IOC Report
SecuriteInfo.com.Trojan.Siggen26.6766.29781.19786.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen26.6766.29781.19786.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MSIUpdaterV131\MSIUpdaterV131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV131\AdobeUpdaterV131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\58P5KO4N\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\58P5KO4N\fu[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\fu[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\ladas[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\niks[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\plaza[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\well[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\ladas[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\niks[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\plaza[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\well[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\fu[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\ladas[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\niks[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\plaza[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\well[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5QtvYXoJaghghg50zGLKyNk.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS131\EdgeMS131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\P52521B9kqdb74d8LejmrZT.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\6EzL3hHTS7jbM2Oz3y4V.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\7roqVJbvngCJVdY0TyvA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\8PXzAAoEBuHCTzP4RBWU.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\AqC0xzKsd_7euDTV6SA_.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\WWQdc6vczGf1JWs0hh6W.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\zFHlx6IqQx3xR1F02yH2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\3rOLtV34Ut0fTkzynGHi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\4sPiYiirBc4Eg8wqN443.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\IDzOFuKIaHRpmM4TfCyF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\KxZFCNaRhrDevdKhe6iU.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\dHERKKd2xGPyY5Ssqp_N.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\jQVZ0AI5Ls1YopKhCBc3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\BzN7a4ewVcXrTgzQjQz2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\HaJpYvk8t0RJ45fl1Ifn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\HhXfzERnI4EYVEjNyANc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\r3bD9GPTMOGYxgEqy2KG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\tkp2xLI98ZeXjg0exnoU.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5VRxrmyjWYJsGnPHociwt5.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6f0e6065-626d-4198-b354-c97b95febe98.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_6f0e6065-626d-4198-b354-c97b95febe98.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4sPiYiirBc4Eg8wqN443.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\1be0ce43-4e40-42d8-a5fc-33f68c48005a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\20b74f7d-d777-47b1-a9d4-96cb4a2e8304.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\25eb2e68-324d-4412-91b5-a1af125476a2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\35fea29b-cadc-4432-8a85-9ef39c103ae4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\427d0f65-8d9a-4893-bcba-bac10bc9a90c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4b1e186f-0122-47db-9d5f-b228dc94b487.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5a7ffd1a-56ec-4f7c-9065-9ddc716a698d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\693e9a9b-ab7c-4824-bff0-3f0e788dc039.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\72a4ac0d-cf23-4d79-a60c-22685d9c98ae.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9b984f65-91b5-4ab0-8a7b-81bcbc5fe26a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-65CA73FD-1B70.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-65CA73FD-2294.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-65CA73FF-2670.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\04b6c0db-0566-4bfe-b44c-03a66f2c2f48.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\064911c9-6795-48cc-bdd8-4e9b8c16a3bc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0d77b4ef-8c60-413c-86c0-89714a1a32d4.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\20a677ba-8b2c-495a-921d-8c557f7a3472.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\4bf03814-3e86-4586-a435-e1fe929b1ca8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6c96194b-a213-46da-b7a8-80016d8bd889.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\772fb796-d5b9-434a-816d-bb12b58b2b74.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\91ebb357-ce2c-4b21-bf11-5d704bd8b768.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\92bbba41-3317-46e0-9c41-d96ad02905a1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000004.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000005.ldb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 13, cookie 0x8, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 11, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\MediaDeviceSalts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 6, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\35133526-0f43-4f00-b9fe-5ca4517077ec.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\58c8155a-dd86-4ab5-99dc-d822c203c749.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\60dd7b9a-4660-4b20-b7a9-097876819e1e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF36a44.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\f397b2b9-2343-41da-9c15-c38f060d405f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF307b2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3449b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3737b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF39cae.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3d3bc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF42a48.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF33113.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF36c38.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF39cce.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF3224e.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13352240387297000
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\ae1c0f0f-a102-4b83-8716-30a89d5468cd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\e79258fa-7f0f-491f-a621-8aaeb2889c11.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 92, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a01ef94b-cf3d-45f5-95d0-8336ca5d28ff.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\df62c6c4-5c47-46e2-be0b-0a83ac0af9c5\0
ASCII text, with very long lines (2825)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\cd9a8d79-7d78-4427-bb27-8acd236ead5a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d6532afa-fc10-4b83-8117-b2ccc75f97c0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\dd498e88-0f3e-47e8-8dce-2118805bdf22.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f18357d1-13d4-4457-b24c-cd3ea3311dc7.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db
SQLite 3.x database, last written using SQLite version 3042000, writer version 2, read version 2, file counter 26, database pages 30, cookie 0x7, schema 4, UTF-8, version-valid-for 26
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF29dec.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF29e78.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF29e88.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2a2ae.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2a2be.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2a7de.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2ce71.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3080f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF332e8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF334cd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3377c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35f09.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3ada6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3ae23.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3ae62.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3d487.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b8b57165-0fad-4bd3-9de4-2e88a785f17b.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bd83ef4e-7710-4e16-ac83-f03d0d52a1df.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bf024648-e250-4c48-be14-4c3dcecd19ce.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e90fd1aa-ca90-4bd0-b37a-2a1be28728f5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\activity-stream.discovery_stream.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\activity-stream.discovery_stream.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\doomed\11335 (copy)
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\doomed\21975 (copy)
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\doomed\26378 (copy)
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\doomed\28297 (copy)
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\doomed\29033
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\doomed\31005 (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\1E3866B584D906DD8CB8840AB2070142E2DEA38A
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\2275F9569F28969C8FC69F9660A75ADD1F8B963B
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 200x200, components 3
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\4C863284CDA7F859EB300BED16DBCEF9517F1824
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\58A756A796A86993036E1F0F79183245EE2ABF58
PEM certificate
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\5B578F8321FC502AEADA5AE834B678EAFA227200
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\6246CB7FA0A72939616FB877FF3FE3BF71EBC1BB
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\69455E9F6ABEDFC78866EDEA94CB9D51C573A013
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\79B11E5B2A73707AF920FBB504E5C456E1698B13
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\7FEF50EB1C89E58D7202896295BED2C7C56D1C99
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\97AE667565B6120DDEBF42730CC21468FE5AC36E
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\C886C15B36E63849FB9E86DCC97456303F590459
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cache2\entries\D0F48A0632B6C451791F4257697E861961F06A6F
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\startupCache\scriptCache-child-new.bin
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\startupCache\scriptCache-child.bin (copy)
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\startupCache\scriptCache-new.bin
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\startupCache\scriptCache.bin (copy)
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\startupCache\urlCache-new.bin
data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-release\startupCache\urlCache.bin (copy)
data
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\0d798529-90c4-411e-a4cb-e373553d620d.tmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
dropped
C:\Users\user\AppData\Local\Temp\0d9ea59c-5762-40cc-8497-9802416f932b.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\16753093-eed8-4802-acb3-47beb22894ed.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\17ca9414-e798-4cbd-bea6-25af6763d89d.tmp
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
dropped
C:\Users\user\AppData\Local\Temp\596ad7b9-999c-453b-b2df-83f467167668.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\5d094c2e-0112-4732-a4da-6351b19bbc0a.tmp
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
dropped
C:\Users\user\AppData\Local\Temp\adobe2JNoqCa0s9_1\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe2JNoqCa0s9_1\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe2JNoqCa0s9_1\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe3rWvK1xaZKPt\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe3rWvK1xaZKPt\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe3rWvK1xaZKPt\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeOZ8O8BClDfN5\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeOZ8O8BClDfN5\Cookies\Edge_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeOZ8O8BClDfN5\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeOZ8O8BClDfN5\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\b21def9c-1665-4140-b0c9-222c3bc24dbf.tmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
dropped
C:\Users\user\AppData\Local\Temp\b857180f-2e62-4f24-8979-be8b51c25023.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 135363
dropped
C:\Users\user\AppData\Local\Temp\bc9e3268-bcc5-4048-8c0c-97cdfb1ed5dd.tmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 68x68, components 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\02zdBXl47cvzHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\2jQJv37iJ0lzCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\3b6N2Xdh3CYwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\8ghN89CsjOW1Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\D87fZN3R3jFeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\Ei8DrAmaYu9KLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\IWPfiAXUTJTSHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\KvHrxJ77cmUgLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\QdX9ITDLyCRBWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\UPG2LoPXwc7OWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\ZunTSaNJLBVfWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\o0qT3dWYBP7ZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\oOPEmFmu_xsJCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\pSE1jchbiT9aHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi2JNoqCa0s9_1\suOrwW4ZcUbjWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\02zdBXl47cvzHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\2jQJv37iJ0lzCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\3b6N2Xdh3CYwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\8ghN89CsjOW1Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\D87fZN3R3jFeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\Ei8DrAmaYu9KLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\IWPfiAXUTJTSHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\KvHrxJ77cmUgLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\QdX9ITDLyCRBWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\UPG2LoPXwc7OWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\ZunTSaNJLBVfWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\o0qT3dWYBP7ZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\oOPEmFmu_xsJCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\pSE1jchbiT9aHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\suOrwW4ZcUbjWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\02zdBXl47cvzHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\2jQJv37iJ0lzCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\3b6N2Xdh3CYwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\8ghN89CsjOW1Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\D87fZN3R3jFeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\Ei8DrAmaYu9KLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\IWPfiAXUTJTSHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\KvHrxJ77cmUgLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\QdX9ITDLyCRBWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\UPG2LoPXwc7OWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\ZunTSaNJLBVfWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 92, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\o0qT3dWYBP7ZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\oOPEmFmu_xsJCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\pSE1jchbiT9aHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiOZ8O8BClDfN5\suOrwW4ZcUbjWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:39:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:39:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:39:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:39:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:39:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS131.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Mon Feb 12 18:39:45 2024, mtime=Mon Feb 12 18:39:45 2024, atime=Mon Feb 12 18:39:40 2024, length=1931264, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\ExperimentStoreData.json (copy)
ASCII text, with very long lines (8269), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\ExperimentStoreData.json.tmp
ASCII text, with very long lines (8269), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\Telemetry.FailedProfileLocks.txt
very short file (no magic)
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cert9.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 8, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cert9.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\content-prefs.sqlite-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\aborted-session-ping (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\aborted-session-ping.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\archived\2024-02\1707773957838.d809f4a1-ece8-444e-a328-cbaa4e1dbc8c.health.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 493 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\archived\2024-02\1707773957838.d809f4a1-ece8-444e-a328-cbaa4e1dbc8c.health.jsonlz4.tmp
Mozilla lz4 compressed data, originally 493 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\db\data.safe.bin (copy)
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\db\data.safe.tmp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\events\background-update
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\events\events
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\pending_pings\061b0173-cecb-452a-9b19-ceec1a83fc58 (copy)
ASCII text, with very long lines (3121)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\pending_pings\2ea83aed-d73c-4146-ac4a-138038fe0d7e (copy)
ASCII text, with very long lines (9946)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\pending_pings\46d27ef2-9d52-4cc4-8518-b2e5ce2a9acf (copy)
ASCII text, with very long lines (1792)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\pending_pings\54c697a2-7653-465e-af26-652978bd2ff0 (copy)
ASCII text, with very long lines (1033)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\pending_pings\a993c97a-1d6a-485f-a17e-0e228ccad620 (copy)
ASCII text, with very long lines (1812)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\pending_pings\b2fd3690-a7d2-4caa-98f7-c4281e698608 (copy)
ASCII text, with very long lines (1830)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\tmp\061b0173-cecb-452a-9b19-ceec1a83fc58
ASCII text, with very long lines (3121)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\tmp\2ea83aed-d73c-4146-ac4a-138038fe0d7e
ASCII text, with very long lines (9946)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\tmp\46d27ef2-9d52-4cc4-8518-b2e5ce2a9acf
ASCII text, with very long lines (1792)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\tmp\54c697a2-7653-465e-af26-652978bd2ff0
ASCII text, with very long lines (1033)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\tmp\a993c97a-1d6a-485f-a17e-0e228ccad620
ASCII text, with very long lines (1812)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\glean\tmp\b2fd3690-a7d2-4caa-98f7-c4281e698608
ASCII text, with very long lines (1830)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\datareporting\session-state.json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\protections.sqlite-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 8516 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 8516 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 8516 bytes
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage.sqlite-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\xulstore.json.tmp
JSON data
dropped
C:\Windows\Tasks\explorgu.job
data
dropped
Chrome Cache Entry: 742
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 743
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 744
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 745
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 746
ASCII text, with very long lines (44728)
downloaded
Chrome Cache Entry: 747
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 748
ASCII text, with very long lines (511)
downloaded
Chrome Cache Entry: 749
exported SGML document, ASCII text, with very long lines (1120)
downloaded
Chrome Cache Entry: 750
ASCII text, with very long lines (1011), with no line terminators
downloaded
Chrome Cache Entry: 751
Web Open Font Format (Version 2), TrueType, length 15744, version 1.0
downloaded
Chrome Cache Entry: 752
Unicode text, UTF-8 text, with very long lines (4982)
downloaded
Chrome Cache Entry: 754
ASCII text, with very long lines (405)
downloaded
Chrome Cache Entry: 755
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 756
ASCII text, with very long lines (10220)
downloaded
Chrome Cache Entry: 757
PNG image data, 10 x 10, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 758
ASCII text, with very long lines (936)
downloaded
Chrome Cache Entry: 759
ASCII text, with very long lines (7990)
downloaded
Chrome Cache Entry: 760
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 68x68, components 3
downloaded
Chrome Cache Entry: 761
ASCII text, with very long lines (4199)
downloaded
Chrome Cache Entry: 762
ASCII text, with very long lines (19354)
downloaded
Chrome Cache Entry: 763
ASCII text, with very long lines (4199)
downloaded
Chrome Cache Entry: 764
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 765
ASCII text, with very long lines (555)
downloaded
Chrome Cache Entry: 766
ASCII text, with very long lines (715)
downloaded
Chrome Cache Entry: 767
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 2560x520, components 3
downloaded
Chrome Cache Entry: 768
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 769
ASCII text, with very long lines (22524)
downloaded
Chrome Cache Entry: 770
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 771
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 772
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 775
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 776
ASCII text, with very long lines (2036)
downloaded
Chrome Cache Entry: 777
ASCII text
downloaded
Chrome Cache Entry: 778
ASCII text, with very long lines (10590)
downloaded
Chrome Cache Entry: 779
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 780
ASCII text, with very long lines (3367)
downloaded
Chrome Cache Entry: 781
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
downloaded
Chrome Cache Entry: 782
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
downloaded
Chrome Cache Entry: 783
ASCII text, with very long lines (4264), with no line terminators
downloaded
Chrome Cache Entry: 784
ASCII text, with very long lines (5842)
downloaded
Chrome Cache Entry: 785
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 68x68, components 3
downloaded
Chrome Cache Entry: 786
ASCII text, with very long lines (775)
downloaded
Chrome Cache Entry: 787
ASCII text, with very long lines (4630)
downloaded
Chrome Cache Entry: 788
ASCII text, with very long lines (18915)
downloaded
Chrome Cache Entry: 789
Web Open Font Format (Version 2), TrueType, length 21464, version 1.0
downloaded
Chrome Cache Entry: 790
PNG image data, 189 x 181, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 791
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
downloaded
Chrome Cache Entry: 793
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 296x370, components 3
downloaded
Chrome Cache Entry: 794
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 68x68, components 3
downloaded
Chrome Cache Entry: 795
ASCII text, with very long lines (645)
downloaded
Chrome Cache Entry: 796
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 797
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 798
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 799
ASCII text, with very long lines (405)
downloaded
Chrome Cache Entry: 800
ASCII text, with very long lines (5311), with no line terminators
downloaded
Chrome Cache Entry: 801
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
downloaded
Chrome Cache Entry: 802
Web Open Font Format (Version 2), TrueType, length 21700, version 1.0
downloaded
Chrome Cache Entry: 803
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 804
ASCII text
downloaded
Chrome Cache Entry: 805
Web Open Font Format (Version 2), TrueType, length 32140, version 1.0
downloaded
Chrome Cache Entry: 806
ASCII text, with very long lines (826)
downloaded
Chrome Cache Entry: 807
ASCII text, with very long lines (58866)
downloaded
Chrome Cache Entry: 808
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 809
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 810
ASCII text, with very long lines (2360)
downloaded
Chrome Cache Entry: 811
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 68x68, components 3
downloaded
Chrome Cache Entry: 812
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 813
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 814
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 815
ASCII text, with very long lines (1299)
downloaded
Chrome Cache Entry: 816
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 817
ASCII text, with very long lines (45939)
downloaded
Chrome Cache Entry: 818
ASCII text, with very long lines (9325)
downloaded
Chrome Cache Entry: 819
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 820
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 821
ASCII text, with very long lines (7696)
downloaded
Chrome Cache Entry: 822
PNG image data, 49 x 74, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 823
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 824
ASCII text, with very long lines (20386)
downloaded
Chrome Cache Entry: 825
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 826
ASCII text, with very long lines (1116)
downloaded
Chrome Cache Entry: 827
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 828
PNG image data, 25 x 64, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 829
ASCII text, with very long lines (6544)
downloaded
Chrome Cache Entry: 830
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 831
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 832
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 833
ASCII text, with very long lines (1998)
downloaded
Chrome Cache Entry: 834
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 835
HTML document, ASCII text, with very long lines (682)
downloaded
Chrome Cache Entry: 836
PNG image data, 640 x 48, 8-bit/color RGBA, interlaced
downloaded
Chrome Cache Entry: 837
ASCII text, with very long lines (10908)
downloaded
Chrome Cache Entry: 838
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
downloaded
Chrome Cache Entry: 839
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 840
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 68x68, components 3
downloaded
Chrome Cache Entry: 841
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 842
ASCII text, with very long lines (1299)
downloaded
Chrome Cache Entry: 843
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 844
ASCII text, with very long lines (826)
downloaded
Chrome Cache Entry: 845
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 846
ASCII text, with very long lines (533)
downloaded
Chrome Cache Entry: 847
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 848
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 68x68, components 3
downloaded
Chrome Cache Entry: 849
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 850
ASCII text, with very long lines (8178)
downloaded
Chrome Cache Entry: 851
ASCII text, with very long lines (1299)
downloaded
Chrome Cache Entry: 852
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 853
ASCII text, with very long lines (4850)
downloaded
Chrome Cache Entry: 854
ASCII text, with very long lines (16083)
downloaded
Chrome Cache Entry: 855
ASCII text, with very long lines (1249)
downloaded
Chrome Cache Entry: 856
Web Open Font Format (Version 2), TrueType, length 15860, version 1.0
downloaded
Chrome Cache Entry: 857
ASCII text, with very long lines (1527)
downloaded
Chrome Cache Entry: 858
Web Open Font Format (Version 2), TrueType, length 15920, version 1.0
downloaded
Chrome Cache Entry: 859
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 860
PNG image data, 21 x 443, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 861
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 862
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 863
ASCII text, with very long lines (16083)
downloaded
Chrome Cache Entry: 864
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 865
ASCII text, with very long lines (1631)
downloaded
Chrome Cache Entry: 866
ASCII text, with very long lines (663)
downloaded
Chrome Cache Entry: 867
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 868
ASCII text, with very long lines (19300)
downloaded
Chrome Cache Entry: 869
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 870
ASCII text, with very long lines (65405)
downloaded
Chrome Cache Entry: 871
ASCII text, with very long lines (516)
downloaded
Chrome Cache Entry: 872
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 873
Web Open Font Format (Version 2), TrueType, length 15552, version 1.0
downloaded
Chrome Cache Entry: 874
HTML document, ASCII text, with very long lines (682)
downloaded
Chrome Cache Entry: 875
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 876
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 877
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 878
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 879
ASCII text, with very long lines (775)
downloaded
Chrome Cache Entry: 880
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 881
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 882
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 883
ASCII text, with very long lines (16083)
downloaded
Chrome Cache Entry: 884
ASCII text, with very long lines (1210)
downloaded
Chrome Cache Entry: 885
ASCII text, with very long lines (1631)
downloaded
Chrome Cache Entry: 886
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 206x366, components 3
downloaded
Chrome Cache Entry: 887
RIFF (little-endian) data, Web/P image, VP8 encoding, 720x404, Scaling: [none]x[none], YUV color, decoders should clamp
downloaded
Chrome Cache Entry: 888
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 640x360, components 3
downloaded
Chrome Cache Entry: 889
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 890
ASCII text, with very long lines (2360)
downloaded
Chrome Cache Entry: 891
ASCII text, with very long lines (663)
downloaded
Chrome Cache Entry: 892
JSON data
downloaded
Chrome Cache Entry: 893
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 540x960, components 3
downloaded
Chrome Cache Entry: 894
ASCII text, with very long lines (710)
downloaded
There are 543 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.6766.29781.19786.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.6766.29781.19786.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\jQVZ0AI5Ls1YopKhCBc3.exe
"C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\jQVZ0AI5Ls1YopKhCBc3.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV131\MSIUpdaterV131.exe" /tn "MSIUpdaterV131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV131\MSIUpdaterV131.exe" /tn "MSIUpdaterV131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\dHERKKd2xGPyY5Ssqp_N.exe
"C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\dHERKKd2xGPyY5Ssqp_N.exe"
malicious
C:\ProgramData\MSIUpdaterV131\MSIUpdaterV131.exe
C:\ProgramData\MSIUpdaterV131\MSIUpdaterV131.exe
malicious
C:\ProgramData\MSIUpdaterV131\MSIUpdaterV131.exe
C:\ProgramData\MSIUpdaterV131\MSIUpdaterV131.exe
malicious
C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\4sPiYiirBc4Eg8wqN443.exe
"C:\Users\user\AppData\Local\Temp\heidi3rWvK1xaZKPt\4sPiYiirBc4Eg8wqN443.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV131\AdobeUpdaterV131.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV131\AdobeUpdaterV131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.youtube.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.linkedin.com/login
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.facebook.com/video
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://accounts.google.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1936,i,5473178486326315563,2545621214023589303,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1936,i,1783626661732821117,8687075592315426283,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1976,i,6856639093823868645,7335846577343969463,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1916,i,11065865018849172942,2521104990630376558,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.facebook.com/video
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1912,i,15615417388423881991,543541311184639790,262144 /prefetch:3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1064 --field-trial-handle=2040,i,3936048782353792184,14433501436862568511,262144 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://www.youtube.com
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.facebook.com/video
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=2072,i,1673978244121305096,9852326822399086703,262144 /prefetch:3
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2352 -parentBuildID 20230927232528 -prefsHandle 2284 -prefMapHandle 1816 -prefsLen 25298 -prefMapSize 238442 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc5eb95e-32b5-4e67-b0fb-c26c990538d2} 3392 "\\.\pipe\gecko-crash-server-pipe.3392" 2000786cf10 socket
There are 36 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.46/cost/well.exemania
unknown
malicious
http://185.215.113.46/cost/fu.exef
unknown
malicious
http://185.215.113.46/cost/ladas.exe86
unknown
malicious
http://185.215.113.46/cost/niks.exeeidi2JNoqCa0s9_1
unknown
malicious
http://185.215.113.46/mine/plaza.exej
unknown
malicious
http://185.215.113.46/mine/plaza.exe0v
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Zbr4ZHZ4CDa4pbW1CbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
http://www.mozilla.com0
unknown
https://addons.mozilla.org/user-media/addon_icons/954/954390-64.png?modified=97d4c956(browserSetting
unknown
https://accounts.google.com/ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com%
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
http://www.fontbureau.com/designers
unknown
http://www.fontbureau.comTTF
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://addons.mozilla.org/user-media/addon_icons/784/784287-64.png?modified=mcrushed
unknown
https://screenshots.firefox.com
unknown
https://www.youtube.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://185.215.113.46/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
http://185.215.113.46/cost/fu.exe
unknown
http://185.215.113.46/mine/plaza.exeb
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
https://www.amazon.com/
unknown
https://fpn.firefox.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://t.me/RiseProSUPPORT
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
https://www.youtube.com(
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://www.groupon.com/?utm_source=google&utm_medium=cpc&utm_campaign=us_dt_sea_ggl_txt_smp_sr_cbp_
unknown
https://ipinfo.io/
unknown
https://ipinfo.io:443/widget/demo/81.181.57.74
unknown
http://185.215.113.46/mine/plaza.exeuu
unknown
https://t.me/risepro_botRomaniaG2
unknown
https://accounts.google.comC:
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
http://185.215.113.46/cost/well.exe
unknown
https://www.iqiyi.com/
unknown
http://r3.o.lencr.org
unknown
http://crl.pki.goog/gsr1/gsr1.crl0;
unknown
http://185.215.113.46/mine/amert.exeg
unknown
http://185.215.113.46/cost/ladas.exeA
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
http://185.215.113.46/cost/ladas.exe3
unknown
https://www.youtube.comC:
unknown
http://185.215.113.46/mine/amert.exeS
unknown
http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://185.215.113.46/cost/ladas.exeb
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://185.215.113.46/cost/ladas.exeT
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
http://185.215.113.46/mine/plaza.exenu
unknown
http://185.215.113.46/mine/plaza.exe
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
http://185.215.113.46/cost/ladas.exe17_
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
http://www.youtube.com
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.amazon.co.uk/
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgThi
unknown
http://185.215.113.46/cost/ladas.exev
unknown
http://185.215.113.46/cost/ladas.exet
unknown
http://json-schema.org/draft-07/schema#-
unknown
http://pki.goog/gsr1/gsr1.crt02
unknown
https://www.wykop.pl/
unknown
http://185.215.113.46/cost/fu.exert
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://accounts.google.com/https://accounts.google.com/
unknown
http://185.215.113.46/mine/plaza.exe6
unknown
http://185.215.113.46/mine/plaza.exe7
unknown
https://developer.mozilla.org/docs/Web/API/Element/setPointerCapture
unknown
https://t.me/risepro_bot
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
74.125.138.113
unknown
United States
13.107.6.158
unknown
United States
204.79.197.200
unknown
United States
185.215.113.46
unknown
Portugal
192.168.2.8
unknown
unknown
172.253.124.106
unknown
United States
173.194.53.40
unknown
United States
172.217.133.10
unknown
United States
173.194.219.94
unknown
United States
173.194.143.137
unknown
United States
34.117.237.239
unknown
United States
173.194.219.154
unknown
United States
18.173.166.77
unknown
United States
162.159.61.3
unknown
United States
173.194.7.10
unknown
United States
13.107.213.41
unknown
United States
40.71.99.188
unknown
United States
204.79.197.239
unknown
United States
31.13.88.13
unknown
Ireland
74.125.138.94
unknown
United States
18.160.60.4
unknown
United States
34.120.208.123
unknown
United States
34.120.115.102
unknown
United States
64.233.177.95
unknown
United States
1.1.1.1
unknown
Australia
74.125.138.149
unknown
United States
172.253.124.132
unknown
United States
64.233.176.84
unknown
United States
172.217.215.136
unknown
United States
13.107.21.239
unknown
United States
52.10.159.154
unknown
United States
34.120.158.37
unknown
United States
31.13.66.19
unknown
Ireland
173.194.219.104
unknown
United States
173.194.219.147
unknown
United States
13.107.42.16
unknown
United States
13.107.42.14
unknown
United States
20.88.206.205
unknown
United States
239.255.255.250
unknown
Reserved
108.177.122.94
unknown
United States
34.160.144.191
unknown
United States
142.251.15.119
unknown
United States
108.177.122.95
unknown
United States
74.125.138.101
unknown
United States
127.0.0.1
unknown
unknown
64.233.185.147
unknown
United States
74.125.1.166
unknown
United States
34.117.186.192
unknown
United States
31.13.65.36
unknown
Ireland
172.217.135.201
unknown
United States
64.233.176.94
unknown
United States
152.195.19.97
unknown
United States
13.107.21.200
unknown
United States
142.250.105.154
unknown
United States
34.117.188.166
unknown
United States
172.217.135.170
unknown
United States
64.233.177.113
unknown
United States
172.217.215.93
unknown
United States
142.250.9.95
unknown
United States
64.233.185.119
unknown
United States
108.177.122.84
unknown
United States
31.13.88.35
unknown
Ireland
142.250.9.113
unknown
United States
172.64.41.3
unknown
United States
172.217.215.95
unknown
United States
23.209.36.201
unknown
United States
74.125.136.94
unknown
United States
172.217.215.113
unknown
United States
142.250.105.94
unknown
United States
74.125.136.95
unknown
United States
142.250.105.95
unknown
United States
104.76.210.77
unknown
United States
172.253.124.119
unknown
United States
34.149.100.209
unknown
United States
172.253.124.91
unknown
United States
34.107.243.93
unknown
United States
193.233.132.62
unknown
Russian Federation
142.250.105.149
unknown
United States
31.13.65.7
unknown
Ireland
34.107.221.82
unknown
United States
172.253.124.95
unknown
United States
35.244.181.201
unknown
United States
23.34.82.79
unknown
United States
64.233.185.93
unknown
United States
74.125.155.166
unknown
United States
142.251.15.84
unknown
United States
64.233.185.95
unknown
United States
52.12.189.203
unknown
United States
23.101.168.44
unknown
United States
142.250.9.102
unknown
United States
74.125.136.132
unknown
United States
172.217.215.84
unknown
United States
There are 82 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV131
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328844
WindowTabManagerFileMappingId
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 183 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DC1000
unkown
page execute and read and write
malicious
E1000
unkown
page execute and read and write
malicious
E1000
unkown
page execute and read and write
malicious
4890000
direct allocation
page read and write
malicious
49C0000
direct allocation
page read and write
malicious
4690000
direct allocation
page read and write
malicious
4641000
heap
page read and write
5B8B000
heap
page read and write
5B50000
trusted library allocation
page read and write
6CBE000
heap
page read and write
6671000
heap
page read and write
2001BEDA000
trusted library allocation
page read and write
20019DF2000
trusted library allocation
page read and write
200211DF000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
20021569000
trusted library allocation
page read and write
20018487000
trusted library allocation
page read and write
5CD0000
heap
page read and write
5E51000
heap
page read and write
2001A854000
trusted library allocation
page read and write
2001B95D000
trusted library allocation
page read and write
26D26D23000
heap
page read and write
6E4000
heap
page read and write
2880C4AD000
heap
page read and write
4E71000
heap
page read and write
20021DF1000
trusted library allocation
page read and write
200176EF000
trusted library allocation
page read and write
1DF1A570000
heap
page read and write
20017C5C000
trusted library allocation
page read and write
20019EBE000
trusted library allocation
page read and write
5A0E000
stack
page read and write
20017858000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
26D26D39000
heap
page read and write
12FC000
stack
page read and write
4E71000
heap
page read and write
6601000
heap
page read and write
20017332000
trusted library allocation
page read and write
28B0003F000
trusted library allocation
page read and write
26D2687D000
trusted library allocation
page read and write
1745000
heap
page read and write
62FD000
stack
page read and write
D5C000
heap
page read and write
2001C28F000
trusted library allocation
page read and write
20021579000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880E898000
trusted library allocation
page read and write
2880C4D6000
heap
page read and write
2001C1B1000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
2001A86E000
trusted library allocation
page read and write
8C0000
unkown
page read and write
20015979000
trusted library allocation
page read and write
4E91000
heap
page read and write
CCD000
unkown
page execute and write copy
2001F593000
trusted library allocation
page read and write
26D26D1E000
heap
page read and write
20017FAE000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
2001F5FD000
trusted library allocation
page read and write
20014855000
heap
page read and write
6E5000
heap
page read and write
2880C4DB000
heap
page read and write
5DCC000
heap
page read and write
26D26D4E000
heap
page read and write
200134E0000
trusted library allocation
page read and write
6E4000
heap
page read and write
D65000
heap
page read and write
200176C5000
trusted library allocation
page read and write
26D26D17000
heap
page read and write
200147A8000
trusted library allocation
page read and write
6E4000
heap
page read and write
20021139000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
26D26D5A000
heap
page read and write
200176DA000
trusted library allocation
page read and write
D60000
heap
page read and write
6591000
heap
page read and write
5B8D000
heap
page read and write
200211FB000
trusted library allocation
page read and write
2001B9F0000
trusted library allocation
page read and write
20014843000
heap
page read and write
462E000
stack
page read and write
717C000
heap
page read and write
20021E59000
trusted library allocation
page read and write
2001484C000
heap
page read and write
6E4000
heap
page read and write
2001F5CF000
trusted library allocation
page read and write
6631000
heap
page read and write
26D26D32000
heap
page read and write
20019E7E000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
CEE000
heap
page read and write
26D27098000
trusted library allocation
page read and write
2880BEFB000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26D31000
heap
page read and write
2001767F000
trusted library allocation
page read and write
2001C16F000
trusted library allocation
page read and write
20019DCF000
trusted library allocation
page read and write
4B90000
direct allocation
page read and write
6591000
heap
page read and write
5C4C000
heap
page read and write
6E4000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
20019EC4000
trusted library allocation
page read and write
4C2E000
stack
page read and write
26D26D4A000
heap
page read and write
57C0000
trusted library allocation
page execute and read and write
2001479D000
trusted library allocation
page read and write
2001BEE0000
trusted library allocation
page read and write
4E91000
heap
page read and write
20019BB4000
trusted library allocation
page read and write
26D268D3000
trusted library allocation
page read and write
5EB1000
heap
page read and write
2001F9E8000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
63CB000
heap
page read and write
20021592000
trusted library allocation
page read and write
200194D1000
trusted library allocation
page read and write
7DC0000
heap
page read and write
4641000
heap
page read and write
20014871000
heap
page read and write
1744000
heap
page read and write
30D0000
direct allocation
page read and write
CA0000
direct allocation
page read and write
200189BA000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
1740000
heap
page read and write
6601000
heap
page read and write
657F000
heap
page read and write
20017363000
trusted library allocation
page read and write
2001C202000
trusted library allocation
page read and write
6E5000
heap
page read and write
20021DA9000
trusted library allocation
page read and write
5D06000
heap
page read and write
26D26D4B000
heap
page read and write
2002108A000
trusted library allocation
page read and write
5C80000
heap
page read and write
677E000
heap
page read and write
62FA000
heap
page read and write
4E35000
heap
page read and write
47CF000
stack
page read and write
5D38000
heap
page read and write
4641000
heap
page read and write
1744000
heap
page read and write
2880C4BA000
heap
page read and write
2880C492000
heap
page read and write
2001BCFE000
trusted library allocation
page read and write
26D26D21000
heap
page read and write
200134F6000
trusted library allocation
page read and write
26D2706A000
trusted library allocation
page read and write
26D26F80000
trusted library allocation
page read and write
D84000
heap
page read and write
2700003F000
trusted library allocation
page read and write
5FC6000
heap
page read and write
663F000
heap
page read and write
6CBF000
heap
page read and write
2880CB81000
trusted library allocation
page read and write
6BF7000
heap
page read and write
7CF000
stack
page read and write
20020FF7000
trusted library allocation
page read and write
150E000
heap
page read and write
109A000
unkown
page execute and read and write
6571000
heap
page read and write
5F80000
trusted library allocation
page read and write
2001F869000
trusted library allocation
page read and write
15E0000
heap
page read and write
2880BFFD000
trusted library allocation
page read and write
14A4000
heap
page read and write
30D0000
direct allocation
page read and write
D4F000
heap
page read and write
200211DF000
trusted library allocation
page read and write
4BFE000
stack
page read and write
2001F9EF000
trusted library allocation
page read and write
200188C7000
trusted library allocation
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
20014843000
heap
page read and write
26D2685F000
trusted library allocation
page read and write
6E4000
heap
page read and write
6601000
heap
page read and write
200134F6000
trusted library allocation
page read and write
20021545000
trusted library allocation
page read and write
5CF5000
heap
page read and write
840000
direct allocation
page read and write
2880C492000
heap
page read and write
26D26D2D000
heap
page read and write
2001BEDA000
trusted library allocation
page read and write
D7A000
heap
page read and write
2002199D000
trusted library allocation
page read and write
4E91000
heap
page read and write
20019AE6000
trusted library allocation
page read and write
298B6870000
heap
page read and write
46F0000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
65D0000
heap
page read and write
367E000
stack
page read and write
4641000
heap
page read and write
200176CF000
trusted library allocation
page read and write
200146A9000
trusted library allocation
page read and write
D55000
heap
page read and write
5CE0000
heap
page read and write
20014845000
heap
page read and write
20016DCC000
trusted library allocation
page read and write
2001484C000
heap
page read and write
4641000
heap
page read and write
2880C4AD000
heap
page read and write
2880C4DB000
heap
page read and write
20019EC0000
trusted library allocation
page read and write
2880C4BD000
heap
page read and write
660A000
heap
page read and write
20017FE4000
trusted library allocation
page read and write
20017B96000
trusted library allocation
page read and write
26D26D4D000
heap
page read and write
6E4000
heap
page read and write
663F000
heap
page read and write
2001484E000
heap
page read and write
5C78000
heap
page read and write
2001A8FE000
trusted library allocation
page read and write
2001F886000
trusted library allocation
page read and write
FB4000
heap
page read and write
6E4000
heap
page read and write
20021B0B000
trusted library allocation
page read and write
A31000
unkown
page execute and write copy
2001C014000
trusted library allocation
page read and write
20017C5C000
trusted library allocation
page read and write
2880C4D6000
heap
page read and write
20014859000
heap
page read and write
4B40000
trusted library allocation
page read and write
200185C2000
trusted library allocation
page read and write
63A3000
heap
page read and write
33CF000
stack
page read and write
2001BCA5000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
1744000
heap
page read and write
DC8000
heap
page read and write
20014845000
heap
page read and write
26D26D19000
heap
page read and write
26D26D18000
heap
page read and write
20021B73000
trusted library allocation
page read and write
200212F6000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
2001F5E4000
trusted library allocation
page read and write
20025B9B000
trusted library allocation
page read and write
1CACB1A5000
heap
page read and write
660A000
heap
page read and write
38FF000
stack
page read and write
2001F503000
trusted library allocation
page read and write
20019DCF000
trusted library allocation
page read and write
5C4C000
heap
page read and write
5A5000
unkown
page execute and read and write
2001AEF7000
trusted library allocation
page read and write
26D26D31000
heap
page read and write
20014643000
trusted library allocation
page read and write
5CF5000
heap
page read and write
2FFF000
stack
page read and write
20014846000
heap
page read and write
148000
unkown
page execute and read and write
26D26D1B000
heap
page read and write
6631000
heap
page read and write
5EB1000
heap
page read and write
20021EA8000
trusted library allocation
page read and write
2001A8EA000
trusted library allocation
page read and write
DB4000
heap
page read and write
5B50000
trusted library allocation
page read and write
26D26D49000
heap
page read and write
2001F9B5000
trusted library allocation
page read and write
4E91000
heap
page read and write
9B0000
heap
page read and write
5E54000
heap
page read and write
4C20000
direct allocation
page execute and read and write
2880BF82000
trusted library allocation
page read and write
2001BF9B000
trusted library allocation
page read and write
1DEAF4F0000
heap
page read and write
660A000
heap
page read and write
2001F600000
trusted library allocation
page read and write
6591000
heap
page read and write
B77000
unkown
page write copy
54A0000
direct allocation
page execute and read and write
200219E6000
trusted library allocation
page read and write
3F0F000
stack
page read and write
200195FE000
trusted library allocation
page read and write
4E91000
heap
page read and write
2001733B000
trusted library allocation
page read and write
4E71000
heap
page read and write
DCC000
heap
page read and write
231DDDBC000
heap
page read and write
1CAC9570000
heap
page read and write
665C000
heap
page read and write
20019E2B000
trusted library allocation
page read and write
2001484B000
heap
page read and write
200176F5000
trusted library allocation
page read and write
20018438000
trusted library allocation
page read and write
2001484D000
heap
page read and write
2880C492000
heap
page read and write
200199CF000
trusted library allocation
page read and write
2001A86E000
trusted library allocation
page read and write
6712000
heap
page read and write
5B8F000
heap
page read and write
200173E6000
trusted library allocation
page read and write
6E4000
heap
page read and write
20021BCE000
trusted library allocation
page read and write
20014655000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
2880C487000
heap
page read and write
20021EFE000
trusted library allocation
page read and write
200146F3000
trusted library allocation
page read and write
20014864000
heap
page read and write
26D26D1D000
heap
page read and write
2001C212000
trusted library allocation
page read and write
6600000
heap
page read and write
20017FF6000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
20014763000
trusted library allocation
page read and write
DC8000
heap
page read and write
3B3F000
stack
page read and write
37FE000
stack
page read and write
4641000
heap
page read and write
20020FDE000
trusted library allocation
page read and write
4850000
trusted library allocation
page read and write
20020EBF000
trusted library allocation
page read and write
5FDB000
heap
page read and write
20015989000
trusted library allocation
page read and write
20016EF3000
trusted library allocation
page read and write
4641000
heap
page read and write
146000
unkown
page read and write
200213E3000
trusted library allocation
page read and write
6607000
heap
page read and write
2880C4DB000
heap
page read and write
5457000
heap
page read and write
20016DF7000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
30B0000
heap
page read and write
2001F9F6000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
20017F39000
trusted library allocation
page read and write
2001C0C5000
trusted library allocation
page read and write
20014685000
trusted library allocation
page read and write
30ED000
heap
page read and write
4C00000
remote allocation
page read and write
6712000
heap
page read and write
4680000
direct allocation
page read and write
20014880000
heap
page read and write
2880BBDF000
trusted library allocation
page read and write
2001484E000
heap
page read and write
26D26D22000
heap
page read and write
20017FB7000
trusted library allocation
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
2002115F000
trusted library allocation
page read and write
6607000
heap
page read and write
3B9000
unkown
page execute and read and write
1CAC9890000
heap
page read and write
2001488F000
heap
page read and write
200134F5000
trusted library allocation
page read and write
2880C493000
heap
page read and write
4E71000
heap
page read and write
26D26D80000
heap
page read and write
5D81000
heap
page read and write
26D267F6000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
628C000
heap
page read and write
20021DFB000
trusted library allocation
page read and write
4641000
heap
page read and write
20019E8E000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
26D26D4A000
heap
page read and write
5B8F000
heap
page read and write
E28000
unkown
page execute and read and write
20019EEF000
trusted library allocation
page read and write
200178D1000
trusted library allocation
page read and write
6628000
heap
page read and write
2001465B000
trusted library allocation
page read and write
661D000
heap
page read and write
5C31000
heap
page read and write
20021133000
trusted library allocation
page read and write
D6F000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
36EE000
stack
page read and write
20025B6F000
trusted library allocation
page read and write
2001772B000
trusted library allocation
page read and write
4E91000
heap
page read and write
5C47000
heap
page read and write
5770000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26D5A000
heap
page read and write
2880C4AB000
heap
page read and write
20021DC2000
trusted library allocation
page read and write
A7005FE000
stack
page read and write
D65000
heap
page read and write
3ABE000
stack
page read and write
4AC0000
direct allocation
page read and write
2880BF9B000
trusted library allocation
page read and write
2880C492000
heap
page read and write
20019EF8000
trusted library allocation
page read and write
3CBF000
stack
page read and write
6649000
heap
page read and write
5CBC000
heap
page read and write
2880E87B000
trusted library allocation
page read and write
2001F5D7000
trusted library allocation
page read and write
336E000
stack
page read and write
6E4000
heap
page read and write
20019EE3000
trusted library allocation
page read and write
2880E725000
trusted library allocation
page read and write
3D0E000
stack
page read and write
2001A88D000
trusted library allocation
page read and write
2001F5C0000
trusted library allocation
page read and write
2001BCF8000
trusted library allocation
page read and write
2001B377000
trusted library allocation
page read and write
4641000
heap
page read and write
52ED000
stack
page read and write
2001733A000
trusted library allocation
page read and write
10B7000
unkown
page execute and write copy
20013441000
trusted library allocation
page read and write
6631000
heap
page read and write
6E4000
heap
page read and write
200212D9000
trusted library allocation
page read and write
2880C492000
heap
page read and write
26D26FF2000
trusted library allocation
page read and write
20017CF2000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
26D26D1D000
heap
page read and write
2880C48B000
heap
page read and write
1744000
heap
page read and write
4641000
heap
page read and write
2001F9BA000
trusted library allocation
page read and write
20021B67000
trusted library allocation
page read and write
5B8D000
heap
page read and write
200176BF000
trusted library allocation
page read and write
4641000
heap
page read and write
6607000
heap
page read and write
2001F8E5000
trusted library allocation
page read and write
58FC000
heap
page read and write
20021DAD000
trusted library allocation
page read and write
D90000
heap
page read and write
28811327000
trusted library allocation
page read and write
200195C9000
trusted library allocation
page read and write
2001F586000
trusted library allocation
page read and write
20017FBF000
trusted library allocation
page read and write
200146E0000
trusted library allocation
page read and write
20019DB8000
trusted library allocation
page read and write
20013471000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
1971000
heap
page read and write
26D26D5A000
heap
page read and write
2001F510000
trusted library allocation
page read and write
4B38000
stack
page read and write
20014875000
heap
page read and write
20017C63000
trusted library allocation
page read and write
D5B000
heap
page read and write
4E71000
heap
page read and write
26D26D18000
heap
page read and write
5F87000
heap
page read and write
5CAE000
stack
page read and write
5C3F000
heap
page read and write
20021137000
trusted library allocation
page read and write
2870000
heap
page read and write
20014661000
trusted library allocation
page read and write
D5B000
heap
page read and write
4641000
heap
page read and write
200147F3000
trusted library allocation
page read and write
20016D5F000
trusted library allocation
page read and write
20024A7F000
trusted library allocation
page read and write
26D26D4F000
heap
page read and write
5EC5000
heap
page read and write
DB4000
heap
page read and write
5310000
direct allocation
page execute and read and write
6BFD000
heap
page read and write
6E4000
heap
page read and write
2CCF000
stack
page read and write
20014845000
heap
page read and write
200176A9000
trusted library allocation
page read and write
20017C6A000
trusted library allocation
page read and write
4641000
heap
page read and write
2880C491000
heap
page read and write
DC8000
heap
page read and write
447F000
stack
page read and write
2001769F000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
20025B8F000
trusted library allocation
page read and write
1CACB1A5000
heap
page read and write
2001B43C000
trusted library allocation
page read and write
14EE000
stack
page read and write
6FBE000
heap
page read and write
26D26D62000
heap
page read and write
28802278000
heap
page read and write
4880000
direct allocation
page execute and read and write
6628000
heap
page read and write
2001F59B000
trusted library allocation
page read and write
20017C61000
trusted library allocation
page read and write
6E4000
heap
page read and write
15C7000
heap
page read and write
5F24000
heap
page read and write
20014844000
heap
page read and write
20019E66000
trusted library allocation
page read and write
20017F68000
trusted library allocation
page read and write
6E4000
heap
page read and write
200176C5000
trusted library allocation
page read and write
5B81000
heap
page read and write
2001F532000
trusted library allocation
page read and write
26D26FCB000
trusted library allocation
page read and write
26D26D23000
heap
page read and write
2001F59F000
trusted library allocation
page read and write
4701000
heap
page read and write
3D7000
unkown
page write copy
1744000
heap
page read and write
20019EC5000
trusted library allocation
page read and write
20020EDC000
trusted library allocation
page read and write
F1C49D8000
stack
page read and write
2001F5BD000
trusted library allocation
page read and write
1260000
unkown
page execute and read and write
2001F59F000
trusted library allocation
page read and write
5C3C000
heap
page read and write
200189C3000
trusted library allocation
page read and write
6671000
heap
page read and write
20020EAE000
trusted library allocation
page read and write
6F62000
heap
page read and write
4D11000
heap
page read and write
2001F515000
trusted library allocation
page read and write
660A000
heap
page read and write
2F0E000
stack
page read and write
2001484B000
heap
page read and write
4D60000
direct allocation
page execute and read and write
20021BA9000
trusted library allocation
page read and write
6E4000
heap
page read and write
200194D3000
trusted library allocation
page read and write
6446000
heap
page read and write
200176EF000
trusted library allocation
page read and write
200195EC000
trusted library allocation
page read and write
200134F6000
trusted library allocation
page read and write
20019C8E000
trusted library allocation
page read and write
4701000
heap
page read and write
6770000
heap
page read and write
200212EB000
trusted library allocation
page read and write
2880C4AB000
heap
page read and write
D52000
heap
page read and write
26D26D1D000
heap
page read and write
EA1000
heap
page read and write
69F000
unkown
page execute and read and write
20019C9B000
trusted library allocation
page read and write
CCD000
unkown
page execute and read and write
2001A887000
trusted library allocation
page read and write
31FF000
stack
page read and write
2880BE76000
trusted library allocation
page read and write
2001A878000
trusted library allocation
page read and write
20017E9E000
trusted library allocation
page read and write
1744000
heap
page read and write
2880E6C3000
trusted library allocation
page read and write
603F000
heap
page read and write
20014860000
heap
page read and write
4E80000
direct allocation
page read and write
14A4000
heap
page read and write
4C20000
direct allocation
page execute and read and write
2001345C000
trusted library allocation
page read and write
20019EC4000
trusted library allocation
page read and write
4E71000
heap
page read and write
26D26D5A000
heap
page read and write
5EFD000
heap
page read and write
2001B2F5000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
60BD000
stack
page read and write
32EF000
stack
page read and write
20017699000
trusted library allocation
page read and write
4641000
heap
page read and write
5E93000
heap
page read and write
20019CDA000
trusted library allocation
page read and write
61C7000
heap
page read and write
20017F31000
trusted library allocation
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
6601000
heap
page read and write
6607000
heap
page read and write
D73000
heap
page read and write
200176F5000
trusted library allocation
page read and write
20019DD1000
trusted library allocation
page read and write
FB4000
heap
page read and write
4E91000
heap
page read and write
5740000
direct allocation
page execute and read and write
CCE000
unkown
page execute and write copy
2001767F000
trusted library allocation
page read and write
20024A6F000
trusted library allocation
page read and write
5A5F000
unkown
page read and write
26D26D5A000
heap
page read and write
2001F868000
trusted library allocation
page read and write
200176FD000
trusted library allocation
page read and write
1CAC9604000
heap
page read and write
6641000
heap
page read and write
26D26D5A000
heap
page read and write
5481000
heap
page read and write
298B6B0A000
trusted library allocation
page read and write
26D26D23000
heap
page read and write
578D000
stack
page read and write
4641000
heap
page read and write
20021D90000
trusted library allocation
page read and write
26D26D63000
heap
page read and write
26D26D2D000
heap
page read and write
20019CD0000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
20021E9E000
trusted library allocation
page read and write
6E4000
heap
page read and write
5FDB000
heap
page read and write
26D26D21000
heap
page read and write
20020EE1000
trusted library allocation
page read and write
5CF5000
heap
page read and write
2001F57A000
trusted library allocation
page read and write
4D11000
heap
page read and write
483BFE000
stack
page read and write
D84000
heap
page read and write
2001F57F000
trusted library allocation
page read and write
CCE000
unkown
page execute and write copy
4641000
heap
page read and write
62F3000
heap
page read and write
15E3000
heap
page read and write
26D26D17000
heap
page read and write
6607000
heap
page read and write
20017C4C000
trusted library allocation
page read and write
5BF8000
heap
page read and write
20021981000
trusted library allocation
page read and write
4D11000
heap
page read and write
D7A000
heap
page read and write
2880E6F7000
trusted library allocation
page read and write
1744000
heap
page read and write
66BC000
heap
page read and write
4641000
heap
page read and write
5C83000
heap
page read and write
20013455000
trusted library allocation
page read and write
DCD000
heap
page read and write
426E000
stack
page read and write
4E91000
heap
page read and write
2001484B000
heap
page read and write
6692000
heap
page read and write
200176C5000
trusted library allocation
page read and write
15E1000
heap
page read and write
924000
heap
page read and write
20021D8E000
trusted library allocation
page read and write
4701000
heap
page read and write
26D26D4A000
heap
page read and write
2001BEF9000
trusted library allocation
page read and write
6E4000
heap
page read and write
4641000
heap
page read and write
200176C5000
trusted library allocation
page read and write
E0000
unkown
page read and write
11CBCBE04000
trusted library allocation
page read and write
6634000
heap
page read and write
200176AC000
trusted library allocation
page read and write
6E4000
heap
page read and write
26D27808000
trusted library allocation
page read and write
2001BEB6000
trusted library allocation
page read and write
4641000
heap
page read and write
5EF0000
heap
page read and write
4719000
heap
page read and write
4641000
heap
page read and write
26D26D18000
heap
page read and write
D80000
heap
page read and write
2001B231000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
6E4000
heap
page read and write
2001F99D000
trusted library allocation
page read and write
61C3000
heap
page read and write
FB4000
heap
page read and write
2001A883000
trusted library allocation
page read and write
2001C10B000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
55DD000
trusted library allocation
page execute and read and write
200189FE000
trusted library allocation
page read and write
6658000
heap
page read and write
2001345C000
trusted library allocation
page read and write
2001768F000
trusted library allocation
page read and write
26D26457000
trusted library allocation
page read and write
D52000
heap
page read and write
D5B000
heap
page read and write
26D2740F000
trusted library allocation
page read and write
D73000
heap
page read and write
29B0000
direct allocation
page execute and read and write
20014836000
heap
page read and write
15C4000
heap
page read and write
2A4E000
stack
page read and write
5CD1000
heap
page read and write
6E4000
heap
page read and write
4D11000
heap
page read and write
5470000
direct allocation
page read and write
20021D5A000
trusted library allocation
page read and write
20020E7C000
trusted library allocation
page read and write
545F000
stack
page read and write
20019ED5000
trusted library allocation
page read and write
20021932000
trusted library allocation
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
628C000
heap
page read and write
36BF000
stack
page read and write
15C0000
heap
page read and write
26D26D1A000
heap
page read and write
2001F973000
trusted library allocation
page read and write
663E000
heap
page read and write
518E000
stack
page read and write
200147BE000
trusted library allocation
page read and write
6607000
heap
page read and write
66E1000
heap
page read and write
20014779000
trusted library allocation
page read and write
2001F948000
trusted library allocation
page read and write
20017C4C000
trusted library allocation
page read and write
6628000
heap
page read and write
D72000
heap
page read and write
3D7000
unkown
page write copy
20017300000
trusted library allocation
page read and write
5CD3000
heap
page read and write
6F61000
heap
page read and write
1744000
heap
page read and write
5EFF000
stack
page read and write
20024A75000
trusted library allocation
page read and write
298E000
stack
page read and write
2001F990000
trusted library allocation
page read and write
2001F99B000
trusted library allocation
page read and write
15C0000
heap
page read and write
2001A878000
trusted library allocation
page read and write
6E5000
heap
page read and write
20017FE1000
trusted library allocation
page read and write
20021DCA000
trusted library allocation
page read and write
20021E9B000
trusted library allocation
page read and write
661D000
heap
page read and write
6628000
heap
page read and write
2880C4BA000
heap
page read and write
20014750000
trusted library allocation
page read and write
2880BFFA000
trusted library allocation
page read and write
2001B227000
trusted library allocation
page read and write
303E000
stack
page read and write
4680000
direct allocation
page read and write
1744000
heap
page read and write
65B1000
heap
page read and write
26D26D44000
heap
page read and write
4D00000
direct allocation
page read and write
5B8C000
heap
page read and write
4641000
heap
page read and write
2001C110000
trusted library allocation
page read and write
2FE0000
heap
page read and write
2001476E000
trusted library allocation
page read and write
2001893D000
trusted library allocation
page read and write
2001BE90000
trusted library allocation
page read and write
20017662000
trusted library allocation
page read and write
20025BCE000
trusted library allocation
page read and write
6E5000
heap
page read and write
2880C486000
heap
page read and write
20020E1C000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
20014694000
trusted library allocation
page read and write
34AB000
stack
page read and write
17CF000
stack
page read and write
2001C20D000
trusted library allocation
page read and write
20020EDF000
trusted library allocation
page read and write
6355000
heap
page read and write
6E4000
heap
page read and write
20021976000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
5F86000
heap
page read and write
42CF000
stack
page read and write
660A000
heap
page read and write
6E4000
heap
page read and write
20014842000
heap
page read and write
20017333000
trusted library allocation
page read and write
65B1000
heap
page read and write
20019EB7000
trusted library allocation
page read and write
DB4000
heap
page read and write
4641000
heap
page read and write
60C0000
heap
page read and write
CA0000
direct allocation
page read and write
2880C4D6000
heap
page read and write
D6E000
heap
page read and write
4E71000
heap
page read and write
6870000
heap
page read and write
19A5000
heap
page read and write
2880CB88000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
200195FE000
trusted library allocation
page read and write
6E4000
heap
page read and write
20014854000
heap
page read and write
20016DD4000
trusted library allocation
page read and write
2001F9C8000
trusted library allocation
page read and write
6607000
heap
page read and write
2A0000
unkown
page readonly
4A00000
direct allocation
page execute and read and write
20021D66000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
2001A8EA000
trusted library allocation
page read and write
5D66000
heap
page read and write
20014843000
heap
page read and write
E9A563E000
unkown
page readonly
5470000
direct allocation
page read and write
26D26F1A000
trusted library allocation
page read and write
20019CBB000
trusted library allocation
page read and write
20019DAD000
trusted library allocation
page read and write
CBF000
unkown
page execute and read and write
6E4000
heap
page read and write
4641000
heap
page read and write
20017CEB000
trusted library allocation
page read and write
2001C106000
trusted library allocation
page read and write
1DF1A550000
heap
page read and write
6E4000
heap
page read and write
20019EA6000
trusted library allocation
page read and write
8CDA000
heap
page read and write
2001F996000
trusted library allocation
page read and write
2880C4D9000
heap
page read and write
200176F5000
trusted library allocation
page read and write
20018977000
trusted library allocation
page read and write
4641000
heap
page read and write
663E000
heap
page read and write
30D0000
direct allocation
page read and write
2001734B000
trusted library allocation
page read and write
2001848B000
trusted library allocation
page read and write
2001C076000
trusted library allocation
page read and write
5F3E000
stack
page read and write
58DF000
stack
page read and write
20020E95000
trusted library allocation
page read and write
2880E7F2000
trusted library allocation
page read and write
13D0000
heap
page read and write
2A7F000
stack
page read and write
2880C4DB000
heap
page read and write
200195E9000
trusted library allocation
page read and write
6E4000
heap
page read and write
20019DFB000
trusted library allocation
page read and write
3A8E000
stack
page read and write
661D000
heap
page read and write
26D2702C000
trusted library allocation
page read and write
2001F584000
trusted library allocation
page read and write
20014842000
heap
page read and write
200147BE000
trusted library allocation
page read and write
200146DB000
trusted library allocation
page read and write
231DC0B0000
heap
page read and write
470A000
heap
page read and write
871000
unkown
page execute read
26D26D18000
heap
page read and write
26D26D3D000
heap
page read and write
4B00000
direct allocation
page execute and read and write
5D33000
heap
page read and write
5DCC000
heap
page read and write
660A000
heap
page read and write
4641000
heap
page read and write
6E4000
heap
page read and write
2880E698000
trusted library allocation
page read and write
51B0000
direct allocation
page read and write
2001F5FD000
trusted library allocation
page read and write
2001A89A000
trusted library allocation
page read and write
8C0000
unkown
page readonly
2001B403000
trusted library allocation
page read and write
26D29397000
trusted library allocation
page read and write
3CBE000
stack
page read and write
2001A8C1000
trusted library allocation
page read and write
20014845000
heap
page read and write
26D2938C000
trusted library allocation
page read and write
20020FFA000
trusted library allocation
page read and write
20014655000
trusted library allocation
page read and write
35EE000
stack
page read and write
4E71000
heap
page read and write
6440000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
6729000
heap
page read and write
2880E695000
trusted library allocation
page read and write
644C000
heap
page read and write
2001485A000
heap
page read and write
20019CC0000
trusted library allocation
page read and write
41FE000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
5B5B000
heap
page read and write
200176B9000
trusted library allocation
page read and write
200176A6000
trusted library allocation
page read and write
661F000
heap
page read and write
2001F9EA000
trusted library allocation
page read and write
5CF9000
heap
page read and write
26D26D4B000
heap
page read and write
65A4000
heap
page read and write
200176FD000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
6E4000
heap
page read and write
3DBF000
stack
page read and write
43AE000
stack
page read and write
944000
unkown
page readonly
2001A8BC000
trusted library allocation
page read and write
65A4000
heap
page read and write
26D26D31000
heap
page read and write
D67000
heap
page read and write
1744000
heap
page read and write
5B8D000
heap
page read and write
15E0000
heap
page read and write
1744000
heap
page read and write
2001B9CC000
trusted library allocation
page read and write
6580000
heap
page read and write
6E4000
heap
page read and write
4D11000
heap
page read and write
4C20000
direct allocation
page execute and read and write
26D26D3C000
heap
page read and write
660A000
heap
page read and write
20020FDE000
trusted library allocation
page read and write
200173E9000
trusted library allocation
page read and write
20021DC4000
trusted library allocation
page read and write
20019D6C000
trusted library allocation
page read and write
5D39000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
6671000
heap
page read and write
E84000
unkown
page execute and write copy
4641000
heap
page read and write
1744000
heap
page read and write
20024A3C000
trusted library allocation
page read and write
20017844000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
4641000
heap
page read and write
20024A23000
trusted library allocation
page read and write
200247A5000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
4641000
heap
page read and write
2880C4AC000
heap
page read and write
2880E7EC000
trusted library allocation
page read and write
5320000
direct allocation
page read and write
F1C3F9E000
stack
page read and write
2880C4AD000
heap
page read and write
2001B47A000
trusted library allocation
page read and write
26D293BC000
trusted library allocation
page read and write
D5B000
heap
page read and write
5B50000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
2001474D000
trusted library allocation
page read and write
20021D33000
trusted library allocation
page read and write
4701000
heap
page read and write
2001A854000
trusted library allocation
page read and write
2001F5EC000
trusted library allocation
page read and write
20014850000
heap
page read and write
2001BCCA000
trusted library allocation
page read and write
26D26D16000
heap
page read and write
6607000
heap
page read and write
2001F83F000
trusted library allocation
page read and write
2001B39E000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
200219CD000
trusted library allocation
page read and write
6635000
heap
page read and write
6633000
heap
page read and write
36CE000
stack
page read and write
200212F2000
trusted library allocation
page read and write
20021DE4000
trusted library allocation
page read and write
6CB5000
heap
page read and write
26D27021000
trusted library allocation
page read and write
2001F5C0000
trusted library allocation
page read and write
2001F9B2000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
20021DF0000
trusted library allocation
page read and write
26D2938A000
trusted library allocation
page read and write
2001F5CB000
trusted library allocation
page read and write
20017BC9000
trusted library allocation
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4E71000
heap
page read and write
4641000
heap
page read and write
2CFE000
stack
page read and write
26D2740A000
trusted library allocation
page read and write
8C0000
unkown
page read and write
2880C490000
heap
page read and write
20017390000
trusted library allocation
page read and write
1745000
heap
page read and write
D70000
direct allocation
page read and write
6274000
heap
page read and write
26D26D4A000
heap
page read and write
200176C5000
trusted library allocation
page read and write
A3C000
stack
page read and write
69FF000
heap
page read and write
2001C0B1000
trusted library allocation
page read and write
200173E8000
trusted library allocation
page read and write
6E4000
heap
page read and write
200173EE000
trusted library allocation
page read and write
2001486F000
heap
page read and write
7070000
heap
page read and write
20017F65000
trusted library allocation
page read and write
20014758000
trusted library allocation
page read and write
2001484C000
heap
page read and write
4641000
heap
page read and write
200188C7000
trusted library allocation
page read and write
6601000
heap
page read and write
2001787A000
trusted library allocation
page read and write
200189F0000
trusted library allocation
page read and write
20017C55000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
3A4E000
stack
page read and write
20021DE2000
trusted library allocation
page read and write
2001B46F000
trusted library allocation
page read and write
20019EF9000
trusted library allocation
page read and write
CD7000
heap
page read and write
200212EB000
trusted library allocation
page read and write
6E4000
heap
page read and write
189F000
stack
page read and write
20019EB1000
trusted library allocation
page read and write
318E000
stack
page read and write
6629000
heap
page read and write
20016DE5000
trusted library allocation
page read and write
DDA000
heap
page read and write
26D26D31000
heap
page read and write
1020000
heap
page read and write
20017894000
trusted library allocation
page read and write
20020FF7000
trusted library allocation
page read and write
2880BF1B000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
407E000
stack
page read and write
2001483D000
heap
page read and write
3F4F000
stack
page read and write
7550000
heap
page read and write
26D26D22000
heap
page read and write
6E4000
heap
page read and write
20020EBF000
trusted library allocation
page read and write
2001F884000
trusted library allocation
page read and write
6E4000
heap
page read and write
20013423000
trusted library allocation
page read and write
2001476C000
trusted library allocation
page read and write
200189B7000
trusted library allocation
page read and write
20014870000
heap
page read and write
26D2647C000
trusted library allocation
page read and write
2880C4C1000
heap
page read and write
6E4000
heap
page read and write
1954000
heap
page read and write
32FF000
stack
page read and write
5FDB000
heap
page read and write
2880C4DB000
heap
page read and write
20019ECC000
trusted library allocation
page read and write
200219DF000
trusted library allocation
page read and write
2001484B000
heap
page read and write
5B80000
trusted library allocation
page read and write
20020FDB000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
4B80000
direct allocation
page read and write
200176F5000
trusted library allocation
page read and write
2880E7CB000
trusted library allocation
page read and write
5A4000
unkown
page execute and write copy
200189FC000
trusted library allocation
page read and write
5C93000
heap
page read and write
2001483F000
heap
page read and write
6571000
heap
page read and write
20020FF7000
trusted library allocation
page read and write
472A000
heap
page read and write
20017FBF000
trusted library allocation
page read and write
200219A7000
trusted library allocation
page read and write
200211FB000
trusted library allocation
page read and write
FB4000
heap
page read and write
26D26FEC000
trusted library allocation
page read and write
2001C034000
trusted library allocation
page read and write
26D26D2C000
heap
page read and write
200189ED000
trusted library allocation
page read and write
26D264B3000
trusted library allocation
page read and write
200173D2000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
20014845000
heap
page read and write
61D9000
heap
page read and write
D74000
heap
page read and write
DB0000
heap
page read and write
2880C4AD000
heap
page read and write
200189BA000
trusted library allocation
page read and write
20013526000
trusted library allocation
page read and write
200173DA000
trusted library allocation
page read and write
5B4E000
stack
page read and write
5CF5000
heap
page read and write
146000
unkown
page read and write
2001736A000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
20019D9C000
trusted library allocation
page read and write
20012E90000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
2001BA28000
trusted library allocation
page read and write
6E4000
heap
page read and write
200176A1000
trusted library allocation
page read and write
6BF8000
heap
page read and write
5F87000
heap
page read and write
15E0000
heap
page read and write
2001C174000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
4B20000
direct allocation
page execute and read and write
20014845000
heap
page read and write
2880E898000
trusted library allocation
page read and write
6E4000
heap
page read and write
2910000
direct allocation
page read and write
20025B35000
trusted library allocation
page read and write
3E6E000
stack
page read and write
2880BEF6000
trusted library allocation
page read and write
5C31000
heap
page read and write
6874000
heap
page read and write
20017FB1000
trusted library allocation
page read and write
6048000
heap
page read and write
5340000
direct allocation
page execute and read and write
2001731C000
trusted library allocation
page read and write
6631000
heap
page read and write
48A0000
direct allocation
page execute and read and write
2880E7F2000
trusted library allocation
page read and write
4AAF000
stack
page read and write
D5B000
heap
page read and write
575B000
trusted library allocation
page execute and read and write
26D26D48000
heap
page read and write
4D11000
heap
page read and write
20017FC5000
trusted library allocation
page read and write
200215D7000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
2001C232000
trusted library allocation
page read and write
6E5000
heap
page read and write
54C0000
remote allocation
page read and write
6BFB000
heap
page read and write
5757000
trusted library allocation
page execute and read and write
4641000
heap
page read and write
6641000
heap
page read and write
231DC0E1000
heap
page read and write
6E5000
heap
page read and write
D5B000
heap
page read and write
26D26D61000
heap
page read and write
200146F3000
trusted library allocation
page read and write
5CC8000
heap
page read and write
200178D6000
trusted library allocation
page read and write
2001783B000
trusted library allocation
page read and write
1910000
heap
page read and write
4641000
heap
page read and write
1CACB1AA000
heap
page read and write
26D1C742000
heap
page read and write
2002127D000
trusted library allocation
page read and write
1B87000
heap
page read and write
2880E7CB000
trusted library allocation
page read and write
6444000
heap
page read and write
4641000
heap
page read and write
1744000
heap
page read and write
2001F890000
trusted library allocation
page read and write
3F3E000
stack
page read and write
5DFF000
heap
page read and write
2001BFB9000
trusted library allocation
page read and write
D5B000
heap
page read and write
6E4000
heap
page read and write
26D26D4A000
heap
page read and write
26D27709000
trusted library allocation
page read and write
2001BEB6000
trusted library allocation
page read and write
2001B882000
trusted library allocation
page read and write
200195C1000
trusted library allocation
page read and write
6E4000
heap
page read and write
5D32000
heap
page read and write
6607000
heap
page read and write
2001F935000
trusted library allocation
page read and write
26D26D37000
heap
page read and write
2880BB9E000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
200212F2000
trusted library allocation
page read and write
4D11000
heap
page read and write
5E51000
heap
page read and write
20018B24000
trusted library allocation
page read and write
C76000
unkown
page execute and read and write
2001B97D000
trusted library allocation
page read and write
7623000
heap
page read and write
4D11000
heap
page read and write
32CE000
stack
page read and write
6398000
heap
page read and write
2001A869000
trusted library allocation
page read and write
20024A9B000
trusted library allocation
page read and write
2001C276000
trusted library allocation
page read and write
5EB3000
heap
page read and write
26D26D2C000
heap
page read and write
C90000
heap
page read and write
6642000
heap
page read and write
200212EB000
trusted library allocation
page read and write
2001F9D3000
trusted library allocation
page read and write
4D11000
heap
page read and write
5CC5000
heap
page read and write
5C8B000
heap
page read and write
15BE000
heap
page read and write
20019DFB000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
5C4C000
heap
page read and write
20019DE1000
trusted library allocation
page read and write
2001484F000
heap
page read and write
2001471B000
trusted library allocation
page read and write
26D26D1E000
heap
page read and write
2001F868000
trusted library allocation
page read and write
2880C492000
heap
page read and write
20014846000
heap
page read and write
2880C4DB000
heap
page read and write
2001BEC9000
trusted library allocation
page read and write
20019DD5000
trusted library allocation
page read and write
6E4000
heap
page read and write
20021580000
trusted library allocation
page read and write
20018940000
trusted library allocation
page read and write
20021356000
trusted library allocation
page read and write
4641000
heap
page read and write
1283000
unkown
page execute and read and write
200176CA000
trusted library allocation
page read and write
2001C251000
trusted library allocation
page read and write
20019EDA000
trusted library allocation
page read and write
4701000
heap
page read and write
2880C4AD000
heap
page read and write
20024A00000
trusted library allocation
page read and write
6632000
heap
page read and write
5D3F000
heap
page read and write
4641000
heap
page read and write
840000
direct allocation
page read and write
2001733F000
trusted library allocation
page read and write
15C6000
heap
page read and write
4BF2000
direct allocation
page read and write
5E66000
heap
page read and write
2880C4D9000
heap
page read and write
FB4000
heap
page read and write
5CE2000
heap
page read and write
E9A573E000
unkown
page readonly
6628000
heap
page read and write
20020EC8000
trusted library allocation
page read and write
65E0000
heap
page read and write
57BE000
stack
page read and write
4E71000
heap
page read and write
26D26F25000
trusted library allocation
page read and write
2880C48A000
heap
page read and write
9B4000
heap
page read and write
664E000
heap
page read and write
65DF000
heap
page read and write
10B6000
unkown
page execute and read and write
2880C4BA000
heap
page read and write
5CC9000
heap
page read and write
2001B207000
trusted library allocation
page read and write
20020E38000
trusted library allocation
page read and write
1744000
heap
page read and write
200212F8000
trusted library allocation
page read and write
20021981000
trusted library allocation
page read and write
D83000
heap
page read and write
2880C4D9000
heap
page read and write
2001756C000
trusted library allocation
page read and write
15CA000
heap
page read and write
3EA000
unkown
page execute and read and write
2990000
direct allocation
page read and write
77F87FC000
stack
page read and write
2880C4BA000
heap
page read and write
4E71000
heap
page read and write
2880E7BB000
trusted library allocation
page read and write
A7767EC000
stack
page read and write
2001B8E0000
trusted library allocation
page read and write
5DD59C1000
trusted library allocation
page execute read
26D26D1E000
heap
page read and write
26D26D42000
heap
page read and write
200173BC000
trusted library allocation
page read and write
6628000
heap
page read and write
5CF5000
heap
page read and write
26D26D44000
heap
page read and write
1744000
heap
page read and write
20016E6A000
trusted library allocation
page read and write
2880C48B000
heap
page read and write
5CD5000
heap
page read and write
20020E30000
trusted library allocation
page read and write
5EBD000
heap
page read and write
840000
direct allocation
page read and write
20019EC7000
trusted library allocation
page read and write
6E4000
heap
page read and write
14A4000
heap
page read and write
2001486F000
heap
page read and write
20017894000
trusted library allocation
page read and write
2001484E000
heap
page read and write
46FF000
stack
page read and write
20019B08000
trusted library allocation
page read and write
20021964000
trusted library allocation
page read and write
20017C7C000
trusted library allocation
page read and write
2001342F000
trusted library allocation
page read and write
2880E7EC000
trusted library allocation
page read and write
DB2000
heap
page read and write
2001A818000
trusted library allocation
page read and write
D84000
heap
page read and write
5AD7000
heap
page read and write
2001787D000
trusted library allocation
page read and write
20017899000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
20021B85000
trusted library allocation
page read and write
1744000
heap
page read and write
2001477F000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
2001F891000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
200176C5000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
1A8AF621000
trusted library allocation
page execute read
4641000
heap
page read and write
20013455000
trusted library allocation
page read and write
2001A80E000
trusted library allocation
page read and write
354F000
stack
page read and write
54A0000
direct allocation
page execute and read and write
20025BCE000
trusted library allocation
page read and write
6DC5000
heap
page read and write
20021B85000
trusted library allocation
page read and write
20017C47000
trusted library allocation
page read and write
E4E000
unkown
page execute and write copy
4641000
heap
page read and write
6E4000
heap
page read and write
20020E2E000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
20021987000
trusted library allocation
page read and write
5DFF000
heap
page read and write
6E4000
heap
page read and write
2001734C000
trusted library allocation
page read and write
1744000
heap
page read and write
6521000
heap
page read and write
4641000
heap
page read and write
5C78000
heap
page read and write
2001485F000
heap
page read and write
E9A67BE000
unkown
page readonly
F1C51FE000
stack
page read and write
26D26D1C000
heap
page read and write
20016E28000
trusted library allocation
page read and write
20018418000
trusted library allocation
page read and write
26D26FED000
trusted library allocation
page read and write
5CC5000
heap
page read and write
20017834000
trusted library allocation
page read and write
20019E2B000
trusted library allocation
page read and write
2001BF8F000
trusted library allocation
page read and write
2DFF000
stack
page read and write
10DF000
unkown
page execute and write copy
5590000
direct allocation
page read and write
4D11000
heap
page read and write
200176A9000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
15C7000
heap
page read and write
2880C492000
heap
page read and write
26D26D4A000
heap
page read and write
20025B32000
trusted library allocation
page read and write
4641000
heap
page read and write
26F0000
direct allocation
page read and write
6E4000
heap
page read and write
1744000
heap
page read and write
20017679000
trusted library allocation
page read and write
7DDE000
stack
page read and write
200176AC000
trusted library allocation
page read and write
1744000
heap
page read and write
5B81000
heap
page read and write
26D26D5A000
heap
page read and write
2880C48B000
heap
page read and write
2880C4DB000
heap
page read and write
BA4000
heap
page read and write
20019E94000
trusted library allocation
page read and write
5E51000
heap
page read and write
53DE000
stack
page read and write
20020E9F000
trusted library allocation
page read and write
2001484B000
heap
page read and write
20021EAA000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
20017CED000
trusted library allocation
page read and write
62F1000
heap
page read and write
5BF2000
heap
page read and write
9EE000
stack
page read and write
20021E9B000
trusted library allocation
page read and write
4BEF000
stack
page read and write
26D26843000
trusted library allocation
page read and write
2001599B000
trusted library allocation
page read and write
6843000
heap
page read and write
20020FEC000
trusted library allocation
page read and write
483E000
stack
page read and write
2001B811000
trusted library allocation
page read and write
92B000
heap
page read and write
1744000
heap
page read and write
20016DCC000
trusted library allocation
page read and write
65A8000
heap
page read and write
3BBE000
stack
page read and write
2880C4BA000
heap
page read and write
6282000
heap
page read and write
2001F992000
trusted library allocation
page read and write
35AF000
stack
page read and write
5D30000
trusted library allocation
page read and write
20021D80000
trusted library allocation
page read and write
65DF000
heap
page read and write
4850000
direct allocation
page execute and read and write
200176C5000
trusted library allocation
page read and write
4C2F000
stack
page read and write
200189F0000
trusted library allocation
page read and write
2001F86C000
trusted library allocation
page read and write
20019ED8000
trusted library allocation
page read and write
1745000
heap
page read and write
26D26FB0000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
2001BEDA000
trusted library allocation
page read and write
4411000
heap
page read and write
574A000
trusted library allocation
page execute and read and write
20019CB8000
trusted library allocation
page read and write
4641000
heap
page read and write
20017FD8000
trusted library allocation
page read and write
657F000
heap
page read and write
2001342F000
trusted library allocation
page read and write
26D293CC000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
6E4000
heap
page read and write
5A01000
heap
page read and write
46BE000
stack
page read and write
20014845000
heap
page read and write
4641000
heap
page read and write
65C0000
heap
page read and write
20021DCA000
trusted library allocation
page read and write
200219A1000
trusted library allocation
page read and write
2001BFD5000
trusted library allocation
page read and write
5E54000
heap
page read and write
15C1000
heap
page read and write
26D26D21000
heap
page read and write
5C81000
heap
page read and write
61DB000
heap
page read and write
6E5000
heap
page read and write
2001B229000
trusted library allocation
page read and write
20019B41000
trusted library allocation
page read and write
2001342F000
trusted library allocation
page read and write
26D26F25000
trusted library allocation
page read and write
2001844D000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001BE97000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880C49E000
heap
page read and write
2001F503000
trusted library allocation
page read and write
5EB1000
heap
page read and write
4641000
heap
page read and write
2880C488000
heap
page read and write
20021E94000
trusted library allocation
page read and write
2001F87B000
trusted library allocation
page read and write
20018973000
trusted library allocation
page read and write
660A000
heap
page read and write
4AEE000
stack
page read and write
344E000
stack
page read and write
4701000
heap
page read and write
D70000
direct allocation
page read and write
724F000
heap
page read and write
2001766B000
trusted library allocation
page read and write
840000
direct allocation
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
26D26D16000
heap
page read and write
D76000
heap
page read and write
65AD000
heap
page read and write
2880C4AD000
heap
page read and write
5D32000
heap
page read and write
20019CE1000
trusted library allocation
page read and write
20019EC0000
trusted library allocation
page read and write
493F000
stack
page read and write
2880C4BA000
heap
page read and write
5EED000
stack
page read and write
20009130000
heap
page read and write
4D6E000
stack
page read and write
2880C4C5000
heap
page read and write
4EEE000
stack
page read and write
5CED000
heap
page read and write
200175A4000
trusted library allocation
page read and write
20018985000
trusted library allocation
page read and write
20021DE0000
trusted library allocation
page read and write
5CCE000
heap
page read and write
2B7F000
stack
page read and write
54A0000
direct allocation
page execute and read and write
20013595000
trusted library allocation
page read and write
2001BF1F000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
26D26D19000
heap
page read and write
A41000
unkown
page execute and write copy
1744000
heap
page read and write
20017FC3000
trusted library allocation
page read and write
2001BC26000
trusted library allocation
page read and write
20017371000
trusted library allocation
page read and write
20018E05000
trusted library allocation
page read and write
2880C48E000
heap
page read and write
20021DE0000
trusted library allocation
page read and write
4D11000
heap
page read and write
20025B03000
trusted library allocation
page read and write
2880BBC1000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
2001F5E4000
trusted library allocation
page read and write
20014845000
heap
page read and write
2001A881000
trusted library allocation
page read and write
1745000
heap
page read and write
20014798000
trusted library allocation
page read and write
D50000
heap
page read and write
20017662000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
2880C4DB000
heap
page read and write
2001A838000
trusted library allocation
page read and write
20019DCF000
trusted library allocation
page read and write
20019DAC000
trusted library allocation
page read and write
6DCB000
heap
page read and write
B93000
unkown
page execute and read and write
5D41000
heap
page read and write
7968000
trusted library allocation
page read and write
20014661000
trusted library allocation
page read and write
5C91000
heap
page read and write
307F000
stack
page read and write
2001F97D000
trusted library allocation
page read and write
2001471B000
trusted library allocation
page read and write
26D2705B000
trusted library allocation
page read and write
200173EE000
trusted library allocation
page read and write
D80000
heap
page read and write
26D26FFC000
trusted library allocation
page read and write
3EA000
unkown
page execute and read and write
20014846000
heap
page read and write
20019EE3000
trusted library allocation
page read and write
2001484E000
heap
page read and write
6E4000
heap
page read and write
20025B34000
trusted library allocation
page read and write
2880CBAB000
trusted library allocation
page read and write
FB4000
heap
page read and write
2880C4BA000
heap
page read and write
D2E000
stack
page read and write
2002116A000
trusted library allocation
page read and write
2001C13C000
trusted library allocation
page read and write
6E5000
heap
page read and write
2001C2B1000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
3BEF000
stack
page read and write
6647000
heap
page read and write
4641000
heap
page read and write
AAB000
heap
page read and write
4641000
heap
page read and write
F1C551E000
stack
page read and write
26D26D67000
heap
page read and write
28CF000
stack
page read and write
4D00000
direct allocation
page execute and read and write
20019CB6000
trusted library allocation
page read and write
200173BA000
trusted library allocation
page read and write
20021DE0000
trusted library allocation
page read and write
2001B493000
trusted library allocation
page read and write
2001BA09000
trusted library allocation
page read and write
200215AD000
trusted library allocation
page read and write
20019C9F000
trusted library allocation
page read and write
2880E7EC000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
66EE000
heap
page read and write
20025B94000
trusted library allocation
page read and write
20014779000
trusted library allocation
page read and write
20021B53000
trusted library allocation
page read and write
200146EB000
trusted library allocation
page read and write
6607000
heap
page read and write
6F6B7FF000
stack
page read and write
26D26D19000
heap
page read and write
20021BE9000
trusted library allocation
page read and write
6631000
heap
page read and write
2001F5D3000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
20019E38000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
20019DE1000
trusted library allocation
page read and write
4D20000
remote allocation
page read and write
D84000
heap
page read and write
5B81000
heap
page read and write
200178D6000
trusted library allocation
page read and write
20018933000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
54A0000
direct allocation
page execute and read and write
E9A3DD8000
stack
page read and write
4641000
heap
page read and write
20021FFB000
trusted library allocation
page read and write
68AE000
heap
page read and write
200189AC000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
1260000
unkown
page execute and write copy
D74000
heap
page read and write
2001769F000
trusted library allocation
page read and write
20014880000
heap
page read and write
2001483D000
heap
page read and write
2880C493000
heap
page read and write
660A000
heap
page read and write
5B8F000
heap
page read and write
2880C491000
heap
page read and write
20014854000
heap
page read and write
290E000
stack
page read and write
5CF7000
heap
page read and write
6635000
heap
page read and write
48CE000
stack
page read and write
6607000
heap
page read and write
20019ECC000
trusted library allocation
page read and write
5C80000
heap
page read and write
3F4E000
stack
page read and write
2880C492000
heap
page read and write
2880E69C000
trusted library allocation
page read and write
26D26D2D000
heap
page read and write
200215D0000
trusted library allocation
page read and write
7EDE000
stack
page read and write
6E4000
heap
page read and write
5C78000
heap
page read and write
65D0000
heap
page read and write
20021B0B000
trusted library allocation
page read and write
2001759D000
trusted library allocation
page read and write
5950000
heap
page read and write
354E000
stack
page read and write
D77000
heap
page read and write
200195E9000
trusted library allocation
page read and write
2880E856000
trusted library allocation
page read and write
200189D7000
trusted library allocation
page read and write
FB4000
heap
page read and write
20017F2A000
trusted library allocation
page read and write
200215B3000
trusted library allocation
page read and write
200195DA000
trusted library allocation
page read and write
200215D7000
trusted library allocation
page read and write
2001F9FA000
trusted library allocation
page read and write
26D26D2D000
heap
page read and write
5F24000
heap
page read and write
2001769E000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
2880BF7D000
trusted library allocation
page read and write
4E71000
heap
page read and write
6591000
heap
page read and write
2001F8D4000
trusted library allocation
page read and write
2001BA30000
trusted library allocation
page read and write
14A4000
heap
page read and write
2001C032000
trusted library allocation
page read and write
20018969000
trusted library allocation
page read and write
2001859E000
trusted library allocation
page read and write
363F000
stack
page read and write
6440000
trusted library allocation
page read and write
6643000
heap
page read and write
D65000
heap
page read and write
14F0000
heap
page read and write
20017C63000
trusted library allocation
page read and write
7CBE000
stack
page read and write
660A000
heap
page read and write
26D26D4A000
heap
page read and write
A776768000
stack
page read and write
20013460000
trusted library allocation
page read and write
1DF1C1AE000
heap
page read and write
5CC1000
heap
page read and write
4641000
heap
page read and write
2880E7BE000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
26D26D18000
heap
page read and write
2DBE000
stack
page read and write
26D2707C000
trusted library allocation
page read and write
20021B13000
trusted library allocation
page read and write
20018421000
trusted library allocation
page read and write
20019EA2000
trusted library allocation
page read and write
2001898B000
trusted library allocation
page read and write
20019DF6000
trusted library allocation
page read and write
20020FFA000
trusted library allocation
page read and write
148000
unkown
page execute and read and write
1DF1A5A3000
heap
page read and write
2001757C000
trusted library allocation
page read and write
2880C490000
heap
page read and write
FB4000
heap
page read and write
DB0000
direct allocation
page read and write
20021289000
trusted library allocation
page read and write
D84000
heap
page read and write
2001473C000
trusted library allocation
page read and write
D7D000
heap
page read and write
2001BA10000
trusted library allocation
page read and write
A7771D8000
stack
page read and write
20017858000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26D31000
heap
page read and write
20021B75000
trusted library allocation
page read and write
2001B435000
trusted library allocation
page read and write
423E000
stack
page read and write
7303000
heap
page read and write
663D000
heap
page read and write
6E5000
heap
page read and write
4E71000
heap
page read and write
2001F9E2000
trusted library allocation
page read and write
200176DF000
trusted library allocation
page read and write
5CC5000
heap
page read and write
55DD000
heap
page read and write
6E4000
heap
page read and write
A0A000
unkown
page execute and read and write
20021BFB000
trusted library allocation
page read and write
539B000
stack
page read and write
2001F957000
trusted library allocation
page read and write
2002193C000
trusted library allocation
page read and write
6964000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
26D26D33000
heap
page read and write
5C3A000
heap
page read and write
20019B77000
trusted library allocation
page read and write
1DEAF5E0000
heap
page read and write
2001B8E8000
trusted library allocation
page read and write
20014844000
heap
page read and write
6595000
heap
page read and write
2001B8B5000
trusted library allocation
page read and write
20013455000
trusted library allocation
page read and write
2001B9C6000
trusted library allocation
page read and write
20017FDB000
trusted library allocation
page read and write
71BE000
heap
page read and write
664D000
heap
page read and write
26D26D4A000
heap
page read and write
6E4000
heap
page read and write
20021B4A000
trusted library allocation
page read and write
4E91000
heap
page read and write
5B0000
heap
page read and write
4641000
heap
page read and write
26D2707C000
trusted library allocation
page read and write
D56000
heap
page read and write
20014845000
heap
page read and write
26D26D22000
heap
page read and write
5CD0000
heap
page read and write
6652000
heap
page read and write
1744000
heap
page read and write
2001894B000
trusted library allocation
page read and write
2001F948000
trusted library allocation
page read and write
382F000
stack
page read and write
146000
unkown
page write copy
2001C194000
trusted library allocation
page read and write
26D26D32000
heap
page read and write
27DE000
stack
page read and write
2910000
direct allocation
page read and write
6CB2000
heap
page read and write
D83000
heap
page read and write
2001C1A8000
trusted library allocation
page read and write
2001B937000
trusted library allocation
page read and write
6643000
heap
page read and write
20019EDE000
trusted library allocation
page read and write
26D270FB000
trusted library allocation
page read and write
AA0000
heap
page read and write
4830000
direct allocation
page execute and read and write
20020FE5000
trusted library allocation
page read and write
2001BFDB000
trusted library allocation
page read and write
417F000
stack
page read and write
26D26D32000
heap
page read and write
83C000
stack
page read and write
393F000
stack
page read and write
6631000
heap
page read and write
6607000
heap
page read and write
20021D3D000
trusted library allocation
page read and write
26D26D16000
heap
page read and write
2001B435000
trusted library allocation
page read and write
5CF5000
heap
page read and write
4B80000
direct allocation
page read and write
5CDC000
heap
page read and write
4641000
heap
page read and write
20019CF9000
trusted library allocation
page read and write
20019E38000
trusted library allocation
page read and write
20020E6E000
trusted library allocation
page read and write
20019EA2000
trusted library allocation
page read and write
2001758D000
trusted library allocation
page read and write
15BC000
heap
page read and write
2EFE000
stack
page read and write
840000
direct allocation
page read and write
26D26D31000
heap
page read and write
661D000
heap
page read and write
20021DF7000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
61C9000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
2B7F000
stack
page read and write
2001B98C000
trusted library allocation
page read and write
2001F5C4000
trusted library allocation
page read and write
13F9000
stack
page read and write
6631000
heap
page read and write
6440000
trusted library allocation
page read and write
20021EA6000
trusted library allocation
page read and write
200199EE000
trusted library allocation
page read and write
20017566000
trusted library allocation
page read and write
E02000
unkown
page execute and write copy
661D000
heap
page read and write
6635000
heap
page read and write
20016DD4000
trusted library allocation
page read and write
4641000
heap
page read and write
CD4000
heap
page read and write
2880C48A000
heap
page read and write
D70000
direct allocation
page read and write
2001484B000
heap
page read and write
26D26D31000
heap
page read and write
5E56000
heap
page read and write
6E4000
heap
page read and write
26D26D21000
heap
page read and write
2A0000
unkown
page read and write
6440000
trusted library allocation
page read and write
200134F1000
trusted library allocation
page read and write
D5B000
heap
page read and write
2001484B000
heap
page read and write
4701000
heap
page read and write
65DB000
heap
page read and write
6633000
heap
page read and write
26D26818000
trusted library allocation
page read and write
2001477F000
trusted library allocation
page read and write
2001B22F000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
20017CE7000
trusted library allocation
page read and write
20016DF7000
trusted library allocation
page read and write
1004000
unkown
page execute and write copy
4AEF000
stack
page read and write
200134E4000
trusted library allocation
page read and write
9F9000
stack
page read and write
3EFF000
stack
page read and write
20021E59000
trusted library allocation
page read and write
2001479D000
trusted library allocation
page read and write
20019EBE000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
15E0000
heap
page read and write
26D26D1C000
heap
page read and write
2001F8E7000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
4641000
heap
page read and write
2880BE2F000
trusted library allocation
page read and write
2001F922000
trusted library allocation
page read and write
55A0000
direct allocation
page execute and read and write
1CACB1A4000
heap
page read and write
20017C57000
trusted library allocation
page read and write
20016DDA000
trusted library allocation
page read and write
2001737E000
trusted library allocation
page read and write
2001F9EC000
trusted library allocation
page read and write
26D26D21000
heap
page read and write
4701000
heap
page read and write
2880C489000
heap
page read and write
5CF7000
heap
page read and write
6E4000
heap
page read and write
26D26D4A000
heap
page read and write
200211F8000
trusted library allocation
page read and write
20014843000
heap
page read and write
2001599F000
trusted library allocation
page read and write
2001C26F000
trusted library allocation
page read and write
5CE2000
heap
page read and write
200189C3000
trusted library allocation
page read and write
6E4000
heap
page read and write
6E5000
heap
page read and write
200173DB000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
4B40000
direct allocation
page execute and read and write
662E000
heap
page read and write
72E000
stack
page read and write
200147C7000
trusted library allocation
page read and write
26D26D1B000
heap
page read and write
54A0000
direct allocation
page execute and read and write
5D81000
heap
page read and write
D84000
heap
page read and write
D7A000
heap
page read and write
26D26FF2000
trusted library allocation
page read and write
2880C486000
heap
page read and write
20014681000
trusted library allocation
page read and write
26D26D4B000
heap
page read and write
200194D9000
trusted library allocation
page read and write
1A4E000
stack
page read and write
68F0000
heap
page read and write
6E4000
heap
page read and write
644A000
heap
page read and write
20019C8E000
trusted library allocation
page read and write
20014714000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
6E4000
heap
page read and write
20017689000
trusted library allocation
page read and write
2001F9E6000
trusted library allocation
page read and write
1744000
heap
page read and write
5F87000
heap
page read and write
5310000
heap
page read and write
3A0E000
stack
page read and write
20021FFB000
trusted library allocation
page read and write
297F000
stack
page read and write
5D0A000
heap
page read and write
6631000
heap
page read and write
4641000
heap
page read and write
2002159B000
trusted library allocation
page read and write
D61000
heap
page read and write
20020E7D000
trusted library allocation
page read and write
6EA6000
heap
page read and write
20020E95000
trusted library allocation
page read and write
26D26D46000
heap
page read and write
4B30000
direct allocation
page execute and read and write
26D26D45000
heap
page read and write
20017837000
trusted library allocation
page read and write
308E000
stack
page read and write
5CDE000
heap
page read and write
13E8000
heap
page read and write
20017378000
trusted library allocation
page read and write
6595000
heap
page read and write
4E91000
heap
page read and write
2001C200000
trusted library allocation
page read and write
20014694000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001F89D000
trusted library allocation
page read and write
2880C4D6000
heap
page read and write
2001F97D000
trusted library allocation
page read and write
26D26FBE000
trusted library allocation
page read and write
2880BFA2000
trusted library allocation
page read and write
20016DF7000
trusted library allocation
page read and write
20021BA9000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
2001F98E000
trusted library allocation
page read and write
20014860000
heap
page read and write
CA0000
direct allocation
page read and write
2001F53C000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
6576000
heap
page read and write
20019E8D000
trusted library allocation
page read and write
407F000
stack
page read and write
9A7D7FF000
stack
page read and write
266F000
stack
page read and write
D52000
heap
page read and write
20018949000
trusted library allocation
page read and write
FB4000
heap
page read and write
6E4000
heap
page read and write
4D00000
direct allocation
page read and write
5D16000
heap
page read and write
2880C4BD000
heap
page read and write
A7001FE000
stack
page read and write
6E85000
heap
page read and write
200211F6000
trusted library allocation
page read and write
26D27609000
trusted library allocation
page read and write
20019EDE000
trusted library allocation
page read and write
200211AD000
trusted library allocation
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
2880C4D9000
heap
page read and write
2001345C000
trusted library allocation
page read and write
333E000
stack
page read and write
5FC6000
heap
page read and write
6941000
heap
page read and write
6639000
heap
page read and write
20019DFB000
trusted library allocation
page read and write
5C35000
heap
page read and write
20017E69000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
4641000
heap
page read and write
200176B9000
trusted library allocation
page read and write
364F000
stack
page read and write
6631000
heap
page read and write
20019E58000
trusted library allocation
page read and write
20019B5F000
trusted library allocation
page read and write
2880C4D7000
heap
page read and write
2880C48C000
heap
page read and write
1421000
heap
page read and write
20014694000
trusted library allocation
page read and write
2001BEB5000
trusted library allocation
page read and write
20021DE0000
trusted library allocation
page read and write
2001F500000
trusted library allocation
page read and write
2001B95B000
trusted library allocation
page read and write
2880C48A000
heap
page read and write
5590000
direct allocation
page read and write
20017691000
trusted library allocation
page read and write
2001739A000
trusted library allocation
page read and write
65A7000
heap
page read and write
661F000
heap
page read and write
20017696000
trusted library allocation
page read and write
1DEAF620000
heap
page read and write
20019D96000
trusted library allocation
page read and write
6632000
heap
page read and write
5470000
direct allocation
page read and write
26D26D5A000
heap
page read and write
4641000
heap
page read and write
4E91000
heap
page read and write
330E000
stack
page read and write
26D26D22000
heap
page read and write
65D4000
heap
page read and write
200173EE000
trusted library allocation
page read and write
4E71000
heap
page read and write
3A6F000
stack
page read and write
20020E9F000
trusted library allocation
page read and write
6E4000
heap
page read and write
200212EB000
trusted library allocation
page read and write
65D4000
heap
page read and write
20019EFE000
trusted library allocation
page read and write
20014845000
heap
page read and write
4411000
heap
page read and write
2001853F000
trusted library allocation
page read and write
20021B48000
trusted library allocation
page read and write
20014845000
heap
page read and write
2001F523000
trusted library allocation
page read and write
2880C48D000
heap
page read and write
E21000
unkown
page execute and read and write
2001B8E2000
trusted library allocation
page read and write
20014854000
heap
page read and write
2880C4DB000
heap
page read and write
4641000
heap
page read and write
37BF000
stack
page read and write
54C0000
direct allocation
page execute and read and write
DB4000
heap
page read and write
1410000
heap
page read and write
2001486F000
heap
page read and write
5CC9000
heap
page read and write
2001483D000
heap
page read and write
20014845000
heap
page read and write
2001F9CD000
trusted library allocation
page read and write
D84000
heap
page read and write
20017C7D000
trusted library allocation
page read and write
915000
heap
page read and write
4C6E000
stack
page read and write
20019EBE000
trusted library allocation
page read and write
200189F0000
trusted library allocation
page read and write
1CAC95D9000
heap
page read and write
4641000
heap
page read and write
200173EE000
trusted library allocation
page read and write
4D11000
heap
page read and write
6656000
heap
page read and write
2002108E000
trusted library allocation
page read and write
E83000
unkown
page execute and read and write
6607000
heap
page read and write
4D2F000
stack
page read and write
39FF000
stack
page read and write
2001954C000
trusted library allocation
page read and write
6628000
heap
page read and write
2001484B000
heap
page read and write
20021B85000
trusted library allocation
page read and write
1745000
heap
page read and write
D54000
heap
page read and write
20021580000
trusted library allocation
page read and write
200176EF000
trusted library allocation
page read and write
6E4000
heap
page read and write
26EE000
stack
page read and write
20020FA3000
trusted library allocation
page read and write
1432000
heap
page read and write
20021281000
trusted library allocation
page read and write
20017CEB000
trusted library allocation
page read and write
2880BF5F000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
6631000
heap
page read and write
E1000
unkown
page execute and write copy
6601000
heap
page read and write
26D26D5A000
heap
page read and write
CA0000
direct allocation
page read and write
2880C491000
heap
page read and write
26D26D4A000
heap
page read and write
20020E74000
trusted library allocation
page read and write
4541000
heap
page read and write
5C78000
heap
page read and write
2001F869000
trusted library allocation
page read and write
2001C1CE000
trusted library allocation
page read and write
1D0000
heap
page read and write
26D26D4A000
heap
page read and write
200146F3000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
F1C3F5E000
stack
page read and write
26D26D4B000
heap
page read and write
20014866000
heap
page read and write
2880C4AD000
heap
page read and write
5B90000
heap
page read and write
26D26D1C000
heap
page read and write
D6F000
heap
page read and write
5452000
direct allocation
page read and write
731A000
heap
page read and write
26D26D4A000
heap
page read and write
2880BB88000
trusted library allocation
page read and write
26D2990A000
trusted library allocation
page read and write
26D29408000
trusted library allocation
page read and write
2D4000
unkown
page execute and read and write
26D26D63000
heap
page read and write
20019EF9000
trusted library allocation
page read and write
200146EF000
trusted library allocation
page read and write
2001F931000
trusted library allocation
page read and write
3EF000
unkown
page execute and read and write
622E000
heap
page read and write
DCD000
heap
page read and write
26D293E7000
trusted library allocation
page read and write
5CC5000
heap
page read and write
20014661000
trusted library allocation
page read and write
2001484B000
heap
page read and write
2001F83A000
trusted library allocation
page read and write
4810000
direct allocation
page execute and read and write
34FF000
stack
page read and write
446F000
stack
page read and write
20021BA9000
trusted library allocation
page read and write
49CF000
stack
page read and write
6649000
heap
page read and write
2001782F000
trusted library allocation
page read and write
6714000
heap
page read and write
20014843000
heap
page read and write
6634000
heap
page read and write
200176F1000
trusted library allocation
page read and write
1744000
heap
page read and write
200176C5000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
20019DF6000
trusted library allocation
page read and write
200147BE000
trusted library allocation
page read and write
539D000
stack
page read and write
1E0000
heap
page read and write
6041000
heap
page read and write
2880C49E000
heap
page read and write
DCD000
heap
page read and write
2001F957000
trusted library allocation
page read and write
4641000
heap
page read and write
4A10000
direct allocation
page execute and read and write
382E000
stack
page read and write
4701000
heap
page read and write
2001757F000
trusted library allocation
page read and write
6571000
heap
page read and write
20021DE2000
trusted library allocation
page read and write
3FE000
unkown
page execute and read and write
6E4000
heap
page read and write
2001753A000
trusted library allocation
page read and write
2880E7FD000
trusted library allocation
page read and write
20020FDE000
trusted library allocation
page read and write
DB4000
heap
page read and write
20016DF7000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
2880C4DB000
heap
page read and write
4D11000
heap
page read and write
54F0000
direct allocation
page execute and read and write
2001F933000
trusted library allocation
page read and write
5560000
direct allocation
page execute and read and write
200176D5000
trusted library allocation
page read and write
2001C2A2000
trusted library allocation
page read and write
14A4000
heap
page read and write
20021DE2000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
5B80000
trusted library allocation
page read and write
D54000
heap
page read and write
2001B400000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
65DC000
heap
page read and write
5DB3000
heap
page read and write
2001485A000
heap
page read and write
20018451000
trusted library allocation
page read and write
200176A4000
trusted library allocation
page read and write
20016DDA000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
8C1000
unkown
page execute and read and write
1744000
heap
page read and write
2880E725000
trusted library allocation
page read and write
1744000
heap
page read and write
45AF000
stack
page read and write
200135FE000
trusted library allocation
page read and write
200215D0000
trusted library allocation
page read and write
20017679000
trusted library allocation
page read and write
1DEAF8E0000
heap
page read and write
4641000
heap
page read and write
20014643000
trusted library allocation
page read and write
20013460000
trusted library allocation
page read and write
200211AB000
trusted library allocation
page read and write
200219A9000
trusted library allocation
page read and write
6645000
heap
page read and write
20019EFE000
trusted library allocation
page read and write
2001B924000
trusted library allocation
page read and write
26D26D2C000
heap
page read and write
5B8B000
heap
page read and write
870000
unkown
page readonly
14A4000
heap
page read and write
6E4000
heap
page read and write
20019EF2000
trusted library allocation
page read and write
20014854000
heap
page read and write
6110000
trusted library allocation
page read and write
200175A4000
trusted library allocation
page read and write
2001763C000
trusted library allocation
page read and write
5B5D000
heap
page read and write
2CCE000
stack
page read and write
54C0000
direct allocation
page execute and read and write
26D26D4D000
heap
page read and write
4ABE000
stack
page read and write
2880C49E000
heap
page read and write
2880BB81000
trusted library allocation
page read and write
200176F5000
trusted library allocation
page read and write
6A2E000
heap
page read and write
20014875000
heap
page read and write
924000
heap
page read and write
EA8000
heap
page read and write
20025B32000
trusted library allocation
page read and write
20019DB4000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
2001F9B5000
trusted library allocation
page read and write
5CC1000
heap
page read and write
20021E6F000
trusted library allocation
page read and write
D60000
heap
page read and write
2001475B000
trusted library allocation
page read and write
20025BC5000
trusted library allocation
page read and write
4D10000
heap
page read and write
D83000
heap
page read and write
26D26D16000
heap
page read and write
B3C000
stack
page read and write
5BC2000
heap
page read and write
4641000
heap
page read and write
2880C4D7000
heap
page read and write
200184A4000
trusted library allocation
page read and write
2880BBB3000
trusted library allocation
page read and write
20021BE9000
trusted library allocation
page read and write
200176DA000
trusted library allocation
page read and write
20017680000
trusted library allocation
page read and write
20021B9C000
trusted library allocation
page read and write
20019E7E000
trusted library allocation
page read and write
2001A893000
trusted library allocation
page read and write
2880E776000
trusted library allocation
page read and write
5CC5000
heap
page read and write
20019EC5000
trusted library allocation
page read and write
2001F977000
trusted library allocation
page read and write
26D26D22000
heap
page read and write
49E0000
direct allocation
page execute and read and write
1744000
heap
page read and write
5C9E000
heap
page read and write
20017319000
trusted library allocation
page read and write
2880C492000
heap
page read and write
CB3000
unkown
page execute and read and write
2001BF8F000
trusted library allocation
page read and write
6E4000
heap
page read and write
6642000
heap
page read and write
54C0000
direct allocation
page execute and read and write
20017C5A000
trusted library allocation
page read and write
20025B3C000
trusted library allocation
page read and write
D5C000
heap
page read and write
26D26D2F000
heap
page read and write
4641000
heap
page read and write
6631000
heap
page read and write
6607000
heap
page read and write
2880BE71000
trusted library allocation
page read and write
2001737C000
trusted library allocation
page read and write
20019E38000
trusted library allocation
page read and write
6E4000
heap
page read and write
FB4000
heap
page read and write
2001C0AC000
trusted library allocation
page read and write
5B8B000
heap
page read and write
6E4000
heap
page read and write
2001B9C8000
trusted library allocation
page read and write
20017C4E000
trusted library allocation
page read and write
26D26F09000
trusted library allocation
page read and write
20019EA9000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
20019D58000
trusted library allocation
page read and write
1744000
heap
page read and write
1DF1C1AC000
heap
page read and write
660A000
heap
page read and write
5CE6000
heap
page read and write
1E6000
heap
page read and write
5D90000
remote allocation
page read and write
20017FC3000
trusted library allocation
page read and write
916000
heap
page read and write
4E6F000
stack
page read and write
6666000
heap
page read and write
26D2681B000
trusted library allocation
page read and write
231DC507000
trusted library allocation
page read and write
20025B16000
trusted library allocation
page read and write
2001F584000
trusted library allocation
page read and write
2001765D000
trusted library allocation
page read and write
20017F3B000
trusted library allocation
page read and write
2910000
direct allocation
page read and write
3F8E000
stack
page read and write
5F81000
heap
page read and write
2001F9E8000
trusted library allocation
page read and write
1744000
heap
page read and write
2880C48A000
heap
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
2001486F000
heap
page read and write
4641000
heap
page read and write
3E8000
unkown
page execute and read and write
5B8D000
heap
page read and write
5FDB000
heap
page read and write
6E4000
heap
page read and write
26D26D4A000
heap
page read and write
661E000
stack
page read and write
20014870000
heap
page read and write
20017E8A000
trusted library allocation
page read and write
6671000
heap
page read and write
20014845000
heap
page read and write
13E0000
heap
page read and write
5E68000
heap
page read and write
2880C492000
heap
page read and write
2001B32F000
trusted library allocation
page read and write
2880C48F000
heap
page read and write
693D000
heap
page read and write
661D000
heap
page read and write
20014845000
heap
page read and write
486F000
stack
page read and write
20014685000
trusted library allocation
page read and write
4641000
heap
page read and write
1744000
heap
page read and write
5E3D000
heap
page read and write
5C48000
heap
page read and write
660A000
heap
page read and write
20017EE3000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
2001C209000
trusted library allocation
page read and write
6607000
heap
page read and write
20013455000
trusted library allocation
page read and write
2001488F000
heap
page read and write
5B8B000
heap
page read and write
4A20000
direct allocation
page read and write
20021FFD000
trusted library allocation
page read and write
3B7D000
stack
page read and write
2880C492000
heap
page read and write
4E71000
heap
page read and write
2001B403000
trusted library allocation
page read and write
26D26D26000
heap
page read and write
20014845000
heap
page read and write
4D20000
direct allocation
page execute and read and write
5CCB000
heap
page read and write
200194E1000
trusted library allocation
page read and write
6873000
heap
page read and write
26D26D31000
heap
page read and write
5D06000
heap
page read and write
26D268F9000
trusted library allocation
page read and write
1DF1A900000
trusted library allocation
page read and write
4CD2000
direct allocation
page read and write
2002477C000
trusted library allocation
page read and write
20021DB3000
trusted library allocation
page read and write
2ECF000
stack
page read and write
2001A84A000
trusted library allocation
page read and write
DB4000
heap
page read and write
14A4000
heap
page read and write
6F69FFF000
stack
page read and write
200212F9000
trusted library allocation
page read and write
1DEAF907000
trusted library allocation
page read and write
14A0000
heap
page read and write
200212FC000
trusted library allocation
page read and write
5A6000
unkown
page execute and write copy
5E62000
heap
page read and write
200212D0000
trusted library allocation
page read and write
2001F84B000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
4641000
heap
page read and write
D76000
heap
page read and write
6632000
heap
page read and write
2001BEC0000
trusted library allocation
page read and write
200173F6000
trusted library allocation
page read and write
26D26D1E000
heap
page read and write
200159A7000
trusted library allocation
page read and write
20017C63000
trusted library allocation
page read and write
2880E82C000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
26D26FB5000
trusted library allocation
page read and write
D52000
heap
page read and write
4C80000
heap
page read and write
4630000
trusted library allocation
page read and write
2880C492000
heap
page read and write
44AF000
stack
page read and write
4CF0000
heap
page read and write
4641000
heap
page read and write
5C48000
heap
page read and write
4E91000
heap
page read and write
D22000
heap
page read and write
6601000
heap
page read and write
26D26D39000
heap
page read and write
2880C4DB000
heap
page read and write
2001485F000
heap
page read and write
20016DC4000
trusted library allocation
page read and write
1B80000
heap
page read and write
6E5000
heap
page read and write
2001F87B000
trusted library allocation
page read and write
26D26D17000
heap
page read and write
2001345C000
trusted library allocation
page read and write
6E4000
heap
page read and write
20017D80000
trusted library allocation
page read and write
5E55000
heap
page read and write
200218FD000
trusted library allocation
page read and write
5CD5000
heap
page read and write
F80000
heap
page read and write
4641000
heap
page read and write
26D26D63000
heap
page read and write
2001C08F000
trusted library allocation
page read and write
D74000
heap
page read and write
200219FD000
trusted library allocation
page read and write
7CD0000
heap
page execute and read and write
2001C0CE000
trusted library allocation
page read and write
15E0000
heap
page read and write
5FBB000
stack
page read and write
2001484F000
heap
page read and write
20020EAC000
trusted library allocation
page read and write
6A20000
heap
page read and write
1744000
heap
page read and write
CC6000
heap
page read and write
20020EF3000
trusted library allocation
page read and write
4E91000
heap
page read and write
6643000
heap
page read and write
D5C000
heap
page read and write
4E8E000
stack
page read and write
20014843000
heap
page read and write
4E80000
direct allocation
page read and write
2001F9DF000
trusted library allocation
page read and write
200176EF000
trusted library allocation
page read and write
2002126D000
trusted library allocation
page read and write
2002127D000
trusted library allocation
page read and write
2880CD0A000
trusted library allocation
page read and write
2880E876000
trusted library allocation
page read and write
2001F9FC000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2880C708000
trusted library allocation
page read and write
DB4000
heap
page read and write
2001C102000
trusted library allocation
page read and write
6601000
heap
page read and write
4641000
heap
page read and write
20024A7A000
trusted library allocation
page read and write
5F8D000
heap
page read and write
2C8F000
stack
page read and write
403F000
stack
page read and write
200211F6000
trusted library allocation
page read and write
4641000
heap
page read and write
2880E70F000
trusted library allocation
page read and write
2001C03C000
trusted library allocation
page read and write
2001A869000
trusted library allocation
page read and write
26D26F13000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
49F0000
direct allocation
page execute and read and write
4810000
direct allocation
page execute and read and write
4641000
heap
page read and write
20018936000
trusted library allocation
page read and write
D83000
heap
page read and write
200195CF000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2001F828000
trusted library allocation
page read and write
1744000
heap
page read and write
200173F3000
trusted library allocation
page read and write
2001767F000
trusted library allocation
page read and write
200176A3000
trusted library allocation
page read and write
F1C000
stack
page read and write
6E4000
heap
page read and write
20019A6D000
trusted library allocation
page read and write
5E51000
heap
page read and write
20019DB4000
trusted library allocation
page read and write
4641000
heap
page read and write
567E000
stack
page read and write
5F8C000
heap
page read and write
26D26D21000
heap
page read and write
294E000
stack
page read and write
20021DAD000
trusted library allocation
page read and write
14A4000
heap
page read and write
20017574000
trusted library allocation
page read and write
6E4000
heap
page read and write
2A7B000
stack
page read and write
200176F5000
trusted library allocation
page read and write
20016DF7000
trusted library allocation
page read and write
200199A8000
trusted library allocation
page read and write
5C47000
heap
page read and write
4EAF000
stack
page read and write
2001342F000
trusted library allocation
page read and write
20014843000
heap
page read and write
DB4000
heap
page read and write
5CF5000
heap
page read and write
1199000
stack
page read and write
4641000
heap
page read and write
2001BDC4000
trusted library allocation
page read and write
6591000
heap
page read and write
6671000
heap
page read and write
D77000
heap
page read and write
200176D5000
trusted library allocation
page read and write
20021BA9000
trusted library allocation
page read and write
2001F5CF000
trusted library allocation
page read and write
65B9000
heap
page read and write
2880BFF9000
trusted library allocation
page read and write
4641000
heap
page read and write
33FF000
stack
page read and write
200219E8000
trusted library allocation
page read and write
2A1000
unkown
page execute and write copy
20021E21000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
2002159F000
trusted library allocation
page read and write
E9A33CE000
stack
page read and write
6E4000
heap
page read and write
D70000
direct allocation
page read and write
A7767AD000
stack
page read and write
20020EA3000
trusted library allocation
page read and write
5300000
direct allocation
page read and write
20014854000
heap
page read and write
6601000
heap
page read and write
6632000
heap
page read and write
D60000
heap
page read and write
DB6000
heap
page read and write
26D26D44000
heap
page read and write
20021999000
trusted library allocation
page read and write
200189C3000
trusted library allocation
page read and write
2001F84B000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
2880BF66000
trusted library allocation
page read and write
5F87000
heap
page read and write
2880C492000
heap
page read and write
2001C0A8000
trusted library allocation
page read and write
2880BF13000
trusted library allocation
page read and write
200175A4000
trusted library allocation
page read and write
2880C491000
heap
page read and write
1DF1A907000
trusted library allocation
page read and write
20021912000
trusted library allocation
page read and write
20017CE7000
trusted library allocation
page read and write
4D11000
heap
page read and write
2001F5AE000
trusted library allocation
page read and write
6607000
heap
page read and write
20018973000
trusted library allocation
page read and write
661D000
heap
page read and write
5CD1000
heap
page read and write
20014685000
trusted library allocation
page read and write
1744000
heap
page read and write
20019EBE000
trusted library allocation
page read and write
E9A56BB000
stack
page read and write
6591000
heap
page read and write
5CC5000
heap
page read and write
D83000
heap
page read and write
2002159B000
trusted library allocation
page read and write
5E68000
heap
page read and write
20017FCF000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
2001F5CB000
trusted library allocation
page read and write
2001A895000
trusted library allocation
page read and write
20013460000
trusted library allocation
page read and write
2001F935000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
2001BEDE000
trusted library allocation
page read and write
9A7BFFF000
stack
page read and write
591C000
stack
page read and write
26D26D17000
heap
page read and write
2001F977000
trusted library allocation
page read and write
26D26F1A000
trusted library allocation
page read and write
D13000
unkown
page execute and read and write
4E91000
heap
page read and write
20019A76000
trusted library allocation
page read and write
2001485A000
heap
page read and write
2001783C000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
4641000
heap
page read and write
4E91000
heap
page read and write
2001F994000
trusted library allocation
page read and write
6654000
heap
page read and write
4641000
heap
page read and write
26D26D33000
heap
page read and write
2880C4BD000
heap
page read and write
20025BC5000
trusted library allocation
page read and write
4641000
heap
page read and write
2001466E000
trusted library allocation
page read and write
496F000
stack
page read and write
DB0000
heap
page read and write
5FE8000
heap
page read and write
4701000
heap
page read and write
200173D9000
trusted library allocation
page read and write
1DF1A58C000
heap
page read and write
20021B4F000
trusted library allocation
page read and write
436E000
stack
page read and write
5CC5000
heap
page read and write
6E4000
heap
page read and write
2001765C000
trusted library allocation
page read and write
D5B000
heap
page read and write
2002153E000
trusted library allocation
page read and write
20021573000
trusted library allocation
page read and write
20019D5C000
trusted library allocation
page read and write
5D1C000
heap
page read and write
D79000
heap
page read and write
D50000
heap
page read and write
200219C7000
trusted library allocation
page read and write
200211A9000
trusted library allocation
page read and write
D76000
heap
page read and write
433E000
stack
page read and write
2001B97F000
trusted library allocation
page read and write
4E91000
heap
page read and write
A31000
unkown
page execute and write copy
2001484B000
heap
page read and write
5A30000
heap
page read and write
20019CB8000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
20017CF5000
trusted library allocation
page read and write
661D000
heap
page read and write
A41000
unkown
page execute and read and write
20014685000
trusted library allocation
page read and write
20019DEB000
trusted library allocation
page read and write
2001A80E000
trusted library allocation
page read and write
FB4000
unkown
page execute and read and write
26D26D21000
heap
page read and write
1744000
heap
page read and write
20019EC4000
trusted library allocation
page read and write
6671000
heap
page read and write
200189F0000
trusted library allocation
page read and write
4641000
heap
page read and write
2001483F000
heap
page read and write
5490000
direct allocation
page execute and read and write
20021D8C000
trusted library allocation
page read and write
358E000
stack
page read and write
4641000
heap
page read and write
2880C491000
heap
page read and write
6671000
heap
page read and write
2001C18F000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
20021B53000
trusted library allocation
page read and write
20017FB7000
trusted library allocation
page read and write
4641000
heap
page read and write
200176EF000
trusted library allocation
page read and write
20021584000
trusted library allocation
page read and write
1CAC95EC000
heap
page read and write
5C70000
heap
page read and write
5A34000
heap
page read and write
2001BA5D000
trusted library allocation
page read and write
6E4000
heap
page read and write
20017FD8000
trusted library allocation
page read and write
26D267FB000
trusted library allocation
page read and write
5D26000
heap
page read and write
26D264DF000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
51A0000
direct allocation
page read and write
4641000
heap
page read and write
6601000
heap
page read and write
2001738E000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
20014860000
heap
page read and write
20021BE9000
trusted library allocation
page read and write
5CCD000
heap
page read and write
200134E9000
trusted library allocation
page read and write
E3F000
unkown
page execute and read and write
65B5000
heap
page read and write
20021261000
trusted library allocation
page read and write
2001F5D9000
trusted library allocation
page read and write
2880C493000
heap
page read and write
7133000
heap
page read and write
200185AA000
trusted library allocation
page read and write
42BF000
stack
page read and write
2002197D000
trusted library allocation
page read and write
200134FE000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
2880E7BE000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
6665000
heap
page read and write
200175A4000
trusted library allocation
page read and write
200134F6000
trusted library allocation
page read and write
2001488F000
heap
page read and write
2001C19B000
trusted library allocation
page read and write
2880C486000
heap
page read and write
35AE000
stack
page read and write
20016E3D000
trusted library allocation
page read and write
1545000
heap
page read and write
2001B88D000
trusted library allocation
page read and write
5FDB000
heap
page read and write
D7D000
heap
page read and write
4641000
heap
page read and write
2880C493000
heap
page read and write
68EC000
stack
page read and write
2001B2DC000
trusted library allocation
page read and write
20021BE2000
trusted library allocation
page read and write
2001BECD000
trusted library allocation
page read and write
5F8F000
heap
page read and write
2001B2EC000
trusted library allocation
page read and write
2001F87B000
trusted library allocation
page read and write
2E0E000
stack
page read and write
DB7000
heap
page read and write
6E4000
heap
page read and write
5300000
direct allocation
page read and write
2001BEF5000
trusted library allocation
page read and write
2910000
direct allocation
page read and write
6855000
heap
page read and write
6870000
trusted library allocation
page read and write
20017C52000
trusted library allocation
page read and write
20018487000
trusted library allocation
page read and write
20018973000
trusted library allocation
page read and write
5E41000
heap
page read and write
200134D2000
trusted library allocation
page read and write
20019E29000
trusted library allocation
page read and write
5EB3000
heap
page read and write
4D11000
heap
page read and write
C76000
unkown
page execute and read and write
6645000
heap
page read and write
20025BAC000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
20019E60000
trusted library allocation
page read and write
1745000
heap
page read and write
20020FF4000
trusted library allocation
page read and write
6607000
heap
page read and write
9A7B7FF000
stack
page read and write
4641000
heap
page read and write
20019EFE000
trusted library allocation
page read and write
5C3F000
stack
page read and write
2001B3DB000
trusted library allocation
page read and write
231DC0C0000
heap
page read and write
4D11000
heap
page read and write
393E000
stack
page read and write
20021BA5000
trusted library allocation
page read and write
4641000
heap
page read and write
20021B67000
trusted library allocation
page read and write
4641000
heap
page read and write
DB4000
heap
page read and write
2001F523000
trusted library allocation
page read and write
2880C492000
heap
page read and write
5CFC000
heap
page read and write
4E71000
heap
page read and write
D7E000
heap
page read and write
4D6F000
stack
page read and write
65B5000
heap
page read and write
5B50000
trusted library allocation
page read and write
200147BC000
trusted library allocation
page read and write
4641000
heap
page read and write
2002159F000
trusted library allocation
page read and write
2880BB6C000
trusted library allocation
page read and write
2001BEFA000
trusted library allocation
page read and write
D4E000
heap
page read and write
20014762000
trusted library allocation
page read and write
200188D6000
trusted library allocation
page read and write
4641000
heap
page read and write
200146E5000
trusted library allocation
page read and write
20019D96000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
D50000
heap
page read and write
2880C49E000
heap
page read and write
26D27065000
trusted library allocation
page read and write
D4E000
heap
page read and write
20017CAE000
trusted library allocation
page read and write
574E000
stack
page read and write
2001F5A2000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
2002190A000
trusted library allocation
page read and write
45EF000
stack
page read and write
5C78000
heap
page read and write
E4D000
unkown
page execute and write copy
40CE000
stack
page read and write
200215D7000
trusted library allocation
page read and write
2001477F000
trusted library allocation
page read and write
26D26D39000
heap
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
20013455000
trusted library allocation
page read and write
2880C492000
heap
page read and write
26F0000
direct allocation
page read and write
5EB1000
heap
page read and write
332E000
stack
page read and write
4641000
heap
page read and write
5B5D000
heap
page read and write
5CF5000
heap
page read and write
2001B475000
trusted library allocation
page read and write
840000
direct allocation
page read and write
5C5A000
heap
page read and write
20021B9C000
trusted library allocation
page read and write
6601000
heap
page read and write
20017C7C000
trusted library allocation
page read and write
5CF5000
heap
page read and write
4E91000
heap
page read and write
6607000
heap
page read and write
1CACB1BC000
heap
page read and write
8C1000
unkown
page execute and write copy
20021800000
trusted library allocation
page read and write
5C35000
heap
page read and write
5580000
direct allocation
page execute and read and write
2880C4C5000
heap
page read and write
6934000
heap
page read and write
4641000
heap
page read and write
20021D3A000
trusted library allocation
page read and write
200147BE000
trusted library allocation
page read and write
2001757E000
trusted library allocation
page read and write
5A3000
unkown
page execute and read and write
20014846000
heap
page read and write
20020E1B000
trusted library allocation
page read and write
26D27509000
trusted library allocation
page read and write
200176D6000
trusted library allocation
page read and write
6E5000
heap
page read and write
2001765F000
trusted library allocation
page read and write
26D26D46000
heap
page read and write
31CE000
stack
page read and write
5470000
direct allocation
page read and write
2001737E000
trusted library allocation
page read and write
2001F58C000
trusted library allocation
page read and write
DB4000
heap
page read and write
5AAF000
heap
page read and write
6440000
trusted library allocation
page read and write
4CFF000
stack
page read and write
5C8C000
heap
page read and write
4D11000
heap
page read and write
200178D6000
trusted library allocation
page read and write
2001896F000
trusted library allocation
page read and write
20014836000
heap
page read and write
154F000
heap
page read and write
5FEA000
heap
page read and write
15CA000
heap
page read and write
840000
direct allocation
page read and write
20014855000
heap
page read and write
6743000
heap
page read and write
2880C4D6000
heap
page read and write
644F000
heap
page read and write
E83000
unkown
page execute and read and write
2001BE73000
trusted library allocation
page read and write
200176A3000
trusted library allocation
page read and write
62DF000
stack
page read and write
93C000
unkown
page write copy
20021E95000
trusted library allocation
page read and write
2001A8B3000
trusted library allocation
page read and write
20019EEA000
trusted library allocation
page read and write
2001BCEB000
trusted library allocation
page read and write
DA5000
heap
page read and write
200211A3000
trusted library allocation
page read and write
20019DC9000
trusted library allocation
page read and write
6591000
heap
page read and write
20020E35000
trusted library allocation
page read and write
200194F7000
trusted library allocation
page read and write
1744000
heap
page read and write
6041000
heap
page read and write
5CA1000
heap
page read and write
2001B82A000
trusted library allocation
page read and write
2001F595000
trusted library allocation
page read and write
1CAC9900000
trusted library allocation
page read and write
2001473C000
trusted library allocation
page read and write
1DF1A6A0000
heap
page read and write
20017FEB000
trusted library allocation
page read and write
20018472000
trusted library allocation
page read and write
661D000
heap
page read and write
20019D52000
trusted library allocation
page read and write
200215B3000
trusted library allocation
page read and write
6E4000
heap
page read and write
6695000
heap
page read and write
5C40000
heap
page read and write
FB4000
heap
page read and write
20014854000
heap
page read and write
2001B233000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
6633000
heap
page read and write
20014880000
heap
page read and write
200189F9000
trusted library allocation
page read and write
2880C48A000
heap
page read and write
1744000
heap
page read and write
E0000
unkown
page readonly
CA0000
direct allocation
page read and write
26D26FBB000
trusted library allocation
page read and write
DCA000
heap
page read and write
26D26D5B000
heap
page read and write
5DEE000
stack
page read and write
2001F871000
trusted library allocation
page read and write
2001B2F0000
trusted library allocation
page read and write
661D000
heap
page read and write
200176FD000
trusted library allocation
page read and write
5E54000
heap
page read and write
1744000
heap
page read and write
20019EB7000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
DB4000
heap
page read and write
20019EEA000
trusted library allocation
page read and write
5CF5000
heap
page read and write
D86000
heap
page read and write
6E4000
heap
page read and write
CA0000
direct allocation
page read and write
20013455000
trusted library allocation
page read and write
2001898B000
trusted library allocation
page read and write
20012EBF000
trusted library allocation
page read and write
20017565000
trusted library allocation
page read and write
6E4000
heap
page read and write
6711000
heap
page read and write
5F24000
heap
page read and write
20014870000
heap
page read and write
20014875000
heap
page read and write
4D50000
direct allocation
page execute and read and write
200147C1000
trusted library allocation
page read and write
200213EB000
trusted library allocation
page read and write
6632000
heap
page read and write
5CE8000
heap
page read and write
3CCF000
stack
page read and write
2001F57A000
trusted library allocation
page read and write
41F0000
heap
page read and write
D81000
heap
page read and write
200189C7000
trusted library allocation
page read and write
26D26D23000
heap
page read and write
20019EEF000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
10C8000
unkown
page execute and read and write
1B60000
direct allocation
page read and write
2880C4BA000
heap
page read and write
4E71000
heap
page read and write
4701000
heap
page read and write
20017C3E000
trusted library allocation
page read and write
5E76000
heap
page read and write
26D26D4A000
heap
page read and write
20019E1F000
trusted library allocation
page read and write
26D26D63000
heap
page read and write
26D26D5A000
heap
page read and write
20017C23000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
26D2681E000
trusted library allocation
page read and write
5AA1000
heap
page read and write
2001B354000
trusted library allocation
page read and write
4641000
heap
page read and write
20021247000
trusted library allocation
page read and write
20019ED5000
trusted library allocation
page read and write
200188B3000
trusted library allocation
page read and write
2001A8E2000
trusted library allocation
page read and write
20017CFD000
trusted library allocation
page read and write
5B90000
heap
page read and write
422F000
stack
page read and write
20020EDF000
trusted library allocation
page read and write
200213F0000
trusted library allocation
page read and write
2001F5FD000
trusted library allocation
page read and write
15BC000
heap
page read and write
4641000
heap
page read and write
5D81000
heap
page read and write
6E4000
heap
page read and write
200146A9000
trusted library allocation
page read and write
BA4000
heap
page read and write
4D20000
direct allocation
page execute and read and write
6647000
heap
page read and write
4D80000
direct allocation
page execute and read and write
6631000
heap
page read and write
20014758000
trusted library allocation
page read and write
6E4000
heap
page read and write
26D1C73A000
heap
page read and write
20025B7B000
trusted library allocation
page read and write
1744000
heap
page read and write
2001A881000
trusted library allocation
page read and write
D2E000
stack
page read and write
26D1C74A000
heap
page read and write
4C20000
direct allocation
page execute and read and write
5CE1000
heap
page read and write
55B0000
direct allocation
page execute and read and write
4641000
heap
page read and write
2001F51B000
trusted library allocation
page read and write
2900000
heap
page read and write
20019D92000
trusted library allocation
page read and write
2001F5EC000
trusted library allocation
page read and write
20016DBD000
trusted library allocation
page read and write
E00000
unkown
page readonly
20014850000
heap
page read and write
20020FDE000
trusted library allocation
page read and write
2001B261000
trusted library allocation
page read and write
26D26D2C000
heap
page read and write
4E91000
heap
page read and write
6642000
heap
page read and write
2001BFBF000
trusted library allocation
page read and write
2001F9E2000
trusted library allocation
page read and write
2001B91E000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2001898B000
trusted library allocation
page read and write
2001F9FA000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
4E71000
heap
page read and write
20025B94000
trusted library allocation
page read and write
200189AA000
trusted library allocation
page read and write
2001B872000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
200176F5000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
20017CF1000
trusted library allocation
page read and write
14F0000
heap
page read and write
4641000
heap
page read and write
26D26D63000
heap
page read and write
2880C492000
heap
page read and write
2880C4AD000
heap
page read and write
443F000
stack
page read and write
26D26FCB000
trusted library allocation
page read and write
340F000
stack
page read and write
5D0E000
heap
page read and write
26D27B09000
trusted library allocation
page read and write
61A3000
heap
page read and write
4D11000
heap
page read and write
6591000
heap
page read and write
6642000
heap
page read and write
5CC5000
heap
page read and write
20014758000
trusted library allocation
page read and write
20021B48000
trusted library allocation
page read and write
1952000
heap
page read and write
2001B43C000
trusted library allocation
page read and write
200146DB000
trusted library allocation
page read and write
20019E99000
trusted library allocation
page read and write
D75000
heap
page read and write
6643000
heap
page read and write
20013455000
trusted library allocation
page read and write
6647000
heap
page read and write
20021DE0000
trusted library allocation
page read and write
2001A883000
trusted library allocation
page read and write
281E000
stack
page read and write
6E4000
heap
page read and write
20021940000
trusted library allocation
page read and write
2001F8FC000
trusted library allocation
page read and write
2937000
heap
page read and write
26D26D2F000
heap
page read and write
200147C1000
trusted library allocation
page read and write
26D293A3000
trusted library allocation
page read and write
2001485F000
heap
page read and write
6BF9000
heap
page read and write
4D11000
heap
page read and write
20020EC8000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
26D26D4B000
heap
page read and write
55C0000
trusted library allocation
page read and write
2001F83F000
trusted library allocation
page read and write
92C000
heap
page read and write
20020FEF000
trusted library allocation
page read and write
6E4000
heap
page read and write
5C78000
heap
page read and write
26D26D5A000
heap
page read and write
1744000
heap
page read and write
2F5B000
stack
page read and write
6711000
heap
page read and write
290F000
stack
page read and write
2880C492000
heap
page read and write
1DF1A57F000
heap
page read and write
37CE000
stack
page read and write
20016D5F000
trusted library allocation
page read and write
2001789E000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
47E0000
direct allocation
page execute and read and write
2001F5C4000
trusted library allocation
page read and write
200215B3000
trusted library allocation
page read and write
529D000
stack
page read and write
5A6000
unkown
page execute and write copy
D61000
heap
page read and write
2001F516000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
4641000
heap
page read and write
26F0000
direct allocation
page read and write
20017312000
trusted library allocation
page read and write
6601000
heap
page read and write
200176D6000
trusted library allocation
page read and write
394E000
stack
page read and write
15E0000
heap
page read and write
2990000
direct allocation
page read and write
2880C4DB000
heap
page read and write
2001484B000
heap
page read and write
2880C4DB000
heap
page read and write
1744000
heap
page read and write
6E4000
heap
page read and write
2880C48D000
heap
page read and write
2001486C000
heap
page read and write
26D26D22000
heap
page read and write
630A000
heap
page read and write
20017C63000
trusted library allocation
page read and write
20018940000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26848000
trusted library allocation
page read and write
2001784F000
trusted library allocation
page read and write
20021139000
trusted library allocation
page read and write
65B2000
heap
page read and write
26D2950A000
trusted library allocation
page read and write
1744000
heap
page read and write
200175A4000
trusted library allocation
page read and write
4641000
heap
page read and write
2001F992000
trusted library allocation
page read and write
603F000
stack
page read and write
26D2706C000
trusted library allocation
page read and write
1744000
heap
page read and write
2001F99C000
trusted library allocation
page read and write
2880C492000
heap
page read and write
6644000
heap
page read and write
45EE000
stack
page read and write
4E71000
heap
page read and write
2001C094000
trusted library allocation
page read and write
D74000
heap
page read and write
200211D1000
trusted library allocation
page read and write
5D06000
heap
page read and write
5340000
remote allocation
page read and write
65DC000
heap
page read and write
6E4000
heap
page read and write
5C4E000
heap
page read and write
65D0000
heap
page read and write
15CB000
heap
page read and write
573000
unkown
page execute and read and write
200146C4000
trusted library allocation
page read and write
2880C49C000
heap
page read and write
1CAC95F1000
heap
page read and write
200189C7000
trusted library allocation
page read and write
2001F5C0000
trusted library allocation
page read and write
1547000
heap
page read and write
20021E6F000
trusted library allocation
page read and write
4D11000
heap
page read and write
200173F5000
trusted library allocation
page read and write
26D293CF000
trusted library allocation
page read and write
20021069000
trusted library allocation
page read and write
2001C2C5000
trusted library allocation
page read and write
2001BEA2000
trusted library allocation
page read and write
6E4000
heap
page read and write
4B80000
direct allocation
page execute and read and write
26D26D2D000
heap
page read and write
5530000
direct allocation
page execute and read and write
200134F5000
trusted library allocation
page read and write
20021DAD000
trusted library allocation
page read and write
4641000
heap
page read and write
2001488F000
heap
page read and write
200176BE000
trusted library allocation
page read and write
20020FDB000
trusted library allocation
page read and write
135C000
stack
page read and write
20014685000
trusted library allocation
page read and write
2001763A000
trusted library allocation
page read and write
26D26D1C000
heap
page read and write
200212D0000
trusted library allocation
page read and write
2001F881000
trusted library allocation
page read and write
20019EFC000
trusted library allocation
page read and write
200189C7000
trusted library allocation
page read and write
3D2E000
stack
page read and write
CCD000
unkown
page execute and write copy
15E0000
heap
page read and write
4E91000
heap
page read and write
3BAF000
stack
page read and write
200188FE000
trusted library allocation
page read and write
2001F871000
trusted library allocation
page read and write
6E4000
heap
page read and write
26D26D2F000
heap
page read and write
2880C493000
heap
page read and write
5C78000
heap
page read and write
2001789E000
trusted library allocation
page read and write
200147F3000
trusted library allocation
page read and write
6647000
heap
page read and write
4641000
heap
page read and write
15E0000
heap
page read and write
14A4000
heap
page read and write
6E4000
heap
page read and write
77F97FF000
stack
page read and write
4E80000
direct allocation
page read and write
5C78000
heap
page read and write
20017699000
trusted library allocation
page read and write
2001F93A000
trusted library allocation
page read and write
20014694000
trusted library allocation
page read and write
200176EF000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001484E000
heap
page read and write
1DEAF900000
trusted library allocation
page read and write
2880C494000
heap
page read and write
26D26D22000
heap
page read and write
4A90000
direct allocation
page execute and read and write
54D0000
direct allocation
page execute and read and write
1744000
heap
page read and write
D81000
heap
page read and write
20018989000
trusted library allocation
page read and write
4641000
heap
page read and write
2880C491000
heap
page read and write
20017866000
trusted library allocation
page read and write
2880C4AB000
heap
page read and write
5B8B000
heap
page read and write
5430000
direct allocation
page execute and read and write
40BF000
stack
page read and write
20019DED000
trusted library allocation
page read and write
5F87000
heap
page read and write
1745000
heap
page read and write
20019CF9000
trusted library allocation
page read and write
6E4000
heap
page read and write
D8B000
heap
page read and write
5CF5000
heap
page read and write
2001F9FA000
trusted library allocation
page read and write
26D26D2C000
heap
page read and write
20016DBD000
trusted library allocation
page read and write
20014875000
heap
page read and write
6607000
heap
page read and write
200219FB000
trusted library allocation
page read and write
5340000
remote allocation
page read and write
D84000
heap
page read and write
20017F6C000
trusted library allocation
page read and write
20019EAE000
trusted library allocation
page read and write
6E4000
heap
page read and write
200173CA000
trusted library allocation
page read and write
200219AD000
trusted library allocation
page read and write
200176BF000
trusted library allocation
page read and write
D64000
heap
page read and write
1744000
heap
page read and write
20018977000
trusted library allocation
page read and write
2001A8AD000
trusted library allocation
page read and write
5FAD000
heap
page read and write
20021249000
trusted library allocation
page read and write
15E1000
heap
page read and write
20017C4E000
trusted library allocation
page read and write
2001F9B9000
trusted library allocation
page read and write
929000
heap
page read and write
200212D9000
trusted library allocation
page read and write
6601000
heap
page read and write
20014875000
heap
page read and write
6659000
heap
page read and write
630B000
heap
page read and write
6E4000
heap
page read and write
200173F7000
trusted library allocation
page read and write
5CE9000
heap
page read and write
2880E709000
trusted library allocation
page read and write
20021B10000
trusted library allocation
page read and write
20021B4E000
trusted library allocation
page read and write
E33000
unkown
page execute and read and write
2001BEA2000
trusted library allocation
page read and write
386E000
stack
page read and write
2880C488000
heap
page read and write
5F15000
heap
page read and write
2001AEA8000
trusted library allocation
page read and write
10A8000
unkown
page execute and read and write
2001F5D9000
trusted library allocation
page read and write
5B8D000
heap
page read and write
2001B3CB000
trusted library allocation
page read and write
20014855000
heap
page read and write
4641000
heap
page read and write
20019A7C000
trusted library allocation
page read and write
8BC000
heap
page read and write
DCD000
heap
page read and write
4641000
heap
page read and write
200188C7000
trusted library allocation
page read and write
20019EAE000
trusted library allocation
page read and write
DCD000
heap
page read and write
2880C48B000
heap
page read and write
20016DCD000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
6E5000
heap
page read and write
3FF000
unkown
page execute and write copy
2001B8CD000
trusted library allocation
page read and write
2001787A000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
5C42000
heap
page read and write
26D26D4A000
heap
page read and write
2880C4DB000
heap
page read and write
6652000
heap
page read and write
20019EB7000
trusted library allocation
page read and write
20019E86000
trusted library allocation
page read and write
200176A3000
trusted library allocation
page read and write
20014875000
heap
page read and write
65DC000
heap
page read and write
6E4000
heap
page read and write
6571000
heap
page read and write
4810000
direct allocation
page execute and read and write
200147F6000
trusted library allocation
page read and write
2001342F000
trusted library allocation
page read and write
6631000
heap
page read and write
2880BF48000
trusted library allocation
page read and write
4D11000
heap
page read and write
26D26D44000
heap
page read and write
20017FE4000
trusted library allocation
page read and write
5F24000
heap
page read and write
DC0000
unkown
page read and write
20019DC6000
trusted library allocation
page read and write
661D000
heap
page read and write
1744000
heap
page read and write
6603000
heap
page read and write
26D26D80000
heap
page read and write
660A000
heap
page read and write
DB4000
heap
page read and write
2001BFC0000
trusted library allocation
page read and write
1966000
heap
page read and write
2002475D000
trusted library allocation
page read and write
2910000
direct allocation
page read and write
4641000
heap
page read and write
20014868000
heap
page read and write
20019EBE000
trusted library allocation
page read and write
20020E10000
trusted library allocation
page read and write
2001483F000
heap
page read and write
20019D96000
trusted library allocation
page read and write
26D26D57000
heap
page read and write
5C78000
heap
page read and write
3BBF000
stack
page read and write
200147DD000
trusted library allocation
page read and write
5DAF000
stack
page read and write
26D27076000
trusted library allocation
page read and write
52FF000
stack
page read and write
1744000
heap
page read and write
2001B889000
trusted library allocation
page read and write
D77000
heap
page read and write
2880C494000
heap
page read and write
200173EE000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
200178F2000
trusted library allocation
page read and write
6385000
heap
page read and write
863000
unkown
page execute and read and write
2001A8DA000
trusted library allocation
page read and write
26D26FBB000
trusted library allocation
page read and write
20019EA7000
trusted library allocation
page read and write
20019EDA000
trusted library allocation
page read and write
200189A5000
trusted library allocation
page read and write
20021E5D000
trusted library allocation
page read and write
4641000
heap
page read and write
5FE8000
heap
page read and write
2001C0A2000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
15CC000
heap
page read and write
4E91000
heap
page read and write
26F0000
direct allocation
page read and write
143E000
stack
page read and write
26D26D4B000
heap
page read and write
20017C78000
trusted library allocation
page read and write
26D26D67000
heap
page read and write
3C7F000
stack
page read and write
2880C4AB000
heap
page read and write
200185C8000
trusted library allocation
page read and write
2880C485000
heap
page read and write
200189FC000
trusted library allocation
page read and write
45FE000
stack
page read and write
2001765F000
trusted library allocation
page read and write
62BF000
heap
page read and write
65B0000
heap
page read and write
4D8B000
stack
page read and write
200176F3000
trusted library allocation
page read and write
20014845000
heap
page read and write
2880C48A000
heap
page read and write
5330000
direct allocation
page execute and read and write
20016DE0000
trusted library allocation
page read and write
20014854000
heap
page read and write
20021BE9000
trusted library allocation
page read and write
5C78000
heap
page read and write
20017C4E000
trusted library allocation
page read and write
20014845000
heap
page read and write
200176D6000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
20014843000
heap
page read and write
1CAC990A000
trusted library allocation
page read and write
20020E69000
trusted library allocation
page read and write
20021EAA000
trusted library allocation
page read and write
E02000
unkown
page execute and read and write
26D26D57000
heap
page read and write
660A000
heap
page read and write
A96000
unkown
page write copy
6F6AFFF000
stack
page read and write
5D31000
heap
page read and write
200178D6000
trusted library allocation
page read and write
2001BFB0000
trusted library allocation
page read and write
2880BB64000
trusted library allocation
page read and write
2001F98E000
trusted library allocation
page read and write
2001F98E000
trusted library allocation
page read and write
20021B75000
trusted library allocation
page read and write
20019EF9000
trusted library allocation
page read and write
5340000
direct allocation
page read and write
200188AE000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
200199E6000
trusted library allocation
page read and write
5EB1000
heap
page read and write
200189EB000
trusted library allocation
page read and write
1744000
heap
page read and write
2A0000
unkown
page read and write
2001BEC0000
trusted library allocation
page read and write
20025B8F000
trusted library allocation
page read and write
6642000
heap
page read and write
2001F93A000
trusted library allocation
page read and write
2001783C000
trusted library allocation
page read and write
200212F2000
trusted library allocation
page read and write
5C44000
heap
page read and write
2880BB84000
trusted library allocation
page read and write
4641000
heap
page read and write
2001F86C000
trusted library allocation
page read and write
4E91000
heap
page read and write
26D26D5A000
heap
page read and write
5C45000
heap
page read and write
20016DBA000
trusted library allocation
page read and write
4D20000
remote allocation
page read and write
5EC5000
heap
page read and write
840000
direct allocation
page read and write
2001F994000
trusted library allocation
page read and write
20021D55000
trusted library allocation
page read and write
26D26D47000
heap
page read and write
6601000
heap
page read and write
200189BA000
trusted library allocation
page read and write
6E4000
heap
page read and write
6654000
heap
page read and write
57DE000
stack
page read and write
1450000
heap
page read and write
20021D47000
trusted library allocation
page read and write
2A1000
unkown
page execute and read and write
20017693000
trusted library allocation
page read and write
1B4F000
stack
page read and write
6E4000
heap
page read and write
20019DA3000
trusted library allocation
page read and write
6F6A7FE000
stack
page read and write
5340000
remote allocation
page read and write
20019EF8000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26D5A000
heap
page read and write
D4F000
heap
page read and write
5B90000
heap
page read and write
2880C493000
heap
page read and write
2880C4AD000
heap
page read and write
2001BEC0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
562C000
stack
page read and write
200212DA000
trusted library allocation
page read and write
200146A9000
trusted library allocation
page read and write
20014691000
trusted library allocation
page read and write
40EE000
stack
page read and write
5C78000
heap
page read and write
2880C4AB000
heap
page read and write
2001BF15000
trusted library allocation
page read and write
15CA000
heap
page read and write
33BF000
stack
page read and write
2001F830000
trusted library allocation
page read and write
200189DF000
trusted library allocation
page read and write
2001F9B2000
trusted library allocation
page read and write
2001759D000
trusted library allocation
page read and write
20021BFB000
trusted library allocation
page read and write
2880C488000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4641000
heap
page read and write
26D26D33000
heap
page read and write
5DB3000
heap
page read and write
1744000
heap
page read and write
45BE000
stack
page read and write
4E71000
heap
page read and write
2880CBB7000
trusted library allocation
page read and write
5C78000
heap
page read and write
2001F535000
trusted library allocation
page read and write
6E5000
heap
page read and write
2880C48B000
heap
page read and write
26D26D32000
heap
page read and write
1CAC9603000
heap
page read and write
2880C609000
trusted library allocation
page read and write
200173BA000
trusted library allocation
page read and write
200175A4000
trusted library allocation
page read and write
4E91000
heap
page read and write
200134FB000
trusted library allocation
page read and write
200146EB000
trusted library allocation
page read and write
2001484B000
heap
page read and write
5C57000
heap
page read and write
4C00000
remote allocation
page read and write
200159DF000
trusted library allocation
page read and write
D49000
heap
page read and write
5F5E000
stack
page read and write
5C35000
heap
page read and write
6DC0000
heap
page read and write
6E4000
heap
page read and write
2001BEDA000
trusted library allocation
page read and write
20021580000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001486E000
heap
page read and write
20017C26000
trusted library allocation
page read and write
657F000
heap
page read and write
A9C000
stack
page read and write
DB2000
heap
page read and write
2001C129000
trusted library allocation
page read and write
26D27042000
trusted library allocation
page read and write
1744000
heap
page read and write
2880C4DB000
heap
page read and write
26D26D32000
heap
page read and write
2880C489000
heap
page read and write
2001A8FE000
trusted library allocation
page read and write
20019CB6000
trusted library allocation
page read and write
1744000
heap
page read and write
20014870000
heap
page read and write
2001A895000
trusted library allocation
page read and write
26D26D2C000
heap
page read and write
20016EB9000
trusted library allocation
page read and write
20017C5A000
trusted library allocation
page read and write
F9F000
stack
page read and write
1DF1C380000
heap
page read and write
200176F7000
trusted library allocation
page read and write
20019D82000
trusted library allocation
page read and write
6E4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
200199E6000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
347E000
stack
page read and write
DB1000
heap
page read and write
15C6000
heap
page read and write
26D26D44000
heap
page read and write
2001F823000
trusted library allocation
page read and write
D79000
heap
page read and write
2880E896000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
20014845000
heap
page read and write
6743000
heap
page read and write
200173D2000
trusted library allocation
page read and write
51FB000
stack
page read and write
2880E8FC000
trusted library allocation
page read and write
200173BC000
trusted library allocation
page read and write
15E0000
heap
page read and write
6601000
heap
page read and write
2001484C000
heap
page read and write
D60000
heap
page read and write
14A4000
heap
page read and write
1FC609B1E000
trusted library allocation
page read and write
476E000
stack
page read and write
20017371000
trusted library allocation
page read and write
6640000
heap
page read and write
26D26D2C000
heap
page read and write
2001A8C4000
trusted library allocation
page read and write
2001BFA5000
trusted library allocation
page read and write
20017682000
trusted library allocation
page read and write
15C6000
heap
page read and write
4641000
heap
page read and write
200176FD000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
D73000
heap
page read and write
D80000
heap
page read and write
26D26D32000
heap
page read and write
5A0B000
heap
page read and write
6E4000
heap
page read and write
390F000
stack
page read and write
26D26D2D000
heap
page read and write
6588000
heap
page read and write
6637000
heap
page read and write
26D293B0000
trusted library allocation
page read and write
5FDB000
heap
page read and write
5F84000
heap
page read and write
231DC500000
trusted library allocation
page read and write
5B0E000
stack
page read and write
5DFE000
stack
page read and write
6607000
heap
page read and write
4E71000
heap
page read and write
55E4000
trusted library allocation
page read and write
2002197D000
trusted library allocation
page read and write
200189F7000
trusted library allocation
page read and write
41BF000
stack
page read and write
20021197000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
1DF1C1B7000
heap
page read and write
2001785A000
trusted library allocation
page read and write
659B000
heap
page read and write
6654000
heap
page read and write
660A000
heap
page read and write
49AF000
stack
page read and write
26D1C74A000
heap
page read and write
20021936000
trusted library allocation
page read and write
6616000
heap
page read and write
26D26D33000
heap
page read and write
6523000
heap
page read and write
200146A0000
trusted library allocation
page read and write
20020E28000
trusted library allocation
page read and write
20017FC5000
trusted library allocation
page read and write
200212F2000
trusted library allocation
page read and write
61D8000
heap
page read and write
6E4000
heap
page read and write
5CF7000
heap
page read and write
20019EAB000
trusted library allocation
page read and write
D7B000
heap
page read and write
E06000
unkown
page read and write
5C47000
heap
page read and write
14A4000
heap
page read and write
2001B22D000
trusted library allocation
page read and write
141000
unkown
page execute and read and write
20017FC1000
trusted library allocation
page read and write
20014875000
heap
page read and write
4641000
heap
page read and write
231DC1E0000
heap
page read and write
2880BF75000
trusted library allocation
page read and write
20017CE8000
trusted library allocation
page read and write
26D26D21000
heap
page read and write
46FE000
stack
page read and write
5C49000
heap
page read and write
2001F86C000
trusted library allocation
page read and write
486E000
stack
page read and write
20019B73000
trusted library allocation
page read and write
2001F9F8000
trusted library allocation
page read and write
156C000
heap
page read and write
20016DE5000
trusted library allocation
page read and write
20013460000
trusted library allocation
page read and write
5590000
direct allocation
page read and write
B73000
unkown
page execute and read and write
2001B36C000
trusted library allocation
page read and write
DC8000
heap
page read and write
304E000
stack
page read and write
6E4000
heap
page read and write
5E51000
heap
page read and write
671E000
stack
page read and write
20021DAD000
trusted library allocation
page read and write
B77000
unkown
page read and write
2001BF92000
trusted library allocation
page read and write
661D000
heap
page read and write
2001486F000
heap
page read and write
1744000
heap
page read and write
4641000
heap
page read and write
D62000
heap
page read and write
20019E6E000
trusted library allocation
page read and write
A700DFF000
stack
page read and write
26D26D5B000
heap
page read and write
20021DA5000
trusted library allocation
page read and write
20017854000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
2001B35F000
trusted library allocation
page read and write
5B8F000
heap
page read and write
20017F92000
trusted library allocation
page read and write
20021BFB000
trusted library allocation
page read and write
2001A86E000
trusted library allocation
page read and write
E9A67FE000
stack
page read and write
2001B8D8000
trusted library allocation
page read and write
4641000
heap
page read and write
4701000
heap
page read and write
15D5000
heap
page read and write
2001C228000
trusted library allocation
page read and write
20017CB1000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
20017D8C000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
20014845000
heap
page read and write
392F000
stack
page read and write
279E000
stack
page read and write
2880C49E000
heap
page read and write
1744000
heap
page read and write
26D26D5A000
heap
page read and write
5550000
direct allocation
page execute and read and write
6BF9000
heap
page read and write
4D11000
heap
page read and write
D83000
heap
page read and write
6662000
heap
page read and write
26D26D31000
heap
page read and write
20025B9B000
trusted library allocation
page read and write
4641000
heap
page read and write
6E4000
heap
page read and write
3CEF000
stack
page read and write
5C85000
heap
page read and write
5D08000
heap
page read and write
20014875000
heap
page read and write
4D11000
heap
page read and write
20021278000
trusted library allocation
page read and write
20014779000
trusted library allocation
page read and write
2001784F000
trusted library allocation
page read and write
5CF5000
heap
page read and write
D83000
heap
page read and write
20021BFB000
trusted library allocation
page read and write
5EB3000
heap
page read and write
2030003F000
trusted library allocation
page read and write
1DF1A591000
heap
page read and write
20014714000
trusted library allocation
page read and write
6643000
heap
page read and write
2001BCC5000
trusted library allocation
page read and write
26D26D67000
heap
page read and write
4641000
heap
page read and write
4D00000
direct allocation
page read and write
4641000
heap
page read and write
6E4000
heap
page read and write
26D26D2D000
heap
page read and write
200195E9000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001345C000
trusted library allocation
page read and write
2001486F000
heap
page read and write
1CACB1B7000
heap
page read and write
191E000
heap
page read and write
26D26D4B000
heap
page read and write
4641000
heap
page read and write
4B70000
direct allocation
page execute and read and write
26D26473000
trusted library allocation
page read and write
26D26D1E000
heap
page read and write
4E71000
heap
page read and write
2880BFF6000
trusted library allocation
page read and write
4E71000
heap
page read and write
20017C77000
trusted library allocation
page read and write
141D000
heap
page read and write
200173D2000
trusted library allocation
page read and write
4E91000
heap
page read and write
2880E842000
trusted library allocation
page read and write
31BF000
stack
page read and write
5390000
direct allocation
page execute and read and write
4BDC000
stack
page read and write
2001F5D7000
trusted library allocation
page read and write
2880BF43000
trusted library allocation
page read and write
26D26D17000
heap
page read and write
20016DD4000
trusted library allocation
page read and write
20017FC6000
trusted library allocation
page read and write
2002159B000
trusted library allocation
page read and write
298B6909000
heap
page read and write
5B80000
trusted library allocation
page read and write
20017557000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
6961000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
200147BE000
trusted library allocation
page read and write
2001B377000
trusted library allocation
page read and write
66C8000
heap
page read and write
6E4000
heap
page read and write
2880C4BA000
heap
page read and write
2001B894000
trusted library allocation
page read and write
3FEE000
stack
page read and write
20017384000
trusted library allocation
page read and write
20019BD2000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
609E000
stack
page read and write
6E4000
heap
page read and write
2001B2F3000
trusted library allocation
page read and write
5472000
direct allocation
page read and write
2001483F000
heap
page read and write
26D26D4D000
heap
page read and write
20016D30000
trusted library allocation
page read and write
2001B8B9000
trusted library allocation
page read and write
5D90000
remote allocation
page read and write
4641000
heap
page read and write
D72000
heap
page read and write
41EF000
stack
page read and write
200215B3000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
57DC000
heap
page read and write
6F5A000
heap
page read and write
5E51000
heap
page read and write
200176BF000
trusted library allocation
page read and write
5F87000
heap
page read and write
660A000
heap
page read and write
20021E36000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
200176CF000
trusted library allocation
page read and write
A77666E000
stack
page read and write
26D26D2F000
heap
page read and write
65D0000
heap
page read and write
26D26D2D000
heap
page read and write
2001476C000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
DB4000
heap
page read and write
2880C4AD000
heap
page read and write
2001B347000
trusted library allocation
page read and write
20021B6A000
trusted library allocation
page read and write
93C000
stack
page read and write
2001A8F2000
trusted library allocation
page read and write
6631000
heap
page read and write
5F82000
heap
page read and write
D76000
heap
page read and write
20021DE6000
trusted library allocation
page read and write
20016E5D000
trusted library allocation
page read and write
20014836000
heap
page read and write
20019E60000
trusted library allocation
page read and write
15BE000
heap
page read and write
20016D33000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
5D13000
heap
page read and write
41FF000
stack
page read and write
6593000
heap
page read and write
200215C7000
trusted library allocation
page read and write
4701000
heap
page read and write
200173E6000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
A05000
heap
page read and write
4641000
heap
page read and write
2001785A000
trusted library allocation
page read and write
422E000
stack
page read and write
200176BF000
trusted library allocation
page read and write
2001738A000
trusted library allocation
page read and write
20014860000
heap
page read and write
37EF000
stack
page read and write
2001F584000
trusted library allocation
page read and write
20016EC8000
trusted library allocation
page read and write
20017C2E000
trusted library allocation
page read and write
4641000
heap
page read and write
15E0000
heap
page read and write
200212D9000
trusted library allocation
page read and write
2001488F000
heap
page read and write
65E0000
heap
page read and write
62BE000
heap
page read and write
2001BC3A000
trusted library allocation
page read and write
6714000
heap
page read and write
6E4000
heap
page read and write
26D26D31000
heap
page read and write
2001F92B000
trusted library allocation
page read and write
4E71000
heap
page read and write
200178D6000
trusted library allocation
page read and write
26D26FB5000
trusted library allocation
page read and write
200212F8000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
453F000
stack
page read and write
6E4000
heap
page read and write
2001A8D8000
trusted library allocation
page read and write
2001F5C1000
trusted library allocation
page read and write
2001BEB6000
trusted library allocation
page read and write
20020E2E000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
9A7CFFE000
stack
page read and write
200176F3000
trusted library allocation
page read and write
1744000
heap
page read and write
2880BF1E000
trusted library allocation
page read and write
661D000
heap
page read and write
2FF0000
heap
page read and write
5A4000
unkown
page execute and write copy
47F0000
direct allocation
page execute and read and write
15CC000
heap
page read and write
26D26D4E000
heap
page read and write
30D0000
direct allocation
page read and write
26D26D23000
heap
page read and write
2001B414000
trusted library allocation
page read and write
2001BF25000
trusted library allocation
page read and write
277A000
heap
page read and write
20014875000
heap
page read and write
20017C27000
trusted library allocation
page read and write
20013460000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
5C57000
heap
page read and write
55A0000
heap
page read and write
5D30000
trusted library allocation
page read and write
5C4E000
heap
page read and write
2001789B000
trusted library allocation
page read and write
6E4000
heap
page read and write
20019DF2000
trusted library allocation
page read and write
20021B48000
trusted library allocation
page read and write
14A4000
heap
page read and write
5C52000
heap
page read and write
20014845000
heap
page read and write
4E71000
heap
page read and write
20017378000
trusted library allocation
page read and write
6E4000
heap
page read and write
65B1000
heap
page read and write
6603000
heap
page read and write
26D26D5A000
heap
page read and write
26D26D63000
heap
page read and write
6E4000
heap
page read and write
20014845000
heap
page read and write
20014796000
trusted library allocation
page read and write
20012EAA000
trusted library allocation
page read and write
20019EDE000
trusted library allocation
page read and write
4D11000
heap
page read and write
5DD5991000
trusted library allocation
page execute read
4E71000
heap
page read and write
2001F8BA000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
2880C49E000
heap
page read and write
327F000
stack
page read and write
CA0000
direct allocation
page read and write
2001784C000
trusted library allocation
page read and write
6F6BFFF000
stack
page read and write
200188FD000
trusted library allocation
page read and write
6E4000
heap
page read and write
30BE000
stack
page read and write
6E4000
heap
page read and write
26D26D5A000
heap
page read and write
6E5000
heap
page read and write
4E71000
heap
page read and write
6E4000
heap
page read and write
FB4000
heap
page read and write
20016DDC000
trusted library allocation
page read and write
20021DA7000
trusted library allocation
page read and write
9A0000
heap
page read and write
20021DE2000
trusted library allocation
page read and write
200195B2000
trusted library allocation
page read and write
D83000
heap
page read and write
2001C1AC000
trusted library allocation
page read and write
66FC000
heap
page read and write
20019400000
trusted library allocation
page read and write
5ADE000
heap
page read and write
D83000
heap
page read and write
2001BEB4000
trusted library allocation
page read and write
6E92000
heap
page read and write
2002196E000
trusted library allocation
page read and write
5D06000
heap
page read and write
2001BEDB000
trusted library allocation
page read and write
20019CEE000
trusted library allocation
page read and write
20025BB1000
trusted library allocation
page read and write
2001952B000
trusted library allocation
page read and write
200177DB000
trusted library allocation
page read and write
20021D51000
trusted library allocation
page read and write
3B4F000
stack
page read and write
4B50000
direct allocation
page execute and read and write
200176D9000
trusted library allocation
page read and write
2001466E000
trusted library allocation
page read and write
20025B35000
trusted library allocation
page read and write
20021DF0000
trusted library allocation
page read and write
5EB1000
heap
page read and write
4E91000
heap
page read and write
6E5000
heap
page read and write
4541000
heap
page read and write
2880E7BB000
trusted library allocation
page read and write
7C3E000
stack
page read and write
4B81000
direct allocation
page read and write
20021B75000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
26D26D63000
heap
page read and write
20014836000
heap
page read and write
15BE000
heap
page read and write
5520000
direct allocation
page execute and read and write
200212A6000
trusted library allocation
page read and write
26D26D18000
heap
page read and write
2001C274000
trusted library allocation
page read and write
200173E5000
trusted library allocation
page read and write
200176AC000
trusted library allocation
page read and write
6641000
heap
page read and write
5B54000
heap
page read and write
200219E8000
trusted library allocation
page read and write
200146A0000
trusted library allocation
page read and write
3D7000
unkown
page read and write
26D26D1D000
heap
page read and write
20018985000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
3E3E000
stack
page read and write
6601000
heap
page read and write
4E80000
direct allocation
page read and write
2910000
direct allocation
page read and write
2880C4AD000
heap
page read and write
2001B835000
trusted library allocation
page read and write
2880C493000
heap
page read and write
3E8000
unkown
page execute and read and write
26D26D16000
heap
page read and write
26F0000
direct allocation
page read and write
200212A4000
trusted library allocation
page read and write
2001484B000
heap
page read and write
2001F8E2000
trusted library allocation
page read and write
20020E74000
trusted library allocation
page read and write
20024710000
trusted library allocation
page read and write
2001F974000
trusted library allocation
page read and write
5CA4000
heap
page read and write
20016DD4000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
29C0000
heap
page read and write
20024730000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
6E5000
heap
page read and write
6E4000
heap
page read and write
20021355000
trusted library allocation
page read and write
2880BBC7000
trusted library allocation
page read and write
20021549000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
90C000
unkown
page readonly
20019EA9000
trusted library allocation
page read and write
5E8B000
heap
page read and write
2002475D000
trusted library allocation
page read and write
200189AA000
trusted library allocation
page read and write
4AFF000
stack
page read and write
26D26D4A000
heap
page read and write
42FF000
stack
page read and write
2001F5D1000
trusted library allocation
page read and write
10DE000
unkown
page execute and read and write
6E4000
heap
page read and write
1CACB1B0000
heap
page read and write
20020FF4000
trusted library allocation
page read and write
20019E60000
trusted library allocation
page read and write
200176BE000
trusted library allocation
page read and write
20019EBA000
trusted library allocation
page read and write
2001484C000
heap
page read and write
577F000
stack
page read and write
1744000
heap
page read and write
20021E6F000
trusted library allocation
page read and write
2880C48E000
heap
page read and write
6580000
heap
page read and write
26D270B4000
trusted library allocation
page read and write
200146A9000
trusted library allocation
page read and write
2880CBB4000
trusted library allocation
page read and write
2002477C000
trusted library allocation
page read and write
1F0000
heap
page read and write
26D26D32000
heap
page read and write
DB6000
heap
page read and write
1DF1A90A000
trusted library allocation
page read and write
20021579000
trusted library allocation
page read and write
20017C1B000
trusted library allocation
page read and write
5E54000
heap
page read and write
2880C4AD000
heap
page read and write
2880C48B000
heap
page read and write
D3611FF000
stack
page read and write
20020E5B000
trusted library allocation
page read and write
5FAC000
heap
page read and write
53A0000
direct allocation
page execute and read and write
408F000
stack
page read and write
5AFD000
stack
page read and write
26D26D33000
heap
page read and write
26D26D5A000
heap
page read and write
4D20000
direct allocation
page execute and read and write
3FAE000
stack
page read and write
20017F73000
trusted library allocation
page read and write
5D81000
heap
page read and write
5B5E000
heap
page read and write
2001BEC9000
trusted library allocation
page read and write
5CF5000
heap
page read and write
4E91000
heap
page read and write
317E000
stack
page read and write
20019E5E000
trusted library allocation
page read and write
3A4F000
stack
page read and write
20020E38000
trusted library allocation
page read and write
200176B8000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
2001A8C1000
trusted library allocation
page read and write
2880E8B4000
trusted library allocation
page read and write
2001BEC8000
trusted library allocation
page read and write
231DDDA0000
heap
page read and write
BA0000
heap
page read and write
D7A000
heap
page read and write
26D2983A000
trusted library allocation
page read and write
200188E6000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
2001BEF5000
trusted library allocation
page read and write
2001B35F000
trusted library allocation
page read and write
200189C3000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5E51000
heap
page read and write
FB4000
heap
page read and write
6E4000
heap
page read and write
20020E73000
trusted library allocation
page read and write
20021EF9000
trusted library allocation
page read and write
200213F4000
trusted library allocation
page read and write
26D27095000
trusted library allocation
page read and write
6E4000
heap
page read and write
20025B00000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
5D33000
heap
page read and write
6399000
heap
page read and write
20014845000
heap
page read and write
20017554000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
2001BEB4000
trusted library allocation
page read and write
2001BEDE000
trusted library allocation
page read and write
20021BA5000
trusted library allocation
page read and write
200178D0000
trusted library allocation
page read and write
6E4000
heap
page read and write
4E71000
heap
page read and write
693000
unkown
page execute and read and write
5770000
direct allocation
page execute and read and write
1744000
heap
page read and write
26D26D2F000
heap
page read and write
20017F9E000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
20021048000
trusted library allocation
page read and write
2001F952000
trusted library allocation
page read and write
6652000
heap
page read and write
54C0000
remote allocation
page read and write
6E4000
heap
page read and write
CBF000
unkown
page execute and read and write
2001484B000
heap
page read and write
2001484B000
heap
page read and write
6E4000
heap
page read and write
6786000
heap
page read and write
5F87000
heap
page read and write
26D26D62000
heap
page read and write
D5B000
heap
page read and write
4641000
heap
page read and write
4A7F000
stack
page read and write
200176F5000
trusted library allocation
page read and write
6E4000
heap
page read and write
DD8000
heap
page read and write
6E4000
heap
page read and write
D79000
heap
page read and write
3E0F000
stack
page read and write
6E4000
heap
page read and write
2001F83A000
trusted library allocation
page read and write
20019E90000
trusted library allocation
page read and write
9F3000
unkown
page execute and read and write
200188C2000
trusted library allocation
page read and write
938000
heap
page read and write
6E4000
heap
page read and write
4D11000
heap
page read and write
2880BFB5000
trusted library allocation
page read and write
20021BA9000
trusted library allocation
page read and write
6873000
heap
page read and write
5CA0000
heap
page read and write
2001F9EF000
trusted library allocation
page read and write
A30000
unkown
page readonly
200215AD000
trusted library allocation
page read and write
20021592000
trusted library allocation
page read and write
200188C3000
trusted library allocation
page read and write
2001841C000
trusted library allocation
page read and write
1441000
heap
page read and write
5D85000
heap
page read and write
6658000
heap
page read and write
2001B386000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
20019E86000
trusted library allocation
page read and write
61C4000
heap
page read and write
4641000
heap
page read and write
14FA000
heap
page read and write
2001F55B000
trusted library allocation
page read and write
20016DBD000
trusted library allocation
page read and write
2001488F000
heap
page read and write
20020FBB000
trusted library allocation
page read and write
4D11000
heap
page read and write
6E4000
heap
page read and write
241324B13000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
5C52000
heap
page read and write
4641000
heap
page read and write
200176A1000
trusted library allocation
page read and write
2880C492000
heap
page read and write
5CE0000
heap
page read and write
20012EA6000
trusted library allocation
page read and write
5F87000
heap
page read and write
2001F9A2000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
26D26D4A000
heap
page read and write
2880C48C000
heap
page read and write
2001BC37000
trusted library allocation
page read and write
20019DA3000
trusted library allocation
page read and write
2001BEB9000
trusted library allocation
page read and write
6E4000
heap
page read and write
4D00000
direct allocation
page read and write
20014857000
heap
page read and write
2880C4DB000
heap
page read and write
2001484B000
heap
page read and write
200176AC000
trusted library allocation
page read and write
5D06000
heap
page read and write
5F82000
heap
page read and write
18F0000
heap
page read and write
D7E000
heap
page read and write
26D26D2C000
heap
page read and write
4E91000
heap
page read and write
412E000
stack
page read and write
20017F63000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
2001B8FA000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
2880E80F000
trusted library allocation
page read and write
2001F874000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
6BF9000
heap
page read and write
20025B14000
trusted library allocation
page read and write
4D11000
heap
page read and write
2880C4AD000
heap
page read and write
58DE000
stack
page read and write
2001B9BE000
trusted library allocation
page read and write
20019E7E000
trusted library allocation
page read and write
20017FB7000
trusted library allocation
page read and write
4641000
heap
page read and write
5D06000
heap
page read and write
26F0000
direct allocation
page read and write
313F000
stack
page read and write
5F10000
heap
page read and write
6E4000
heap
page read and write
2880C486000
heap
page read and write
26D2689B000
trusted library allocation
page read and write
661D000
heap
page read and write
4641000
heap
page read and write
20019D70000
trusted library allocation
page read and write
8CC0000
heap
page read and write
38FE000
stack
page read and write
2001F5E6000
trusted library allocation
page read and write
20019E24000
trusted library allocation
page read and write
2880C48B000
heap
page read and write
D6A000
heap
page read and write
5E21000
heap
page read and write
2001BEDA000
trusted library allocation
page read and write
2001A8FE000
trusted library allocation
page read and write
314F000
stack
page read and write
49F0000
direct allocation
page execute and read and write
20019EA2000
trusted library allocation
page read and write
20014845000
heap
page read and write
61FE000
stack
page read and write
20019DD5000
trusted library allocation
page read and write
3FF000
unkown
page execute and write copy
20014866000
heap
page read and write
6668000
heap
page read and write
20019D92000
trusted library allocation
page read and write
2001F996000
trusted library allocation
page read and write
5CE0000
heap
page read and write
304F000
stack
page read and write
2880C4BD000
heap
page read and write
4702000
heap
page read and write
5F7E000
heap
page read and write
6671000
heap
page read and write
4641000
heap
page read and write
20016D52000
trusted library allocation
page read and write
20021E9E000
trusted library allocation
page read and write
20017FDE000
trusted library allocation
page read and write
2001A829000
trusted library allocation
page read and write
20019B13000
trusted library allocation
page read and write
200195CE000
trusted library allocation
page read and write
5FC6000
heap
page read and write
26D26D4A000
heap
page read and write
2001F5D8000
trusted library allocation
page read and write
2001BFA0000
trusted library allocation
page read and write
26D26D1C000
heap
page read and write
26D2649E000
trusted library allocation
page read and write
26D26D31000
heap
page read and write
200146F1000
trusted library allocation
page read and write
6607000
heap
page read and write
6607000
heap
page read and write
200189F7000
trusted library allocation
page read and write
2880C493000
heap
page read and write
200188D9000
trusted library allocation
page read and write
3AAE000
stack
page read and write
2880E740000
trusted library allocation
page read and write
20020FFA000
trusted library allocation
page read and write
664B000
heap
page read and write
EA0000
trusted library allocation
page read and write
2001485A000
heap
page read and write
2001F924000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
200176A1000
trusted library allocation
page read and write
20017FC1000
trusted library allocation
page read and write
1660000
heap
page read and write
26D29854000
trusted library allocation
page read and write
6E4000
heap
page read and write
4E91000
heap
page read and write
20017C22000
trusted library allocation
page read and write
2001F5F8000
trusted library allocation
page read and write
6E4000
heap
page read and write
5360000
direct allocation
page execute and read and write
511E000
stack
page read and write
20016DF7000
trusted library allocation
page read and write
141000
unkown
page execute and read and write
65D0000
heap
page read and write
2001F9DC000
trusted library allocation
page read and write
26D26D1C000
heap
page read and write
20017699000
trusted library allocation
page read and write
20020E93000
trusted library allocation
page read and write
4701000
heap
page read and write
2880C492000
heap
page read and write
CC9000
heap
page read and write
5CA1000
heap
page read and write
5CC5000
heap
page read and write
200213E3000
trusted library allocation
page read and write
5FE8000
heap
page read and write
2001C12E000
trusted library allocation
page read and write
26D26D17000
heap
page read and write
26D26D5A000
heap
page read and write
C90000
heap
page read and write
DC1000
unkown
page execute and write copy
5CF5000
heap
page read and write
2001C06F000
trusted library allocation
page read and write
200147F6000
trusted library allocation
page read and write
1744000
heap
page read and write
20024730000
trusted library allocation
page read and write
200135B4000
trusted library allocation
page read and write
20021EAA000
trusted library allocation
page read and write
26D268A2000
trusted library allocation
page read and write
5EB1000
heap
page read and write
200188EC000
trusted library allocation
page read and write
6E4000
heap
page read and write
26D26826000
trusted library allocation
page read and write
A30000
unkown
page readonly
5CF5000
heap
page read and write
26D26D44000
heap
page read and write
20021DE0000
trusted library allocation
page read and write
6671000
heap
page read and write
2880C4AB000
heap
page read and write
2002193E000
trusted library allocation
page read and write
6628000
heap
page read and write
6E4000
heap
page read and write
572E000
stack
page read and write
6628000
heap
page read and write
26D26D2F000
heap
page read and write
15E0000
heap
page read and write
660A000
heap
page read and write
2001BEC9000
trusted library allocation
page read and write
2001A8A5000
trusted library allocation
page read and write
20016EF3000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
2880BB73000
trusted library allocation
page read and write
2001F970000
trusted library allocation
page read and write
20014764000
trusted library allocation
page read and write
D7F000
heap
page read and write
14A4000
heap
page read and write
5F86000
heap
page read and write
2880C4DB000
heap
page read and write
61DD000
heap
page read and write
200176FD000
trusted library allocation
page read and write
2001351B000
trusted library allocation
page read and write
4641000
heap
page read and write
200178A9000
trusted library allocation
page read and write
20025BAC000
trusted library allocation
page read and write
2001954C000
trusted library allocation
page read and write
2880C48D000
heap
page read and write
DB4000
heap
page read and write
6641000
heap
page read and write
200212F8000
trusted library allocation
page read and write
20025B6F000
trusted library allocation
page read and write
200176A6000
trusted library allocation
page read and write
2880BB6A000
trusted library allocation
page read and write
20017FC1000
trusted library allocation
page read and write
2880C000000
trusted library allocation
page read and write
ECE000
stack
page read and write
20016DE0000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
26D26FFC000
trusted library allocation
page read and write
9B7000
heap
page read and write
2A0F000
stack
page read and write
D84000
heap
page read and write
2001F977000
trusted library allocation
page read and write
2848000
heap
page read and write
6634000
heap
page read and write
6E4000
heap
page read and write
D4F000
heap
page read and write
1744000
heap
page read and write
200176CA000
trusted library allocation
page read and write
D81000
heap
page read and write
2001733B000
trusted library allocation
page read and write
15CC000
heap
page read and write
357F000
stack
page read and write
6E4000
heap
page read and write
5490000
direct allocation
page execute and read and write
26D26D5A000
heap
page read and write
2001486F000
heap
page read and write
20021B4A000
trusted library allocation
page read and write
5B8D000
heap
page read and write
26D26D5B000
heap
page read and write
2001F868000
trusted library allocation
page read and write
200188E6000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
6E5000
heap
page read and write
4D90000
direct allocation
page execute and read and write
61A1000
heap
page read and write
6E4000
heap
page read and write
4641000
heap
page read and write
26D27077000
trusted library allocation
page read and write
6601000
heap
page read and write
26D26D2F000
heap
page read and write
26D26D4A000
heap
page read and write
20016EF4000
trusted library allocation
page read and write
2001F586000
trusted library allocation
page read and write
20021E9E000
trusted library allocation
page read and write
6CBB000
heap
page read and write
6E4000
heap
page read and write
2002193A000
trusted library allocation
page read and write
55A000
stack
page read and write
20017837000
trusted library allocation
page read and write
6641000
heap
page read and write
4641000
heap
page read and write
5350000
direct allocation
page execute and read and write
20017674000
trusted library allocation
page read and write
2001485B000
heap
page read and write
20019D64000
trusted library allocation
page read and write
200176AC000
trusted library allocation
page read and write
2880C492000
heap
page read and write
20019CDA000
trusted library allocation
page read and write
5A3000
unkown
page execute and read and write
2880BB7C000
trusted library allocation
page read and write
2880C488000
heap
page read and write
7034000
heap
page read and write
64DB000
stack
page read and write
41D0000
heap
page read and write
20017646000
trusted library allocation
page read and write
4D11000
heap
page read and write
26D26D31000
heap
page read and write
5C93000
heap
page read and write
26D26D62000
heap
page read and write
2001B87E000
trusted library allocation
page read and write
200188FE000
trusted library allocation
page read and write
26D26D4F000
heap
page read and write
2001737E000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
1744000
heap
page read and write
4641000
heap
page read and write
2001A8EA000
trusted library allocation
page read and write
20021092000
trusted library allocation
page read and write
1CAC9895000
heap
page read and write
4641000
heap
page read and write
200195C9000
trusted library allocation
page read and write
6671000
heap
page read and write
26D26D21000
heap
page read and write
2001C294000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
26D26D16000
heap
page read and write
298B6B07000
trusted library allocation
page read and write
26D27096000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
142E000
heap
page read and write
4D11000
heap
page read and write
2880C4DB000
heap
page read and write
26D26D5B000
heap
page read and write
644F000
heap
page read and write
26D26D17000
heap
page read and write
2880C4AD000
heap
page read and write
20017692000
trusted library allocation
page read and write
2880C492000
heap
page read and write
6E4000
heap
page read and write
D5B000
heap
page read and write
2880C4AD000
heap
page read and write
1DEAF700000
trusted library allocation
page read and write
2001F994000
trusted library allocation
page read and write
2002154B000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
20019E90000
trusted library allocation
page read and write
6641000
heap
page read and write
6671000
heap
page read and write
5CF7000
heap
page read and write
20014843000
heap
page read and write
26D26D4A000
heap
page read and write
200134E4000
trusted library allocation
page read and write
5CE2000
heap
page read and write
2001B3EB000
trusted library allocation
page read and write
20024A32000
trusted library allocation
page read and write
921000
heap
page read and write
DAE000
stack
page read and write
2001B9C0000
trusted library allocation
page read and write
20014875000
heap
page read and write
1CACB1BA000
heap
page read and write
D3619FF000
stack
page read and write
6E4000
heap
page read and write
6628000
heap
page read and write
14A4000
heap
page read and write
5310000
direct allocation
page read and write
200173E6000
trusted library allocation
page read and write
2880C48E000
heap
page read and write
20021B75000
trusted library allocation
page read and write
20019EB1000
trusted library allocation
page read and write
4833FF000
stack
page read and write
26D26D5A000
heap
page read and write
20014890000
heap
page read and write
5D32000
heap
page read and write
2880C48A000
heap
page read and write
390E000
stack
page read and write
26D26D44000
heap
page read and write
2880C48E000
heap
page read and write
200215D0000
trusted library allocation
page read and write
5D1D000
heap
page read and write
101E000
stack
page read and write
20025B00000
trusted library allocation
page read and write
2001BC68000
trusted library allocation
page read and write
20014875000
heap
page read and write
20020E15000
trusted library allocation
page read and write
20019E26000
trusted library allocation
page read and write
5F7D000
heap
page read and write
20021373000
trusted library allocation
page read and write
2001759D000
trusted library allocation
page read and write
DAB000
heap
page read and write
4E91000
heap
page read and write
2F7E000
stack
page read and write
200215D0000
trusted library allocation
page read and write
6634000
heap
page read and write
6211000
heap
page read and write
20014661000
trusted library allocation
page read and write
26D26D39000
heap
page read and write
200213F0000
trusted library allocation
page read and write
200176C5000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001F86C000
trusted library allocation
page read and write
20017854000
trusted library allocation
page read and write
2002159F000
trusted library allocation
page read and write
5D01000
heap
page read and write
6E4000
heap
page read and write
661D000
heap
page read and write
2001F98C000
trusted library allocation
page read and write
5F87000
heap
page read and write
2001BA7C000
trusted library allocation
page read and write
26D26880000
trusted library allocation
page read and write
20021E94000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
5EB3000
heap
page read and write
6628000
heap
page read and write
20021DF0000
trusted library allocation
page read and write
20014875000
heap
page read and write
4C20000
direct allocation
page execute and read and write
20019EBA000
trusted library allocation
page read and write
6671000
heap
page read and write
2001483F000
heap
page read and write
4D12000
heap
page read and write
26D26D44000
heap
page read and write
2880CB9D000
trusted library allocation
page read and write
FFD000
stack
page read and write
20016E3B000
trusted library allocation
page read and write
5C7E000
stack
page read and write
26D26875000
trusted library allocation
page read and write
4E91000
heap
page read and write
5D81000
heap
page read and write
2880C4AB000
heap
page read and write
26D26D6A000
heap
page read and write
5EB1000
heap
page read and write
377F000
stack
page read and write
2001A830000
trusted library allocation
page read and write
1DF1A5A2000
heap
page read and write
2880C486000
heap
page read and write
2001896D000
trusted library allocation
page read and write
6655000
heap
page read and write
32FF000
stack
page read and write
4E91000
heap
page read and write
5D81000
heap
page read and write
6643000
heap
page read and write
5920000
trusted library allocation
page read and write
318F000
stack
page read and write
DCD000
heap
page read and write
4E91000
heap
page read and write
26D26D21000
heap
page read and write
A5E000
stack
page read and write
660A000
heap
page read and write
26D293C8000
trusted library allocation
page read and write
20025B16000
trusted library allocation
page read and write
20020FDB000
trusted library allocation
page read and write
5E21000
heap
page read and write
2880E865000
trusted library allocation
page read and write
20017FFB000
trusted library allocation
page read and write
5540000
direct allocation
page execute and read and write
20021199000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
26D26D5A000
heap
page read and write
20012EEF000
trusted library allocation
page read and write
231DC200000
trusted library allocation
page read and write
61D5000
heap
page read and write
2001F970000
trusted library allocation
page read and write
2001F56F000
trusted library allocation
page read and write
20021373000
trusted library allocation
page read and write
20017FCF000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
664D000
heap
page read and write
26D26D5B000
heap
page read and write
20014661000
trusted library allocation
page read and write
20013600000
trusted library allocation
page read and write
1744000
heap
page read and write
26D26D51000
heap
page read and write
2001C29B000
trusted library allocation
page read and write
4C00000
remote allocation
page read and write
2001F57B000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
20021363000
trusted library allocation
page read and write
200176C5000
trusted library allocation
page read and write
5D04000
heap
page read and write
20019DF6000
trusted library allocation
page read and write
1CACB1A0000
heap
page read and write
4641000
heap
page read and write
200134E0000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
46CE000
stack
page read and write
2880BBBF000
trusted library allocation
page read and write
2001A869000
trusted library allocation
page read and write
3A3F000
stack
page read and write
20017FC3000
trusted library allocation
page read and write
408E000
stack
page read and write
4D11000
heap
page read and write
5320000
direct allocation
page execute and read and write
2001485F000
heap
page read and write
6601000
heap
page read and write
26D26D4A000
heap
page read and write
6601000
heap
page read and write
4641000
heap
page read and write
2001765C000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
20014842000
heap
page read and write
20019DD5000
trusted library allocation
page read and write
200176D9000
trusted library allocation
page read and write
20019D92000
trusted library allocation
page read and write
2002159F000
trusted library allocation
page read and write
40BE000
stack
page read and write
4B90000
direct allocation
page execute and read and write
26D26FF2000
trusted library allocation
page read and write
51C0000
direct allocation
page read and write
2880C4AB000
heap
page read and write
6E4000
heap
page read and write
15E0000
heap
page read and write
4D11000
heap
page read and write
6591000
heap
page read and write
73D6000
heap
page read and write
1745000
heap
page read and write
5C37000
heap
page read and write
200195CA000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
200173D9000
trusted library allocation
page read and write
15C5000
heap
page read and write
2001767B000
trusted library allocation
page read and write
605F000
stack
page read and write
2990000
direct allocation
page read and write
6E5000
heap
page read and write
5DCC000
heap
page read and write
2001F940000
trusted library allocation
page read and write
6601000
heap
page read and write
20014875000
heap
page read and write
20017F83000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
D70000
direct allocation
page read and write
20019C57000
trusted library allocation
page read and write
26D26D15000
heap
page read and write
2880C49E000
heap
page read and write
20019DC9000
trusted library allocation
page read and write
2001A8A1000
trusted library allocation
page read and write
20021B73000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26D4A000
heap
page read and write
200212FC000
trusted library allocation
page read and write
2001B271000
trusted library allocation
page read and write
4641000
heap
page read and write
20019EBA000
trusted library allocation
page read and write
663D000
heap
page read and write
6E4000
heap
page read and write
2001342F000
trusted library allocation
page read and write
6652000
heap
page read and write
2001B97A000
trusted library allocation
page read and write
D5B000
heap
page read and write
4641000
heap
page read and write
6635000
heap
page read and write
5D06000
heap
page read and write
5EA5000
heap
page read and write
661F000
heap
page read and write
2001345C000
trusted library allocation
page read and write
5C31000
heap
page read and write
2002119B000
trusted library allocation
page read and write
64CC000
heap
page read and write
26D26484000
trusted library allocation
page read and write
5EB1000
heap
page read and write
20017C7D000
trusted library allocation
page read and write
15CE000
heap
page read and write
D84000
heap
page read and write
20014643000
trusted library allocation
page read and write
20017AF4000
trusted library allocation
page read and write
2001F8FC000
trusted library allocation
page read and write
525D000
stack
page read and write
20013460000
trusted library allocation
page read and write
E0000
unkown
page read and write
26D26D4A000
heap
page read and write
D7B000
heap
page read and write
E0A000
unkown
page execute and read and write
2001474B000
trusted library allocation
page read and write
200188C3000
trusted library allocation
page read and write
26D26D2D000
heap
page read and write
6049000
heap
page read and write
2001F924000
trusted library allocation
page read and write
6F69FFA000
stack
page read and write
4E71000
heap
page read and write
2001342F000
trusted library allocation
page read and write
5570000
direct allocation
page execute and read and write
4641000
heap
page read and write
2001BEC8000
trusted library allocation
page read and write
5EEF000
stack
page read and write
2880C4AD000
heap
page read and write
2880C48B000
heap
page read and write
2001F9DF000
trusted library allocation
page read and write
20017831000
trusted library allocation
page read and write
20017698000
trusted library allocation
page read and write
3DFE000
stack
page read and write
1744000
heap
page read and write
4C84000
heap
page read and write
2001F99D000
trusted library allocation
page read and write
2001BFA2000
trusted library allocation
page read and write
5C8D000
heap
page read and write
20020FFE000
trusted library allocation
page read and write
30E0000
heap
page read and write
4D11000
heap
page read and write
20016DDA000
trusted library allocation
page read and write
660A000
heap
page read and write
20016E63000
trusted library allocation
page read and write
20019546000
trusted library allocation
page read and write
26D2672F000
trusted library allocation
page read and write
2001B89C000
trusted library allocation
page read and write
2880C486000
heap
page read and write
864000
unkown
page execute and write copy
2001737C000
trusted library allocation
page read and write
154B000
heap
page read and write
6F5F000
heap
page read and write
5B5F000
heap
page read and write
6652000
heap
page read and write
4800000
direct allocation
page execute and read and write
20019D68000
trusted library allocation
page read and write
200215C7000
trusted library allocation
page read and write
4701000
heap
page read and write
2001F8E2000
trusted library allocation
page read and write
20019A90000
trusted library allocation
page read and write
15DE000
stack
page read and write
26D26D4A000
heap
page read and write
26D270FE000
trusted library allocation
page read and write
20021BE2000
trusted library allocation
page read and write
20020FEF000
trusted library allocation
page read and write
2001F57C000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
2001F8CF000
trusted library allocation
page read and write
54AD000
stack
page read and write
5CA0000
heap
page read and write
200211FE000
trusted library allocation
page read and write
200188FE000
trusted library allocation
page read and write
20025B3C000
trusted library allocation
page read and write
14A4000
heap
page read and write
6628000
heap
page read and write
4641000
heap
page read and write
2001F83C000
trusted library allocation
page read and write
65D0000
heap
page read and write
5F24000
heap
page read and write
2880CBA6000
trusted library allocation
page read and write
26D26D2C000
heap
page read and write
20019AD2000
trusted library allocation
page read and write
DC0000
unkown
page readonly
3D2F000
stack
page read and write
D7E000
heap
page read and write
2001F513000
trusted library allocation
page read and write
D3621FF000
stack
page read and write
6E4000
heap
page read and write
26D264CA000
trusted library allocation
page read and write
6E4000
heap
page read and write
20020E88000
trusted library allocation
page read and write
200194DE000
trusted library allocation
page read and write
200199FB000
trusted library allocation
page read and write
20017739000
trusted library allocation
page read and write
20020E88000
trusted library allocation
page read and write
20016DE7000
trusted library allocation
page read and write
D84000
heap
page read and write
7DB000
stack
page read and write
20025BB1000
trusted library allocation
page read and write
4E71000
heap
page read and write
26D26D5F000
heap
page read and write
2001F954000
trusted library allocation
page read and write
661D000
heap
page read and write
20017848000
trusted library allocation
page read and write
2001466E000
trusted library allocation
page read and write
26D26D63000
heap
page read and write
6E4000
heap
page read and write
200175CD000
trusted library allocation
page read and write
5B8B000
heap
page read and write
5C35000
heap
page read and write
6E4000
heap
page read and write
346E000
stack
page read and write
20014842000
heap
page read and write
5CCB000
heap
page read and write
2001F55D000
trusted library allocation
page read and write
2001C2CE000
trusted library allocation
page read and write
20019EFC000
trusted library allocation
page read and write
161E000
stack
page read and write
5D17000
heap
page read and write
26D26D4B000
heap
page read and write
20019ECC000
trusted library allocation
page read and write
4D11000
heap
page read and write
20016DF7000
trusted library allocation
page read and write
200185FA000
trusted library allocation
page read and write
4D11000
heap
page read and write
840000
direct allocation
page read and write
2001A8EC000
trusted library allocation
page read and write
5CC5000
heap
page read and write
6E4000
heap
page read and write
26D26D2E000
heap
page read and write
4D11000
heap
page read and write
6591000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
2880C492000
heap
page read and write
26D26D30000
heap
page read and write
2001B8C8000
trusted library allocation
page read and write
20021938000
trusted library allocation
page read and write
2001F9EA000
trusted library allocation
page read and write
2001B90D000
trusted library allocation
page read and write
20019C6A000
trusted library allocation
page read and write
1744000
heap
page read and write
20020FEC000
trusted library allocation
page read and write
5CC5000
heap
page read and write
4641000
heap
page read and write
2880C48D000
heap
page read and write
4702000
heap
page read and write
200146E0000
trusted library allocation
page read and write
664E000
heap
page read and write
2001B906000
trusted library allocation
page read and write
20014838000
heap
page read and write
2001F913000
trusted library allocation
page read and write
20019CB4000
trusted library allocation
page read and write
DB0000
heap
page read and write
20024786000
trusted library allocation
page read and write
1FC609B24000
trusted library allocation
page read and write
6659000
heap
page read and write
FB4000
heap
page read and write
2880E877000
trusted library allocation
page read and write
20014860000
heap
page read and write
D6C000
stack
page read and write
20021DBF000
trusted library allocation
page read and write
870000
unkown
page readonly
2001F532000
trusted library allocation
page read and write
20021995000
trusted library allocation
page read and write
6601000
heap
page read and write
200146B0000
trusted library allocation
page read and write
6571000
heap
page read and write
20012E98000
trusted library allocation
page read and write
2001B416000
trusted library allocation
page read and write
20017D94000
trusted library allocation
page read and write
26D26776000
trusted library allocation
page read and write
5CCB000
heap
page read and write
200195DA000
trusted library allocation
page read and write
6E4000
heap
page read and write
20019E24000
trusted library allocation
page read and write
4D11000
heap
page read and write
6588000
heap
page read and write
1744000
heap
page read and write
200185FA000
trusted library allocation
page read and write
65AD000
heap
page read and write
200189BB000
trusted library allocation
page read and write
E9A55FE000
unkown
page readonly
20019DA3000
trusted library allocation
page read and write
20021BCE000
trusted library allocation
page read and write
5C4C000
heap
page read and write
5B90000
heap
page read and write
5CCB000
heap
page read and write
5470000
direct allocation
page read and write
E0000
unkown
page readonly
26D26D5A000
heap
page read and write
6E4000
heap
page read and write
20017FDE000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
200146F2000
trusted library allocation
page read and write
2001F922000
trusted library allocation
page read and write
20019EC5000
trusted library allocation
page read and write
200176AC000
trusted library allocation
page read and write
2880E821000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
200211A9000
trusted library allocation
page read and write
4641000
heap
page read and write
6593000
heap
page read and write
2001F9AB000
trusted library allocation
page read and write
26D26D63000
heap
page read and write
6631000
heap
page read and write
26D26D6A000
heap
page read and write
20019E2B000
trusted library allocation
page read and write
66BC000
heap
page read and write
2001C1A2000
trusted library allocation
page read and write
2001B85B000
trusted library allocation
page read and write
ABD000
heap
page read and write
2001BFB5000
trusted library allocation
page read and write
C60000
heap
page read and write
5EB3000
heap
page read and write
20021E2D000
trusted library allocation
page read and write
663D000
heap
page read and write
1744000
heap
page read and write
5F87000
heap
page read and write
26D26D2F000
heap
page read and write
200189C8000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
6A11000
heap
page read and write
4641000
heap
page read and write
20016DD1000
trusted library allocation
page read and write
1CAC9700000
trusted library allocation
page read and write
3AAF000
stack
page read and write
20018E0A000
trusted library allocation
page read and write
6F52000
heap
page read and write
4641000
heap
page read and write
26D26D2C000
heap
page read and write
1DF1C1A3000
heap
page read and write
2001483F000
heap
page read and write
51A1000
direct allocation
page read and write
5D81000
heap
page read and write
5D4A000
heap
page read and write
5CDE000
heap
page read and write
4641000
heap
page read and write
484BFF000
stack
page read and write
4D11000
heap
page read and write
20017C47000
trusted library allocation
page read and write
2880C492000
heap
page read and write
D51000
heap
page read and write
200176BE000
trusted library allocation
page read and write
20019EF1000
trusted library allocation
page read and write
15E0000
heap
page read and write
200176CA000
trusted library allocation
page read and write
4641000
heap
page read and write
20019E1B000
trusted library allocation
page read and write
20014758000
trusted library allocation
page read and write
4641000
heap
page read and write
2001484C000
heap
page read and write
4641000
heap
page read and write
6601000
heap
page read and write
26AE000
stack
page read and write
20021B85000
trusted library allocation
page read and write
2001BFA0000
trusted library allocation
page read and write
6595000
heap
page read and write
20020E79000
trusted library allocation
page read and write
6639000
heap
page read and write
20019C9B000
trusted library allocation
page read and write
3FBE000
stack
page read and write
DB0000
heap
page read and write
2880C492000
heap
page read and write
1744000
heap
page read and write
26D26D4A000
heap
page read and write
3D3000
unkown
page execute and read and write
5FDB000
heap
page read and write
200176FD000
trusted library allocation
page read and write
6607000
heap
page read and write
D5B000
heap
page read and write
20017876000
trusted library allocation
page read and write
47FF000
stack
page read and write
20016D61000
trusted library allocation
page read and write
2001474F000
trusted library allocation
page read and write
20019BBA000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
200176BE000
trusted library allocation
page read and write
20020E99000
trusted library allocation
page read and write
5CE0000
heap
page read and write
20017696000
trusted library allocation
page read and write
660A000
heap
page read and write
20017FBF000
trusted library allocation
page read and write
26D26D5B000
heap
page read and write
942000
heap
page read and write
65B0000
heap
page read and write
661D000
heap
page read and write
4641000
heap
page read and write
1744000
heap
page read and write
D4E000
unkown
page execute and write copy
4E71000
heap
page read and write
200176A6000
trusted library allocation
page read and write
2880E71A000
trusted library allocation
page read and write
20014844000
heap
page read and write
D51000
heap
page read and write
63D8000
heap
page read and write
20019ED5000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
26D26D1D000
heap
page read and write
4D00000
direct allocation
page read and write
1744000
heap
page read and write
37BE000
stack
page read and write
2001F5D3000
trusted library allocation
page read and write
20025BA8000
trusted library allocation
page read and write
2001F593000
trusted library allocation
page read and write
200173F7000
trusted library allocation
page read and write
2001476C000
trusted library allocation
page read and write
5E93000
heap
page read and write
20016DE7000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
200173D2000
trusted library allocation
page read and write
2001484B000
heap
page read and write
20019B6C000
trusted library allocation
page read and write
5B52000
heap
page read and write
2910000
direct allocation
page read and write
2A0000
unkown
page readonly
1744000
heap
page read and write
3BFE000
stack
page read and write
2880F908000
trusted library allocation
page read and write
6631000
heap
page read and write
2880BFAB000
trusted library allocation
page read and write
26D26D18000
heap
page read and write
2880C4DB000
heap
page read and write
2880C4AB000
heap
page read and write
20025BB1000
trusted library allocation
page read and write
2001954A000
trusted library allocation
page read and write
200173D2000
trusted library allocation
page read and write
20020FF7000
trusted library allocation
page read and write
20021D5F000
trusted library allocation
page read and write
2001F530000
trusted library allocation
page read and write
200176FE000
trusted library allocation
page read and write
2001767F000
trusted library allocation
page read and write
4E71000
heap
page read and write
5C35000
heap
page read and write
6E4000
heap
page read and write
4641000
heap
page read and write
2001484E000
heap
page read and write
20014890000
heap
page read and write
2001484B000
heap
page read and write
2001F9C8000
trusted library allocation
page read and write
D74000
heap
page read and write
6E4000
heap
page read and write
20025B03000
trusted library allocation
page read and write
26D26D2D000
heap
page read and write
4641000
heap
page read and write
1285000
unkown
page execute and read and write
20021DF1000
trusted library allocation
page read and write
2001B2E2000
trusted library allocation
page read and write
D7B000
heap
page read and write
26D26D44000
heap
page read and write
1099000
unkown
page execute and read and write
26D26D5A000
heap
page read and write
2001476E000
trusted library allocation
page read and write
6114000
heap
page read and write
5C46000
heap
page read and write
2001BCD1000
trusted library allocation
page read and write
200195CD000
trusted library allocation
page read and write
6633000
heap
page read and write
551E000
stack
page read and write
15E0000
heap
page read and write
200211A3000
trusted library allocation
page read and write
6395000
heap
page read and write
D74000
heap
page read and write
20013518000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
2001AECB000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
2880C492000
heap
page read and write
5C9C000
heap
page read and write
2880E7E8000
trusted library allocation
page read and write
5D4D000
heap
page read and write
2001A8FE000
trusted library allocation
page read and write
200146F5000
trusted library allocation
page read and write
E93000
heap
page read and write
6E4000
heap
page read and write
2880C488000
heap
page read and write
2880BEFB000
trusted library allocation
page read and write
20014855000
heap
page read and write
20017FB7000
trusted library allocation
page read and write
5E54000
heap
page read and write
2001AEDB000
trusted library allocation
page read and write
5D3C000
heap
page read and write
5CD6000
heap
page read and write
5C31000
heap
page read and write
6600000
heap
page read and write
200219F0000
trusted library allocation
page read and write
1744000
heap
page read and write
D9D000
heap
page read and write
6E4000
heap
page read and write
26D26FB5000
trusted library allocation
page read and write
D5B000
heap
page read and write
200176EF000
trusted library allocation
page read and write
2001486E000
heap
page read and write
4BBF000
stack
page read and write
D84000
heap
page read and write
2880C4DB000
heap
page read and write
2880C4B9000
heap
page read and write
D87000
heap
page read and write
2001B3CB000
trusted library allocation
page read and write
200134F6000
trusted library allocation
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
6642000
heap
page read and write
200212D1000
trusted library allocation
page read and write
4DE0000
direct allocation
page execute and read and write
2001F89D000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
5CDE000
heap
page read and write
20020EF8000
trusted library allocation
page read and write
5D26000
heap
page read and write
26D26488000
trusted library allocation
page read and write
20025B9B000
trusted library allocation
page read and write
5EB1000
heap
page read and write
4E91000
heap
page read and write
20020EB5000
trusted library allocation
page read and write
4D11000
heap
page read and write
5F87000
heap
page read and write
2001A883000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
664A000
heap
page read and write
4641000
heap
page read and write
432F000
stack
page read and write
1549000
heap
page read and write
2880E896000
trusted library allocation
page read and write
20021B6A000
trusted library allocation
page read and write
10CF000
unkown
page execute and read and write
5B80000
trusted library allocation
page read and write
2B4F000
stack
page read and write
4E91000
heap
page read and write
6591000
heap
page read and write
5D7F000
stack
page read and write
20014843000
heap
page read and write
447E000
stack
page read and write
26D298C8000
trusted library allocation
page read and write
660A000
heap
page read and write
4641000
heap
page read and write
2001C200000
trusted library allocation
page read and write
20017CE4000
trusted library allocation
page read and write
2001479A000
trusted library allocation
page read and write
661D000
heap
page read and write
20020FDB000
trusted library allocation
page read and write
200189FE000
trusted library allocation
page read and write
2001484B000
heap
page read and write
200189C7000
trusted library allocation
page read and write
4E71000
heap
page read and write
4E91000
heap
page read and write
2001BC6C000
trusted library allocation
page read and write
20014875000
heap
page read and write
5C52000
heap
page read and write
26D26D21000
heap
page read and write
F1C527C000
stack
page read and write
28FE000
stack
page read and write
2880C48A000
heap
page read and write
20014855000
heap
page read and write
2001759D000
trusted library allocation
page read and write
200176BE000
trusted library allocation
page read and write
26D26882000
trusted library allocation
page read and write
20021D3F000
trusted library allocation
page read and write
20016E5F000
trusted library allocation
page read and write
20017C0B000
trusted library allocation
page read and write
6E4000
heap
page read and write
200189F4000
trusted library allocation
page read and write
1744000
heap
page read and write
2001F5E4000
trusted library allocation
page read and write
231DC0C9000
heap
page read and write
2001F5A2000
trusted library allocation
page read and write
2880C4D6000
heap
page read and write
20021BA5000
trusted library allocation
page read and write
20017C78000
trusted library allocation
page read and write
20020FEC000
trusted library allocation
page read and write
6E4000
heap
page read and write
280F000
stack
page read and write
2001BA00000
trusted library allocation
page read and write
6637000
heap
page read and write
5CF5000
heap
page read and write
4E80000
direct allocation
page read and write
14A4000
heap
page read and write
26D26D4B000
heap
page read and write
200176FD000
trusted library allocation
page read and write
2001B8D0000
trusted library allocation
page read and write
20021B7A000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
2880C49E000
heap
page read and write
200211AD000
trusted library allocation
page read and write
20014779000
trusted library allocation
page read and write
2001B8CD000
trusted library allocation
page read and write
6631000
heap
page read and write
15E0000
heap
page read and write
200146B0000
trusted library allocation
page read and write
200219F0000
trusted library allocation
page read and write
6E4000
heap
page read and write
200219EC000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
4FEF000
stack
page read and write
2001359E000
trusted library allocation
page read and write
2001899D000
trusted library allocation
page read and write
2001F58C000
trusted library allocation
page read and write
5BE4000
heap
page read and write
2880E872000
trusted library allocation
page read and write
5D16000
heap
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
4E71000
heap
page read and write
2001B9C2000
trusted library allocation
page read and write
4641000
heap
page read and write
5C57000
heap
page read and write
20024710000
trusted library allocation
page read and write
45B000
stack
page read and write
6631000
heap
page read and write
3CCE000
stack
page read and write
DCD000
heap
page read and write
5C92000
heap
page read and write
5AD0000
heap
page read and write
5B50000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
4701000
heap
page read and write
DA0000
heap
page read and write
4D20000
direct allocation
page execute and read and write
20017573000
trusted library allocation
page read and write
4D11000
heap
page read and write
5EB1000
heap
page read and write
4641000
heap
page read and write
2001485F000
heap
page read and write
26D26D31000
heap
page read and write
26D26D19000
heap
page read and write
20014712000
trusted library allocation
page read and write
20014779000
trusted library allocation
page read and write
26D27090000
trusted library allocation
page read and write
39AE000
stack
page read and write
2001488F000
heap
page read and write
26D26FBE000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2001F53C000
trusted library allocation
page read and write
659B000
heap
page read and write
48F0000
direct allocation
page read and write
2880C4AD000
heap
page read and write
2880E6E6000
trusted library allocation
page read and write
2001F5F8000
trusted library allocation
page read and write
5CC5000
heap
page read and write
2001F83F000
trusted library allocation
page read and write
6AD000
unkown
page execute and read and write
20017FC5000
trusted library allocation
page read and write
D52000
heap
page read and write
2001B493000
trusted library allocation
page read and write
20019EC0000
trusted library allocation
page read and write
179E000
stack
page read and write
443E000
stack
page read and write
6E4000
heap
page read and write
2880C4AB000
heap
page read and write
20021E76000
trusted library allocation
page read and write
20025B6F000
trusted library allocation
page read and write
380E000
stack
page read and write
20017699000
trusted library allocation
page read and write
D49000
heap
page read and write
661D000
heap
page read and write
6633000
heap
page read and write
146000
unkown
page write copy
20019EB7000
trusted library allocation
page read and write
200146EB000
trusted library allocation
page read and write
91D000
heap
page read and write
26D26D5B000
heap
page read and write
6643000
heap
page read and write
5340000
direct allocation
page execute and read and write
2001767F000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
20021E7D000
trusted library allocation
page read and write
1CAC9850000
heap
page read and write
663C000
heap
page read and write
2880C4C9000
heap
page read and write
26D26D33000
heap
page read and write
4E70000
heap
page read and write
6440000
trusted library allocation
page read and write
4641000
heap
page read and write
2D4000
unkown
page execute and read and write
4E20000
direct allocation
page execute and read and write
200173CE000
trusted library allocation
page read and write
4870000
direct allocation
page execute and read and write
20014854000
heap
page read and write
28802270000
heap
page read and write
DB2000
heap
page read and write
37CF000
stack
page read and write
5CF7000
heap
page read and write
2880C80A000
trusted library allocation
page read and write
2001C1C5000
trusted library allocation
page read and write
20020E00000
trusted library allocation
page read and write
5EB1000
heap
page read and write
2F9E000
stack
page read and write
4641000
heap
page read and write
30AB000
stack
page read and write
4701000
heap
page read and write
2001C002000
trusted library allocation
page read and write
200176A3000
trusted library allocation
page read and write
20021157000
trusted library allocation
page read and write
2001BC2B000
trusted library allocation
page read and write
2001736A000
trusted library allocation
page read and write
200199EE000
trusted library allocation
page read and write
5D80000
heap
page read and write
2001A883000
trusted library allocation
page read and write
200176EF000
trusted library allocation
page read and write
200176A1000
trusted library allocation
page read and write
1745000
heap
page read and write
6E4000
heap
page read and write
20021278000
trusted library allocation
page read and write
20025B91000
trusted library allocation
page read and write
200188EC000
trusted library allocation
page read and write
D74000
heap
page read and write
4641000
heap
page read and write
5CC5000
heap
page read and write
20014845000
heap
page read and write
20017FFB000
trusted library allocation
page read and write
180000
heap
page read and write
4641000
heap
page read and write
14A4000
heap
page read and write
2001F846000
trusted library allocation
page read and write
6665000
heap
page read and write
2001B39E000
trusted library allocation
page read and write
20017C77000
trusted library allocation
page read and write
26D26D2D000
heap
page read and write
5CC0000
heap
page read and write
3D3000
unkown
page execute and read and write
20019DD1000
trusted library allocation
page read and write
26D26D21000
heap
page read and write
200189FE000
trusted library allocation
page read and write
2001484F000
heap
page read and write
20019DB8000
trusted library allocation
page read and write
200146E0000
trusted library allocation
page read and write
26D26FF2000
trusted library allocation
page read and write
4641000
heap
page read and write
5BDB000
heap
page read and write
2001B8B5000
trusted library allocation
page read and write
6636000
heap
page read and write
20021573000
trusted library allocation
page read and write
20021363000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
2880C4AB000
heap
page read and write
2880C49E000
heap
page read and write
2001B9F2000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
5EB1000
heap
page read and write
3BCE000
stack
page read and write
4E71000
heap
page read and write
4641000
heap
page read and write
200195CF000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26D5B000
heap
page read and write
200189AC000
trusted library allocation
page read and write
20014875000
heap
page read and write
20021D8C000
trusted library allocation
page read and write
1DF1A8E0000
heap
page read and write
2001F5D1000
trusted library allocation
page read and write
2001737C000
trusted library allocation
page read and write
2001C07B000
trusted library allocation
page read and write
2001C27B000
trusted library allocation
page read and write
20017CAC000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001B49B000
trusted library allocation
page read and write
1CAC9530000
heap
page read and write
20014751000
trusted library allocation
page read and write
2F3F000
stack
page read and write
8FB000
stack
page read and write
4E91000
heap
page read and write
E1000
unkown
page execute and write copy
2001F9E8000
trusted library allocation
page read and write
20020EB7000
trusted library allocation
page read and write
20021133000
trusted library allocation
page read and write
20018E07000
trusted library allocation
page read and write
20016DE5000
trusted library allocation
page read and write
343E000
stack
page read and write
4E71000
heap
page read and write
26D26D3C000
heap
page read and write
26D26D44000
heap
page read and write
20014845000
heap
page read and write
3A7E000
stack
page read and write
6E4000
heap
page read and write
200212A4000
trusted library allocation
page read and write
2880BB55000
trusted library allocation
page read and write
26D26813000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
6E4000
heap
page read and write
A40000
unkown
page read and write
4641000
heap
page read and write
2001BEE1000
trusted library allocation
page read and write
20024786000
trusted library allocation
page read and write
2880C492000
heap
page read and write
20021199000
trusted library allocation
page read and write
14A4000
heap
page read and write
660A000
heap
page read and write
2001B423000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
200194FB000
trusted library allocation
page read and write
20017C4E000
trusted library allocation
page read and write
26D26D6A000
heap
page read and write
20021BA5000
trusted library allocation
page read and write
2001F97D000
trusted library allocation
page read and write
26D26D31000
heap
page read and write
5D81000
heap
page read and write
2880C485000
heap
page read and write
2001738A000
trusted library allocation
page read and write
6447000
heap
page read and write
FB4000
heap
page read and write
6E4000
heap
page read and write
33FE000
stack
page read and write
20021B10000
trusted library allocation
page read and write
4E71000
heap
page read and write
4641000
heap
page read and write
26D26FBE000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
2880C486000
heap
page read and write
5CA1000
heap
page read and write
231DDDB7000
heap
page read and write
5D81000
heap
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
20019DC6000
trusted library allocation
page read and write
200212DD000
trusted library allocation
page read and write
2001F8E5000
trusted library allocation
page read and write
200134F6000
trusted library allocation
page read and write
20017CEB000
trusted library allocation
page read and write
200146E5000
trusted library allocation
page read and write
20014844000
heap
page read and write
3E4E000
stack
page read and write
4810000
direct allocation
page execute and read and write
2001F55B000
trusted library allocation
page read and write
20021249000
trusted library allocation
page read and write
13C0000
heap
page read and write
26D26D5A000
heap
page read and write
2001B998000
trusted library allocation
page read and write
26D26FB5000
trusted library allocation
page read and write
200134D6000
trusted library allocation
page read and write
2001470C000
trusted library allocation
page read and write
1744000
heap
page read and write
5CA0000
heap
page read and write
4D11000
heap
page read and write
7DC7000
heap
page read and write
20014880000
heap
page read and write
231DC0DC000
heap
page read and write
1744000
heap
page read and write
20019E58000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
200185FA000
trusted library allocation
page read and write
5F8D000
heap
page read and write
6671000
heap
page read and write
5E51000
heap
page read and write
20021E56000
trusted library allocation
page read and write
2001F83A000
trusted library allocation
page read and write
20014875000
heap
page read and write
20014875000
heap
page read and write
2880C4DB000
heap
page read and write
5480000
direct allocation
page execute and read and write
4E71000
heap
page read and write
41BE000
stack
page read and write
54A0000
direct allocation
page execute and read and write
6E4000
heap
page read and write
26D26D5A000
heap
page read and write
200176EF000
trusted library allocation
page read and write
26D26D1B000
heap
page read and write
5320000
direct allocation
page read and write
D49000
heap
page read and write
200195C1000
trusted library allocation
page read and write
2001F5BD000
trusted library allocation
page read and write
2002115F000
trusted library allocation
page read and write
6628000
heap
page read and write
26D2646A000
trusted library allocation
page read and write
2001F9EA000
trusted library allocation
page read and write
5D26000
heap
page read and write
B93000
unkown
page execute and read and write
2001BEC0000
trusted library allocation
page read and write
2001B920000
trusted library allocation
page read and write
5CE1000
heap
page read and write
1745000
heap
page read and write
20019DB8000
trusted library allocation
page read and write
5EC5000
heap
page read and write
20021B6F000
trusted library allocation
page read and write
20021BCE000
trusted library allocation
page read and write
200211F8000
trusted library allocation
page read and write
2910000
direct allocation
page read and write
20014842000
heap
page read and write
20025B98000
trusted library allocation
page read and write
4E91000
heap
page read and write
1744000
heap
page read and write
4641000
heap
page read and write
55E0000
trusted library allocation
page read and write
5B8D000
heap
page read and write
20014762000
trusted library allocation
page read and write
7BF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
200189E6000
trusted library allocation
page read and write
200176BE000
trusted library allocation
page read and write
5D81000
heap
page read and write
4E91000
heap
page read and write
D76000
heap
page read and write
200189C3000
trusted library allocation
page read and write
2BBE000
stack
page read and write
20013455000
trusted library allocation
page read and write
3D7000
unkown
page read and write
4641000
heap
page read and write
D73000
heap
page read and write
200199DB000
trusted library allocation
page read and write
200175CD000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
2880E713000
trusted library allocation
page read and write
26D26D37000
heap
page read and write
20020EF3000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2001484E000
heap
page read and write
20021EA6000
trusted library allocation
page read and write
6E4000
heap
page read and write
6070000
trusted library allocation
page read and write
36FE000
stack
page read and write
4D11000
heap
page read and write
6F50000
heap
page read and write
4641000
heap
page read and write
2001F846000
trusted library allocation
page read and write
DC8000
heap
page read and write
2880C492000
heap
page read and write
2001484B000
heap
page read and write
20020E1C000
trusted library allocation
page read and write
20021B53000
trusted library allocation
page read and write
20020E5B000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
200147DC000
trusted library allocation
page read and write
20019E58000
trusted library allocation
page read and write
2930000
heap
page read and write
6870000
heap
page read and write
2001466E000
trusted library allocation
page read and write
2001B87B000
trusted library allocation
page read and write
200195ED000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
8B0000
heap
page read and write
5C52000
heap
page read and write
65A7000
heap
page read and write
2001F8C2000
trusted library allocation
page read and write
502E000
stack
page read and write
20014836000
heap
page read and write
26D26485000
trusted library allocation
page read and write
26D2700F000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
26D26D22000
heap
page read and write
59FE000
stack
page read and write
4641000
heap
page read and write
54A0000
direct allocation
page execute and read and write
200188EC000
trusted library allocation
page read and write
2001F91A000
trusted library allocation
page read and write
6662000
heap
page read and write
4641000
heap
page read and write
2001A8EE000
trusted library allocation
page read and write
26D26FED000
trusted library allocation
page read and write
6633000
heap
page read and write
2001BE93000
trusted library allocation
page read and write
2001BC61000
trusted library allocation
page read and write
4D21000
heap
page read and write
2002159B000
trusted library allocation
page read and write
20018949000
trusted library allocation
page read and write
26D1C74A000
heap
page read and write
20014868000
heap
page read and write
6668000
heap
page read and write
5B89000
heap
page read and write
2002136F000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
5D81000
heap
page read and write
20014842000
heap
page read and write
26D26D2F000
heap
page read and write
5C43000
heap
page read and write
20025BB7000
trusted library allocation
page read and write
61CF000
heap
page read and write
20017662000
trusted library allocation
page read and write
2001B21D000
trusted library allocation
page read and write
1744000
heap
page read and write
2001B49B000
trusted library allocation
page read and write
840000
direct allocation
page read and write
2001BEA2000
trusted library allocation
page read and write
2880CBCB000
trusted library allocation
page read and write
20019DE1000
trusted library allocation
page read and write
20021E76000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
20025BA8000
trusted library allocation
page read and write
2002119D000
trusted library allocation
page read and write
20017CAD000
trusted library allocation
page read and write
2001A8BC000
trusted library allocation
page read and write
20019C9B000
trusted library allocation
page read and write
6631000
heap
page read and write
2880E780000
trusted library allocation
page read and write
2001B83D000
trusted library allocation
page read and write
D70000
direct allocation
page read and write
4A30000
direct allocation
page execute and read and write
5B90000
heap
page read and write
2001B91C000
trusted library allocation
page read and write
2001A854000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
306F000
stack
page read and write
20021E59000
trusted library allocation
page read and write
2001466E000
trusted library allocation
page read and write
4641000
heap
page read and write
20017679000
trusted library allocation
page read and write
26D26D15000
heap
page read and write
20016DC0000
trusted library allocation
page read and write
231DC300000
heap
page read and write
4641000
heap
page read and write
20021B1B000
trusted library allocation
page read and write
20021DF0000
trusted library allocation
page read and write
20021D93000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
20018456000
trusted library allocation
page read and write
3A7F000
stack
page read and write
2001342F000
trusted library allocation
page read and write
2001BFA2000
trusted library allocation
page read and write
26D2938F000
trusted library allocation
page read and write
2001765F000
trusted library allocation
page read and write
5CE0000
heap
page read and write
6E4000
heap
page read and write
200212D7000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
5C93000
heap
page read and write
20019DC9000
trusted library allocation
page read and write
D84000
heap
page read and write
1745000
heap
page read and write
65F6000
heap
page read and write
20013575000
trusted library allocation
page read and write
20019E9B000
trusted library allocation
page read and write
4E91000
heap
page read and write
2001F886000
trusted library allocation
page read and write
2001F9FC000
trusted library allocation
page read and write
3EAE000
stack
page read and write
3E0E000
stack
page read and write
26D26D4A000
heap
page read and write
6F59000
heap
page read and write
26D26D2D000
heap
page read and write
20014859000
heap
page read and write
200195EC000
trusted library allocation
page read and write
DB4000
heap
page read and write
4641000
heap
page read and write
20021BA5000
trusted library allocation
page read and write
860000
heap
page read and write
6E4000
heap
page read and write
26D26D5A000
heap
page read and write
D6E000
stack
page read and write
2001F9FC000
trusted library allocation
page read and write
26D26D67000
heap
page read and write
E9A56B8000
stack
page read and write
26D26D2C000
heap
page read and write
2001BC08000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880E67B000
trusted library allocation
page read and write
5C35000
heap
page read and write
200176FD000
trusted library allocation
page read and write
4641000
heap
page read and write
20016DF7000
trusted library allocation
page read and write
20017DA6000
trusted library allocation
page read and write
DB1000
heap
page read and write
20024728000
trusted library allocation
page read and write
20021DCA000
trusted library allocation
page read and write
A96000
unkown
page write copy
3B8F000
stack
page read and write
26D26D5F000
heap
page read and write
20017691000
trusted library allocation
page read and write
6390000
heap
page read and write
26D27072000
trusted library allocation
page read and write
5D81000
heap
page read and write
2001B8D6000
trusted library allocation
page read and write
2880BF19000
trusted library allocation
page read and write
2001F9DC000
trusted library allocation
page read and write
14A4000
heap
page read and write
4641000
heap
page read and write
433F000
stack
page read and write
4641000
heap
page read and write
26D26D5B000
heap
page read and write
2880BF26000
trusted library allocation
page read and write
20021D8E000
trusted library allocation
page read and write
65A4000
heap
page read and write
20019BA9000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
200175CD000
trusted library allocation
page read and write
7B3E000
stack
page read and write
2880C486000
heap
page read and write
840000
direct allocation
page read and write
6BFA000
heap
page read and write
26D26D5A000
heap
page read and write
2001345C000
trusted library allocation
page read and write
1744000
heap
page read and write
1A8AF631000
trusted library allocation
page execute read
20021D45000
trusted library allocation
page read and write
26D293FE000
trusted library allocation
page read and write
436F000
stack
page read and write
2001B930000
trusted library allocation
page read and write
5CF5000
heap
page read and write
20019EA6000
trusted library allocation
page read and write
26D26D16000
heap
page read and write
26D26D31000
heap
page read and write
D70000
direct allocation
page read and write
14A4000
heap
page read and write
5301000
direct allocation
page read and write
200188EC000
trusted library allocation
page read and write
20013513000
trusted library allocation
page read and write
20021E5D000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
1745000
heap
page read and write
26D26D1D000
heap
page read and write
687C000
heap
page read and write
15BE000
heap
page read and write
2880E890000
trusted library allocation
page read and write
3F3F000
stack
page read and write
659C000
heap
page read and write
5CE9000
heap
page read and write
20020E03000
trusted library allocation
page read and write
2001759D000
trusted library allocation
page read and write
6E4000
heap
page read and write
5B8B000
heap
page read and write
20013423000
trusted library allocation
page read and write
20021974000
trusted library allocation
page read and write
4641000
heap
page read and write
1CAC95D0000
heap
page read and write
2880C4DB000
heap
page read and write
2880CBBC000
trusted library allocation
page read and write
FB4000
heap
page read and write
2001B235000
trusted library allocation
page read and write
26D26F80000
trusted library allocation
page read and write
2001484B000
heap
page read and write
D84000
heap
page read and write
8CC1000
heap
page read and write
2001759D000
trusted library allocation
page read and write
5C78000
heap
page read and write
20012E84000
trusted library allocation
page read and write
200147F3000
trusted library allocation
page read and write
20020E32000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880C49E000
heap
page read and write
20014843000
heap
page read and write
20013460000
trusted library allocation
page read and write
200135A7000
trusted library allocation
page read and write
200185AA000
trusted library allocation
page read and write
20021BCE000
trusted library allocation
page read and write
D7B000
heap
page read and write
4E91000
heap
page read and write
4701000
heap
page read and write
2001A8DA000
trusted library allocation
page read and write
77F87FF000
stack
page read and write
20019ED5000
trusted library allocation
page read and write
20021DA0000
trusted library allocation
page read and write
4641000
heap
page read and write
171E000
stack
page read and write
200195E9000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
55F0000
direct allocation
page read and write
2001357E000
trusted library allocation
page read and write
2880C489000
heap
page read and write
2001483F000
heap
page read and write
6E5000
heap
page read and write
2001A8A5000
trusted library allocation
page read and write
20019D54000
trusted library allocation
page read and write
2001784F000
trusted library allocation
page read and write
40FE000
stack
page read and write
30D0000
direct allocation
page read and write
20017FC3000
trusted library allocation
page read and write
5BE7000
heap
page read and write
6607000
heap
page read and write
20021569000
trusted library allocation
page read and write
200212F8000
trusted library allocation
page read and write
20021D42000
trusted library allocation
page read and write
651B000
heap
page read and write
2880C48A000
heap
page read and write
14FE000
heap
page read and write
20019EBA000
trusted library allocation
page read and write
20019E5E000
trusted library allocation
page read and write
2001784C000
trusted library allocation
page read and write
20019EBA000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
14A4000
heap
page read and write
2880C4BA000
heap
page read and write
62FD000
heap
page read and write
26D26D62000
heap
page read and write
20013460000
trusted library allocation
page read and write
5A34000
heap
page read and write
20019E8D000
trusted library allocation
page read and write
2001B8CA000
trusted library allocation
page read and write
1744000
heap
page read and write
20017684000
trusted library allocation
page read and write
2001483F000
heap
page read and write
2001F513000
trusted library allocation
page read and write
15BE000
heap
page read and write
2880C4DB000
heap
page read and write
2001F586000
trusted library allocation
page read and write
6628000
heap
page read and write
6E4000
heap
page read and write
E08000
unkown
page read and write
200173C3000
trusted library allocation
page read and write
5CF8000
heap
page read and write
3E2F000
stack
page read and write
A7003F6000
stack
page read and write
5B8B000
heap
page read and write
3E6F000
stack
page read and write
1DEAF600000
heap
page read and write
661D000
heap
page read and write
2001483F000
heap
page read and write
2002157D000
trusted library allocation
page read and write
20024700000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880EF08000
trusted library allocation
page read and write
2880BF26000
trusted library allocation
page read and write
200176AC000
trusted library allocation
page read and write
20017C61000
trusted library allocation
page read and write
20018946000
trusted library allocation
page read and write
2880C492000
heap
page read and write
26D26D19000
heap
page read and write
2880C4AD000
heap
page read and write
D7A000
heap
page read and write
20013582000
trusted library allocation
page read and write
26D26826000
trusted library allocation
page read and write
26D27056000
trusted library allocation
page read and write
20019EF3000
trusted library allocation
page read and write
200219EC000
trusted library allocation
page read and write
E9A577E000
stack
page read and write
5A30000
heap
page read and write
20016DCC000
trusted library allocation
page read and write
231DC0F1000
heap
page read and write
20017693000
trusted library allocation
page read and write
657F000
heap
page read and write
200199AD000
trusted library allocation
page read and write
20025B03000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
7FF000
stack
page read and write
D73000
heap
page read and write
200176BF000
trusted library allocation
page read and write
942000
heap
page read and write
20017FFB000
trusted library allocation
page read and write
5C98000
heap
page read and write
4641000
heap
page read and write
26D26D33000
heap
page read and write
200189C0000
trusted library allocation
page read and write
26D26D4B000
heap
page read and write
4700000
heap
page read and write
20017574000
trusted library allocation
page read and write
2001F59B000
trusted library allocation
page read and write
20021BFB000
trusted library allocation
page read and write
15E0000
heap
page read and write
20013455000
trusted library allocation
page read and write
20021B9C000
trusted library allocation
page read and write
6DD5000
heap
page read and write
20021BE2000
trusted library allocation
page read and write
DCD000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
20024728000
trusted library allocation
page read and write
A7015FF000
stack
page read and write
26D26D2F000
heap
page read and write
6628000
heap
page read and write
2880E7F2000
trusted library allocation
page read and write
DC0000
heap
page read and write
6DD3000
heap
page read and write
20017673000
trusted library allocation
page read and write
2001A808000
trusted library allocation
page read and write
2001BE97000
trusted library allocation
page read and write
6631000
heap
page read and write
1744000
heap
page read and write
54C0000
remote allocation
page read and write
63BA000
heap
page read and write
2001F9AB000
trusted library allocation
page read and write
35BE000
stack
page read and write
6642000
heap
page read and write
4641000
heap
page read and write
2910000
direct allocation
page read and write
6643000
heap
page read and write
5CCB000
heap
page read and write
26D26D33000
heap
page read and write
20014890000
heap
page read and write
14A4000
heap
page read and write
20017891000
trusted library allocation
page read and write
2001484C000
heap
page read and write
4641000
heap
page read and write
15E0000
heap
page read and write
6591000
heap
page read and write
BA4000
heap
page read and write
4D20000
direct allocation
page execute and read and write
4641000
heap
page read and write
6E5000
heap
page read and write
2880E670000
trusted library allocation
page read and write
26D26D23000
heap
page read and write
6711000
heap
page read and write
2001F87B000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
26D26D4A000
heap
page read and write
1419000
heap
page read and write
26D26D4D000
heap
page read and write
4641000
heap
page read and write
20016DE0000
trusted library allocation
page read and write
6631000
heap
page read and write
20017384000
trusted library allocation
page read and write
2001BFBD000
trusted library allocation
page read and write
2001F9D3000
trusted library allocation
page read and write
20025B02000
trusted library allocation
page read and write
6652000
heap
page read and write
5B90000
heap
page read and write
2001BEB9000
trusted library allocation
page read and write
5D1C000
heap
page read and write
66C8000
heap
page read and write
E9A57BE000
unkown
page readonly
20017F9E000
trusted library allocation
page read and write
20021B73000
trusted library allocation
page read and write
6645000
heap
page read and write
64D8000
heap
page read and write
2001A887000
trusted library allocation
page read and write
BA4000
heap
page read and write
4711000
heap
page read and write
CCB000
heap
page read and write
6E4000
heap
page read and write
26D26D4B000
heap
page read and write
6628000
heap
page read and write
2001F575000
trusted library allocation
page read and write
D52000
heap
page read and write
2880BF80000
trusted library allocation
page read and write
6646000
heap
page read and write
20024A93000
trusted library allocation
page read and write
2001B3AF000
trusted library allocation
page read and write
20019EBE000
trusted library allocation
page read and write
200211D1000
trusted library allocation
page read and write
2001B33F000
trusted library allocation
page read and write
15C7000
heap
page read and write
26D26D18000
heap
page read and write
8A5000
heap
page read and write
5D30000
trusted library allocation
page read and write
200212DA000
trusted library allocation
page read and write
20014779000
trusted library allocation
page read and write
2001787F000
trusted library allocation
page read and write
4DB0000
direct allocation
page execute and read and write
20014842000
heap
page read and write
26D26D5B000
heap
page read and write
20021DCA000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
1553000
heap
page read and write
26D26D5A000
heap
page read and write
66A2000
heap
page read and write
5CF5000
heap
page read and write
26D26866000
trusted library allocation
page read and write
14A4000
heap
page read and write
1744000
heap
page read and write
86E000
heap
page read and write
26D26D37000
heap
page read and write
5E51000
heap
page read and write
26D26D33000
heap
page read and write
2001F5C4000
trusted library allocation
page read and write
5CD7000
heap
page read and write
20012E81000
trusted library allocation
page read and write
2880E71F000
trusted library allocation
page read and write
5CC0000
heap
page read and write
F1C3FDB000
stack
page read and write
5D49000
heap
page read and write
20017FF1000
trusted library allocation
page read and write
6647000
heap
page read and write
2880C4DB000
heap
page read and write
D7C000
heap
page read and write
4701000
heap
page read and write
6649000
heap
page read and write
200219D5000
trusted library allocation
page read and write
20019EAB000
trusted library allocation
page read and write
2001848B000
trusted library allocation
page read and write
20017371000
trusted library allocation
page read and write
65DF000
heap
page read and write
2880C48B000
heap
page read and write
619F000
stack
page read and write
660A000
heap
page read and write
2E3E000
stack
page read and write
20020EA8000
trusted library allocation
page read and write
20017384000
trusted library allocation
page read and write
36EF000
stack
page read and write
6E4000
heap
page read and write
6AD000
unkown
page execute and write copy
2001F57F000
trusted library allocation
page read and write
26D26D18000
heap
page read and write
4641000
heap
page read and write
2880E7BB000
trusted library allocation
page read and write
20014859000
heap
page read and write
6523000
heap
page read and write
2001484B000
heap
page read and write
5CF5000
heap
page read and write
2001C100000
trusted library allocation
page read and write
2001F5CD000
trusted library allocation
page read and write
63A7000
heap
page read and write
2001F5CB000
trusted library allocation
page read and write
4E71000
heap
page read and write
1DF1A700000
trusted library allocation
page read and write
1DF1C1B9000
heap
page read and write
2001F9F2000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
663E000
heap
page read and write
7060000
heap
page read and write
656000
unkown
page execute and read and write
26D26F66000
trusted library allocation
page read and write
200176CF000
trusted library allocation
page read and write
200146E5000
trusted library allocation
page read and write
457F000
stack
page read and write
20014854000
heap
page read and write
5C78000
heap
page read and write
4823FA000
stack
page read and write
6397000
heap
page read and write
200176A9000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
20020E98000
trusted library allocation
page read and write
298B6B00000
trusted library allocation
page read and write
26D26D6A000
heap
page read and write
4E71000
heap
page read and write
2880C492000
heap
page read and write
55D4000
trusted library allocation
page read and write
2001C09B000
trusted library allocation
page read and write
BA4000
heap
page read and write
6E4000
heap
page read and write
D5B000
heap
page read and write
200173BA000
trusted library allocation
page read and write
20014880000
heap
page read and write
2880C4AB000
heap
page read and write
43FF000
stack
page read and write
20020E12000
trusted library allocation
page read and write
20016D26000
trusted library allocation
page read and write
231DC50A000
trusted library allocation
page read and write
6671000
heap
page read and write
54C0000
direct allocation
page execute and read and write
2880C4DB000
heap
page read and write
4701000
heap
page read and write
20021D38000
trusted library allocation
page read and write
4E71000
heap
page read and write
5F24000
heap
page read and write
D60000
heap
page read and write
2001BFB2000
trusted library allocation
page read and write
26D26FEA000
trusted library allocation
page read and write
2880C491000
heap
page read and write
6E4000
heap
page read and write
6636000
heap
page read and write
5EB1000
heap
page read and write
5C35000
heap
page read and write
26D26D5A000
heap
page read and write
2001471B000
trusted library allocation
page read and write
2001F58C000
trusted library allocation
page read and write
26D27098000
trusted library allocation
page read and write
6601000
heap
page read and write
200139B9000
trusted library allocation
page read and write
26D26D17000
heap
page read and write
2001F99B000
trusted library allocation
page read and write
26D264EF000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
A40000
unkown
page readonly
660A000
heap
page read and write
4D00000
direct allocation
page read and write
2880BBA1000
trusted library allocation
page read and write
20019EB7000
trusted library allocation
page read and write
2001B210000
trusted library allocation
page read and write
4E10000
direct allocation
page execute and read and write
6633000
heap
page read and write
2880CC09000
trusted library allocation
page read and write
1744000
heap
page read and write
5CF5000
heap
page read and write
2880C49E000
heap
page read and write
14A4000
heap
page read and write
26D26FCB000
trusted library allocation
page read and write
20016DD1000
trusted library allocation
page read and write
20014845000
heap
page read and write
943000
heap
page read and write
6878000
heap
page read and write
2880BBEF000
trusted library allocation
page read and write
26D26D15000
heap
page read and write
5CF5000
heap
page read and write
353E000
stack
page read and write
200195CF000
trusted library allocation
page read and write
26D26D63000
heap
page read and write
D76000
heap
page read and write
4E91000
heap
page read and write
9A7C7FF000
stack
page read and write
2880C4AD000
heap
page read and write
26D26D1D000
heap
page read and write
4820000
direct allocation
page execute and read and write
26D26D16000
heap
page read and write
2001A8FA000
trusted library allocation
page read and write
20017696000
trusted library allocation
page read and write
200175CD000
trusted library allocation
page read and write
2001B386000
trusted library allocation
page read and write
3B8E000
stack
page read and write
904000
heap
page read and write
20025B93000
trusted library allocation
page read and write
20017FBF000
trusted library allocation
page read and write
2001769E000
trusted library allocation
page read and write
200212D7000
trusted library allocation
page read and write
20017693000
trusted library allocation
page read and write
4641000
heap
page read and write
20014843000
heap
page read and write
2002119D000
trusted library allocation
page read and write
6E4000
heap
page read and write
20019CBE000
trusted library allocation
page read and write
200199FB000
trusted library allocation
page read and write
5B8F000
heap
page read and write
6646000
heap
page read and write
20025B93000
trusted library allocation
page read and write
2001BECD000
trusted library allocation
page read and write
2001BC15000
trusted library allocation
page read and write
2001483A000
heap
page read and write
367F000
stack
page read and write
26D26D33000
heap
page read and write
2BCF000
stack
page read and write
26D26FEA000
trusted library allocation
page read and write
26D27A0A000
trusted library allocation
page read and write
200176B9000
trusted library allocation
page read and write
200195EC000
trusted library allocation
page read and write
200215DF000
trusted library allocation
page read and write
646B000
heap
page read and write
20013476000
trusted library allocation
page read and write
200173EE000
trusted library allocation
page read and write
2880C4AB000
heap
page read and write
2001C2A8000
trusted library allocation
page read and write
5CCD000
heap
page read and write
200178A2000
trusted library allocation
page read and write
6582000
heap
page read and write
26D26D4B000
heap
page read and write
2001F884000
trusted library allocation
page read and write
2001342F000
trusted library allocation
page read and write
44056A03000
trusted library allocation
page read and write
4641000
heap
page read and write
6E4000
heap
page read and write
E9A5FBE000
stack
page read and write
2880C4AD000
heap
page read and write
200195BF000
trusted library allocation
page read and write
26D26D4D000
heap
page read and write
150A000
heap
page read and write
CA0000
direct allocation
page read and write
4B7E000
stack
page read and write
20017EFC000
trusted library allocation
page read and write
20014845000
heap
page read and write
20021DA0000
trusted library allocation
page read and write
2001F944000
trusted library allocation
page read and write
1744000
heap
page read and write
26D26D42000
heap
page read and write
2001F5ED000
trusted library allocation
page read and write
5320000
direct allocation
page read and write
2001A8E6000
trusted library allocation
page read and write
26D26D31000
heap
page read and write
6E4000
heap
page read and write
20019A6B000
trusted library allocation
page read and write
200188E6000
trusted library allocation
page read and write
20021B73000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
5410000
direct allocation
page execute and read and write
F1C54BF000
stack
page read and write
2001F832000
trusted library allocation
page read and write
1964000
heap
page read and write
FB0000
heap
page read and write
200146DB000
trusted library allocation
page read and write
2880C493000
heap
page read and write
26D26D2F000
heap
page read and write
26D267FB000
trusted library allocation
page read and write
2001C176000
trusted library allocation
page read and write
2002108A000
trusted library allocation
page read and write
20017F4C000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
26D26F0F000
trusted library allocation
page read and write
200147C1000
trusted library allocation
page read and write
2001B46F000
trusted library allocation
page read and write
BA4000
heap
page read and write
200211FE000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
20014655000
trusted library allocation
page read and write
4E91000
heap
page read and write
6665000
heap
page read and write
1DF1C1A0000
heap
page read and write
2880C4AB000
heap
page read and write
CC0000
direct allocation
page read and write
2880C493000
heap
page read and write
26D26D32000
heap
page read and write
20014655000
trusted library allocation
page read and write
26D26FFE000
trusted library allocation
page read and write
1DF1A8E5000
heap
page read and write
2880C4AB000
heap
page read and write
D70000
direct allocation
page read and write
6671000
heap
page read and write
1744000
heap
page read and write
2880C48F000
heap
page read and write
2001F9F4000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
298B6900000
heap
page read and write
2877000
heap
page read and write
20014844000
heap
page read and write
20017C57000
trusted library allocation
page read and write
FB4000
heap
page read and write
2001B92E000
trusted library allocation
page read and write
940000
unkown
page write copy
7DC2000
heap
page read and write
20014850000
heap
page read and write
5B50000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
5B8D000
heap
page read and write
D50000
heap
page read and write
285E000
stack
page read and write
9F7000
unkown
page read and write
2910000
direct allocation
page read and write
298B6C50000
heap
page read and write
61DE000
stack
page read and write
D66000
heap
page read and write
2001476E000
trusted library allocation
page read and write
4641000
heap
page read and write
5CCB000
heap
page read and write
26D26D2F000
heap
page read and write
6E4000
heap
page read and write
26D26FB9000
trusted library allocation
page read and write
4641000
heap
page read and write
26D27096000
trusted library allocation
page read and write
200212D1000
trusted library allocation
page read and write
42FE000
stack
page read and write
20019D79000
trusted library allocation
page read and write
340E000
stack
page read and write
5D32000
heap
page read and write
6BF8000
heap
page read and write
20017FC1000
trusted library allocation
page read and write
1CAC9550000
heap
page read and write
2001A821000
trusted library allocation
page read and write
2001AEE5000
trusted library allocation
page read and write
4641000
heap
page read and write
4E91000
heap
page read and write
4701000
heap
page read and write
649E000
stack
page read and write
6E4000
heap
page read and write
191A000
heap
page read and write
D55000
heap
page read and write
20021B7A000
trusted library allocation
page read and write
2001BE93000
trusted library allocation
page read and write
2880C4DB000
heap
page read and write
20021DAD000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
20019B4D000
trusted library allocation
page read and write
20017CFA000
trusted library allocation
page read and write
26D26D32000
heap
page read and write
5F24000
heap
page read and write
4E71000
heap
page read and write
4641000
heap
page read and write
61D9000
heap
page read and write
20025B14000
trusted library allocation
page read and write
20014846000
heap
page read and write
7182000
heap
page read and write
20014679000
trusted library allocation
page read and write
20019CC0000
trusted library allocation
page read and write
2880E87B000
trusted library allocation
page read and write
2001F516000
trusted library allocation
page read and write
5CC5000
heap
page read and write
11A000
stack
page read and write
2001A8A1000
trusted library allocation
page read and write
4641000
heap
page read and write
49AE000
stack
page read and write
20020EB1000
trusted library allocation
page read and write
6E4000
heap
page read and write
4E71000
heap
page read and write
5B8D000
heap
page read and write
2001F589000
trusted library allocation
page read and write
9F7000
unkown
page write copy
200173D2000
trusted library allocation
page read and write
20025B69000
trusted library allocation
page read and write
2001A88D000
trusted library allocation
page read and write
1CAC9907000
trusted library allocation
page read and write
20021197000
trusted library allocation
page read and write
2001B3BA000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
200188C7000
trusted library allocation
page read and write
5E22000
heap
page read and write
2001B400000
trusted library allocation
page read and write
20017F8C000
trusted library allocation
page read and write
6649000
heap
page read and write
231DC475000
heap
page read and write
41F1000
heap
page read and write
5CE1000
heap
page read and write
200176F5000
trusted library allocation
page read and write
4B60000
direct allocation
page execute and read and write
20021B7A000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
20021DB0000
trusted library allocation
page read and write
200212D7000
trusted library allocation
page read and write
2001484E000
heap
page read and write
DDC000
heap
page read and write
200194CB000
trusted library allocation
page read and write
2001488F000
heap
page read and write
20017C60000
trusted library allocation
page read and write
4E91000
heap
page read and write
200195DA000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
2001784E000
trusted library allocation
page read and write
DB4000
heap
page read and write
20017CF8000
trusted library allocation
page read and write
6571000
heap
page read and write
6E4000
heap
page read and write
6633000
heap
page read and write
20025B35000
trusted library allocation
page read and write
2001486F000
heap
page read and write
20017BC3000
trusted library allocation
page read and write
4410000
heap
page read and write
38CF000
stack
page read and write
2001C208000
trusted library allocation
page read and write
20025B7A000
trusted library allocation
page read and write
E00000
unkown
page read and write
20019E7C000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
2001484B000
heap
page read and write
5B3E000
stack
page read and write
DF6000
unkown
page execute and read and write
1744000
heap
page read and write
26D26D5A000
heap
page read and write
57D0000
heap
page execute and read and write
4E71000
heap
page read and write
756A000
heap
page read and write
2880E766000
trusted library allocation
page read and write
6629000
heap
page read and write
4E71000
heap
page read and write
20014769000
trusted library allocation
page read and write
8C0000
unkown
page readonly
5CF5000
heap
page read and write
200146EF000
trusted library allocation
page read and write
4641000
heap
page read and write
20014762000
trusted library allocation
page read and write
5B53000
heap
page read and write
D70000
direct allocation
page read and write
D5B000
heap
page read and write
4843FE000
stack
page read and write
200176A6000
trusted library allocation
page read and write
6E4000
heap
page read and write
6601000
heap
page read and write
6D89000
heap
page read and write
49EE000
stack
page read and write
2910000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
6571000
heap
page read and write
26D26D23000
heap
page read and write
942000
heap
page read and write
20016D2B000
trusted library allocation
page read and write
26D264BF000
trusted library allocation
page read and write
20019B1E000
trusted library allocation
page read and write
6922000
heap
page read and write
5C78000
heap
page read and write
5B90000
heap
page read and write
2880C492000
heap
page read and write
20021D66000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
20014836000
heap
page read and write
6399000
heap
page read and write
200212DD000
trusted library allocation
page read and write
2001345C000
trusted library allocation
page read and write
20019E94000
trusted library allocation
page read and write
6628000
heap
page read and write
1744000
heap
page read and write
2880C49E000
heap
page read and write
1744000
heap
page read and write
5D90000
remote allocation
page read and write
6607000
heap
page read and write
4D00000
direct allocation
page read and write
2001B8B9000
trusted library allocation
page read and write
5C92000
heap
page read and write
2F4E000
stack
page read and write
20020FE5000
trusted library allocation
page read and write
CC0000
direct allocation
page read and write
2001F500000
trusted library allocation
page read and write
DA5000
heap
page read and write
6631000
heap
page read and write
2001739A000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
D4F000
heap
page read and write
200195EC000
trusted library allocation
page read and write
200134E9000
trusted library allocation
page read and write
5CF8000
heap
page read and write
20014709000
trusted library allocation
page read and write
6E4000
heap
page read and write
CCE000
heap
page read and write
26D26D4A000
heap
page read and write
20019CD0000
trusted library allocation
page read and write
2001739A000
trusted library allocation
page read and write
5C44000
heap
page read and write
14A4000
heap
page read and write
41F1000
heap
page read and write
D6B000
heap
page read and write
5480000
heap
page read and write
26D26882000
trusted library allocation
page read and write
200147DD000
trusted library allocation
page read and write
200176A1000
trusted library allocation
page read and write
2880C493000
heap
page read and write
2880C49C000
heap
page read and write
200135B1000
trusted library allocation
page read and write
4642000
heap
page read and write
4A40000
direct allocation
page execute and read and write
2001BEC0000
trusted library allocation
page read and write
2001F5CF000
trusted library allocation
page read and write
15CC000
heap
page read and write
3CFF000
stack
page read and write
661D000
heap
page read and write
4B30000
direct allocation
page execute and read and write
6E4000
heap
page read and write
4641000
heap
page read and write
2001B978000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5CE1000
heap
page read and write
200189F9000
trusted library allocation
page read and write
3FE000
unkown
page execute and write copy
5CC5000
heap
page read and write
6E5000
heap
page read and write
5EB1000
heap
page read and write
1744000
heap
page read and write
6601000
heap
page read and write
20013566000
trusted library allocation
page read and write
2001BE97000
trusted library allocation
page read and write
6F6C7FF000
stack
page read and write
26D26D5A000
heap
page read and write
20018989000
trusted library allocation
page read and write
342F000
stack
page read and write
664D000
heap
page read and write
20014836000
heap
page read and write
2880E88A000
trusted library allocation
page read and write
6607000
heap
page read and write
20019DD1000
trusted library allocation
page read and write
1744000
heap
page read and write
30D0000
direct allocation
page read and write
26D26D2C000
heap
page read and write
661D000
heap
page read and write
20017C61000
trusted library allocation
page read and write
15BC000
heap
page read and write
4D20000
direct allocation
page execute and read and write
6BFB000
heap
page read and write
20019C9F000
trusted library allocation
page read and write
200219EC000
trusted library allocation
page read and write
2001F58C000
trusted library allocation
page read and write
20014851000
heap
page read and write
6E5000
heap
page read and write
5A06000
heap
page read and write
1540000
heap
page read and write
328F000
stack
page read and write
26D26D33000
heap
page read and write
660A000
heap
page read and write
26D26D2F000
heap
page read and write
2001484B000
heap
page read and write
20019CB8000
trusted library allocation
page read and write
1744000
heap
page read and write
20025B14000
trusted library allocation
page read and write
4641000
heap
page read and write
2001BFD5000
trusted library allocation
page read and write
2880C48B000
heap
page read and write
5C4E000
heap
page read and write
62BE000
heap
page read and write
6628000
heap
page read and write
5AAA000
heap
page read and write
20014845000
heap
page read and write
2002113B000
trusted library allocation
page read and write
639E000
stack
page read and write
20016DE6000
trusted library allocation
page read and write
20025B00000
trusted library allocation
page read and write
26D26D5E000
heap
page read and write
15E0000
heap
page read and write
D6C000
heap
page read and write
5961000
trusted library allocation
page read and write
2B8E000
stack
page read and write
14A4000
heap
page read and write
5F87000
heap
page read and write
20021592000
trusted library allocation
page read and write
5CE8000
heap
page read and write
20013455000
trusted library allocation
page read and write
2CBF000
stack
page read and write
20019CB6000
trusted library allocation
page read and write
14A4000
heap
page read and write
2001C226000
trusted library allocation
page read and write
2001F974000
trusted library allocation
page read and write
65DF000
heap
page read and write
2001485A000
heap
page read and write
20020E4B000
trusted library allocation
page read and write
1745000
heap
page read and write
26D26D4A000
heap
page read and write
26D27098000
trusted library allocation
page read and write
14A4000
heap
page read and write
9A7B7FA000
stack
page read and write
4641000
heap
page read and write
2880E77E000
trusted library allocation
page read and write
2001B9CA000
trusted library allocation
page read and write
5EB1000
heap
page read and write
20013460000
trusted library allocation
page read and write
20016DD1000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
661D000
heap
page read and write
20021E46000
trusted library allocation
page read and write
26D26D62000
heap
page read and write
2001BC8E000
trusted library allocation
page read and write
4E71000
heap
page read and write
26D26D19000
heap
page read and write
26D26D1D000
heap
page read and write
6631000
heap
page read and write
20017C4C000
trusted library allocation
page read and write
5CCB000
heap
page read and write
661D000
heap
page read and write
20014733000
trusted library allocation
page read and write
20020E5D000
trusted library allocation
page read and write
D7F000
heap
page read and write
26D26D4A000
heap
page read and write
660A000
heap
page read and write
20013455000
trusted library allocation
page read and write
26D268FA000
trusted library allocation
page read and write
D82000
heap
page read and write
660A000
heap
page read and write
482F000
stack
page read and write
2001BFA5000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2880C4AB000
heap
page read and write
2880C492000
heap
page read and write
20021580000
trusted library allocation
page read and write
3FE000
unkown
page execute and read and write
2FF7000
heap
page read and write
26D26D2D000
heap
page read and write
26D267FE000
trusted library allocation
page read and write
675C000
heap
page read and write
2001F575000
trusted library allocation
page read and write
14A4000
heap
page read and write
5CF7000
heap
page read and write
2880C48A000
heap
page read and write
CA0000
direct allocation
page read and write
20017566000
trusted library allocation
page read and write
200212F2000
trusted library allocation
page read and write
6607000
heap
page read and write
20017656000
trusted library allocation
page read and write
14A4000
heap
page read and write
20019CBB000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880C492000
heap
page read and write
2880C4DB000
heap
page read and write
D83000
heap
page read and write
20017C52000
trusted library allocation
page read and write
20014855000
heap
page read and write
D78000
heap
page read and write
378F000
stack
page read and write
5340000
direct allocation
page execute and read and write
3AEE000
stack
page read and write
2880E870000
trusted library allocation
page read and write
6049000
heap
page read and write
6E4000
heap
page read and write
D7B000
heap
page read and write
512F000
stack
page read and write
49F0000
direct allocation
page execute and read and write
300F000
stack
page read and write
4641000
heap
page read and write
20013460000
trusted library allocation
page read and write
20013461000
trusted library allocation
page read and write
4810000
direct allocation
page execute and read and write
4641000
heap
page read and write
200176D6000
trusted library allocation
page read and write
BB0000
heap
page read and write
20021DE2000
trusted library allocation
page read and write
20019EAE000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
4E71000
heap
page read and write
20019EB4000
trusted library allocation
page read and write
26D26D1A000
heap
page read and write
588D000
stack
page read and write
20016DD4000
trusted library allocation
page read and write
2001F97D000
trusted library allocation
page read and write
2880C492000
heap
page read and write
20021B9C000
trusted library allocation
page read and write
6DC7000
heap
page read and write
200195C1000
trusted library allocation
page read and write
6E4000
heap
page read and write
1455000
heap
page read and write
2001F83F000
trusted library allocation
page read and write
20017696000
trusted library allocation
page read and write
2880C909000
trusted library allocation
page read and write
2001483F000
heap
page read and write
2001C134000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
2880C4D6000
heap
page read and write
55C9000
heap
page read and write
2001A895000
trusted library allocation
page read and write
20020E76000
trusted library allocation
page read and write
4E71000
heap
page read and write
26D26D31000
heap
page read and write
20019CB4000
trusted library allocation
page read and write
F1C559B000
stack
page read and write
6E4000
heap
page read and write
938000
heap
page read and write
2880BF82000
trusted library allocation
page read and write
4641000
heap
page read and write
26D26D4A000
heap
page read and write
6E4000
heap
page read and write
5C78000
heap
page read and write
2001F9FE000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
4641000
heap
page read and write
DCD000
heap
page read and write
4641000
heap
page read and write
200173E6000
trusted library allocation
page read and write
916000
heap
page read and write
2A3F000
stack
page read and write
20020FEF000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
6E4000
heap
page read and write
20020E86000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
472F000
stack
page read and write
6DC4000
heap
page read and write
5CF5000
heap
page read and write
2001483F000
heap
page read and write
9A7DFFF000
stack
page read and write
200176BA000
trusted library allocation
page read and write
D52000
heap
page read and write
CCD000
unkown
page execute and read and write
2001F5F8000
trusted library allocation
page read and write
26D264F9000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
5B8F000
heap
page read and write
2001A838000
trusted library allocation
page read and write
20020E00000
trusted library allocation
page read and write
20020EB5000
trusted library allocation
page read and write
2001B36C000
trusted library allocation
page read and write
4641000
heap
page read and write
D6B000
heap
page read and write
4641000
heap
page read and write
20018989000
trusted library allocation
page read and write
6658000
heap
page read and write
26D268AB000
trusted library allocation
page read and write
661D000
heap
page read and write
20014854000
heap
page read and write
20020E14000
trusted library allocation
page read and write
6631000
heap
page read and write
2001483B000
heap
page read and write
5340000
direct allocation
page execute and read and write
20017648000
trusted library allocation
page read and write
2001751E000
trusted library allocation
page read and write
37FF000
stack
page read and write
26D26D33000
heap
page read and write
20014643000
trusted library allocation
page read and write
200147BC000
trusted library allocation
page read and write
2001B259000
trusted library allocation
page read and write
200247A5000
trusted library allocation
page read and write
200188EC000
trusted library allocation
page read and write
3DFF000
stack
page read and write
20019D9C000
trusted library allocation
page read and write
2001BF1B000
trusted library allocation
page read and write
20019CE1000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
14A4000
heap
page read and write
293B000
heap
page read and write
4701000
heap
page read and write
26D26D36000
heap
page read and write
20019968000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
2001F9CD000
trusted library allocation
page read and write
2880E90A000
trusted library allocation
page read and write
1744000
heap
page read and write
20017C57000
trusted library allocation
page read and write
2001738A000
trusted library allocation
page read and write
92B000
heap
page read and write
6E4000
heap
page read and write
2880C4AB000
heap
page read and write
2880CE09000
trusted library allocation
page read and write
20021DA6000
trusted library allocation
page read and write
20019EC5000
trusted library allocation
page read and write
2ACF000
stack
page read and write
D6F000
heap
page read and write
14A4000
heap
page read and write
231DC0F2000
heap
page read and write
6607000
heap
page read and write
2001F9F4000
trusted library allocation
page read and write
20017FB1000
trusted library allocation
page read and write
561F000
stack
page read and write
20013423000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880E7CB000
trusted library allocation
page read and write
830000
heap
page read and write
20021E48000
trusted library allocation
page read and write
10B6000
unkown
page execute and write copy
20019EC4000
trusted library allocation
page read and write
200175CD000
trusted library allocation
page read and write
48AE000
stack
page read and write
2880C4DB000
heap
page read and write
2001B92C000
trusted library allocation
page read and write
200159F8000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001F9F2000
trusted library allocation
page read and write
3F7E000
stack
page read and write
5D02000
heap
page read and write
D4F000
heap
page read and write
30D0000
direct allocation
page read and write
200189F1000
trusted library allocation
page read and write
30E7000
heap
page read and write
2001BFDB000
trusted library allocation
page read and write
BA4000
heap
page read and write
200147E0000
trusted library allocation
page read and write
20020E7F000
trusted library allocation
page read and write
20019CB4000
trusted library allocation
page read and write
26D26D4D000
heap
page read and write
26D26D39000
heap
page read and write
5C52000
heap
page read and write
6607000
heap
page read and write
4A50000
direct allocation
page execute and read and write
932000
unkown
page readonly
20021B85000
trusted library allocation
page read and write
3A3E000
stack
page read and write
924000
heap
page read and write
200147DC000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
6E4000
heap
page read and write
298B6890000
heap
page read and write
20019D31000
trusted library allocation
page read and write
2001B3BA000
trusted library allocation
page read and write
6E4000
heap
page read and write
26D26D5A000
heap
page read and write
6E4000
heap
page read and write
2880C4AD000
heap
page read and write
3CFE000
stack
page read and write
200213F4000
trusted library allocation
page read and write
200176C7000
trusted library allocation
page read and write
20017668000
trusted library allocation
page read and write
6631000
heap
page read and write
2880BEFE000
trusted library allocation
page read and write
4D11000
heap
page read and write
5ADD000
heap
page read and write
20019EBE000
trusted library allocation
page read and write
200195DA000
trusted library allocation
page read and write
20014845000
heap
page read and write
58CD000
stack
page read and write
20018977000
trusted library allocation
page read and write
2001485A000
heap
page read and write
54B0000
direct allocation
page execute and read and write
200173BA000
trusted library allocation
page read and write
4E71000
heap
page read and write
20017F2C000
trusted library allocation
page read and write
2001959E000
trusted library allocation
page read and write
20014836000
heap
page read and write
4C20000
direct allocation
page execute and read and write
2001737E000
trusted library allocation
page read and write
6652000
heap
page read and write
26D26D2F000
heap
page read and write
200219D5000
trusted library allocation
page read and write
9B4000
heap
page read and write
20021540000
trusted library allocation
page read and write
5EB1000
heap
page read and write
200189AA000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
44BE000
stack
page read and write
E26000
unkown
page write copy
2001484B000
heap
page read and write
65AD000
heap
page read and write
26D2708A000
trusted library allocation
page read and write
2001484B000
heap
page read and write
231DC410000
heap
page read and write
2001B358000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
2002197A000
trusted library allocation
page read and write
20017706000
trusted library allocation
page read and write
20017C1D000
trusted library allocation
page read and write
26D26D31000
heap
page read and write
4E00000
direct allocation
page execute and read and write
5D4B000
heap
page read and write
2F0F000
stack
page read and write
20014880000
heap
page read and write
6641000
heap
page read and write
4641000
heap
page read and write
4E91000
heap
page read and write
26F0000
direct allocation
page read and write
20025B75000
trusted library allocation
page read and write
3E3F000
stack
page read and write
3FAF000
stack
page read and write
9F7000
unkown
page read and write
2880C4AD000
heap
page read and write
26D26D47000
heap
page read and write
20013423000
trusted library allocation
page read and write
15C1000
heap
page read and write
26D26455000
trusted library allocation
page read and write
2002197A000
trusted library allocation
page read and write
20019B6C000
trusted library allocation
page read and write
4E71000
heap
page read and write
20021E5D000
trusted library allocation
page read and write
7C7E000
stack
page read and write
5B90000
heap
page read and write
20017668000
trusted library allocation
page read and write
2001A8AC000
trusted library allocation
page read and write
4D11000
heap
page read and write
6607000
heap
page read and write
20021D93000
trusted library allocation
page read and write
FB4000
heap
page read and write
4E71000
heap
page read and write
2880C488000
heap
page read and write
20017FB1000
trusted library allocation
page read and write
F1C54FB000
stack
page read and write
26D26723000
trusted library allocation
page read and write
5C35000
heap
page read and write
48B0000
direct allocation
page execute and read and write
6591000
heap
page read and write
26D26900000
trusted library allocation
page read and write
2001F999000
trusted library allocation
page read and write
D5C000
heap
page read and write
A00000
heap
page read and write
D5B000
heap
page read and write
2001A893000
trusted library allocation
page read and write
20014845000
heap
page read and write
20017CE9000
trusted library allocation
page read and write
628A000
heap
page read and write
20017CE5000
trusted library allocation
page read and write
2001F9F8000
trusted library allocation
page read and write
DBE000
heap
page read and write
6E4000
heap
page read and write
26D26D21000
heap
page read and write
840000
direct allocation
page read and write
44AE000
stack
page read and write
2880BB90000
trusted library allocation
page read and write
20017FFB000
trusted library allocation
page read and write
20013460000
trusted library allocation
page read and write
6658000
heap
page read and write
2001484B000
heap
page read and write
1CACB1BA000
heap
page read and write
4B30000
direct allocation
page execute and read and write
5A37000
heap
page read and write
3F6F000
stack
page read and write
4701000
heap
page read and write
20025B74000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
DB4000
heap
page read and write
3F7F000
stack
page read and write
660A000
heap
page read and write
A7766AE000
stack
page read and write
200176C5000
trusted library allocation
page read and write
2001B8D4000
trusted library allocation
page read and write
20016DF7000
trusted library allocation
page read and write
5C36000
heap
page read and write
2001B8F0000
trusted library allocation
page read and write
20017662000
trusted library allocation
page read and write
20019ECD000
trusted library allocation
page read and write
55D3000
trusted library allocation
page execute and read and write
5C31000
heap
page read and write
20020EDC000
trusted library allocation
page read and write
DB1000
heap
page read and write
D63000
heap
page read and write
2001BEF5000
trusted library allocation
page read and write
200189C7000
trusted library allocation
page read and write
6E4000
heap
page read and write
20014855000
heap
page read and write
2001F924000
trusted library allocation
page read and write
200147AA000
trusted library allocation
page read and write
2001A887000
trusted library allocation
page read and write
45BF000
stack
page read and write
15E0000
heap
page read and write
2001B96B000
trusted library allocation
page read and write
231DDDA9000
heap
page read and write
4641000
heap
page read and write
20014754000
trusted library allocation
page read and write
61C7000
heap
page read and write
D52000
heap
page read and write
2001C074000
trusted library allocation
page read and write
200176FD000
trusted library allocation
page read and write
20016EF4000
trusted library allocation
page read and write
26D27909000
trusted library allocation
page read and write
6E4000
heap
page read and write
3C2E000
stack
page read and write
26D26D4B000
heap
page read and write
4823FF000
stack
page read and write
2002116A000
trusted library allocation
page read and write
5D04000
heap
page read and write
2001F5FD000
trusted library allocation
page read and write
6CB8000
heap
page read and write
15CC000
heap
page read and write
5C4C000
heap
page read and write
4DAE000
stack
page read and write
2001BEC8000
trusted library allocation
page read and write
200176EF000
trusted library allocation
page read and write
6E4000
heap
page read and write
5CD3000
heap
page read and write
4641000
heap
page read and write
2001F56F000
trusted library allocation
page read and write
200215C7000
trusted library allocation
page read and write
1400000
heap
page read and write
2001F935000
trusted library allocation
page read and write
20019EFE000
trusted library allocation
page read and write
2001F9B9000
trusted library allocation
page read and write
D9B000
heap
page read and write
4E91000
heap
page read and write
65A7000
heap
page read and write
4641000
heap
page read and write
4B10000
direct allocation
page execute and read and write
7EF000
stack
page read and write
6631000
heap
page read and write
6E4000
heap
page read and write
200211AB000
trusted library allocation
page read and write
2880C48B000
heap
page read and write
2001F5D1000
trusted library allocation
page read and write
5D2A000
heap
page read and write
200176A6000
trusted library allocation
page read and write
DC8000
heap
page read and write
4641000
heap
page read and write
F1C3FEE000
stack
page read and write
20021DA0000
trusted library allocation
page read and write
5E5B000
heap
page read and write
2001F87D000
trusted library allocation
page read and write
2001F970000
trusted library allocation
page read and write
2001342F000
trusted library allocation
page read and write
3D3E000
stack
page read and write
26D26498000
trusted library allocation
page read and write
3D6E000
stack
page read and write
6713000
heap
page read and write
5B8D000
heap
page read and write
6641000
heap
page read and write
15E0000
heap
page read and write
20021097000
trusted library allocation
page read and write
20019BF1000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
4641000
heap
page read and write
20019DBD000
trusted library allocation
page read and write
4E71000
heap
page read and write
2001A8B3000
trusted library allocation
page read and write
59BC000
stack
page read and write
26D26875000
trusted library allocation
page read and write
2001F535000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
5C8F000
heap
page read and write
4E71000
heap
page read and write
20014850000
heap
page read and write
3BEE000
stack
page read and write
20019EB1000
trusted library allocation
page read and write
DA2000
heap
page read and write
4641000
heap
page read and write
26D26D5B000
heap
page read and write
5F87000
heap
page read and write
2880BFD3000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
2700000
heap
page read and write
20021D35000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2001BA28000
trusted library allocation
page read and write
D4F000
heap
page read and write
2001F595000
trusted library allocation
page read and write
2001F8DD000
trusted library allocation
page read and write
5C8C000
heap
page read and write
20017FDE000
trusted library allocation
page read and write
661D000
heap
page read and write
26D26D5B000
heap
page read and write
15E3000
heap
page read and write
200173EE000
trusted library allocation
page read and write
2001B400000
trusted library allocation
page read and write
2001345C000
trusted library allocation
page read and write
5EB3000
heap
page read and write
4D11000
heap
page read and write
26D26D5B000
heap
page read and write
200189AC000
trusted library allocation
page read and write
5E41000
heap
page read and write
200212D7000
trusted library allocation
page read and write
6E4000
heap
page read and write
200176B9000
trusted library allocation
page read and write
20018E02000
trusted library allocation
page read and write
4D11000
heap
page read and write
4550000
heap
page read and write
20017378000
trusted library allocation
page read and write
92B000
heap
page read and write
FCF000
stack
page read and write
5D44000
heap
page read and write
2001767B000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
153D000
heap
page read and write
2001F586000
trusted library allocation
page read and write
2001BFFE000
trusted library allocation
page read and write
4641000
heap
page read and write
CDB000
heap
page read and write
4E71000
heap
page read and write
26D26D31000
heap
page read and write
26D26D63000
heap
page read and write
20014875000
heap
page read and write
E84000
unkown
page execute and write copy
4641000
heap
page read and write
20021B75000
trusted library allocation
page read and write
20017C60000
trusted library allocation
page read and write
DC8000
heap
page read and write
6600000
heap
page read and write
20019BD8000
trusted library allocation
page read and write
FB4000
heap
page read and write
26D26D19000
heap
page read and write
20013423000
trusted library allocation
page read and write
5B8F000
heap
page read and write
5C40000
heap
page read and write
2880C4DB000
heap
page read and write
2001774F000
trusted library allocation
page read and write
20017FC5000
trusted library allocation
page read and write
5B89000
heap
page read and write
383E000
stack
page read and write
200189B7000
trusted library allocation
page read and write
109B000
stack
page read and write
2001F5C7000
trusted library allocation
page read and write
5481000
heap
page read and write
200188BC000
trusted library allocation
page read and write
2DCF000
stack
page read and write
26D26D23000
heap
page read and write
2001F5E6000
trusted library allocation
page read and write
6E4000
heap
page read and write
4701000
heap
page read and write
20021B4F000
trusted library allocation
page read and write
41F1000
heap
page read and write
D6B000
heap
page read and write
2001C000000
trusted library allocation
page read and write
1750000
heap
page read and write
2001F500000
trusted library allocation
page read and write
20015954000
trusted library allocation
page read and write
6E4000
heap
page read and write
200189F0000
trusted library allocation
page read and write
200176FD000
trusted library allocation
page read and write
26D26FBE000
trusted library allocation
page read and write
57D3000
heap
page read and write
26D26D39000
heap
page read and write
2002126D000
trusted library allocation
page read and write
6591000
heap
page read and write
4E71000
heap
page read and write
1744000
heap
page read and write
2880BB98000
trusted library allocation
page read and write
4411000
heap
page read and write
6629000
heap
page read and write
26D26D31000
heap
page read and write
1744000
heap
page read and write
4D11000
heap
page read and write
DB2000
heap
page read and write
5C91000
heap
page read and write
6580000
heap
page read and write
2001F979000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
54A0000
direct allocation
page execute and read and write
20025B00000
trusted library allocation
page read and write
5D83000
heap
page read and write
5FDB000
heap
page read and write
2880C4C5000
heap
page read and write
4BA0000
direct allocation
page read and write
2F1E000
stack
page read and write
2910000
direct allocation
page read and write
200176F5000
trusted library allocation
page read and write
2001483F000
heap
page read and write
5DCC000
heap
page read and write
2880E829000
trusted library allocation
page read and write
5D33000
heap
page read and write
2880BF75000
trusted library allocation
page read and write
20019EB4000
trusted library allocation
page read and write
8CBC000
stack
page read and write
200212DD000
trusted library allocation
page read and write
F1C523D000
stack
page read and write
26D26D5A000
heap
page read and write
D3611FC000
stack
page read and write
200159C3000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
396F000
stack
page read and write
4D11000
heap
page read and write
6628000
heap
page read and write
26D26D4A000
heap
page read and write
2001F919000
trusted library allocation
page read and write
1744000
heap
page read and write
200146D0000
trusted library allocation
page read and write
298B6A00000
trusted library allocation
page read and write
20021DCA000
trusted library allocation
page read and write
20024700000
trusted library allocation
page read and write
2960000
direct allocation
page execute and read and write
595E000
stack
page read and write
20021DCA000
trusted library allocation
page read and write
F1C555B000
stack
page read and write
4641000
heap
page read and write
2001B432000
trusted library allocation
page read and write
66C5000
heap
page read and write
6FB4000
heap
page read and write
26D26D17000
heap
page read and write
900000
heap
page read and write
26D26D1D000
heap
page read and write
2001F59F000
trusted library allocation
page read and write
2001AEC9000
trusted library allocation
page read and write
346F000
stack
page read and write
9F3000
unkown
page execute and read and write
20014861000
heap
page read and write
5EA9000
heap
page read and write
20021EA8000
trusted library allocation
page read and write
20021BE9000
trusted library allocation
page read and write
5C4B000
heap
page read and write
F1C3FFE000
stack
page read and write
26D29388000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880C4AD000
heap
page read and write
54DF000
stack
page read and write
5C85000
heap
page read and write
26D26D44000
heap
page read and write
6E4000
heap
page read and write
26D26D18000
heap
page read and write
20014842000
heap
page read and write
2880C48D000
heap
page read and write
6634000
heap
page read and write
4641000
heap
page read and write
2880CBDE000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
4641000
heap
page read and write
5C90000
heap
page read and write
6E4000
heap
page read and write
200189A5000
trusted library allocation
page read and write
5E21000
heap
page read and write
2002113B000
trusted library allocation
page read and write
6E4000
heap
page read and write
3C8F000
stack
page read and write
20019E60000
trusted library allocation
page read and write
4641000
heap
page read and write
2001474F000
trusted library allocation
page read and write
4641000
heap
page read and write
2001F990000
trusted library allocation
page read and write
6665000
heap
page read and write
2001F5CD000
trusted library allocation
page read and write
4D11000
heap
page read and write
5B50000
trusted library allocation
page read and write
472E000
stack
page read and write
200176FD000
trusted library allocation
page read and write
6E4000
heap
page read and write
5CD5000
heap
page read and write
20019AD6000
trusted library allocation
page read and write
26D26D1D000
heap
page read and write
BA4000
heap
page read and write
4D11000
heap
page read and write
20019C4A000
trusted library allocation
page read and write
4810000
direct allocation
page execute and read and write
20014769000
trusted library allocation
page read and write
231DDDBC000
heap
page read and write
6E4000
heap
page read and write
6042000
heap
page read and write
6E4000
heap
page read and write
2001345C000
trusted library allocation
page read and write
6643000
heap
page read and write
4B2E000
stack
page read and write
6CCB000
heap
page read and write
20014779000
trusted library allocation
page read and write
1412000
heap
page read and write
2001485A000
heap
page read and write
2001B8D2000
trusted library allocation
page read and write
372E000
stack
page read and write
A77676B000
stack
page read and write
20021281000
trusted library allocation
page read and write
26D26D33000
heap
page read and write
20020FF4000
trusted library allocation
page read and write
6671000
heap
page read and write
4641000
heap
page read and write
20017C63000
trusted library allocation
page read and write
20020FF4000
trusted library allocation
page read and write
D84000
heap
page read and write
6E4000
heap
page read and write
200146F3000
trusted library allocation
page read and write
58BE000
stack
page read and write
6E4000
heap
page read and write
200134DE000
trusted library allocation
page read and write
26D26D2D000
heap
page read and write
1CAC95DF000
heap
page read and write
20021DAD000
trusted library allocation
page read and write
DC0000
heap
page read and write
2001F83F000
trusted library allocation
page read and write
D87000
heap
page read and write
4D00000
direct allocation
page read and write
2001BCC7000
trusted library allocation
page read and write
2001A893000
trusted library allocation
page read and write
200189E6000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001484E000
heap
page read and write
20019DEB000
trusted library allocation
page read and write
20019E86000
trusted library allocation
page read and write
15D1000
heap
page read and write
20017668000
trusted library allocation
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
4641000
heap
page read and write
660A000
heap
page read and write
26D293D3000
trusted library allocation
page read and write
200147A1000
trusted library allocation
page read and write
20013460000
trusted library allocation
page read and write
4E71000
heap
page read and write
2001BFBB000
trusted library allocation
page read and write
D86000
heap
page read and write
2001F87B000
trusted library allocation
page read and write
20019C9F000
trusted library allocation
page read and write
2001A8C7000
trusted library allocation
page read and write
20019EB7000
trusted library allocation
page read and write
5D34000
heap
page read and write
2001C23C000
trusted library allocation
page read and write
200134F1000
trusted library allocation
page read and write
D4E000
unkown
page execute and write copy
20021289000
trusted library allocation
page read and write
5C78000
heap
page read and write
3B7F000
stack
page read and write
20014875000
heap
page read and write
1286000
unkown
page execute and write copy
20013526000
trusted library allocation
page read and write
20017FB1000
trusted library allocation
page read and write
20024728000
trusted library allocation
page read and write
6A1E000
heap
page read and write
DCD000
heap
page read and write
231DDDAC000
heap
page read and write
5C78000
heap
page read and write
200215C7000
trusted library allocation
page read and write
343F000
stack
page read and write
20020ED0000
trusted library allocation
page read and write
2001A869000
trusted library allocation
page read and write
44EE000
stack
page read and write
2001484B000
heap
page read and write
20025B3C000
trusted library allocation
page read and write
20017FE1000
trusted library allocation
page read and write
31EF000
stack
page read and write
2001F582000
trusted library allocation
page read and write
6E4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
26D26D5A000
heap
page read and write
2880C4D6000
heap
page read and write
20025B76000
trusted library allocation
page read and write
2880E6EB000
trusted library allocation
page read and write
2001A854000
trusted library allocation
page read and write
2001486F000
heap
page read and write
FB4000
heap
page read and write
6591000
heap
page read and write
26D26D33000
heap
page read and write
20014875000
heap
page read and write
2001F8FC000
trusted library allocation
page read and write
2001A84A000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
20020FE5000
trusted library allocation
page read and write
6E4000
heap
page read and write
6665000
heap
page read and write
20012E9E000
trusted library allocation
page read and write
2880E71F000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
200189B7000
trusted library allocation
page read and write
2001B884000
trusted library allocation
page read and write
20019E9E000
trusted library allocation
page read and write
DA5000
heap
page read and write
20014855000
heap
page read and write
26D26D1E000
heap
page read and write
26D26D4A000
heap
page read and write
20019DAD000
trusted library allocation
page read and write
840000
direct allocation
page read and write
4E71000
heap
page read and write
26D26D5A000
heap
page read and write
200215AD000
trusted library allocation
page read and write
5FDB000
heap
page read and write
1DEAF629000
heap
page read and write
2880BE23000
trusted library allocation
page read and write
20024A35000
trusted library allocation
page read and write
5CD3000
heap
page read and write
2001739A000
trusted library allocation
page read and write
20017CFD000
trusted library allocation
page read and write
4E91000
heap
page read and write
26D26D23000
heap
page read and write
20021560000
trusted library allocation
page read and write
4E71000
heap
page read and write
26D26498000
trusted library allocation
page read and write
2880E7E8000
trusted library allocation
page read and write
2001BFFE000
trusted library allocation
page read and write
20014794000
trusted library allocation
page read and write
20014842000
heap
page read and write
2880C4D6000
heap
page read and write
26D26D21000
heap
page read and write
200176F0000
trusted library allocation
page read and write
4641000
heap
page read and write
4E91000
heap
page read and write
FB4000
heap
page read and write
6E4000
heap
page read and write
5B81000
heap
page read and write
20020E7D000
trusted library allocation
page read and write
2001BFB9000
trusted library allocation
page read and write
2FDE000
stack
page read and write
6628000
heap
page read and write
26D26D31000
heap
page read and write
6601000
heap
page read and write
482BFF000
stack
page read and write
6E4000
heap
page read and write
1744000
heap
page read and write
6591000
heap
page read and write
6E4000
heap
page read and write
82E000
stack
page read and write
20018989000
trusted library allocation
page read and write
200173DA000
trusted library allocation
page read and write
4C2C000
stack
page read and write
200188E9000
trusted library allocation
page read and write
6580000
heap
page read and write
20019EFE000
trusted library allocation
page read and write
6950000
heap
page read and write
2880C4DB000
heap
page read and write
4641000
heap
page read and write
2001F528000
trusted library allocation
page read and write
690000
heap
page read and write
20025B32000
trusted library allocation
page read and write
5F24000
heap
page read and write
5CCB000
heap
page read and write
2001733F000
trusted library allocation
page read and write
200184D2000
trusted library allocation
page read and write
D83000
heap
page read and write
200219BB000
trusted library allocation
page read and write
20014875000
heap
page read and write
20019E26000
trusted library allocation
page read and write
4641000
heap
page read and write
20016D72000
trusted library allocation
page read and write
6E4000
heap
page read and write
7AFD000
stack
page read and write
20017662000
trusted library allocation
page read and write
2001F924000
trusted library allocation
page read and write
4E71000
heap
page read and write
2001BF12000
trusted library allocation
page read and write
26D2687D000
trusted library allocation
page read and write
20017F40000
trusted library allocation
page read and write
2001F59F000
trusted library allocation
page read and write
20021934000
trusted library allocation
page read and write
4641000
heap
page read and write
65A7000
heap
page read and write
2001345C000
trusted library allocation
page read and write
26D29845000
trusted library allocation
page read and write
26D26D63000
heap
page read and write
20017668000
trusted library allocation
page read and write
26D26D39000
heap
page read and write
2001A8FA000
trusted library allocation
page read and write
3B9000
unkown
page execute and read and write
2001736A000
trusted library allocation
page read and write
20017F28000
trusted library allocation
page read and write
20021B13000
trusted library allocation
page read and write
2D7F000
stack
page read and write
280000
heap
page read and write
200147C1000
trusted library allocation
page read and write
4540000
heap
page read and write
200189AA000
trusted library allocation
page read and write
20021DE2000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
2880C4D6000
heap
page read and write
1027000
heap
page read and write
437E000
stack
page read and write
6607000
heap
page read and write
20014839000
heap
page read and write
20020ED0000
trusted library allocation
page read and write
6E4000
heap
page read and write
2880C48E000
heap
page read and write
6571000
heap
page read and write
5CC5000
heap
page read and write
26D26771000
trusted library allocation
page read and write
20017565000
trusted library allocation
page read and write
26D26D31000
heap
page read and write
4641000
heap
page read and write
368E000
stack
page read and write
357E000
stack
page read and write
4641000
heap
page read and write
2880C4AB000
heap
page read and write
5CC9000
heap
page read and write
2880C492000
heap
page read and write
2001738A000
trusted library allocation
page read and write
2001F973000
trusted library allocation
page read and write
1A8AF671000
trusted library allocation
page execute read
20014694000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
20019DF1000
trusted library allocation
page read and write
26D26D39000
heap
page read and write
6A30000
heap
page read and write
200188C7000
trusted library allocation
page read and write
86A000
heap
page read and write
2880C49E000
heap
page read and write
20014880000
heap
page read and write
5750000
trusted library allocation
page read and write
20019C8E000
trusted library allocation
page read and write
6751000
heap
page read and write
26D26D5A000
heap
page read and write
15E0000
heap
page read and write
5C91000
heap
page read and write
26D26D2F000
heap
page read and write
6DCD000
heap
page read and write
5D81000
heap
page read and write
430E000
stack
page read and write
1744000
heap
page read and write
200176C7000
trusted library allocation
page read and write
20016D7A000
trusted library allocation
page read and write
298B6780000
heap
page read and write
5B50000
trusted library allocation
page read and write
20014844000
heap
page read and write
26D26D63000
heap
page read and write
6E4000
heap
page read and write
6E4000
heap
page read and write
20021157000
trusted library allocation
page read and write
26D26D4D000
heap
page read and write
5D30000
trusted library allocation
page read and write
418F000
stack
page read and write
51A0000
direct allocation
page read and write
5D81000
heap
page read and write
200212D7000
trusted library allocation
page read and write
6580000
heap
page read and write
D79000
heap
page read and write
6603000
heap
page read and write
2880BF17000
trusted library allocation
page read and write
2001F9A2000
trusted library allocation
page read and write
200189CF000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
6601000
heap
page read and write
20014845000
heap
page read and write
26D26D22000
heap
page read and write
200173D9000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
20021B7A000
trusted library allocation
page read and write
6E4000
heap
page read and write
4541000
heap
page read and write
660A000
heap
page read and write
DB4000
heap
page read and write
200146E0000
trusted library allocation
page read and write
2001B981000
trusted library allocation
page read and write
20017F85000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
20018494000
trusted library allocation
page read and write
2001B816000
trusted library allocation
page read and write
D86000
heap
page read and write
5F7E000
heap
page read and write
2001A86E000
trusted library allocation
page read and write
12FC000
stack
page read and write
2880CA09000
trusted library allocation
page read and write
D49000
heap
page read and write
54C0000
direct allocation
page execute and read and write
26D26D5A000
heap
page read and write
8C1000
unkown
page execute and write copy
62BE000
heap
page read and write
2001C234000
trusted library allocation
page read and write
D60000
heap
page read and write
20019EB7000
trusted library allocation
page read and write
6CB6000
heap
page read and write
1744000
heap
page read and write
6E4000
heap
page read and write
200176A6000
trusted library allocation
page read and write
5A5000
unkown
page execute and read and write
20017F71000
trusted library allocation
page read and write
6595000
heap
page read and write
3EF000
unkown
page execute and read and write
26D27091000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
6055000
heap
page read and write
200176EF000
trusted library allocation
page read and write
20016DD1000
trusted library allocation
page read and write
4641000
heap
page read and write
26D268B5000
trusted library allocation
page read and write
2001F929000
trusted library allocation
page read and write
2001A887000
trusted library allocation
page read and write
10DE000
unkown
page execute and write copy
2001B47A000
trusted library allocation
page read and write
6E4000
heap
page read and write
20019EB4000
trusted library allocation
page read and write
2001F957000
trusted library allocation
page read and write
2001F9FE000
trusted library allocation
page read and write
49FB000
stack
page read and write
26D26D4A000
heap
page read and write
6985000
trusted library allocation
page read and write
200219E8000
trusted library allocation
page read and write
2001F5CD000
trusted library allocation
page read and write
2001A878000
trusted library allocation
page read and write
20020EF8000
trusted library allocation
page read and write
20014875000
heap
page read and write
1423000
heap
page read and write
20014844000
heap
page read and write
195C000
heap
page read and write
6E4000
heap
page read and write
20019E5E000
trusted library allocation
page read and write
5CB6000
heap
page read and write
396E000
stack
page read and write
46EF000
stack
page read and write
6603000
heap
page read and write
6CBF000
heap
page read and write
D76000
heap
page read and write
20018973000
trusted library allocation
page read and write
20019CEE000
trusted library allocation
page read and write
200188FE000
trusted library allocation
page read and write
2880C48B000
heap
page read and write
6654000
heap
page read and write
DCD000
heap
page read and write
20020EE1000
trusted library allocation
page read and write
125C000
stack
page read and write
2001342F000
trusted library allocation
page read and write
2001BEB9000
trusted library allocation
page read and write
5D2A000
heap
page read and write
661D000
heap
page read and write
D5B000
heap
page read and write
6449000
heap
page read and write
5CDD000
heap
page read and write
5340000
direct allocation
page execute and read and write
26D26D1C000
heap
page read and write
2001F830000
trusted library allocation
page read and write
A7767FF000
stack
page read and write
6E4000
heap
page read and write
515D000
stack
page read and write
200147C7000
trusted library allocation
page read and write
2C7F000
stack
page read and write
2880C492000
heap
page read and write
5C4F000
stack
page read and write
20019EF1000
trusted library allocation
page read and write
26D26D44000
heap
page read and write
2001F98C000
trusted library allocation
page read and write
6596000
heap
page read and write
5470000
direct allocation
page read and write
2001A8EE000
trusted library allocation
page read and write
200188C4000
trusted library allocation
page read and write
20017574000
trusted library allocation
page read and write
2880C48E000
heap
page read and write
200175CD000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2001B475000
trusted library allocation
page read and write
D84000
heap
page read and write
20016DCD000
trusted library allocation
page read and write
6E4000
heap
page read and write
49F0000
direct allocation
page execute and read and write
20019EC0000
trusted library allocation
page read and write
DCD000
heap
page read and write
1DF1C1A5000
heap
page read and write
5AAB000
heap
page read and write
6E5000
heap
page read and write
49F0000
direct allocation
page execute and read and write
5CC5000
heap
page read and write
2880C485000
heap
page read and write
26D26D1D000
heap
page read and write
20024709000
trusted library allocation
page read and write
20019EF1000
trusted library allocation
page read and write
5A09000
heap
page read and write
26D26D4A000
heap
page read and write
20014764000
trusted library allocation
page read and write
26D26D23000
heap
page read and write
6643000
heap
page read and write
20019EA2000
trusted library allocation
page read and write
2001F582000
trusted library allocation
page read and write
4701000
heap
page read and write
30FF000
stack
page read and write
2001F5BE000
trusted library allocation
page read and write
26D26D2C000
heap
page read and write
200147F9000
trusted library allocation
page read and write
1DF1A579000
heap
page read and write
2880BB98000
trusted library allocation
page read and write
2001C2AC000
trusted library allocation
page read and write
4890000
direct allocation
page execute and read and write
26D26D4B000
heap
page read and write
2001789F000
trusted library allocation
page read and write
32BE000
stack
page read and write
2001A8E6000
trusted library allocation
page read and write
5DEB000
stack
page read and write
4E71000
heap
page read and write
5D04000
heap
page read and write
2001F973000
trusted library allocation
page read and write
20017FFB000
trusted library allocation
page read and write
2001F5AE000
trusted library allocation
page read and write
2880C493000
heap
page read and write
6E4000
heap
page read and write
200176EF000
trusted library allocation
page read and write
2001B8C8000
trusted library allocation
page read and write
4D11000
heap
page read and write
2001766B000
trusted library allocation
page read and write
D76000
heap
page read and write
2001F91A000
trusted library allocation
page read and write
5CF5000
heap
page read and write
2001484C000
heap
page read and write
A0A000
unkown
page execute and read and write
9F7000
unkown
page write copy
4641000
heap
page read and write
4641000
heap
page read and write
2001F8E7000
trusted library allocation
page read and write
4641000
heap
page read and write
20021092000
trusted library allocation
page read and write
2001483F000
heap
page read and write
4E91000
heap
page read and write
2880C4AD000
heap
page read and write
4840000
direct allocation
page execute and read and write
5CCC000
heap
page read and write
26D29379000
trusted library allocation
page read and write
20019EB4000
trusted library allocation
page read and write
20017C7C000
trusted library allocation
page read and write
26D26853000
trusted library allocation
page read and write
26D26D57000
heap
page read and write
2001787D000
trusted library allocation
page read and write
4E80000
heap
page read and write
840000
direct allocation
page read and write
2001BC5E000
trusted library allocation
page read and write
5CE6000
heap
page read and write
8C1000
unkown
page execute and read and write
660A000
heap
page read and write
20017FEB000
trusted library allocation
page read and write
2001BE97000
trusted library allocation
page read and write
6872000
heap
page read and write
20014891000
heap
page read and write
6628000
heap
page read and write
20017FEA000
trusted library allocation
page read and write
2001C230000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
664A000
heap
page read and write
4642000
heap
page read and write
283B000
heap
page read and write
20021DA4000
trusted library allocation
page read and write
2001F8E0000
trusted library allocation
page read and write
4641000
heap
page read and write
20017FFB000
trusted library allocation
page read and write
1CACB1A3000
heap
page read and write
5C5B000
heap
page read and write
2002108E000
trusted library allocation
page read and write
200176B9000
trusted library allocation
page read and write
4641000
heap
page read and write
DC8000
heap
page read and write
6645000
heap
page read and write
6E4000
heap
page read and write
20019CBE000
trusted library allocation
page read and write
4641000
heap
page read and write
14A4000
heap
page read and write
2880C4AB000
heap
page read and write
20019EE1000
trusted library allocation
page read and write
2001476E000
trusted library allocation
page read and write
20016EF3000
trusted library allocation
page read and write
2001B22B000
trusted library allocation
page read and write
200199F6000
trusted library allocation
page read and write
2001765D000
trusted library allocation
page read and write
5C78000
heap
page read and write
397E000
stack
page read and write
6628000
heap
page read and write
2001B432000
trusted library allocation
page read and write
2880C4D6000
heap
page read and write
200146CE000
trusted library allocation
page read and write
5F87000
heap
page read and write
26D26D2F000
heap
page read and write
26D26D5A000
heap
page read and write
20014764000
trusted library allocation
page read and write
D4F000
heap
page read and write
26D298AA000
trusted library allocation
page read and write
2880E7BE000
trusted library allocation
page read and write
20017FC3000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
5D30000
trusted library allocation
page read and write
6DCD000
heap
page read and write
4641000
heap
page read and write
6301000
heap
page read and write
4641000
heap
page read and write
6E5000
heap
page read and write
DB4000
heap
page read and write
2001BC59000
trusted library allocation
page read and write
4641000
heap
page read and write
2880C492000
heap
page read and write
535C000
stack
page read and write
2001737C000
trusted library allocation
page read and write
62FE000
heap
page read and write
6652000
heap
page read and write
2001F8DD000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
5B8F000
heap
page read and write
32CF000
stack
page read and write
2001A8D8000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
2001A8BA000
trusted library allocation
page read and write
20018995000
trusted library allocation
page read and write
26D26D5B000
heap
page read and write
20019D9C000
trusted library allocation
page read and write
FB4000
heap
page read and write
20019B37000
trusted library allocation
page read and write
6E4000
heap
page read and write
20013441000
trusted library allocation
page read and write
D61000
heap
page read and write
2001F86C000
trusted library allocation
page read and write
20021BCE000
trusted library allocation
page read and write
66C4000
heap
page read and write
20017CFA000
trusted library allocation
page read and write
2001BEB4000
trusted library allocation
page read and write
E9A4DFD000
stack
page read and write
200212A6000
trusted library allocation
page read and write
4E91000
heap
page read and write
20014870000
heap
page read and write
2001739A000
trusted library allocation
page read and write
3DCF000
stack
page read and write
2001A881000
trusted library allocation
page read and write
6628000
heap
page read and write
6E4000
heap
page read and write
3E7E000
stack
page read and write
5590000
direct allocation
page execute and read and write
20020FEC000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
661D000
heap
page read and write
D54000
heap
page read and write
200176FD000
trusted library allocation
page read and write
26D26FEA000
trusted library allocation
page read and write
4D20000
remote allocation
page read and write
200176FD000
trusted library allocation
page read and write
20017C5A000
trusted library allocation
page read and write
200146DB000
trusted library allocation
page read and write
20021B4A000
trusted library allocation
page read and write
6CBC000
heap
page read and write
4D11000
heap
page read and write
200215FC000
trusted library allocation
page read and write
2DCF000
stack
page read and write
20017C77000
trusted library allocation
page read and write
20021E40000
trusted library allocation
page read and write
26D26D2D000
heap
page read and write
20013496000
trusted library allocation
page read and write
2001F5A3000
trusted library allocation
page read and write
270000
heap
page read and write
15BC000
heap
page read and write
91D000
heap
page read and write
200215D7000
trusted library allocation
page read and write
20025B74000
trusted library allocation
page read and write
2001B88B000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
6E4000
heap
page read and write
DB3000
heap
page read and write
2001767F000
trusted library allocation
page read and write
1CACB1BE000
heap
page read and write
26D26FCB000
trusted library allocation
page read and write
4860000
direct allocation
page execute and read and write
36BE000
stack
page read and write
1744000
heap
page read and write
657B000
heap
page read and write
2001C016000
trusted library allocation
page read and write
6E4000
heap
page read and write
26D26D5A000
heap
page read and write
20017315000
trusted library allocation
page read and write
66FD000
heap
page read and write
2001C17B000
trusted library allocation
page read and write
200146EB000
trusted library allocation
page read and write
2001735E000
trusted library allocation
page read and write
41CF000
stack
page read and write
4E80000
direct allocation
page read and write
4D00000
direct allocation
page read and write
2001351E000
trusted library allocation
page read and write
FB4000
heap
page read and write
2880C4AD000
heap
page read and write
1DF1A680000
heap
page read and write
B8A000
unkown
page execute and read and write
4E91000
heap
page read and write
6591000
heap
page read and write
26D26D21000
heap
page read and write
20021E93000
trusted library allocation
page read and write
118D000
stack
page read and write
6E4000
heap
page read and write
2880C492000
heap
page read and write
20013455000
trusted library allocation
page read and write
20014859000
heap
page read and write
2001484B000
heap
page read and write
FB4000
heap
page read and write
6440000
trusted library allocation
page read and write
2880E6B8000
trusted library allocation
page read and write
DAB000
stack
page read and write
4E91000
heap
page read and write
2880C492000
heap
page read and write
20025B7B000
trusted library allocation
page read and write
26D26D4D000
heap
page read and write
200195EC000
trusted library allocation
page read and write
20020EA3000
trusted library allocation
page read and write
D79000
heap
page read and write
4E71000
heap
page read and write
26D26D5E000
heap
page read and write
20019DED000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
4CDF000
stack
page read and write
26D26D31000
heap
page read and write
64E0000
heap
page read and write
2880E7E8000
trusted library allocation
page read and write
A7766EB000
stack
page read and write
5D81000
heap
page read and write
5F8F000
heap
page read and write
26D26FEA000
trusted library allocation
page read and write
6AD000
unkown
page execute and write copy
6600000
heap
page read and write
2001765F000
trusted library allocation
page read and write
20020FFA000
trusted library allocation
page read and write
4E91000
heap
page read and write
26D26D5A000
heap
page read and write
353F000
stack
page read and write
4E80000
direct allocation
page read and write
4E91000
heap
page read and write
200189A5000
trusted library allocation
page read and write
200159BA000
trusted library allocation
page read and write
368F000
stack
page read and write
2001F5D3000
trusted library allocation
page read and write
26D2646D000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
26D26D55000
heap
page read and write
26D26D4A000
heap
page read and write
2002119B000
trusted library allocation
page read and write
20016DCD000
trusted library allocation
page read and write
20021D90000
trusted library allocation
page read and write
6671000
heap
page read and write
6E0000
heap
page read and write
5481000
heap
page read and write
2001B99A000
trusted library allocation
page read and write
26D26D1C000
heap
page read and write
D70000
direct allocation
page read and write
2880E6A9000
trusted library allocation
page read and write
40AF000
stack
page read and write
404F000
stack
page read and write
D6C000
heap
page read and write
1744000
heap
page read and write
5D1D000
heap
page read and write
5CB6000
heap
page read and write
20020FEF000
trusted library allocation
page read and write
2910000
direct allocation
page read and write
1500000
heap
page read and write
440F000
stack
page read and write
2880BB9A000
trusted library allocation
page read and write
20017693000
trusted library allocation
page read and write
20024A16000
trusted library allocation
page read and write
2001B3BA000
trusted library allocation
page read and write
2001A89A000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
200173BA000
trusted library allocation
page read and write
2002155F000
trusted library allocation
page read and write
2A1000
unkown
page execute and write copy
6E4000
heap
page read and write
38BF000
stack
page read and write
2001A8EE000
trusted library allocation
page read and write
2880C492000
heap
page read and write
20018985000
trusted library allocation
page read and write
200146D0000
trusted library allocation
page read and write
200173F6000
trusted library allocation
page read and write
26D26D5A000
heap
page read and write
5E51000
heap
page read and write
20020E91000
trusted library allocation
page read and write
15E0000
heap
page read and write
5CA4000
heap
page read and write
4641000
heap
page read and write
200219DF000
trusted library allocation
page read and write
20021B9C000
trusted library allocation
page read and write
3FE000
unkown
page execute and write copy
41F1000
heap
page read and write
26D298B5000
trusted library allocation
page read and write
2880BB57000
trusted library allocation
page read and write
D4F000
heap
page read and write
20015951000
trusted library allocation
page read and write
2880C49E000
heap
page read and write
2880C4AD000
heap
page read and write
E06000
unkown
page write copy
20025B3C000
trusted library allocation
page read and write
2880C492000
heap
page read and write
6601000
heap
page read and write
4E71000
heap
page read and write
4641000
heap
page read and write
2001484B000
heap
page read and write
41CE000
stack
page read and write
26D26FFE000
trusted library allocation
page read and write
D9D000
heap
page read and write
2880C488000
heap
page read and write
6440000
trusted library allocation
page read and write
6628000
heap
page read and write
5CF5000
heap
page read and write
26D26D4D000
heap
page read and write
20012EEF000
trusted library allocation
page read and write
154B000
heap
page read and write
6E4000
heap
page read and write
2001F958000
trusted library allocation
page read and write
20021991000
trusted library allocation
page read and write
26D27029000
trusted library allocation
page read and write
F9A000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
2001BECD000
trusted library allocation
page read and write
26D26D21000
heap
page read and write
20B000
stack
page read and write
200194D7000
trusted library allocation
page read and write
31FE000
stack
page read and write
871000
unkown
page execute read
20014655000
trusted library allocation
page read and write
200176EF000
trusted library allocation
page read and write
2001757E000
trusted library allocation
page read and write
200212F6000
trusted library allocation
page read and write
20014875000
heap
page read and write
20019E60000
trusted library allocation
page read and write
2001B8DA000
trusted library allocation
page read and write
2001F5BD000
trusted library allocation
page read and write
350F000
stack
page read and write
2001C22B000
trusted library allocation
page read and write
15E0000
heap
page read and write
2001B820000
trusted library allocation
page read and write
26D26D2F000
heap
page read and write
6E4000
heap
page read and write
20019CBB000
trusted library allocation
page read and write
2001484B000
heap
page read and write
CB3000
unkown
page execute and read and write
5C40000
heap
page read and write
26D26FBB000
trusted library allocation
page read and write
200147BE000
trusted library allocation
page read and write
2880C492000
heap
page read and write
6E4000
heap
page read and write
200176FD000
trusted library allocation
page read and write
2001483F000
heap
page read and write
26D2702E000
trusted library allocation
page read and write
2EBF000
stack
page read and write
2A1000
unkown
page execute and read and write
5510000
direct allocation
page execute and read and write
DB7000
heap
page read and write
200176A3000
trusted library allocation
page read and write
2880C4BA000
heap
page read and write
20019BFD000
trusted library allocation
page read and write
200195E9000
trusted library allocation
page read and write
2880BFAB000
trusted library allocation
page read and write
4641000
heap
page read and write
20025B76000
trusted library allocation
page read and write
6635000
heap
page read and write
26D26F27000
trusted library allocation
page read and write
26D26F40000
trusted library allocation
page read and write
66BC000
heap
page read and write
5B8B000
heap
page read and write
661D000
heap
page read and write
2880C4D6000
heap
page read and write
6D7C000
heap
page read and write
5D33000
heap
page read and write
4E91000
heap
page read and write
2880C49E000
heap
page read and write
20019C60000
trusted library allocation
page read and write
2880C48B000
heap
page read and write
2001F926000
trusted library allocation
page read and write
200159D1000
trusted library allocation
page read and write
20013423000
trusted library allocation
page read and write
4641000
heap
page read and write
200195BF000
trusted library allocation
page read and write
77F8FFF000
stack
page read and write
200173FB000
trusted library allocation
page read and write
5C40000
heap
page read and write
5420000
direct allocation
page execute and read and write
200212EB000
trusted library allocation
page read and write
2001BE88000
trusted library allocation
page read and write
E4D000
unkown
page execute and read and write
6631000
heap
page read and write
59CD000
stack
page read and write
6635000
heap
page read and write
1745000
heap
page read and write
200135BB000
trusted library allocation
page read and write
D84000
heap
page read and write
2001B9C4000
trusted library allocation
page read and write
5C40000
heap
page read and write
6628000
heap
page read and write
20021E76000
trusted library allocation
page read and write
20025BA2000
trusted library allocation
page read and write
D7F000
heap
page read and write
2001B358000
trusted library allocation
page read and write
92C000
heap
page read and write
2001474B000
trusted library allocation
page read and write
2001B8CC000
trusted library allocation
page read and write
2001789E000
trusted library allocation
page read and write
5CC5000
heap
page read and write
20021B7A000
trusted library allocation
page read and write
26D26490000
trusted library allocation
page read and write
2880C4AD000
heap
page read and write
20014769000
trusted library allocation
page read and write
200212CE000
trusted library allocation
page read and write
356F000
stack
page read and write
2001345C000
trusted library allocation
page read and write
20021592000
trusted library allocation
page read and write
2001BC06000
trusted library allocation
page read and write
20019EF9000
trusted library allocation
page read and write
5500000
direct allocation
page execute and read and write
200194B9000
trusted library allocation
page read and write
2001F881000
trusted library allocation
page read and write
40EF000
stack
page read and write
1744000
heap
page read and write
231DC470000
heap
page read and write
4641000
heap
page read and write
200212F6000
trusted library allocation
page read and write
497E000
stack
page read and write
20020E3C000
trusted library allocation
page read and write
2001F99B000
trusted library allocation
page read and write
20019DC6000
trusted library allocation
page read and write
2880E891000
trusted library allocation
page read and write
1744000
heap
page read and write
2880BF7D000
trusted library allocation
page read and write
2001342F000
trusted library allocation
page read and write
2001BEA2000
trusted library allocation
page read and write
200176F5000
trusted library allocation
page read and write
20017FE1000
trusted library allocation
page read and write
6643000
heap
page read and write
2001A8E1000
trusted library allocation
page read and write
2001F947000
trusted library allocation
page read and write
1744000
heap
page read and write
200173E9000
trusted library allocation
page read and write
2001F584000
trusted library allocation
page read and write
5B8B000
heap
page read and write
6783000
heap
page read and write
1284000
unkown
page execute and write copy
60DE000
heap
page read and write
4641000
heap
page read and write
664E000
heap
page read and write
20017384000
trusted library allocation
page read and write
DC7000
heap
page read and write
6E4000
heap
page read and write
20021DE8000
trusted library allocation
page read and write
5C51000
heap
page read and write
20019CCE000
trusted library allocation
page read and write
4641000
heap
page read and write
20019E86000
trusted library allocation
page read and write
4641000
heap
page read and write
5B90000
heap
page read and write
20020E99000
trusted library allocation
page read and write
20014643000
trusted library allocation
page read and write
20020E86000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
4D11000
heap
page read and write
5C40000
heap
page read and write
D86000
heap
page read and write
6E4000
heap
page read and write
D5B000
heap
page read and write
36AF000
stack
page read and write
5CF5000
heap
page read and write
20016ECE000
trusted library allocation
page read and write
20017563000
trusted library allocation
page read and write
2001F595000
trusted library allocation
page read and write
200147F6000
trusted library allocation
page read and write
2001B958000
trusted library allocation
page read and write
2001F935000
trusted library allocation
page read and write
6615000
heap
page read and write
4D20000
direct allocation
page execute and read and write
200176B9000
trusted library allocation
page read and write
2001342F000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
20017FC5000
trusted library allocation
page read and write
2001B8DC000
trusted library allocation
page read and write
2001F595000
trusted library allocation
page read and write
4641000
heap
page read and write
20021DBE000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
2001F5B0000
trusted library allocation
page read and write
2880BB85000
trusted library allocation
page read and write
660A000
heap
page read and write
2001484E000
heap
page read and write
4541000
heap
page read and write
20024A03000
trusted library allocation
page read and write
20020E4B000
trusted library allocation
page read and write
2001F9BA000
trusted library allocation
page read and write
65DC000
stack
page read and write
26D26D23000
heap
page read and write
20025BA2000
trusted library allocation
page read and write
2880E71A000
trusted library allocation
page read and write
6E4000
heap
page read and write
5D81000
heap
page read and write
D86000
heap
page read and write
6AE000
unkown
page execute and write copy
200189BA000
trusted library allocation
page read and write
E26000
unkown
page read and write
2001483E000
heap
page read and write
20017FE1000
trusted library allocation
page read and write
2910000
direct allocation
page read and write
20016D54000
trusted library allocation
page read and write
20019CBE000
trusted library allocation
page read and write
26D26D4A000
heap
page read and write
6E4000
heap
page read and write
15C6000
heap
page read and write
1003000
unkown
page execute and read and write
2001F97D000
trusted library allocation
page read and write
20019BA2000
trusted library allocation
page read and write
20014854000
heap
page read and write
5CD0000
heap
page read and write
2880C4DB000
heap
page read and write
2001F5E7000
trusted library allocation
page read and write
DCD000
heap
page read and write
2001A881000
trusted library allocation
page read and write
20017FA7000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
30D0000
direct allocation
page read and write
200215AD000
trusted library allocation
page read and write
2880BF53000
trusted library allocation
page read and write
2001F91C000
trusted library allocation
page read and write
13D0000
heap
page read and write
2001A8FA000
trusted library allocation
page read and write
FDE000
stack
page read and write
4E80000
direct allocation
page read and write
6631000
heap
page read and write
26D268F6000
trusted library allocation
page read and write
20019ED5000
trusted library allocation
page read and write
6F61000
heap
page read and write
20014842000
heap
page read and write
2880C4AD000
heap
page read and write
20025B32000
trusted library allocation
page read and write
2880E7FD000
trusted library allocation
page read and write
6E4000
heap
page read and write
2001486F000
heap
page read and write
200195DA000
trusted library allocation
page read and write
200188E6000
trusted library allocation
page read and write
20017825000
trusted library allocation
page read and write
149E000
stack
page read and write
5FE8000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
200176A1000
trusted library allocation
page read and write
5D0D000
heap
page read and write
15CE000
heap
page read and write
2001A878000
trusted library allocation
page read and write
4A70000
direct allocation
page execute and read and write
26D26481000
trusted library allocation
page read and write
2001959B000
trusted library allocation
page read and write
2001BEC0000
trusted library allocation
page read and write
661D000
heap
page read and write
980000
trusted library allocation
page read and write
200219E6000
trusted library allocation
page read and write
200147C7000
trusted library allocation
page read and write
20021137000
trusted library allocation
page read and write
There are 7826 hidden memdumps, click here to show them.