allocation
page read and write
13C4000
heap
page read and write
FA2000
unkown
page execute and write copy
FE8000
unkown
page execute and read and write
1194000
heap
page read and write
1664000
heap
page read and write
ADE000
stack
page read and write
61ED4000
direct allocation
page readonly
5E97000
trusted library allocation
page read and write
327000
unkown
page execute and write copy
5E8F000
trusted library allocation
page read and write
4702000
heap
page read and write
B14000
heap
page read and write
C6D000
heap
page read and write
5EA8000
trusted library allocation
page read and write
5550000
direct allocation
page execute and read and write
1664000
heap
page read and write
11B9000
unkown
page execute and write copy
4EE0000
direct allocation
page execute and read and write
4C61000
heap
page read and write
1185000
unkown
page execute and write copy
4E31000
heap
page read and write
110C000
unkown
page execute and read and write
339E000
stack
page read and write
46E0000
heap
page read and write
13C4000
heap
page read and write
1524000
heap
page read and write
5EA5000
trusted library allocation
page read and write
225000
unkown
page execute and read and write
FE8000
unkown
page execute and read and write
185D000
heap
page read and write
5702000
trusted library allocation
page read and write
4BE1000
heap
page read and write
5AAC000
stack
page read and write
1D1B1000
heap
page read and write
1145000
unkown
page execute and write copy
C60000
direct allocation
page read and write
93E000
stack
page read and write
379E000
stack
page read and write
4E20000
direct allocation
page read and write
12EF000
heap
page read and write
5860000
trusted library allocation
page read and write
4A2E000
stack
page read and write
F54000
heap
page read and write
23275000
heap
page read and write
1125000
unkown
page execute and read and write
4C61000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4B9F000
stack
page read and write
5ECC000
trusted library allocation
page read and write
1025000
heap
page read and write
4C61000
heap
page read and write
DB9000
unkown
page write copy
5EBB000
trusted library allocation
page read and write
A99000
heap
page read and write
68F000
unkown
page execute and write copy
4CAF000
stack
page read and write
5B4D000
trusted library allocation
page read and write
3C9000
stack
page read and write
11D2000
unkown
page execute and write copy
56F5000
trusted library allocation
page read and write
5EE7000
trusted library allocation
page read and write
4F01000
heap
page read and write
5F7E000
trusted library allocation
page read and write
702E000
stack
page read and write
1280000
heap
page read and write
13C4000
heap
page read and write
5A7E000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
555A000
trusted library allocation
page execute and read and write
4E31000
heap
page read and write
99E000
unkown
page execute and read and write
C6D000
heap
page read and write
1024000
heap
page read and write
FD0000
heap
page read and write
1664000
heap
page read and write
575E000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
40000
unkown
page readonly
5ECB000
trusted library allocation
page read and write
5250000
heap
page read and write
5EC2000
trusted library allocation
page read and write
1D07E000
stack
page read and write
56EF000
trusted library allocation
page read and write
5BEE000
stack
page read and write
83E000
unkown
page execute and read and write
53E4000
trusted library allocation
page read and write
5290000
direct allocation
page read and write
5EE8000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
1D34F000
stack
page read and write
1024000
heap
page read and write
107A000
unkown
page execute and write copy
119E000
heap
page read and write
1DA00000
heap
page read and write
4FFD000
stack
page read and write
5CEE000
trusted library allocation
page read and write
430F000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
1024000
heap
page read and write
112F000
unkown
page execute and write copy
F59000
stack
page read and write
4C61000
heap
page read and write
433E000
stack
page read and write
13C4000
heap
page read and write
1194000
heap
page read and write
819B000
stack
page read and write
51F0000
direct allocation
page execute and read and write
4F50000
direct allocation
page execute and read and write
5783000
trusted library allocation
page read and write
4CB0000
heap
page read and write
369E000
stack
page read and write
B10000
heap
page read and write
458E000
stack
page read and write
1664000
heap
page read and write
48B0000
direct allocation
page read and write
575A000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
4C2000
unkown
page execute and write copy
346E000
stack
page read and write
C7A000
heap
page read and write
4BE1000
heap
page read and write
46F1000
heap
page read and write
FA6000
unkown
page write copy
52A1000
heap
page read and write
11F8000
unkown
page execute and write copy
490E000
stack
page read and write
56F6000
trusted library allocation
page read and write
1524000
heap
page read and write
1024000
heap
page read and write
6F8000
unkown
page execute and write copy
1060000
unkown
page execute and read and write
5310000
direct allocation
page read and write
1024000
heap
page read and write
FA5000
heap
page read and write
5B5D000
stack
page read and write
D94000
heap
page read and write
2A2DC000
stack
page read and write
352F000
stack
page read and write
46F1000
heap
page read and write
D94000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
4C1E000
stack
page read and write
13C5000
heap
page read and write
5EBA000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
1D31E000
stack
page read and write
450F000
stack
page read and write
5702000
trusted library allocation
page read and write
1024000
heap
page read and write
5330000
heap
page read and write
604C000
trusted library allocation
page execute and read and write
13C4000
heap
page read and write
57AA000
trusted library allocation
page read and write
13C4000
heap
page read and write
FA3000
heap
page read and write
5F02000
trusted library allocation
page read and write
325E000
stack
page read and write
14B4000
heap
page read and write
4E31000
heap
page read and write
368F000
stack
page read and write
116E000
unkown
page execute and write copy
11D6000
heap
page read and write
1180000
unkown
page execute and read and write
5400000
direct allocation
page read and write
5BAC000
trusted library allocation
page read and write
11A1000
heap
page read and write
4BE1000
heap
page read and write
1D1AC000
heap
page read and write
4F01000
heap
page read and write
46F1000
heap
page read and write
5013000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
13C4000
heap
page read and write
C60000
direct allocation
page read and write
1664000
heap
page read and write
1D1AE000
heap
page read and write
1524000
heap
page read and write
47CF000
stack
page read and write
13C4000
heap
page read and write
2E9E000
stack
page read and write
1024000
heap
page read and write
575F000
trusted library allocation
page read and write
13C4000
heap
page read and write
5965000
trusted library allocation
page read and write
300F000
stack
page read and write
5708000
trusted library allocation
page read and write
9DE000
stack
page read and write
5752000
trusted library allocation
page read and write
4711000
heap
page read and write
1871000
heap
page read and write
4E21000
heap
page read and write
13C4000
heap
page read and write
BE0000
direct allocation
page read and write
709000
unkown
page execute and read and write
1024000
heap
page read and write
FD0000
unkown
page execute and read and write
4E31000
heap
page read and write
4911000
heap
page read and write
5E00000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
4DCE000
stack
page read and write
1524000
heap
page read and write
47A1000
heap
page read and write
719000
unkown
page execute and write copy
4700000
direct allocation
page read and write
23271000
heap
page read and write
140D000
heap
page read and write
5785000
trusted library allocation
page read and write
5EEC000
trusted library allocation
page read and write
507E000
stack
page read and write
C60000
direct allocation
page read and write
565E000
stack
page read and write
47A0000
heap
page read and write
5752000
trusted library allocation
page read and write
37AF000
stack
page read and write
1024000
heap
page read and write
4B90000
trusted library allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
23450000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
1174000
unkown
page execute and read and write
4D1E000
stack
page read and write
336000
unkown
page execute and write copy
2DC0000
direct allocation
page read and write
6B8000
unkown
page execute and write copy
1664000
heap
page read and write
4911000
heap
page read and write
46DE000
stack
page read and write
6CD0F000
unkown
page readonly
5BA6000
trusted library allocation
page read and write
1024000
heap
page read and write
C60000
direct allocation
page read and write
1524000
heap
page read and write
225000
unkown
page execute and write copy
60C2000
trusted library allocation
page read and write
4C61000
heap
page read and write
911000
unkown
page execute and write copy
1024000
heap
page read and write
A70000
heap
page read and write
5EA6000
trusted library allocation
page read and write
1664000
heap
page read and write
1024000
heap
page read and write
11CB000
unkown
page execute and write copy
5741000
trusted library allocation
page read and write
4C61000
heap
page read and write
11A9000
heap
page read and write
4E31000
heap
page read and write
1869000
heap
page read and write
53D0000
trusted library allocation
page read and write
1D2A0000
trusted library allocation
page read and write
52A1000
heap
page read and write
56FC000
trusted library allocation
page read and write
3A4F000
stack
page read and write
5540000
direct allocation
page execute and read and write
1524000
heap
page read and write
404F000
stack
page read and write
5B8F000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
445E000
stack
page read and write
FAE000
unkown
page execute and read and write
585D000
stack
page read and write
4F20000
direct allocation
page read and write
4BE1000
heap
page read and write
13C4000
heap
page read and write
5727000
trusted library allocation
page read and write
349F000
stack
page read and write
5EAA000
trusted library allocation
page read and write
13C0000
heap
page read and write
4431000
heap
page read and write
1524000
heap
page read and write
5783000
trusted library allocation
page read and write
316D000
heap
page read and write
A9000
unkown
page write copy
2C1E000
stack
page read and write
444F000
stack
page read and write
11E0000
heap
page read and write
5713000
trusted library allocation
page read and write
47A1000
heap
page read and write
4E30000
heap
page read and write
576A000
trusted library allocation
page read and write
56F3000
trusted library allocation
page read and write
4E31000
heap
page read and write
295E000
stack
page read and write
1024000
heap
page read and write
46F1000
heap
page read and write
6CB71000
unkown
page execute read
23230000
heap
page read and write
1024000
heap
page read and write
1197000
unkown
page execute and write copy
BE0000
direct allocation
page read and write
1024000
heap
page read and write
5600000
direct allocation
page execute and read and write
5ECB000
trusted library allocation
page read and write
954000
heap
page read and write
2FDF000
stack
page read and write
C60000
direct allocation
page read and write
B5E000
stack
page read and write
1100000
direct allocation
page read and write
106B000
unkown
page execute and write copy
2620000
heap
page read and write
3CBF000
stack
page read and write
13C4000
heap
page read and write
6BD000
unkown
page execute and read and write
1D1AE000
heap
page read and write
3A0E000
stack
page read and write
57B000
unkown
page execute and read and write
1194000
heap
page read and write
FAE000
unkown
page execute and read and write
1194000
heap
page read and write
4F30000
direct allocation
page execute and read and write
4EF0000
direct allocation
page read and write
386F000
stack
page read and write
4C61000
heap
page read and write
4E8E000
stack
page read and write
48EE000
stack
page read and write
1024000
heap
page read and write
4C61000
heap
page read and write
1D18D000
heap
page read and write
116C000
unkown
page execute and read and write
5EFA000
trusted library allocation
page read and write
4E31000
heap
page read and write
293000
unkown
page execute and write copy
575F000
trusted library allocation
page read and write
419E000
stack
page read and write
13C4000
heap
page read and write
6CB62000
unkown
page readonly
CDB000
heap
page read and write
1024000
heap
page read and write
86DF000
heap
page read and write
1024000
heap
page read and write
575F000
trusted library allocation
page read and write
17D8000
heap
page read and write
1866000
heap
page read and write
866C000
stack
page read and write
5400000
direct allocation
page read and write
4711000
heap
page read and write
5945000
trusted library allocation
page read and write
2E9000
unkown
page execute and read and write
1D182000
heap
page read and write
954000
heap
page read and write
CC5000
heap
page read and write
124C000
unkown
page execute and write copy
357E000
stack
page read and write
13C4000
heap
page read and write
57B4000
trusted library allocation
page read and write
17F3000
heap
page read and write
17C5000
heap
page read and write
23292000
heap
page read and write
1524000
heap
page read and write
46F1000
heap
page read and write
4DAF000
stack
page read and write
323000
unkown
page execute and write copy
F64000
unkown
page execute and read and write
5716000
trusted library allocation
page read and write
4BE1000
heap
page read and write
A6F000
heap
page read and write
1024000
heap
page read and write
1D1B1000
heap
page read and write
3A7E000
stack
page read and write
68C000
unkown
page execute and read and write
75A000
unkown
page execute and read and write
F50000
heap
page read and write
47AE000
stack
page read and write
1D1BE000
stack
page read and write
CE8000
heap
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
5CCF000
stack
page read and write
1664000
heap
page read and write
1D1B1000
heap
page read and write
DB9000
unkown
page write copy
13C4000
heap
page read and write
FF2000
unkown
page execute and read and write
560B000
trusted library allocation
page execute and read and write
FD0000
unkown
page execute and read and write
4E21000
heap
page read and write
1524000
heap
page read and write
5711000
trusted library allocation
page read and write
F43000
unkown
page execute and read and write
1872000
heap
page read and write
575F000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
CC3000
heap
page read and write
10AE000
stack
page read and write
408F000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
372F000
stack
page read and write
5E97000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
46C1000
heap
page read and write
910000
unkown
page readonly
DC7000
unkown
page execute and write copy
5E92000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
52A0000
heap
page read and write
117F000
stack
page read and write
5510000
direct allocation
page execute and read and write
4CE0000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
11B1000
unkown
page execute and read and write
4E21000
heap
page read and write
754000
unkown
page execute and write copy
910000
unkown
page readonly
41000
unkown
page execute and write copy
1024000
heap
page read and write
F54000
heap
page read and write
32EF000
stack
page read and write
47A1000
heap
page read and write
41000
unkown
page execute and write copy
31AE000
stack
page read and write
1024000
heap
page read and write
1D1A9000
heap
page read and write
1740000
heap
page read and write
36CE000
stack
page read and write
5A74000
trusted library allocation
page read and write
1524000
heap
page read and write
1D1BF000
heap
page read and write
CDC000
heap
page read and write
5310000
direct allocation
page read and write
A85000
heap
page read and write
5BCE000
stack
page read and write
4BE1000
heap
page read and write
D60000
unkown
page read and write
1D197000
heap
page read and write
F54000
heap
page read and write
1100000
direct allocation
page read and write
1D48F000
stack
page read and write
4A0F000
stack
page read and write
1866000
heap
page read and write
5B0C000
trusted library allocation
page read and write
4700000
direct allocation
page read and write
23289000
heap
page read and write
5E88000
trusted library allocation
page read and write
66B0000
heap
page read and write
1D1A3000
heap
page read and write
3B1F000
stack
page read and write
D94000
heap
page read and write
1A4E000
stack
page read and write
B70000
heap
page read and write
FDE000
unkown
page execute and write copy
1024000
heap
page read and write
46F1000
heap
page read and write
5B5A000
trusted library allocation
page read and write
CE1000
heap
page read and write
490F000
stack
page read and write
F54000
heap
page read and write
302F000
stack
page read and write
576A000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
4C80000
heap
page read and write
1024000
heap
page read and write
8BE000
stack
page read and write
11C2000
heap
page read and write
5EBA000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
1D1CD000
heap
page read and write
1664000
heap
page read and write
13C4000
heap
page read and write
2B6E000
stack
page read and write
317F000
stack
page read and write
DF2000
unkown
page execute and read and write
FD5000
heap
page read and write
4C70000
heap
page read and write
4844000
trusted library allocation
page read and write
11D3000
unkown
page execute and read and write
DBB000
unkown
page execute and read and write
954000
heap
page read and write
5EE2000
trusted library allocation
page read and write
1194000
heap
page read and write
4BA6000
direct allocation
page read and write
C52000
heap
page read and write
1664000
heap
page read and write
575A000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
F54000
heap
page read and write
5EA6000
trusted library allocation
page read and write
CEE000
heap
page read and write
11BB000
unkown
page execute and read and write
5E9B000
trusted library allocation
page read and write
3A6F000
stack
page read and write
5B19000
trusted library allocation
page read and write
CEC000
heap
page read and write
5D60000
heap
page read and write
13C4000
heap
page read and write
46F1000
heap
page read and write
5420000
trusted library allocation
page read and write
225000
unkown
page execute and write copy
1010000
unkown
page execute and read and write
314F000
stack
page read and write
124C000
unkown
page execute and write copy
1524000
heap
page read and write
5E92000
trusted library allocation
page read and write
145E000
stack
page read and write
39DE000
stack
page read and write
4D90000
direct allocation
page execute and read and write
17F8000
heap
page read and write
1D7000
unkown
page execute and read and write
4C61000
heap
page read and write
5C4C000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
1024000
heap
page read and write
D94000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
794D000
stack
page read and write
29C0000
direct allocation
page read and write
225000
unkown
page execute and write copy
D60000
unkown
page readonly
51C0000
direct allocation
page execute and read and write
350F000
stack
page read and write
DC5000
unkown
page execute and write copy
415E000
stack
page read and write
5EA5000
trusted library allocation
page read and write
116E000
unkown
page execute and write copy
5EA5000
trusted library allocation
page read and write
CEB000
unkown
page execute and read and write
4E10000
heap
page read and write
3CFE000
stack
page read and write
5ECB000
trusted library allocation
page read and write
297000
unkown
page execute and read and write
5EE6000
trusted library allocation
page read and write
710000
heap
page read and write
B14000
heap
page read and write
4BE1000
heap
page read and write
5F14000
trusted library allocation
page read and write
321F000
stack
page read and write
5E97000
trusted library allocation
page read and write
4E31000
heap
page read and write
32EE000
stack
page read and write
5EBA000
trusted library allocation
page read and write
1572000
heap
page read and write
1053000
unkown
page execute and write copy
5EBB000
trusted library allocation
page read and write
1D1B0000
heap
page read and write
23210000
heap
page read and write
53A0000
trusted library allocation
page read and write
F30000
heap
page read and write
116C000
unkown
page execute and read and write
4C61000
heap
page read and write
4430000
heap
page read and write
56EB000
trusted library allocation
page read and write
13C4000
heap
page read and write
3FAE000
stack
page read and write
23277000
heap
page read and write
4E21000
heap
page read and write
5B6F000
trusted library allocation
page read and write
CEE000
heap
page read and write
2DFF000
stack
page read and write
C70000
heap
page read and write
775000
heap
page read and write
3E2F000
stack
page read and write
5EA7000
trusted library allocation
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
BE0000
direct allocation
page read and write
3240000
heap
page read and write
1024000
heap
page read and write
1189000
unkown
page execute and read and write
61F5000
trusted library allocation
page read and write
4BE1000
heap
page read and write
FB1000
unkown
page execute and read and write
56FF000
trusted library allocation
page read and write
1D1A9000
heap
page read and write
4F01000
heap
page read and write
F8D000
unkown
page execute and write copy
AC0000
heap
page read and write
3CDE000
stack
page read and write
4711000
heap
page read and write
1524000
heap
page read and write
4C61000
heap
page read and write
454E000
stack
page read and write
1D1AE000
heap
page read and write
659E000
stack
page read and write
47B1000
heap
page read and write
318B000
stack
page read and write
5EFA000
trusted library allocation
page read and write
309B000
heap
page read and write
2CDF000
stack
page read and write
F54000
unkown
page execute and write copy
DBB000
unkown
page execute and write copy
8270000
direct allocation
page read and write
455E000
stack
page read and write
54CF000
stack
page read and write
1194000
heap
page read and write
743000
unkown
page execute and write copy
1D75D000
stack
page read and write
CE4000
heap
page read and write
1194000
heap
page read and write
5EB0000
trusted library allocation
page read and write
544E000
stack
page read and write
53FF000
stack
page read and write
1D1B1000
heap
page read and write
4F20000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
1D4FE000
stack
page read and write
42CF000
stack
page read and write
455F000
stack
page read and write
4E31000
heap
page read and write
165E000
stack
page read and write
13C4000
heap
page read and write
AB000
unkown
page execute and write copy
4EF0000
direct allocation
page read and write
4E21000
heap
page read and write
475F000
stack
page read and write
34C000
unkown
page execute and write copy
4BE1000
heap
page read and write
2E8000
unkown
page execute and write copy
FE0000
unkown
page execute and write copy
F54000
heap
page read and write
22F000
unkown
page execute and write copy
1024000
heap
page read and write
5770000
trusted library allocation
page read and write
4BD0000
direct allocation
page read and write
4A30000
direct allocation
page execute and read and write
954000
heap
page read and write
41AF000
stack
page read and write
334000
unkown
page execute and write copy
5EAA000
trusted library allocation
page read and write
954000
heap
page read and write
FDF000
unkown
page execute and read and write
5728000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
3D0E000
stack
page read and write
1869000
heap
page read and write
5F04000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
2334E000
stack
page read and write
5A73000
trusted library allocation
page read and write
B14000
heap
page read and write
There are 4092 hidden memdumps, click here to show them.