IOC Report
Modrinth_Installer.exe

loading gif

Files

File Path
Type
Category
Malicious
Modrinth_Installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files\Modrinth App\Modrinth App.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Modrinth.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\notepad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Config.Msi\6a222b.rbs
data
modified
C:\Program Files\Modrinth App\Uninstall Modrinth App.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Archive, ctime=Sat Dec 7 08:09:44 2019, mtime=Fri Jul 26 18:25:57 2024, atime=Sat Dec 7 08:09:44 2019, length=69632, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\Modrinth App.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Fri Jul 26 18:26:13 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\Modrinth App.lnk~RF6a340c.TMP (copy)
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Fri Jul 26 18:26:13 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\~odrinth App.tmp
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Fri Jul 26 18:26:13 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\Users\Public\Desktop\Modrinth App.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Fri Jul 26 18:26:13 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\0016789f-7083-4f11-bb30-bb60e549d85e.tmp
RIFF (little-endian) data, Web/P image
modified
C:\Users\user\AppData\Local\Temp\MSI10A6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI4265.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Modrinth App_0.7.1_x64_en-US.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Modrinth App, Author: modrinth, Keywords: Installer, Comments: This installer database contains the logic and data required to install Modrinth App., Template: x64;0, Revision Number: {C760B5F9-74CA-4082-83C4-12F6B36A93BB}, Create Time/Date: Tue Apr 23 23:26:10 2024, Last Saved Time/Date: Tue Apr 23 23:26:10 2024, Number of Pages: 450, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\1deb9ae8-4e7d-49f6-9963-cd82dfa8f7b6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\1e113dfa-612f-48a6-b637-eb99eae77bf0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\65b94235-7c50-4389-ab77-2bf4acb85c3f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\9fb045a1-1cd1-49da-ae36-343a024c8fb5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\BrowserMetrics\BrowserMetrics-66A3F85A-1E24.pma
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\0c1520ec-4f98-41b7-8956-73ae2a6722a3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\14e6410b-80f2-465f-a700-146b2d26c963.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\4279f7db-252a-45f5-a992-3a06c0a596e7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\8155a7d7-0c1b-4468-b682-71264f626339.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\f_000001
Web Open Font Format (Version 2), TrueType, length 98868, version 1.0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\f_000002
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\f_000003
Web Open Font Format (Version 2), TrueType, length 105924, version 1.0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\f_000004
Web Open Font Format (Version 2), TrueType, length 106140, version 1.0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\f_000005
RIFF (little-endian) data, Web/P image
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\js\ac0a8a50cebbb6e1_0
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF6aa796.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Local Storage\leveldb\000003.log
data
modified
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\318816ab-6009-4101-9768-d21aefb2f51f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\45000fb2-fb92-482d-b855-15ca5012acfc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\562f14b7-8a1a-48f1-b5fc-919e31247d70.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\7787e538-7f4c-4ba3-8fb7-79a9c4daa4a5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\Network Persistent State~RF6b76ae.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\SCT Auditing Pending Reports~RF6a4ea9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Network\c97e8e16-9f20-4bb0-af29-9e1567babdb9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Preferences~RF6a9e01.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Preferences~RF6ae701.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Preferences~RF6b5c21.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Preferences~RF6c46fe.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\a157f035-0ed7-4d93-9606-55d045ad6ee5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\edf3684c-d172-4ea6-bb2f-29901bcebc5a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Local State~RF6a494a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Local State~RF6a4979.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Local State~RF6a7089.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Local State~RF6a9e01.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Local State~RF6b5a9a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Local State~RF6be1cc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\aba78bb1-66b0-4efd-862a-2501ff562cf2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\dc7aa6f7-9250-4dd7-8729-5433c759fdea.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\e212f0c0-44ed-4fa6-862a-9e88c2c2430b.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\notepad.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Jul 26 18:26:02 2024, mtime=Fri Jul 26 18:26:02 2024, atime=Fri Jul 26 18:26:02 2024, length=324096, window=hide
dropped
C:\Users\user\AppData\Roaming\com.modrinth.theseus\caches\metadata\metadata.json
JSON data
dropped
C:\Users\user\AppData\Roaming\com.modrinth.theseus\caches\metadata\metadata.json.bak
JSON data
dropped
C:\Users\user\AppData\Roaming\com.modrinth.theseus\caches\metadata\tags.json
JSON data
dropped
C:\Users\user\AppData\Roaming\com.modrinth.theseus\caches\metadata\tags.json.bak
JSON data
dropped
C:\Users\user\AppData\Roaming\com.modrinth.theseus\launcher_logs\theseus.log.2024-07-26
ASCII text
dropped
C:\Windows\Installer\6a222a.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Modrinth App, Author: modrinth, Keywords: Installer, Comments: This installer database contains the logic and data required to install Modrinth App., Template: x64;0, Revision Number: {C760B5F9-74CA-4082-83C4-12F6B36A93BB}, Create Time/Date: Tue Apr 23 23:26:10 2024, Last Saved Time/Date: Tue Apr 23 23:26:10 2024, Number of Pages: 450, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\6a222c.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Modrinth App, Author: modrinth, Keywords: Installer, Comments: This installer database contains the logic and data required to install Modrinth App., Template: x64;0, Revision Number: {C760B5F9-74CA-4082-83C4-12F6B36A93BB}, Create Time/Date: Tue Apr 23 23:26:10 2024, Last Saved Time/Date: Tue Apr 23 23:26:10 2024, Number of Pages: 450, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI3053.tmp
data
dropped
C:\Windows\Installer\SourceHash{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{67E35770-3BE7-49CB-BE18-C8626CE846EE}\ProductIcon
MS Windows icon resource - 6 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF0150A68402F75138.TMP
data
dropped
C:\Windows\Temp\~DF173ADAEC389301CB.TMP
data
dropped
C:\Windows\Temp\~DF39BD558DD7C725C6.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4B9E390C32129C38.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF50C9F1B32334789D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF729E97EE94F545C4.TMP
data
dropped
C:\Windows\Temp\~DF7CA8598823228EE1.TMP
data
dropped
C:\Windows\Temp\~DFAA83BE2FA08D5F0C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFAC1A1BE010E22A39.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD959BFA42BB7DD34.TMP
data
dropped
C:\Windows\Temp\~DFE6450DEB847108BD.TMP
data
dropped
C:\Windows\Temp\~DFED37D601D7BF7D7B.TMP
data
dropped
There are 184 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Modrinth_Installer.exe
"C:\Users\user\Desktop\Modrinth_Installer.exe"
malicious
C:\Users\user\AppData\Local\Temp\Modrinth.exe
"C:\Users\user\AppData\Local\Temp\Modrinth.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "notepad" /tr "C:\Users\user\AppData\Roaming\notepad.exe"
malicious
C:\Users\user\AppData\Roaming\notepad.exe
C:\Users\user\AppData\Roaming\notepad.exe
malicious
C:\Users\user\AppData\Roaming\notepad.exe
"C:\Users\user\AppData\Roaming\notepad.exe"
malicious
C:\Users\user\AppData\Roaming\notepad.exe
"C:\Users\user\AppData\Roaming\notepad.exe"
malicious
C:\Users\user\AppData\Roaming\notepad.exe
C:\Users\user\AppData\Roaming\notepad.exe
malicious
C:\Users\user\AppData\Roaming\notepad.exe
C:\Users\user\AppData\Roaming\notepad.exe
malicious
C:\Users\user\AppData\Roaming\notepad.exe
C:\Users\user\AppData\Roaming\notepad.exe
malicious
C:\Users\user\AppData\Roaming\notepad.exe
C:\Users\user\AppData\Roaming\notepad.exe
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\Modrinth App_0.7.1_x64_en-US.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 825BAD695F088FC1F1B993AE41384B51 C
C:\Program Files\Modrinth App\Modrinth App.exe
"C:\Program Files\Modrinth App\Modrinth App.exe"
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name="Modrinth App.exe" --webview-exe-version=0.7.1 --user-data-dir="C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=MojoIpcz --lang=en-GB --mojo-named-platform-channel-pipe=7628.7672.3230350393833385459
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7ffdf53b8e88,0x7ffdf53b8e98,0x7ffdf53b8ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView" --webview-exe-name="Modrinth App.exe" --webview-exe-version=0.7.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1732 --field-trial-handle=1736,i,7591513521622056798,11814314458307727179,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView" --webview-exe-name="Modrinth App.exe" --webview-exe-version=0.7.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2964 --field-trial-handle=1736,i,7591513521622056798,11814314458307727179,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView" --webview-exe-name="Modrinth App.exe" --webview-exe-version=0.7.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=3200 --field-trial-handle=1736,i,7591513521622056798,11814314458307727179,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView" --webview-exe-name="Modrinth App.exe" --webview-exe-version=0.7.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1722015013436244 --launch-time-ticks=6966503381 --mojo-platform-channel-handle=3224 --field-trial-handle=1736,i,7591513521622056798,11814314458307727179,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.modrinth.theseus\EBWebView" --webview-exe-name="Modrinth App.exe" --webview-exe-version=0.7.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4536 --field-trial-handle=1736,i,7591513521622056798,11814314458307727179,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://meta.modrinth.com/minecraft/v0/versions/1.20-pre6.json.json
unknown
https://meta.modrinth.com/fabric/v0/versions/0.13.1.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.991.json
unknown
https://meta.modrinth.com/quilt/v0/versions/0.22.0.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1091.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1392.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.4-rc3.json.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.1059.json
unknown
https://tootpick.org/#text=
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1301.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.3-pre2.jsonson
unknown
https://meta.modrinth.com/fabric/v0/versions/0.14.2.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.1047.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1085.json/D
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1460.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/15w32a.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.13.2-forge-25.0.174.json
unknown
https://meta.modrinth.com/fabric/v0/versions/0.12.0.json
unknown
https://meta.modrinth.com/fabric/v0/versions/0.15.9.json&q
unknown
https://meta.modrinth.com/forge/v0/versions/1.13.2-forge-25.0.99.json344K
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1402.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1359.jsonmB
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1088.jsonzD
unknown
https://meta.modrinth.com/fabric/v0/versions/0.16.0.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.13.2-forge-25.0.206.jsonle
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.2.1133.jsongC
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.1031.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1334.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1409.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1487.jsonUA
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1484.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.3-pre1.jsonjson
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1459.json
unknown
https://meta.modrinth.com/fabric/v0/versions/0.11.5.jsonJ
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.1043.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1078.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.1025.json6E
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.2.1433.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1095.json
unknown
https://meta.modrib
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.1-rc3.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1308.json
unknown
https://meta.modrinth.com/quilt/v0/versions/0.20.2.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.4.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1305.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.1014.json
unknown
https://meta.modrinth.com/quilt/v0/versions/0.23.1.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.13.2-forge-25.0.109.jsoneri
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1375.json
unknown
https://meta.modrinth.com/quilt/v0/versions/0.26.0.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1069.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1113.json
unknown
https://meta.modrinth.com/fabric/v0/versions/0.12.7.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.2-rc1.json.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.2.1444.json&As
unknown
https://tauri.localhost
unknown
https://meta.modrinth.com/forge/v0/versions/1.13.2-forge-25.0.114.json47A
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.2.1437.jsonDA
unknown
https://meta.modrinth.com/minecraft/v0/versions/14w34d.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.20.2-pre2.json
unknown
https://twitter.com/intent/tweet?text=
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1464.json
unknown
https://api.modrinth.com/v2/search?facets=[[%22project_type:mod%22]]&limit=10&index=follows
104.18.22.35
https://meta.modrinth.com/minecraft/v0/versions/1.20-pre7.jsona.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1479.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1324.jsonrB
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1354.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1405.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/23w07a.jsoneta.json
unknown
https://meta.modrinth.com/fabric/v0/versions/0.11.0.jsonf
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1463.json
unknown
https://meta.modrinth.com/minecraft/v0/assets/legacy.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.3.1493.json
unknown
https://meta.modrinth.com/fabric/v0/versions/0.12.8.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1070.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1325.json
unknown
https://meta.modrinth.com/minecraft/v0/assets/14w25a.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.3-pre3.jsonjsonq
unknown
https://meta.modrinth.com/fabric/v0/versions/0.15.7.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.0.1018.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.2.1131.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.13.2-forge-25.0.84.jsondri
unknown
https://meta.modrinth.com/forge/v0/versions/1.13.2-forge-25.0.100.json.mL
unknown
https://meta.modrinth.com/minecraft/v0/versions/23w18a.jsoneta.json
unknown
https://meta.modrinth.com/minecraft/v0/assets/14w31a.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.2-rc1.json.jsonB
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1317.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1405.json3B
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1326.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/22w44a.jsoneta.jsono
unknown
https://meta.modrinth.com/fabric/v0/versions/0.14.3.jsonR
unknown
https://meta.modrinth.com/fabric/v0/versions/0.14.9.json
unknown
https://modrinth.com/$
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1311.json?C
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.19.4-rc1.json.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.1.1087.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.7.2-Forge10.12.2.1132.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1316.json
unknown
https://meta.modrinth.com/forge/v0/versions/1.8-Forge11.14.1.1310.json
unknown
https://meta.modrinth.com/minecraft/v0/versions/1.20.2-pre4.jsonjson
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
she-vocal.gl.at.ply.gg
147.185.221.21
malicious
chrome.cloudflare-dns.com
172.64.41.3
api.modrinth.com
104.18.23.35
meta.modrinth.com
104.18.22.35
launcher-files.modrinth.com
104.18.22.35
cdn-raw.modrinth.com
104.18.22.35

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.21
she-vocal.gl.at.ply.gg
United States
malicious
130.211.34.183
unknown
United States
104.18.22.35
meta.modrinth.com
United States
104.18.23.35
api.modrinth.com
United States
204.79.197.239
unknown
United States
127.0.0.1
unknown
unknown
172.64.41.3
chrome.cloudflare-dns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msi\OpenWithProgids
Msi.Package
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Windows\System32\msimsg.dll,-36
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Windows\System32\msimsg.dll,-37
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Windows\System32\msimsg.dll,-38
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{8D80504A-0826-40C5-97E1-EBC68F953792} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Modrinth_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
notepad
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6a222b.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6a222b.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FF8D73E2EDCEE955E8B0475207857DB8
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F09FD58A4AF5D035B9AF3C83702CA955
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B5E1BBF8CCAC7445FB38157CD3B6C4C3
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5A5DBDBAD66DD6E5FAE6BC2B9DB28158
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8261A1D79F60F685AADC5E1ABA5E0982
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7B1170220E0EA9D5B9CC18B00137FE0E
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Modrinth App\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{67E35770-3BE7-49CB-BE18-C8626CE846EE}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document\shell\open
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack
Content Type
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document
NULL
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
Desktop Shortcut
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
InstallDir
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
Uninstaller Shortcut
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
Start Menu Shortcut
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities
ApplicationDescription
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities
ApplicationIcon
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities
ApplicationName
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\FileAssociations
.mrpack
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\MIMEAssociations
application/mrpack
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\shell\Open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications
theseus
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document
MRPACK File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack\OpenWithList\theseus
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack\OpenWithProgids
theseus.mrpack.Document
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\mrpack\SupportedTypes
.mrpack
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\mrpack\shell\open
FriendlyAppName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\13CC58B29F9FD325381898EFA5ED7FD8
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
ShortcutsFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
ShortcutsFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
MainProgram
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
MainProgram
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
Environment
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
Environment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
External
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
External
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\13CC58B29F9FD325381898EFA5ED7FD8
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_CURRENT_USER_Classes\modrinth
NULL
HKEY_CURRENT_USER_Classes\modrinth
URL Protocol
HKEY_CURRENT_USER_Classes\modrinth\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\modrinth\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
There are 167 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12AD1000
trusted library allocation
page read and write
malicious
CA2000
heap
page read and write
malicious
2AC1000
trusted library allocation
page read and write
malicious
44B000
unkown
page readonly
malicious
5D2000
unkown
page readonly
malicious
CF0000
heap
page read and write
malicious
7610004F4000
trusted library allocation
page read and write
23A001CD4000
trusted library allocation
page read and write
14802C24000
trusted library allocation
page read and write
611400358000
trusted library allocation
page read and write
23A000674000
trusted library allocation
page read and write
14D9D609000
heap
page read and write
12ACF000
trusted library allocation
page read and write
BAF000
stack
page read and write
33FC00148000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
761000300000
trusted library allocation
page read and write
61C0090C000
trusted library allocation
page read and write
61C00360000
trusted library allocation
page read and write
66900020C000
trusted library allocation
page read and write
EAF000
stack
page read and write
15D3000
trusted library allocation
page read and write
14803D90000
trusted library allocation
page read and write
2EB8000BC000
trusted library allocation
page read and write
1B4FE000
stack
page read and write
33FC0011C000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1CACE1CA000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
23A002074000
trusted library allocation
page read and write
23A0020C8000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
77C000210000
direct allocation
page read and write
23A0008AF000
trusted library allocation
page read and write
761000264000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
12A33000
trusted library allocation
page read and write
14E65E9E000
unclassified section
page read and write
23A002DCA000
trusted library allocation
page read and write
1CACDC9D000
heap
page read and write
24EEB61B000
heap
page read and write
23A002D8A000
trusted library allocation
page read and write
14E63140000
unclassified section
page read and write
35CC0024C000
direct allocation
page read and write
1CACDCA7000
heap
page read and write
7FF7888A0000
unkown
page readonly
1CACE2C4000
heap
page read and write
23A002E64000
trusted library allocation
page read and write
76100035C000
trusted library allocation
page read and write
7FFD9BB32000
trusted library allocation
page read and write
1CACC67E000
heap
page read and write
2EB800095000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
1DC81B90000
unclassified section
page readonly
31DC1FE000
unkown
page readonly
24EEB580000
trusted library section
page readonly
1CACC6F9000
heap
page read and write
1CACDD83000
heap
page read and write
23A000A0C000
trusted library allocation
page read and write
23A001004000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
148026D8000
trusted library allocation
page read and write
23A001EB2000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
17F00A40000
trusted library allocation
page read and write
33FC00158000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
33FC0013C000
trusted library allocation
page read and write
14803D4C000
trusted library allocation
page read and write
1A0000
heap
page read and write
1FBE2202000
heap
page read and write
23A000A72000
trusted library allocation
page read and write
77C000250000
direct allocation
page read and write
1FBE2150000
unclassified section
page readonly
764000
stack
page read and write
14802C24000
trusted library allocation
page read and write
B7F6790000
stack
page read and write
7FFD9BB22000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
49B0002A8000
trusted library allocation
page read and write
23A002E29000
trusted library allocation
page read and write
77C00031C000
direct allocation
page read and write
14E6592E000
unclassified section
page read and write
4A2C002E0000
trusted library allocation
page read and write
23A003D54000
trusted library allocation
page read and write
3FDC00090000
trusted library allocation
page read and write
1FBE2605000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
14E63180000
unclassified section
page read and write
1BA70000
heap
page read and write
14803F18000
trusted library allocation
page read and write
14E658BA000
unclassified section
page read and write
83C000
heap
page read and write
10EC002A4000
trusted library allocation
page read and write
61C00E04000
trusted library allocation
page read and write
1AAD12E2000
heap
page read and write
14D9D624000
heap
page read and write
33FC004A8000
trusted library allocation
page read and write
B00000
heap
page read and write
76100038C000
trusted library allocation
page read and write
14D9D655000
heap
page read and write
23A001F54000
trusted library allocation
page read and write
14800201000
trusted library allocation
page read and write
23A002325000
trusted library allocation
page read and write
1CACDD06000
heap
page read and write
1CACDBB6000
heap
page read and write
76100048C000
trusted library allocation
page read and write
49B000201000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
1CACDEB7000
heap
page read and write
23A002198000
trusted library allocation
page read and write
1AAD8202000
heap
page read and write
3FDC0005C000
trusted library allocation
page read and write
2CD76856000
heap
page read and write
7610000D0000
trusted library allocation
page read and write
23A000A66000
trusted library allocation
page read and write
23A0020BF000
trusted library allocation
page read and write
10EC002B8000
trusted library allocation
page read and write
23A001B04000
trusted library allocation
page read and write
14802C61000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
31CE1FE000
unkown
page readonly
23A0020BF000
trusted library allocation
page read and write
761000284000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
1CACC7D0000
heap
page read and write
14E65760000
unclassified section
page read and write
148033AC000
trusted library allocation
page read and write
1480244C000
trusted library allocation
page read and write
14E65896000
unclassified section
page read and write
23A001BD4000
trusted library allocation
page read and write
49B000318000
trusted library allocation
page read and write
23A003416000
trusted library allocation
page read and write
23A002248000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
B7F6829000
stack
page read and write
23A003CFE000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
7610002F4000
trusted library allocation
page read and write
61C00B0C000
trusted library allocation
page read and write
61C0033C000
trusted library allocation
page read and write
C5F000
stack
page read and write
49B000238000
trusted library allocation
page read and write
761000254000
trusted library allocation
page read and write
B7F65AE000
stack
page read and write
33FC00220000
trusted library allocation
page read and write
700C002E4000
trusted library allocation
page read and write
23A002180000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14D9D624000
heap
page read and write
16780029C000
trusted library allocation
page read and write
1CACC6AC000
heap
page read and write
1CACE191000
heap
page read and write
4A2C002F8000
trusted library allocation
page read and write
E7D000
stack
page read and write
23A000F74000
trusted library allocation
page read and write
23A000AEE000
trusted library allocation
page read and write
33FC004F0000
trusted library allocation
page read and write
23A003D0D000
trusted library allocation
page read and write
23A000D3E000
trusted library allocation
page read and write
23A0022BC000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1DC81869000
heap
page read and write
31C41FE000
unkown
page readonly
14D9D60A000
heap
page read and write
14D9D62B000
heap
page read and write
31E59FE000
stack
page read and write
2CD768B2000
heap
page read and write
23A003D20000
trusted library allocation
page read and write
7610001B0000
trusted library allocation
page read and write
7FFD9BB32000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
182C002CC000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
1CACDDC9000
heap
page read and write
23A00080C000
trusted library allocation
page read and write
1CACDBAE000
heap
page read and write
1DC84821000
heap
page read and write
14800EAA000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
23A0021DC000
trusted library allocation
page read and write
23A003394000
trusted library allocation
page read and write
14E65835000
unclassified section
page read and write
76100044E000
trusted library allocation
page read and write
44780033C000
trusted library allocation
page read and write
1CACC677000
heap
page read and write
23A000AAE000
trusted library allocation
page read and write
23A00230F000
trusted library allocation
page read and write
5E9000
heap
page read and write
231E000
stack
page read and write
138C000
heap
page read and write
23A003D83000
trusted library allocation
page read and write
1CACE5E1000
heap
page read and write
497C00220000
direct allocation
page read and write
33FC003B4000
trusted library allocation
page read and write
35CC00234000
direct allocation
page read and write
23A0003E8000
trusted library allocation
page read and write
1CACA3F3000
heap
page read and write
39480024C000
direct allocation
page read and write
1CACC66D000
heap
page read and write
61C00994000
trusted library allocation
page read and write
1875000
heap
page read and write
1CACE208000
heap
page read and write
33FC00178000
trusted library allocation
page read and write
6A6A7FE000
unkown
page readonly
76100038C000
trusted library allocation
page read and write
33FC003CC000
trusted library allocation
page read and write
1CACE348000
heap
page read and write
33FC0020C000
trusted library allocation
page read and write
1CACC697000
heap
page read and write
14D9D625000
heap
page read and write
23F1000
trusted library allocation
page read and write
1CACC7A0000
heap
page read and write
1DC876DA000
unclassified section
page readonly
23A000C98000
trusted library allocation
page read and write
1A04002F0000
trusted library allocation
page read and write
1AAD8200000
heap
page read and write
1CACC72D000
heap
page read and write
1CACA3ED000
heap
page read and write
1CACDC2A000
heap
page read and write
61C002B0000
trusted library allocation
page read and write
14E65899000
unclassified section
page read and write
1FBE25E7000
unclassified section
page read and write
23A0021BA000
trusted library allocation
page read and write
14E657E7000
unclassified section
page read and write
761000300000
trusted library allocation
page read and write
1CACA440000
heap
page read and write
1CACC66A000
heap
page read and write
2D4E000
stack
page read and write
1CACC6AC000
heap
page read and write
1CACA44B000
heap
page read and write
6A6AFFE000
stack
page read and write
16780028C000
trusted library allocation
page read and write
1CACDBB4000
heap
page read and write
14E658AC000
unclassified section
page read and write
33FC00248000
trusted library allocation
page read and write
33FC00128000
trusted library allocation
page read and write
14803070000
trusted library allocation
page read and write
14E658FA000
unclassified section
page read and write
3C3400258000
trusted library allocation
page read and write
3EAB5FC000
stack
page read and write
14803D3C000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
33FC000E6000
trusted library allocation
page read and write
61140032C000
trusted library allocation
page read and write
1CACC7B7000
heap
page read and write
23A001EB2000
trusted library allocation
page read and write
3EABDFE000
unkown
page readonly
23A002250000
trusted library allocation
page read and write
23A000B80000
trusted library allocation
page read and write
1CACDD48000
heap
page read and write
23A001F6C000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
14803E54000
trusted library allocation
page read and write
1BA36000
heap
page read and write
23A0023A0000
trusted library allocation
page read and write
23A001D74000
trusted library allocation
page read and write
E12FFFE000
unkown
page readonly
23A000D44000
trusted library allocation
page read and write
14802224000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
14D9D609000
heap
page read and write
31BF1FE000
unkown
page readonly
24EEB652000
heap
page read and write
23A002BAE000
trusted library allocation
page read and write
1AF3D000
stack
page read and write
2CD7682B000
heap
page read and write
23A0021D8000
trusted library allocation
page read and write
1CACE30D000
heap
page read and write
23A0003E8000
trusted library allocation
page read and write
14803390000
trusted library allocation
page read and write
761000084000
trusted library allocation
page read and write
14E65E52000
unclassified section
page read and write
23A00344F000
trusted library allocation
page read and write
23A000B78000
trusted library allocation
page read and write
1FBE2180000
heap
page readonly
761000290000
trusted library allocation
page read and write
1B54F000
stack
page read and write
23A000B48000
trusted library allocation
page read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
23A001021000
trusted library allocation
page read and write
10EC00294000
trusted library allocation
page read and write
23A000E5C000
trusted library allocation
page read and write
14802794000
trusted library allocation
page read and write
447800308000
trusted library allocation
page read and write
2EB800178000
trusted library allocation
page read and write
23A00089C000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1CACDD12000
heap
page read and write
1CACA449000
heap
page read and write
23A00061C000
trusted library allocation
page read and write
14D9D625000
heap
page read and write
33FC00152000
trusted library allocation
page read and write
6A24002D0000
direct allocation
page read and write
2EB80007C000
trusted library allocation
page read and write
23A00033C000
trusted library allocation
page read and write
17F00A42000
trusted library allocation
page read and write
1AAD12E1000
heap
page read and write
76100035D000
trusted library allocation
page read and write
77C0002F8000
direct allocation
page read and write
4A2C00304000
trusted library allocation
page read and write
14E6546F000
unclassified section
page read and write
23A001868000
trusted library allocation
page read and write
23A000CB0000
trusted library allocation
page read and write
48E0002B0000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
2EB800104000
trusted library allocation
page read and write
14E60C50000
unclassified section
page read and write
1CACDC7E000
heap
page read and write
8D0000
heap
page read and write
77C000212000
direct allocation
page read and write
14D9D62B000
heap
page read and write
23A003D0F000
trusted library allocation
page read and write
1D9B8A02000
heap
page read and write
1CACC624000
heap
page read and write
77C000234000
direct allocation
page read and write
3948002B0000
direct allocation
page read and write
761000290000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
1AAD1333000
heap
page read and write
14803C01000
trusted library allocation
page read and write
2CD02570000
trusted library allocation
page read and write
497C002A4000
direct allocation
page read and write
7FF789228000
unkown
page read and write
1CACDEB7000
heap
page read and write
31D89FE000
stack
page read and write
23A002E4A000
trusted library allocation
page read and write
35CC0028C000
direct allocation
page read and write
33FC0000C000
trusted library allocation
page read and write
23A000A52000
trusted library allocation
page read and write
61C0077C000
trusted library allocation
page read and write
76100035D000
trusted library allocation
page read and write
370000
heap
page read and write
148027E0000
trusted library allocation
page read and write
6A737FE000
unkown
page readonly
14D9D5A0000
unclassified section
page readonly
1A04002C4000
trusted library allocation
page read and write
14D9D654000
heap
page read and write
23A000D4A000
trusted library allocation
page read and write
1CACDBA0000
heap
page read and write
14802334000
trusted library allocation
page read and write
1CACC5BD000
heap
page read and write
14802F2C000
trusted library allocation
page read and write
77C0002E0000
direct allocation
page read and write
14D9D624000
heap
page read and write
14E621B0000
unclassified section
page read and write
7610002C0000
trusted library allocation
page read and write
23A003470000
trusted library allocation
page read and write
23A0020C8000
trusted library allocation
page read and write
3EAFDFE000
unkown
page readonly
14803164000
trusted library allocation
page read and write
61140029C000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
5C8000
heap
page read and write
61C00D5C000
trusted library allocation
page read and write
1DC87A40000
unclassified section
page readonly
76100040C000
trusted library allocation
page read and write
1CACDCC6000
heap
page read and write
61C0090C000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
1DC81C13000
heap
page read and write
76100040C000
trusted library allocation
page read and write
1CACDB55000
heap
page read and write
14D9D62B000
heap
page read and write
17F00A82000
trusted library allocation
page read and write
2CD76873000
heap
page read and write
148028C4000
trusted library allocation
page read and write
1CACA395000
heap
page read and write
CB0000
heap
page read and write
23A001404000
trusted library allocation
page read and write
14E6644B000
unclassified section
page read and write
31D41FE000
unkown
page readonly
1CACDCC7000
heap
page read and write
ED5000
heap
page read and write
23A001A74000
trusted library allocation
page read and write
23A000328000
trusted library allocation
page read and write
23A002193000
trusted library allocation
page read and write
1DC84800000
heap
page read and write
23A001EB4000
trusted library allocation
page read and write
23A000B28000
trusted library allocation
page read and write
182C002CC000
trusted library allocation
page read and write
23A003D45000
trusted library allocation
page read and write
1CACC734000
heap
page read and write
24EEB664000
heap
page read and write
23A001D4C000
trusted library allocation
page read and write
76100014C000
trusted library allocation
page read and write
23A00206C000
trusted library allocation
page read and write
14802E0C000
trusted library allocation
page read and write
14D9D625000
heap
page read and write
14802794000
trusted library allocation
page read and write
61C00944000
trusted library allocation
page read and write
23A000D14000
trusted library allocation
page read and write
14803150000
trusted library allocation
page read and write
23A000624000
trusted library allocation
page read and write
2CD768C6000
heap
page read and write
1CACDBF6000
heap
page read and write
33FC0022A000
trusted library allocation
page read and write
23A001F6C000
trusted library allocation
page read and write
23A0033C1000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
23A003D7C000
trusted library allocation
page read and write
35CC0027C000
direct allocation
page read and write
14D9D62B000
heap
page read and write
1CACDE81000
heap
page read and write
B7F9CAF000
stack
page read and write
1AAD6180000
trusted library section
page read and write
1CACE186000
heap
page read and write
14E65814000
unclassified section
page read and write
1AAD6386000
trusted library section
page read and write
14E6590A000
unclassified section
page read and write
14E62ED8000
unclassified section
page read and write
1CACE2B9000
heap
page read and write
1AAD3013000
heap
page read and write
14E65E38000
unclassified section
page read and write
14E60814000
trusted library allocation
page read and write
17F00502000
trusted library allocation
page read and write
1A04002C4000
trusted library allocation
page read and write
14803E9C000
trusted library allocation
page read and write
280000
unkown
page readonly
1CACE33F000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
2531000
trusted library allocation
page read and write
1CACE325000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
23A002320000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
14E654BF000
unclassified section
page read and write
447800284000
trusted library allocation
page read and write
14E665CD000
unclassified section
page read and write
23A001B84000
trusted library allocation
page read and write
1CACC6CC000
heap
page read and write
1DC81BE0000
trusted library allocation
page read and write
31D59FE000
stack
page read and write
1B2EF000
stack
page read and write
3C340023C000
trusted library allocation
page read and write
1AAD12B6000
heap
page read and write
40C000
unkown
page readonly
700C00304000
trusted library allocation
page read and write
23A000674000
trusted library allocation
page read and write
447800240000
trusted library allocation
page read and write
33FC003E8000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
76100044E000
trusted library allocation
page read and write
14802C92000
trusted library allocation
page read and write
497C00274000
direct allocation
page read and write
1CACE1B2000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
23A002E6D000
trusted library allocation
page read and write
1CACC740000
heap
page read and write
14E65F0B000
unclassified section
page read and write
1CACDDC2000
heap
page read and write
61C00DAC000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1DC8489A000
heap
page read and write
49B0002B8000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
1DC87FF8000
unclassified section
page readonly
14E65941000
unclassified section
page read and write
14D9D62B000
heap
page read and write
23A001B8C000
trusted library allocation
page read and write
33FC00120000
trusted library allocation
page read and write
3C34002C4000
trusted library allocation
page read and write
1CACDBAE000
heap
page read and write
BF0000
heap
page read and write
14D9D60A000
heap
page read and write
14D9D624000
heap
page read and write
23A0009EC000
trusted library allocation
page read and write
2C10000
heap
page read and write
21986B98000
heap
page read and write
23A000D2C000
trusted library allocation
page read and write
1CACA430000
heap
page read and write
14D9D60D000
heap
page read and write
23A002E80000
trusted library allocation
page read and write
1A04002C0000
trusted library allocation
page read and write
14803E1C000
trusted library allocation
page read and write
14E657BA000
unclassified section
page read and write
1B5BE000
stack
page read and write
1CACE34B000
heap
page read and write
1CACDBAA000
heap
page read and write
611400237000
trusted library allocation
page read and write
23A001BC4000
trusted library allocation
page read and write
1CACDB9E000
heap
page read and write
23A001EE8000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
1CACE164000
heap
page read and write
10EC002C4000
trusted library allocation
page read and write
23A000AC0000
trusted library allocation
page read and write
23A003CF5000
trusted library allocation
page read and write
1CACC66E000
heap
page read and write
1CACC6AC000
heap
page read and write
23A003CE0000
trusted library allocation
page read and write
14E65927000
unclassified section
page read and write
148031DC000
trusted library allocation
page read and write
1CACDEFC000
heap
page read and write
1CACC78E000
heap
page read and write
B7F6609000
stack
page read and write
1FBE21F0000
trusted library allocation
page read and write
23A00399B000
trusted library allocation
page read and write
14E63200000
unclassified section
page read and write
23A000730000
trusted library allocation
page read and write
1CACDBBE000
heap
page read and write
7C0000
heap
page read and write
F95000
heap
page read and write
61C002CC000
trusted library allocation
page read and write
14803A54000
trusted library allocation
page read and write
2EB800060000
trusted library allocation
page read and write
1CACE153000
heap
page read and write
23A000D08000
trusted library allocation
page read and write
1A04002A0000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
182C00260000
trusted library allocation
page read and write
1CACA43C000
heap
page read and write
1CACC657000
heap
page read and write
7610002E8000
trusted library allocation
page read and write
1CACE2F3000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
76100019C000
trusted library allocation
page read and write
1CACE309000
heap
page read and write
76100008F000
trusted library allocation
page read and write
1B39E000
stack
page read and write
930000
heap
page execute and read and write
14D9D62B000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
23A00225C000
trusted library allocation
page read and write
23A0021DC000
trusted library allocation
page read and write
1CACBD80000
heap
page read and write
76100035C000
trusted library allocation
page read and write
1CACC5A4000
heap
page read and write
1480287C000
trusted library allocation
page read and write
23A001C74000
trusted library allocation
page read and write
23A001C3C000
trusted library allocation
page read and write
23A001C6C000
trusted library allocation
page read and write
1DC84912000
heap
page read and write
1CACE2B8000
heap
page read and write
1CACC626000
heap
page read and write
611400354000
trusted library allocation
page read and write
1CACE329000
heap
page read and write
14D9D60A000
heap
page read and write
14D9D62B000
heap
page read and write
1CACE1D2000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
33FC0044C000
trusted library allocation
page read and write
3FDC00001000
trusted library allocation
page read and write
611400254000
trusted library allocation
page read and write
611400324000
trusted library allocation
page read and write
1AAD1327000
heap
page read and write
970000
heap
page read and write
1AC9E000
stack
page read and write
1CACE5EB000
heap
page read and write
3FDC000D4000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
1AAD1333000
heap
page read and write
14D9D60A000
heap
page read and write
1A04002A0000
trusted library allocation
page read and write
963A1FE000
stack
page read and write
61C0032C000
trusted library allocation
page read and write
49B000220000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
6A6FFFE000
stack
page read and write
14D9D624000
heap
page read and write
61C008AC000
trusted library allocation
page read and write
1CACC73D000
heap
page read and write
15F0000
heap
page read and write
B7F6424000
stack
page read and write
1480380C000
trusted library allocation
page read and write
BD0000
heap
page read and write
76100044E000
trusted library allocation
page read and write
23A00206C000
trusted library allocation
page read and write
14E65EE0000
unclassified section
page read and write
33FC000D8000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
23A001C14000
trusted library allocation
page read and write
33FC00170000
trusted library allocation
page read and write
48E00028C000
trusted library allocation
page read and write
23A00200C000
trusted library allocation
page read and write
23A002380000
trusted library allocation
page read and write
1CACA431000
heap
page read and write
1CACC682000
heap
page read and write
76100040C000
trusted library allocation
page read and write
700C0029C000
trusted library allocation
page read and write
6A2400274000
direct allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
14E60636000
unclassified section
page read and write
76100035C000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
23A000D14000
trusted library allocation
page read and write
1CACC50E000
heap
page read and write
23A003D6B000
trusted library allocation
page read and write
1CACDD21000
heap
page read and write
23A001D04000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
7FF789202000
unkown
page readonly
14802F64000
trusted library allocation
page read and write
14E65E3F000
unclassified section
page read and write
761000504000
trusted library allocation
page read and write
31CF1FE000
unkown
page readonly
61C0030C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A003D16000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
148029E8000
trusted library allocation
page read and write
44780025C000
trusted library allocation
page read and write
14D9D609000
heap
page read and write
14E658F3000
unclassified section
page read and write
C58002C0000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
1480346C000
trusted library allocation
page read and write
23A000D44000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
23A0008AD000
trusted library allocation
page read and write
23A001FC4000
trusted library allocation
page read and write
23A001C4C000
trusted library allocation
page read and write
14E65854000
unclassified section
page read and write
23A002BA8000
trusted library allocation
page read and write
1AAD12FA000
heap
page read and write
14802D8C000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
48E0002A0000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
14803294000
trusted library allocation
page read and write
A1F000
heap
page read and write
1CACDCA7000
heap
page read and write
23A000F10000
trusted library allocation
page read and write
61C0077C000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
61C0090C000
trusted library allocation
page read and write
33BC000
stack
page read and write
76100036B000
trusted library allocation
page read and write
1DC8183F000
heap
page read and write
5D0000
unkown
page readonly
61C00268000
trusted library allocation
page read and write
1AAD12C4000
heap
page read and write
23A000CE0000
trusted library allocation
page read and write
16FF000
stack
page read and write
1CACE3D5000
heap
page read and write
23A0021DA000
trusted library allocation
page read and write
23A000B04000
trusted library allocation
page read and write
14803ED4000
trusted library allocation
page read and write
23A001FBC000
trusted library allocation
page read and write
761000290000
trusted library allocation
page read and write
C53000
trusted library allocation
page read and write
23A0022FC000
trusted library allocation
page read and write
23A002D0A000
trusted library allocation
page read and write
1DC8483C000
heap
page read and write
14802EF0000
trusted library allocation
page read and write
17F008AA000
trusted library allocation
page read and write
33FC0014F000
trusted library allocation
page read and write
148030A4000
trusted library allocation
page read and write
77C000324000
direct allocation
page read and write
4A2C00237000
trusted library allocation
page read and write
1CACE4B7000
heap
page read and write
61C00220000
trusted library allocation
page read and write
1AAD1388000
heap
page read and write
14802724000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
49B00029C000
trusted library allocation
page read and write
148029A0000
trusted library allocation
page read and write
33FC000C1000
trusted library allocation
page read and write
1CACC691000
heap
page read and write
1CACE4C7000
heap
page read and write
23A002B8C000
trusted library allocation
page read and write
48E00020C000
trusted library allocation
page read and write
611400250000
trusted library allocation
page read and write
14803090000
trusted library allocation
page read and write
1CACC742000
heap
page read and write
1B944000
heap
page read and write
1480324C000
trusted library allocation
page read and write
14802498000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
1AAD6680000
unkown
page readonly
5E6000
heap
page read and write
17F00942000
trusted library allocation
page read and write
23A003D4C000
trusted library allocation
page read and write
7610002E8000
trusted library allocation
page read and write
23A001D7C000
trusted library allocation
page read and write
23A000408000
trusted library allocation
page read and write
23A000D50000
trusted library allocation
page read and write
1DC88007000
unclassified section
page readonly
76100035D000
trusted library allocation
page read and write
A91000
heap
page read and write
1CACE309000
heap
page read and write
23A001C9C000
trusted library allocation
page read and write
33FC004CD000
trusted library allocation
page read and write
23A002E9D000
trusted library allocation
page read and write
4A2C002B0000
trusted library allocation
page read and write
23A002034000
trusted library allocation
page read and write
FB4000
stack
page read and write
44780033C000
trusted library allocation
page read and write
1AAD6382000
trusted library section
page read and write
1550000
heap
page read and write
1A04002B4000
trusted library allocation
page read and write
77C000330000
direct allocation
page read and write
2932BE6000
stack
page read and write
23A000A6C000
trusted library allocation
page read and write
23A001EB2000
trusted library allocation
page read and write
23A002E70000
trusted library allocation
page read and write
148029B4000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
49B0002C8000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
1AAD8400000
heap
page read and write
14E6556E000
unclassified section
page read and write
76100048C000
trusted library allocation
page read and write
23A002252000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
77C00031E000
direct allocation
page read and write
31CA9FE000
stack
page read and write
61C00884000
trusted library allocation
page read and write
9B000
stack
page read and write
2CD76887000
heap
page read and write
14D9D624000
heap
page read and write
7610004D8000
trusted library allocation
page read and write
23A001DAC000
trusted library allocation
page read and write
4478002F0000
trusted library allocation
page read and write
1CACE5E1000
heap
page read and write
61C00924000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
7FF789227000
unkown
page write copy
14D9D60A000
heap
page read and write
33FC000A0000
trusted library allocation
page read and write
1B49E000
stack
page read and write
23A001D44000
trusted library allocation
page read and write
4A2C00404000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
1CACC6A8000
heap
page read and write
23A00080C000
trusted library allocation
page read and write
2EB800154000
trusted library allocation
page read and write
23A000D20000
trusted library allocation
page read and write
33FC004C8000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
14802298000
trusted library allocation
page read and write
2CD76883000
heap
page read and write
14802350000
trusted library allocation
page read and write
23A002CE9000
trusted library allocation
page read and write
2CD7681C000
heap
page read and write
23A003D1B000
trusted library allocation
page read and write
61C00308000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
77C0002C0000
direct allocation
page read and write
23A001898000
trusted library allocation
page read and write
23A00345B000
trusted library allocation
page read and write
7610004C2000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
1DC848AA000
heap
page read and write
1CACC5A3000
heap
page read and write
14E65E4D000
unclassified section
page read and write
1CACDBA0000
heap
page read and write
17F00402000
trusted library allocation
page read and write
148030A4000
trusted library allocation
page read and write
1A0400244000
trusted library allocation
page read and write
1CACE5DF000
heap
page read and write
33FC00120000
trusted library allocation
page read and write
1DC87B40000
unclassified section
page readonly
E12DFFE000
unkown
page readonly
B7F506B000
stack
page read and write
14D9D624000
heap
page read and write
14802710000
trusted library allocation
page read and write
B00000
heap
page read and write
23A000F60000
trusted library allocation
page read and write
3FDC00108000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
B7F6848000
stack
page read and write
61140029C000
trusted library allocation
page read and write
23A002428000
trusted library allocation
page read and write
31D71FE000
unkown
page readonly
23A001D84000
trusted library allocation
page read and write
761000273000
trusted library allocation
page read and write
1AAD81F0000
unkown
page readonly
7B0000
heap
page read and write
14E65301000
unclassified section
page read and write
14E6567A000
unclassified section
page read and write
1CACE335000
heap
page read and write
23A002120000
trusted library allocation
page read and write
14803EB0000
trusted library allocation
page read and write
33FC0014A000
trusted library allocation
page read and write
77C000217000
direct allocation
page read and write
2CD7687C000
heap
page read and write
14802968000
trusted library allocation
page read and write
23A00061C000
trusted library allocation
page read and write
7610001EC000
trusted library allocation
page read and write
182C00274000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
31CC1FE000
unkown
page readonly
761000284000
trusted library allocation
page read and write
14E620F0000
unclassified section
page read and write
1CACE5ED000
heap
page read and write
1CACE2BF000
heap
page read and write
7610004BC000
trusted library allocation
page read and write
48E000238000
trusted library allocation
page read and write
23A002DEB000
trusted library allocation
page read and write
23A000A14000
trusted library allocation
page read and write
14803448000
trusted library allocation
page read and write
1DC81B29000
unclassified section
page read and write
23A001FA0000
trusted library allocation
page read and write
23A001F5C000
trusted library allocation
page read and write
2EB800184000
trusted library allocation
page read and write
14802C24000
trusted library allocation
page read and write
23A002E91000
trusted library allocation
page read and write
7610004F0000
trusted library allocation
page read and write
23A0021AC000
trusted library allocation
page read and write
B7EEBD7000
stack
page read and write
14803EF8000
trusted library allocation
page read and write
14E6541F000
unclassified section
page read and write
49B000408000
trusted library allocation
page read and write
14802C89000
trusted library allocation
page read and write
1CACE2A8000
heap
page read and write
1CACDCAE000
heap
page read and write
1CACE15E000
heap
page read and write
3C34002A0000
trusted library allocation
page read and write
C5800280000
trusted library allocation
page read and write
B7F6588000
stack
page read and write
1CACE1FE000
heap
page read and write
31E51FE000
unkown
page readonly
1FBE21C0000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
1CACA43E000
heap
page read and write
23A000C04000
trusted library allocation
page read and write
23A001D14000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A001DAC000
trusted library allocation
page read and write
17F00000000
trusted library allocation
page readonly
23A00217E000
trusted library allocation
page read and write
12963000
trusted library allocation
page read and write
14803D64000
trusted library allocation
page read and write
23A002188000
trusted library allocation
page read and write
61C0030C000
trusted library allocation
page read and write
9F3000
heap
page read and write
148030B0000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
1CACE2C4000
heap
page read and write
14D9D147000
remote allocation
page execute read
14802878000
trusted library allocation
page read and write
1CACC532000
heap
page read and write
14803A04000
trusted library allocation
page read and write
2EB800054000
trusted library allocation
page read and write
1480346C000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
17F00AC2000
trusted library allocation
page read and write
1CACC734000
heap
page read and write
77C000339000
direct allocation
page read and write
14E65862000
unclassified section
page read and write
23A002D91000
trusted library allocation
page read and write
23A00074C000
trusted library allocation
page read and write
23A002D6B000
trusted library allocation
page read and write
14D9D202000
heap
page read and write
1CACE2A3000
heap
page read and write
23A000AA4000
trusted library allocation
page read and write
790000
heap
page read and write
23A001EBC000
trusted library allocation
page read and write
23A001FAF000
trusted library allocation
page read and write
23A001920000
trusted library allocation
page read and write
33FC00164000
trusted library allocation
page read and write
14E6584D000
unclassified section
page read and write
23A00206C000
trusted library allocation
page read and write
1CACE195000
heap
page read and write
14D9D62B000
heap
page read and write
1CACC73C000
heap
page read and write
76100036B000
trusted library allocation
page read and write
394800234000
direct allocation
page read and write
5BC8002B0000
direct allocation
page read and write
31BC9FD000
stack
page read and write
23A002190000
trusted library allocation
page read and write
33FC00114000
trusted library allocation
page read and write
14E65EF5000
unclassified section
page read and write
1CACDCBA000
heap
page read and write
6A64FF6000
stack
page read and write
14802C24000
trusted library allocation
page read and write
1AAD132E000
heap
page read and write
23A0021B4000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
2EB80000C000
trusted library allocation
page read and write
23A000CA0000
trusted library allocation
page read and write
E12BFFE000
unkown
page readonly
7FFD9BB42000
trusted library allocation
page read and write
1AAD1333000
heap
page read and write
23A00235C000
trusted library allocation
page read and write
23A0020B5000
trusted library allocation
page read and write
394800220000
direct allocation
page read and write
61C00958000
trusted library allocation
page read and write
1CACC7B7000
heap
page read and write
77C000201000
direct allocation
page read and write
D3C000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
49B000348000
trusted library allocation
page read and write
1480286C000
trusted library allocation
page read and write
14E65ED4000
unclassified section
page read and write
23A0023E0000
trusted library allocation
page read and write
14E65808000
unclassified section
page read and write
14D9D62B000
heap
page read and write
1CACDD21000
heap
page read and write
12AC1000
trusted library allocation
page read and write
31DD1FE000
unkown
page readonly
611400348000
trusted library allocation
page read and write
2CD025B0000
heap
page read and write
23A001F54000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
14803238000
trusted library allocation
page read and write
1CACDBBA000
heap
page read and write
6690002CC000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
761000124000
trusted library allocation
page read and write
1AAD8312000
heap
page read and write
23A002DFC000
trusted library allocation
page read and write
23A002E56000
trusted library allocation
page read and write
23A003D5B000
trusted library allocation
page read and write
761000260000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
1CACC639000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
1B62E000
stack
page read and write
7FF789231000
unkown
page readonly
33FC00458000
trusted library allocation
page read and write
23A000788000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
14E65867000
unclassified section
page read and write
1CACDB30000
heap
page read and write
76100044E000
trusted library allocation
page read and write
394800210000
direct allocation
page read and write
10EC002C4000
trusted library allocation
page read and write
1CACE1DD000
heap
page read and write
76100008A000
trusted library allocation
page read and write
1CACDCA7000
heap
page read and write
1CACC691000
heap
page read and write
7FFDC3216000
trusted library allocation
page execute and read and write
1CACC797000
heap
page read and write
23A000770000
trusted library allocation
page read and write
48E000298000
trusted library allocation
page read and write
23A002CC3000
trusted library allocation
page read and write
23A002D43000
trusted library allocation
page read and write
23A002CFC000
trusted library allocation
page read and write
76100020E000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
1CACDBC8000
heap
page read and write
14802C01000
trusted library allocation
page read and write
1DC87F70000
unclassified section
page readonly
1CACE5F1000
heap
page read and write
1CACA3AC000
heap
page read and write
1CACE1DD000
heap
page read and write
33FC0011C000
trusted library allocation
page read and write
611400300000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
1CACA43E000
heap
page read and write
23A001E9C000
trusted library allocation
page read and write
1CACDBD2000
heap
page read and write
1CACC6CF000
heap
page read and write
761000300000
trusted library allocation
page read and write
23A002170000
trusted library allocation
page read and write
1AAD1330000
heap
page read and write
496000
unkown
page readonly
1B6FE000
stack
page read and write
39480029C000
direct allocation
page read and write
14802C58000
trusted library allocation
page read and write
23A002BC0000
trusted library allocation
page read and write
1CACE15A000
heap
page read and write
1A040020C000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
23A003CE2000
trusted library allocation
page read and write
1480286C000
trusted library allocation
page read and write
1AAD1326000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
1AAD315B000
heap
page read and write
14D9D130000
remote allocation
page read and write
1480244C000
trusted library allocation
page read and write
1CACC524000
heap
page read and write
1AAD62F9000
unclassified section
page read and write
7610003BC000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
23A002A6B000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
33FC001B0000
trusted library allocation
page read and write
23A003CCF000
trusted library allocation
page read and write
7E5000
heap
page read and write
1CACE553000
heap
page read and write
136B000
heap
page read and write
49B000284000
trusted library allocation
page read and write
48E00027C000
trusted library allocation
page read and write
E7F000
stack
page read and write
1CACE553000
heap
page read and write
497C002C0000
direct allocation
page read and write
1CACE323000
heap
page read and write
4A2C002A4000
trusted library allocation
page read and write
1CACE323000
heap
page read and write
1CACE2A5000
heap
page read and write
14D9D624000
heap
page read and write
1CACE1FB000
heap
page read and write
148027B0000
trusted library allocation
page read and write
17F008AA000
trusted library allocation
page read and write
394800201000
direct allocation
page read and write
23A002E58000
trusted library allocation
page read and write
17F00902000
trusted library allocation
page read and write
14800601000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
23A0023F0000
trusted library allocation
page read and write
1DC81857000
heap
page read and write
23A001FBC000
trusted library allocation
page read and write
1CACDB6E000
heap
page read and write
14E6558A000
unclassified section
page read and write
7610001C4000
trusted library allocation
page read and write
1DC8483C000
heap
page read and write
61C0032C000
trusted library allocation
page read and write
14E65914000
unclassified section
page read and write
1CACC5D4000
heap
page read and write
1CACE329000
heap
page read and write
14802FA4000
trusted library allocation
page read and write
23A0021E8000
trusted library allocation
page read and write
33FC001B4000
trusted library allocation
page read and write
1AAD66E0000
unkown
page readonly
1DC81760000
unclassified section
page readonly
4A2C0028C000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1CACE1B2000
heap
page read and write
23A000AF8000
trusted library allocation
page read and write
14803028000
trusted library allocation
page read and write
23A000BF4000
trusted library allocation
page read and write
17F00582000
trusted library allocation
page read and write
31B79FD000
stack
page read and write
23A003414000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
17F00A82000
trusted library allocation
page read and write
23A000BEC000
trusted library allocation
page read and write
23A00280C000
trusted library allocation
page read and write
23A0023DC000
trusted library allocation
page read and write
6114002E0000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
14802C41000
trusted library allocation
page read and write
33FC000CA000
trusted library allocation
page read and write
1AAD310F000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
1678002D4000
trusted library allocation
page read and write
761000303000
trusted library allocation
page read and write
14E65EEC000
unclassified section
page read and write
148030FC000
trusted library allocation
page read and write
1CACDBEB000
heap
page read and write
23A00346B000
trusted library allocation
page read and write
1CACE335000
heap
page read and write
14D9D624000
heap
page read and write
12B1C000
trusted library allocation
page read and write
14802E3C000
trusted library allocation
page read and write
2CD02500000
heap
page read and write
1CACE2E9000
heap
page read and write
23A002D16000
trusted library allocation
page read and write
14E6589B000
unclassified section
page read and write
700C00284000
trusted library allocation
page read and write
1DC817EE000
remote allocation
page execute read
B7F6615000
stack
page read and write
14803E50000
trusted library allocation
page read and write
23A001F54000
trusted library allocation
page read and write
14D9D5E0000
unclassified section
page read and write
2CD76857000
heap
page read and write
148030B0000
trusted library allocation
page read and write
23A000D32000
trusted library allocation
page read and write
14803A01000
trusted library allocation
page read and write
1CACDD04000
heap
page read and write
B7F6390000
stack
page read and write
10EC002A4000
trusted library allocation
page read and write
23A000ED8000
trusted library allocation
page read and write
17F00502000
trusted library allocation
page read and write
77C00021C000
direct allocation
page read and write
23A001920000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
14D9D624000
heap
page read and write
761000254000
trusted library allocation
page read and write
23A000AF0000
trusted library allocation
page read and write
5BC8002A4000
direct allocation
page read and write
C50000
trusted library allocation
page read and write
E128FFE000
unkown
page readonly
1CACC6CD000
heap
page read and write
611400240000
trusted library allocation
page read and write
1CACA41E000
heap
page read and write
6A24002A0000
direct allocation
page read and write
12533000
trusted library allocation
page read and write
5DB000
heap
page read and write
23A000634000
trusted library allocation
page read and write
1CACC6C2000
heap
page read and write
23A000D3E000
trusted library allocation
page read and write
21986B10000
heap
page read and write
14D9D624000
heap
page read and write
AF4000
stack
page read and write
E1297FE000
stack
page read and write
24EEB550000
trusted library allocation
page read and write
23A000D26000
trusted library allocation
page read and write
4A2C00268000
trusted library allocation
page read and write
23A001F14000
trusted library allocation
page read and write
14E65680000
unclassified section
page read and write
23A002E7E000
trusted library allocation
page read and write
13B1000
heap
page read and write
61C002FC000
trusted library allocation
page read and write
1CACE2F3000
heap
page read and write
1D9B8A13000
heap
page read and write
14D9D60A000
heap
page read and write
35CC0023C000
direct allocation
page read and write
1A04002C0000
trusted library allocation
page read and write
15C0000
heap
page execute and read and write
2EB800144000
trusted library allocation
page read and write
61C0033C000
trusted library allocation
page read and write
1CACDF0D000
heap
page read and write
CE0000
heap
page read and write
23A000C84000
trusted library allocation
page read and write
23A003D67000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
38EA000
heap
page read and write
B7FA0AE000
stack
page read and write
7610003BC000
trusted library allocation
page read and write
2EB80015C000
trusted library allocation
page read and write
14E6575E000
unclassified section
page read and write
49B00032C000
trusted library allocation
page read and write
23A000730000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1480340C000
trusted library allocation
page read and write
7FC000
heap
page read and write
14803420000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
23A002BA8000
trusted library allocation
page read and write
669000270000
trusted library allocation
page read and write
23A000D38000
trusted library allocation
page read and write
14E65EE7000
unclassified section
page read and write
23A002E5F000
trusted library allocation
page read and write
23A00180C000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
49B000355000
trusted library allocation
page read and write
23E0000
heap
page read and write
167800268000
trusted library allocation
page read and write
1CACC6C8000
heap
page read and write
296F000
trusted library allocation
page read and write
23A0039B3000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
23A0039B8000
trusted library allocation
page read and write
1CACDD0A000
heap
page read and write
14E65432000
unclassified section
page read and write
1CACC593000
heap
page read and write
61C00378000
trusted library allocation
page read and write
16780024C000
trusted library allocation
page read and write
14E65664000
unclassified section
page read and write
B7F607F000
stack
page read and write
2CD76800000
heap
page read and write
23A003D48000
trusted library allocation
page read and write
14803C04000
trusted library allocation
page read and write
761000278000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
23A002458000
trusted library allocation
page read and write
1AAD1329000
heap
page read and write
1CACC73D000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
B7EFC1F000
stack
page read and write
17FE000
stack
page read and write
497C00404000
direct allocation
page read and write
264F000
stack
page read and write
23A002E16000
trusted library allocation
page read and write
182C00220000
trusted library allocation
page read and write
761000038000
trusted library allocation
page read and write
1FBE5870000
unclassified section
page read and write
3FDC00114000
trusted library allocation
page read and write
761000401000
trusted library allocation
page read and write
61C00A8C000
trusted library allocation
page read and write
23A002E11000
trusted library allocation
page read and write
1DC8481F000
heap
page read and write
1CACDCC2000
heap
page read and write
31E39FB000
stack
page read and write
77C000284000
direct allocation
page read and write
14E65EDE000
unclassified section
page read and write
96389FE000
unkown
page readonly
1CACA455000
heap
page read and write
23A000A6C000
trusted library allocation
page read and write
23A001F34000
trusted library allocation
page read and write
33FC00220000
trusted library allocation
page read and write
1CACE2B9000
heap
page read and write
61C01004000
trusted library allocation
page read and write
14802E84000
trusted library allocation
page read and write
1CACDBA4000
heap
page read and write
7BC000
heap
page read and write
49B000300000
trusted library allocation
page read and write
61C00A0C000
trusted library allocation
page read and write
1DC87880000
unclassified section
page readonly
14E65E97000
unclassified section
page read and write
C58002CC000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1CACDC74000
heap
page read and write
2CD768C0000
heap
page read and write
B7F6574000
stack
page read and write
14D9D609000
heap
page read and write
23A000A4C000
trusted library allocation
page read and write
1CACC677000
heap
page read and write
CD5000
heap
page read and write
23A0021DC000
trusted library allocation
page read and write
23A000F0C000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A00208C000
trusted library allocation
page read and write
2CD767F0000
heap
page read and write
23A0018D8000
trusted library allocation
page read and write
447800304000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
2CD76861000
heap
page read and write
602000
heap
page read and write
66735FE000
unkown
page readonly
23A002323000
trusted library allocation
page read and write
1CACE191000
heap
page read and write
33FD000
heap
page read and write
23A000D44000
trusted library allocation
page read and write
23A000A74000
trusted library allocation
page read and write
7610001B0000
trusted library allocation
page read and write
23A002198000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
1AABE000
stack
page read and write
1AAD3DEB000
unkown
page read and write
23A000818000
trusted library allocation
page read and write
1DC87A00000
unclassified section
page readonly
1CACC6AC000
heap
page read and write
3EAC5FE000
stack
page read and write
2EB800090000
trusted library allocation
page read and write
23A001EB8000
trusted library allocation
page read and write
497C00230000
direct allocation
page read and write
1480398C000
trusted library allocation
page read and write
23A00231B000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A00260C000
trusted library allocation
page read and write
61C00258000
trusted library allocation
page read and write
23A00218C000
trusted library allocation
page read and write
3FDC000B4000
trusted library allocation
page read and write
447800238000
trusted library allocation
page read and write
1AAD3129000
heap
page read and write
1AAD316E000
heap
page read and write
1CACE5E3000
heap
page read and write
2CD7687C000
heap
page read and write
6A2400284000
direct allocation
page read and write
1CACE5EB000
heap
page read and write
7610004BC000
trusted library allocation
page read and write
1AAD1282000
heap
page read and write
23A001BE4000
trusted library allocation
page read and write
499000
unkown
page readonly
23A002320000
trusted library allocation
page read and write
23A001F6C000
trusted library allocation
page read and write
1CACC4F2000
heap
page read and write
23A00206C000
trusted library allocation
page read and write
14D9D609000
heap
page read and write
14D9D624000
heap
page read and write
1CACE148000
heap
page read and write
48E0002C8000
trusted library allocation
page read and write
1A04002D4000
trusted library allocation
page read and write
23A0021BA000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14E65E65000
unclassified section
page read and write
1BC7E000
stack
page read and write
1CACE1CD000
heap
page read and write
1480346C000
trusted library allocation
page read and write
33FC00225000
trusted library allocation
page read and write
31D11FE000
unkown
page readonly
7610004C8000
trusted library allocation
page read and write
23A0023C0000
trusted library allocation
page read and write
23A001C2C000
trusted library allocation
page read and write
761000162000
trusted library allocation
page read and write
23A003D29000
trusted library allocation
page read and write
14803E60000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
23A000A4C000
trusted library allocation
page read and write
23A0022D8000
trusted library allocation
page read and write
23A0039A5000
trusted library allocation
page read and write
23A003D4A000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
1CACDB9A000
heap
page read and write
24EEB5E0000
heap
page read and write
1CACE2A5000
heap
page read and write
14803D74000
trusted library allocation
page read and write
23A002DB7000
trusted library allocation
page read and write
14E66455000
unclassified section
page read and write
1CACE5F3000
heap
page read and write
1480301C000
trusted library allocation
page read and write
1CACC4C6000
heap
page read and write
12E0000
heap
page read and write
1DC84670000
unclassified section
page read and write
6690002A4000
trusted library allocation
page read and write
17F008C2000
trusted library allocation
page read and write
14803E74000
trusted library allocation
page read and write
394800240000
direct allocation
page read and write
23A003D43000
trusted library allocation
page read and write
23A001BDC000
trusted library allocation
page read and write
23A002E0F000
trusted library allocation
page read and write
23A0022F0000
trusted library allocation
page read and write
61C00801000
trusted library allocation
page read and write
447800430000
trusted library allocation
page read and write
6A757FE000
unkown
page readonly
1CACC797000
heap
page read and write
24EEB530000
heap
page read and write
1CACDCC6000
heap
page read and write
1CACE2C8000
heap
page read and write
148022D0000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
14803380000
trusted library allocation
page read and write
1CACDC74000
heap
page read and write
14E65ECB000
unclassified section
page read and write
23A001DAC000
trusted library allocation
page read and write
23A000CA0000
trusted library allocation
page read and write
447800370000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
23A000F78000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
1AAD3186000
heap
page read and write
3C34002D8000
trusted library allocation
page read and write
14803294000
trusted library allocation
page read and write
1CACC741000
heap
page read and write
5BC8002D0000
direct allocation
page read and write
23A002170000
trusted library allocation
page read and write
29393F9000
stack
page read and write
400000
unkown
page readonly
96341FB000
stack
page read and write
7610003BC000
trusted library allocation
page read and write
1DC87F30000
unclassified section
page readonly
14E65E5E000
unclassified section
page read and write
23A000818000
trusted library allocation
page read and write
14E66981000
unclassified section
page read and write
23A002D4A000
trusted library allocation
page read and write
4A2C002C0000
trusted library allocation
page read and write
14802488000
trusted library allocation
page read and write
31D29FE000
stack
page read and write
761000371000
trusted library allocation
page read and write
23A000D50000
trusted library allocation
page read and write
61C00601000
trusted library allocation
page read and write
1CACE15F000
heap
page read and write
23A000F68000
trusted library allocation
page read and write
1CACC4DC000
heap
page read and write
13D7000
heap
page read and write
1AAD314B000
heap
page read and write
23A00217C000
trusted library allocation
page read and write
497C00201000
direct allocation
page read and write
61C0096C000
trusted library allocation
page read and write
31B81FE000
unkown
page readonly
14E65875000
unclassified section
page read and write
1CACD6B0000
remote allocation
page read and write
1B73E000
stack
page read and write
BDD000
heap
page read and write
4478002E0000
trusted library allocation
page read and write
23A003D2B000
trusted library allocation
page read and write
14802230000
trusted library allocation
page read and write
17F00AC2000
trusted library allocation
page read and write
700C0020C000
trusted library allocation
page read and write
E1267F5000
stack
page read and write
14DE0610000
trusted library allocation
page read and write
1CACC563000
heap
page read and write
23A002318000
trusted library allocation
page read and write
1A04002A0000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A000D44000
trusted library allocation
page read and write
33FC00114000
trusted library allocation
page read and write
26AE000
stack
page read and write
76100048C000
trusted library allocation
page read and write
10EC002A4000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
1CACE27E000
heap
page read and write
3C3400238000
trusted library allocation
page read and write
6114002A0000
trusted library allocation
page read and write
23A0021A4000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
17F00500000
trusted library allocation
page read and write
E12EFFE000
unkown
page readonly
1480339C000
trusted library allocation
page read and write
1CACA400000
heap
page read and write
1CACC6DC000
heap
page read and write
14803E8C000
trusted library allocation
page read and write
23A000D14000
trusted library allocation
page read and write
1CACDBAA000
heap
page read and write
1CACDCAE000
heap
page read and write
5FD000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
23A000D68000
trusted library allocation
page read and write
1AAD316E000
heap
page read and write
10EC002A4000
trusted library allocation
page read and write
1B44E000
stack
page read and write
7610004BC000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
3C3400278000
trusted library allocation
page read and write
1CACE2C7000
heap
page read and write
14D9D62B000
heap
page read and write
14802F68000
trusted library allocation
page read and write
1CACE213000
heap
page read and write
23A002170000
trusted library allocation
page read and write
23A000F14000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACC5C0000
heap
page read and write
761000284000
trusted library allocation
page read and write
394800260000
direct allocation
page read and write
167800230000
trusted library allocation
page read and write
B7F65E2000
stack
page read and write
23A00241C000
trusted library allocation
page read and write
14800A01000
trusted library allocation
page read and write
B7EEB9F000
stack
page read and write
1CACC73D000
heap
page read and write
761000371000
trusted library allocation
page read and write
23A001604000
trusted library allocation
page read and write
33FC00538000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
23A001D6C000
trusted library allocation
page read and write
761000290000
trusted library allocation
page read and write
14E658E7000
unclassified section
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
23A002E03000
trusted library allocation
page read and write
14803270000
trusted library allocation
page read and write
23A00218C000
trusted library allocation
page read and write
1480263C000
trusted library allocation
page read and write
1CACC691000
heap
page read and write
1CACE21F000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
16FF000
stack
page read and write
1AAD125A000
heap
page read and write
1AAD3146000
heap
page read and write
1CACC6CC000
heap
page read and write
4A2C00418000
trusted library allocation
page read and write
1CACA449000
heap
page read and write
2721000
trusted library allocation
page read and write
23A002DD6000
trusted library allocation
page read and write
61C0085C000
trusted library allocation
page read and write
23A001F6C000
trusted library allocation
page read and write
1CACC596000
heap
page read and write
23A000AF0000
trusted library allocation
page read and write
96371FE000
stack
page read and write
14D9D66E000
heap
page read and write
B7F663E000
stack
page read and write
23A001880000
trusted library allocation
page read and write
14E60C97000
unclassified section
page read and write
14D9D609000
heap
page read and write
14D9D60A000
heap
page read and write
1CACC68D000
heap
page read and write
23A000B24000
trusted library allocation
page read and write
497C002EC000
direct allocation
page read and write
1CACDB31000
heap
page read and write
1B3F0000
heap
page read and write
1CACDCC2000
heap
page read and write
1CACDD15000
heap
page read and write
23A00206C000
trusted library allocation
page read and write
14D9D200000
heap
page read and write
761000300000
trusted library allocation
page read and write
31E41FE000
unkown
page readonly
23A002074000
trusted library allocation
page read and write
76100035C000
trusted library allocation
page read and write
23A003D6E000
trusted library allocation
page read and write
1A04002A0000
trusted library allocation
page read and write
23A003D41000
trusted library allocation
page read and write
14803D68000
trusted library allocation
page read and write
23A002E30000
trusted library allocation
page read and write
23A000A0C000
trusted library allocation
page read and write
23A003D81000
trusted library allocation
page read and write
1CACC73B000
heap
page read and write
6114002C8000
trusted library allocation
page read and write
17F00A42000
trusted library allocation
page read and write
23A000D56000
trusted library allocation
page read and write
23A002CD6000
trusted library allocation
page read and write
3EAEDFE000
unkown
page readonly
1CACA478000
heap
page read and write
1FBE2580000
unclassified section
page readonly
23A001B34000
trusted library allocation
page read and write
23A0021A0000
trusted library allocation
page read and write
1CACDB6C000
heap
page read and write
1CACC72D000
heap
page read and write
23A001EE8000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
1DC872E0000
unclassified section
page readonly
1DC8488A000
heap
page read and write
B7F6622000
stack
page read and write
3EAD5FE000
stack
page read and write
23A002E5D000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
23A000674000
trusted library allocation
page read and write
1F0000
heap
page read and write
23A000674000
trusted library allocation
page read and write
1CACDCB2000
heap
page read and write
77C000274000
direct allocation
page read and write
394800280000
direct allocation
page read and write
35CC002BC000
direct allocation
page read and write
1CACA478000
heap
page read and write
14803DC0000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
24EEB410000
heap
page read and write
1CACDBA4000
heap
page read and write
76100035D000
trusted library allocation
page read and write
1CACDE93000
heap
page read and write
154F000
stack
page read and write
23A000CD0000
trusted library allocation
page read and write
23A002190000
trusted library allocation
page read and write
23A002034000
trusted library allocation
page read and write
1CACDBA6000
heap
page read and write
23A0021B7000
trusted library allocation
page read and write
1CACC6BD000
heap
page read and write
1AFBE000
stack
page read and write
23A002076000
trusted library allocation
page read and write
24EEB430000
heap
page read and write
7610002F4000
trusted library allocation
page read and write
1CACE15A000
heap
page read and write
23A00060C000
trusted library allocation
page read and write
1CACC6B4000
heap
page read and write
10AE000
stack
page read and write
14802654000
trusted library allocation
page read and write
1A04002AC000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
B7F679F000
stack
page read and write
1CACE2BF000
heap
page read and write
23A000D74000
trusted library allocation
page read and write
23A000F80000
trusted library allocation
page read and write
14802C4D000
trusted library allocation
page read and write
148025E8000
trusted library allocation
page read and write
14803404000
trusted library allocation
page read and write
61C0077C000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
33FC00001000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
1AEED000
stack
page read and write
66900029C000
trusted library allocation
page read and write
24EEB705000
heap
page read and write
23A001C1C000
trusted library allocation
page read and write
23A001F88000
trusted library allocation
page read and write
23A002188000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1A0400201000
trusted library allocation
page read and write
6A697FE000
unkown
page readonly
23A00339D000
trusted library allocation
page read and write
14802378000
trusted library allocation
page read and write
761000098000
trusted library allocation
page read and write
33FC00201000
trusted library allocation
page read and write
23A00080C000
trusted library allocation
page read and write
1A0400258000
trusted library allocation
page read and write
1CACC6A4000
heap
page read and write
61C0033C000
trusted library allocation
page read and write
1AAD12FE000
heap
page read and write
497C002DC000
direct allocation
page read and write
14D9D60A000
heap
page read and write
14D9D657000
heap
page read and write
23A000818000
trusted library allocation
page read and write
23A0039B5000
trusted library allocation
page read and write
14E6587A000
unclassified section
page read and write
7C4000
heap
page read and write
14E654CA000
unclassified section
page read and write
23A003D62000
trusted library allocation
page read and write
4A2C002EC000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
31C51FE000
unkown
page readonly
B7EEB86000
stack
page read and write
14E65E3D000
unclassified section
page read and write
1CACDCB8000
heap
page read and write
76100048C000
trusted library allocation
page read and write
1CACE33F000
heap
page read and write
23A001CC4000
trusted library allocation
page read and write
14802C9C000
trusted library allocation
page read and write
23A0033EE000
trusted library allocation
page read and write
182C0029C000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
2CD768B9000
heap
page read and write
31E61FE000
unkown
page readonly
23A002CD4000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
2C1C000
heap
page read and write
148033D8000
trusted library allocation
page read and write
148033C4000
trusted library allocation
page read and write
2B39000
trusted library allocation
page read and write
1AAD1384000
heap
page read and write
1DC8189A000
heap
page read and write
1480310C000
trusted library allocation
page read and write
1CACE327000
heap
page read and write
14D9D66E000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
77C000220000
direct allocation
page read and write
23A002E8A000
trusted library allocation
page read and write
17F00A42000
trusted library allocation
page read and write
23A002DE4000
trusted library allocation
page read and write
14E65E46000
unclassified section
page read and write
23A002084000
trusted library allocation
page read and write
33FC004C4000
trusted library allocation
page read and write
14D9D1B2000
unclassified section
page read and write
23A000A94000
trusted library allocation
page read and write
1CACE034000
heap
page read and write
23A0008AF000
trusted library allocation
page read and write
1AAD316A000
heap
page read and write
23A0021A0000
trusted library allocation
page read and write
4A2C002D0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1DC84657000
unclassified section
page read and write
761000324000
trusted library allocation
page read and write
31CF9FD000
stack
page read and write
1B2EE000
stack
page read and write
1FBE21A9000
unclassified section
page read and write
33FC0060C000
trusted library allocation
page read and write
1DC848C2000
heap
page read and write
24EEB661000
heap
page read and write
327F000
stack
page read and write
14E62EE7000
unclassified section
page read and write
14803198000
trusted library allocation
page read and write
23A000A7C000
trusted library allocation
page read and write
1CACC65D000
heap
page read and write
1CACE553000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
61C0060C000
trusted library allocation
page read and write
7FF7888A1000
unkown
page execute read
23A000638000
trusted library allocation
page read and write
23A00268C000
trusted library allocation
page read and write
23A003CD6000
trusted library allocation
page read and write
5F1000
heap
page read and write
1CACE4C8000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1480304C000
trusted library allocation
page read and write
1CACE2BF000
heap
page read and write
1CACC6BA000
heap
page read and write
24EEB600000
heap
page read and write
77C00031F000
direct allocation
page read and write
76100012E000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
23A002E72000
trusted library allocation
page read and write
23A00338D000
trusted library allocation
page read and write
1CACDB6E000
heap
page read and write
23A00077C000
trusted library allocation
page read and write
1CACA455000
heap
page read and write
700C00274000
trusted library allocation
page read and write
23A0021A0000
trusted library allocation
page read and write
5D0000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
1480259C000
trusted library allocation
page read and write
1CACC68D000
heap
page read and write
1CACE186000
heap
page read and write
14E60C48000
unclassified section
page read and write
404000
unkown
page read and write
C5800238000
trusted library allocation
page read and write
35CC0025C000
direct allocation
page read and write
720000
trusted library allocation
page read and write
1CACC72D000
heap
page read and write
33FC00148000
trusted library allocation
page read and write
1CACDF30000
heap
page read and write
669000254000
trusted library allocation
page read and write
23A002BA8000
trusted library allocation
page read and write
23A003D5D000
trusted library allocation
page read and write
6A67FFE000
stack
page read and write
33FC0011C000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
B7F6879000
stack
page read and write
14802984000
trusted library allocation
page read and write
148031A0000
trusted library allocation
page read and write
31E49FB000
stack
page read and write
23A000D4A000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
4F4000
stack
page read and write
761000300000
trusted library allocation
page read and write
761000140000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
35CC00201000
direct allocation
page read and write
23A002179000
trusted library allocation
page read and write
10EC002A4000
trusted library allocation
page read and write
1CACE348000
heap
page read and write
23A002E24000
trusted library allocation
page read and write
23A001F54000
trusted library allocation
page read and write
1CACDCBD000
heap
page read and write
1CACA440000
heap
page read and write
33FC0042C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14D9D624000
heap
page read and write
14D9D624000
heap
page read and write
14803224000
trusted library allocation
page read and write
14E61FBA000
unclassified section
page read and write
33FC001C8000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
14803380000
trusted library allocation
page read and write
1CACC51A000
heap
page read and write
14E65695000
unclassified section
page read and write
1CACC524000
heap
page read and write
23A002E79000
trusted library allocation
page read and write
1CACC52B000
heap
page read and write
23A003D30000
trusted library allocation
page read and write
962D9FE000
unkown
page readonly
1CACE2CF000
heap
page read and write
1CACDD37000
heap
page read and write
23A0003D0000
trusted library allocation
page read and write
14803CAC000
trusted library allocation
page read and write
7E0000
heap
page read and write
1CACDC43000
heap
page read and write
1CACDBCC000
heap
page read and write
76100005C000
trusted library allocation
page read and write
1CACA483000
heap
page read and write
1CACA42E000
heap
page read and write
1CACC797000
heap
page read and write
49B0002E0000
trusted library allocation
page read and write
1CACE2E0000
heap
page read and write
1CACDC19000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
7FF788FDD000
unkown
page readonly
1DC8489D000
heap
page read and write
1CACC6B8000
heap
page read and write
6A6DFFE000
stack
page read and write
14803E0C000
trusted library allocation
page read and write
14E65873000
unclassified section
page read and write
1CACE213000
heap
page read and write
23A001F04000
trusted library allocation
page read and write
1CACC73B000
heap
page read and write
5BC8002A0000
direct allocation
page read and write
14D9D66A000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1480339C000
trusted library allocation
page read and write
B7EEBAF000
stack
page read and write
1DC84843000
heap
page read and write
2934BFD000
stack
page read and write
14803AE4000
trusted library allocation
page read and write
1CACC6CC000
heap
page read and write
10EC00294000
trusted library allocation
page read and write
23A000D74000
trusted library allocation
page read and write
33FC00384000
trusted library allocation
page read and write
13021000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
19B000
stack
page read and write
13AB000
heap
page read and write
14802488000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
33FC0018E000
trusted library allocation
page read and write
10EC002A4000
trusted library allocation
page read and write
7610004FC000
trusted library allocation
page read and write
1CACC677000
heap
page read and write
23A00208C000
trusted library allocation
page read and write
7610004C2000
trusted library allocation
page read and write
1CACDCA7000
heap
page read and write
14803DF4000
trusted library allocation
page read and write
167800210000
trusted library allocation
page read and write
1B4B0000
heap
page execute and read and write
23A002176000
trusted library allocation
page read and write
23A0003E8000
trusted library allocation
page read and write
23A002118000
trusted library allocation
page read and write
1DC81BD0000
heap
page read and write
7FFD9BB32000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
23A003448000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
1CACE209000
heap
page read and write
1CACC6CC000
heap
page read and write
23A000A54000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
1CACC5B7000
heap
page read and write
14D9D62B000
heap
page read and write
1A04002A0000
trusted library allocation
page read and write
61C002A4000
trusted library allocation
page read and write
14802C43000
trusted library allocation
page read and write
1CACE151000
heap
page read and write
761000300000
trusted library allocation
page read and write
23A001DA4000
trusted library allocation
page read and write
23A000730000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
4A2C00220000
trusted library allocation
page read and write
1CACC790000
heap
page read and write
14D9D5F7000
unclassified section
page read and write
33FC00198000
trusted library allocation
page read and write
31D01FE000
unkown
page readonly
447800401000
trusted library allocation
page read and write
1CACE34B000
heap
page read and write
23A001EEC000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACC753000
heap
page read and write
14802D20000
trusted library allocation
page read and write
23A003CFC000
trusted library allocation
page read and write
31DE9FE000
stack
page read and write
1CACE17A000
heap
page read and write
14D9D62B000
heap
page read and write
611400220000
trusted library allocation
page read and write
12538000
trusted library allocation
page read and write
1CACC6C0000
heap
page read and write
33FC00450000
trusted library allocation
page read and write
1CACE297000
heap
page read and write
23A001F1C000
trusted library allocation
page read and write
1CACE5E1000
heap
page read and write
49B000260000
trusted library allocation
page read and write
1CACE5DF000
heap
page read and write
B05000
heap
page read and write
76100016C000
trusted library allocation
page read and write
77C0002F0000
direct allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
14E66444000
unclassified section
page read and write
1BCAF000
stack
page read and write
761000504000
trusted library allocation
page read and write
2CD7685E000
heap
page read and write
B40000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
23A001C64000
trusted library allocation
page read and write
23A001F1C000
trusted library allocation
page read and write
23A000674000
trusted library allocation
page read and write
76100035C000
trusted library allocation
page read and write
23A000D56000
trusted library allocation
page read and write
61C002B8000
trusted library allocation
page read and write
2EB800118000
trusted library allocation
page read and write
44780031C000
trusted library allocation
page read and write
2CD7687C000
heap
page read and write
3EAADFE000
unkown
page readonly
700C00240000
trusted library allocation
page read and write
23A002DDD000
trusted library allocation
page read and write
23A001F3C000
trusted library allocation
page read and write
1CACC766000
heap
page read and write
14803130000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
23A000724000
trusted library allocation
page read and write
700C002A0000
trusted library allocation
page read and write
14800C2A000
trusted library allocation
page read and write
4A2C00230000
trusted library allocation
page read and write
1CACA438000
heap
page read and write
14802F98000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
23A001D9C000
trusted library allocation
page read and write
23A000730000
trusted library allocation
page read and write
23A001A64000
trusted library allocation
page read and write
14802201000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
7610004E4000
trusted library allocation
page read and write
23A000788000
trusted library allocation
page read and write
2CD76AD0000
heap
page readonly
17F00AC2000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
49B00029C000
trusted library allocation
page read and write
23A0021A0000
trusted library allocation
page read and write
1DC81800000
heap
page read and write
1CACC6AC000
heap
page read and write
33FC0011C000
trusted library allocation
page read and write
61140040C000
trusted library allocation
page read and write
1CACDB97000
heap
page read and write
14D9D62B000
heap
page read and write
14D9D60A000
heap
page read and write
1350000
heap
page read and write
17F00142000
trusted library allocation
page read and write
10EC002A4000
trusted library allocation
page read and write
611400334000
trusted library allocation
page read and write
23A000614000
trusted library allocation
page read and write
23A000D26000
trusted library allocation
page read and write
1DC84886000
heap
page read and write
23A0009BA000
trusted library allocation
page read and write
33FC00298000
trusted library allocation
page read and write
148029A8000
trusted library allocation
page read and write
148036FC000
trusted library allocation
page read and write
1DC81830000
heap
page read and write
1CACDD01000
heap
page read and write
14E65852000
unclassified section
page read and write
61C0096C000
trusted library allocation
page read and write
1CACC67E000
heap
page read and write
23A001DDC000
trusted library allocation
page read and write
1CACDC47000
heap
page read and write
1CACDF27000
heap
page read and write
14E6549F000
unclassified section
page read and write
14D9D62B000
heap
page read and write
23A003D4F000
trusted library allocation
page read and write
1CACC5E2000
heap
page read and write
23A000AA4000
trusted library allocation
page read and write
14E654CF000
unclassified section
page read and write
2933BFD000
stack
page read and write
1CACA42C000
heap
page read and write
14802794000
trusted library allocation
page read and write
14E60C67000
unclassified section
page read and write
14E61A60000
unclassified section
page read and write
1CACC67E000
heap
page read and write
61C002A4000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
33FC002A8000
trusted library allocation
page read and write
1DC87A71000
unclassified section
page readonly
76100040C000
trusted library allocation
page read and write
31D39FE000
stack
page read and write
96381FE000
stack
page read and write
1CACC50E000
heap
page read and write
23A001928000
trusted library allocation
page read and write
17F00A42000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
1C476000
heap
page read and write
14800D92000
trusted library allocation
page read and write
17F00502000
trusted library allocation
page read and write
14803201000
trusted library allocation
page read and write
14803801000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
33FC00070000
trusted library allocation
page read and write
23A000F98000
trusted library allocation
page read and write
23A001E8C000
trusted library allocation
page read and write
1CACDD15000
heap
page read and write
B7F6A48000
stack
page read and write
23A002DE2000
trusted library allocation
page read and write
24EEB602000
heap
page read and write
F90000
heap
page read and write
76100048C000
trusted library allocation
page read and write
14802818000
trusted library allocation
page read and write
1CACE1A9000
heap
page read and write
35CC002AC000
direct allocation
page read and write
7610002C0000
trusted library allocation
page read and write
1CACE337000
heap
page read and write
23A000A38000
trusted library allocation
page read and write
1AAD132F000
heap
page read and write
14E6584F000
unclassified section
page read and write
497C00210000
direct allocation
page read and write
1CACDBB0000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
14E6567D000
unclassified section
page read and write
1CACE15D000
heap
page read and write
1CACA3F7000
heap
page read and write
21986E50000
heap
page read and write
405000
unkown
page write copy
1C86A000
stack
page read and write
23A001EA4000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
14D9D625000
heap
page read and write
F7C000
stack
page read and write
14D9D60A000
heap
page read and write
23A001C8C000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
14802EB8000
trusted library allocation
page read and write
14E65778000
unclassified section
page read and write
2EB800140000
trusted library allocation
page read and write
66725FE000
unkown
page readonly
1DC879C0000
unclassified section
page readonly
23A002078000
trusted library allocation
page read and write
23A00217C000
trusted library allocation
page read and write
14802C87000
trusted library allocation
page read and write
23A0021BA000
trusted library allocation
page read and write
23A0006AC000
trusted library allocation
page read and write
1480300C000
trusted library allocation
page read and write
61C002DC000
trusted library allocation
page read and write
23A00088C000
trusted library allocation
page read and write
669000210000
trusted library allocation
page read and write
B7F661F000
stack
page read and write
23A003D72000
trusted library allocation
page read and write
1AEAE000
stack
page read and write
1BB4F000
stack
page read and write
1CACDBB4000
heap
page read and write
23A002D96000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
14803490000
trusted library allocation
page read and write
1CACC4D7000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
23A001B9C000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
6A6B7FE000
unkown
page readonly
611400201000
trusted library allocation
page read and write
33FC000BC000
trusted library allocation
page read and write
31B59F1000
stack
page read and write
14E62019000
unclassified section
page read and write
23A001DBC000
trusted library allocation
page read and write
5BC800294000
direct allocation
page read and write
23A000D3E000
trusted library allocation
page read and write
1CACE17D000
heap
page read and write
1CACE34B000
heap
page read and write
61C0072C000
trusted library allocation
page read and write
61C00B0C000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
6A76FFE000
stack
page read and write
14D9D60A000
heap
page read and write
14D9D62B000
heap
page read and write
447800201000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
1CACDD26000
heap
page read and write
1CACA3FD000
heap
page read and write
23A0039A7000
trusted library allocation
page read and write
23A001004000
trusted library allocation
page read and write
4478002BC000
trusted library allocation
page read and write
23A00088C000
trusted library allocation
page read and write
1AFAF000
stack
page read and write
14802FE4000
trusted library allocation
page read and write
23A001CBC000
trusted library allocation
page read and write
1CACDCC7000
heap
page read and write
14D9D624000
heap
page read and write
1CACC677000
heap
page read and write
1A04002A0000
trusted library allocation
page read and write
14E65888000
unclassified section
page read and write
1480340C000
trusted library allocation
page read and write
1CACC6EA000
heap
page read and write
761000284000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1CACC73B000
heap
page read and write
C5800270000
trusted library allocation
page read and write
23A002078000
trusted library allocation
page read and write
23A003CEB000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
2CD768CE000
heap
page read and write
33FC00494000
trusted library allocation
page read and write
77C0002F0000
direct allocation
page read and write
14802868000
trusted library allocation
page read and write
23A001CB4000
trusted library allocation
page read and write
23A003CCD000
trusted library allocation
page read and write
7FFD9BB12000
trusted library allocation
page read and write
14803040000
trusted library allocation
page read and write
31C49FC000
stack
page read and write
7610002C0000
trusted library allocation
page read and write
23A0020B5000
trusted library allocation
page read and write
23A002170000
trusted library allocation
page read and write
1AAD633A000
unclassified section
page read and write
14E657D4000
unclassified section
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
C5800254000
trusted library allocation
page read and write
23A001838000
trusted library allocation
page read and write
23A00208C000
trusted library allocation
page read and write
7D2000
heap
page read and write
76100048C000
trusted library allocation
page read and write
14E65848000
unclassified section
page read and write
76100040C000
trusted library allocation
page read and write
66705FE000
unkown
page readonly
1CACE1CB000
heap
page read and write
48E000278000
trusted library allocation
page read and write
23A00339B000
trusted library allocation
page read and write
14801001000
trusted library allocation
page read and write
61C00754000
trusted library allocation
page read and write
23A002DD1000
trusted library allocation
page read and write
31C81FE000
unkown
page readonly
23A001BEC000
trusted library allocation
page read and write
1AAD8C07000
unkown
page readonly
33FC00538000
trusted library allocation
page read and write
1CACA3E6000
heap
page read and write
1CACDC93000
heap
page read and write
14E6580D000
unclassified section
page read and write
76100048C000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
1CACE2A0000
heap
page read and write
23A0022BC000
trusted library allocation
page read and write
35CC0026C000
direct allocation
page read and write
23A0008AF000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
1DC87BC0000
unclassified section
page readonly
14803580000
trusted library allocation
page read and write
33FC00114000
trusted library allocation
page read and write
CAB000
heap
page read and write
1480286C000
trusted library allocation
page read and write
7610004C2000
trusted library allocation
page read and write
1CACC6BC000
heap
page read and write
61C00DAC000
trusted library allocation
page read and write
23A000F58000
trusted library allocation
page read and write
1C76B000
stack
page read and write
23A0008AF000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
61C009A8000
trusted library allocation
page read and write
23A002E77000
trusted library allocation
page read and write
7FFDC3204000
trusted library allocation
page execute and read and write
23A0028FC000
trusted library allocation
page read and write
1CACC6BE000
heap
page read and write
23A000E0C000
trusted library allocation
page read and write
23A002120000
trusted library allocation
page read and write
1CACC66F000
heap
page read and write
33FC004C8000
trusted library allocation
page read and write
23A0039AE000
trusted library allocation
page read and write
7FF788FDD000
unkown
page readonly
3C340027C000
trusted library allocation
page read and write
23A000B50000
trusted library allocation
page read and write
447800404000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
23A0021B7000
trusted library allocation
page read and write
761000290000
trusted library allocation
page read and write
D24000
heap
page read and write
1CACDD01000
heap
page read and write
1BA40000
heap
page read and write
1CACDC13000
heap
page read and write
1CACC670000
heap
page read and write
1480274C000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
1CACC508000
heap
page read and write
61C00384000
trusted library allocation
page read and write
17F00A40000
trusted library allocation
page read and write
1480098E000
trusted library allocation
page read and write
14802C24000
trusted library allocation
page read and write
1480248B000
trusted library allocation
page read and write
23A0021A8000
trusted library allocation
page read and write
148026C8000
trusted library allocation
page read and write
23A000C84000
trusted library allocation
page read and write
14E64901000
unclassified section
page read and write
1AAD67B0000
unkown
page readonly
1CACC75D000
heap
page read and write
1CACDEFB000
heap
page read and write
33FC00470000
trusted library allocation
page read and write
654000
heap
page read and write
14E658C1000
unclassified section
page read and write
23A001CF4000
trusted library allocation
page read and write
1CACC6E6000
heap
page read and write
17F00A42000
trusted library allocation
page read and write
48E0002D8000
trusted library allocation
page read and write
1678002BC000
trusted library allocation
page read and write
B7F6474000
stack
page read and write
61C00900000
trusted library allocation
page read and write
33FC00024000
trusted library allocation
page read and write
6A68FFE000
stack
page read and write
1CACDB9C000
heap
page read and write
7610004D8000
trusted library allocation
page read and write
23A003CE7000
trusted library allocation
page read and write
14802C6C000
trusted library allocation
page read and write
1480244C000
trusted library allocation
page read and write
6A6E7FE000
unkown
page readonly
14D9D624000
heap
page read and write
76100044E000
trusted library allocation
page read and write
1BBA0000
heap
page execute and read and write
7610001C4000
trusted library allocation
page read and write
14E6582E000
unclassified section
page read and write
76100044E000
trusted library allocation
page read and write
1DC8781A000
unclassified section
page readonly
23A002CC8000
trusted library allocation
page read and write
2CD7689A000
heap
page read and write
23A000B1C000
trusted library allocation
page read and write
23A000B38000
trusted library allocation
page read and write
962E1FE000
stack
page read and write
14803420000
trusted library allocation
page read and write
1AAD132E000
heap
page read and write
1CACE17E000
heap
page read and write
31BB1FE000
unkown
page readonly
76100044E000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
14E65EA5000
unclassified section
page read and write
1CACE3D4000
heap
page read and write
1CACC66D000
heap
page read and write
1CACC798000
heap
page read and write
61C00354000
trusted library allocation
page read and write
3EAE5FE000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
1CACC6CC000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
B7F6454000
stack
page read and write
23A0039A0000
trusted library allocation
page read and write
23A001940000
trusted library allocation
page read and write
14802D6C000
trusted library allocation
page read and write
761000278000
trusted library allocation
page read and write
23A001F3C000
trusted library allocation
page read and write
B7F657E000
stack
page read and write
E1277FE000
stack
page read and write
7610001C4000
trusted library allocation
page read and write
1CACDB84000
heap
page read and write
76100036B000
trusted library allocation
page read and write
761000284000
trusted library allocation
page read and write
14E65930000
unclassified section
page read and write
23A001930000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACE29E000
heap
page read and write
61C00754000
trusted library allocation
page read and write
1AAD1381000
heap
page read and write
1CACC6AC000
heap
page read and write
1CACA44B000
heap
page read and write
7610000EC000
trusted library allocation
page read and write
23A000EC0000
trusted library allocation
page read and write
14803580000
trusted library allocation
page read and write
23A00219B000
trusted library allocation
page read and write
61C0033C000
trusted library allocation
page read and write
1AAD1241000
heap
page read and write
23A0003E8000
trusted library allocation
page read and write
23A0008AD000
trusted library allocation
page read and write
17F008C2000
trusted library allocation
page read and write
1CACDD40000
heap
page read and write
669000220000
trusted library allocation
page read and write
16780027C000
trusted library allocation
page read and write
1B0AE000
stack
page read and write
23A001A5C000
trusted library allocation
page read and write
1CACA43C000
heap
page read and write
2401000
trusted library allocation
page read and write
14802998000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A000F84000
trusted library allocation
page read and write
390000
heap
page read and write
1CACE1C8000
heap
page read and write
23A000684000
trusted library allocation
page read and write
7610004C8000
trusted library allocation
page read and write
31B71FE000
unkown
page readonly
23A00080C000
trusted library allocation
page read and write
1DC8473D000
unclassified section
page read and write
14E657E0000
unclassified section
page read and write
14E65EE5000
unclassified section
page read and write
23A0033DB000
trusted library allocation
page read and write
23A0021B7000
trusted library allocation
page read and write
1B340000
heap
page read and write
23A000A0C000
trusted library allocation
page read and write
1300000
heap
page read and write
23A000A0C000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
23A00219B000
trusted library allocation
page read and write
23A00074C000
trusted library allocation
page read and write
1CACC598000
heap
page read and write
1A0400238000
trusted library allocation
page read and write
1AAD3DE9000
unkown
page read and write
16780025C000
trusted library allocation
page read and write
7610004C8000
trusted library allocation
page read and write
23A000A52000
trusted library allocation
page read and write
23A0039BA000
trusted library allocation
page read and write
15F5000
heap
page read and write
12AC8000
trusted library allocation
page read and write
48E000258000
trusted library allocation
page read and write
61C01004000
trusted library allocation
page read and write
1CACA3DF000
heap
page read and write
1DC848C7000
heap
page read and write
1480304C000
trusted library allocation
page read and write
1DC87B00000
unclassified section
page readonly
1A04002C0000
trusted library allocation
page read and write
14803804000
trusted library allocation
page read and write
23A0020C0000
trusted library allocation
page read and write
14E62EED000
unclassified section
page read and write
14802444000
trusted library allocation
page read and write
1CACDBDD000
heap
page read and write
1DC84900000
heap
page read and write
C20000
trusted library allocation
page read and write
14E65865000
unclassified section
page read and write
23A0009EC000
trusted library allocation
page read and write
29363FE000
stack
page read and write
1DC877D0000
unclassified section
page readonly
1CACDE93000
heap
page read and write
14803E50000
trusted library allocation
page read and write
148022DC000
trusted library allocation
page read and write
1AAD12B4000
heap
page read and write
1CACC72D000
heap
page read and write
14802734000
trusted library allocation
page read and write
49B000240000
trusted library allocation
page read and write
14E65468000
unclassified section
page read and write
628000
heap
page read and write
1480320C000
trusted library allocation
page read and write
BF0000
heap
page read and write
1CACDC7E000
heap
page read and write
302F000
trusted library allocation
page read and write
77C00032C000
direct allocation
page read and write
14E65E92000
unclassified section
page read and write
23A001898000
trusted library allocation
page read and write
23A00089C000
trusted library allocation
page read and write
A7E000
stack
page read and write
23A000D08000
trusted library allocation
page read and write
1CACE341000
heap
page read and write
14803110000
trusted library allocation
page read and write
611400230000
trusted library allocation
page read and write
14803601000
trusted library allocation
page read and write
33FC002BC000
trusted library allocation
page read and write
23A000AE4000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
700C0029C000
trusted library allocation
page read and write
B7F6677000
stack
page read and write
447800424000
trusted library allocation
page read and write
3C3400268000
trusted library allocation
page read and write
2CD02380000
trusted library section
page readonly
1A04002B4000
trusted library allocation
page read and write
5E3000
unkown
page readonly
1CACA430000
heap
page read and write
7610000D8000
trusted library allocation
page read and write
761000264000
trusted library allocation
page read and write
761000278000
trusted library allocation
page read and write
1CACE32D000
heap
page read and write
611400324000
trusted library allocation
page read and write
1480325C000
trusted library allocation
page read and write
33FC00424000
trusted library allocation
page read and write
2EB8000F8000
trusted library allocation
page read and write
48E00028C000
trusted library allocation
page read and write
14E65948000
unclassified section
page read and write
B7EEB5E000
stack
page read and write
6F4000
stack
page read and write
76100040C000
trusted library allocation
page read and write
23A001CAC000
trusted library allocation
page read and write
3FDC000A8000
trusted library allocation
page read and write
23A000A61000
trusted library allocation
page read and write
14D9D625000
heap
page read and write
49B000418000
trusted library allocation
page read and write
1CACDBCC000
heap
page read and write
2937BFC000
stack
page read and write
17F00442000
trusted library allocation
page read and write
6A66FFE000
stack
page read and write
61C0096C000
trusted library allocation
page read and write
24EEB510000
heap
page readonly
33FC00601000
trusted library allocation
page read and write
23A000F4C000
trusted library allocation
page read and write
1CACDBB8000
heap
page read and write
14D9D62B000
heap
page read and write
23A002176000
trusted library allocation
page read and write
1CACC6DD000
heap
page read and write
1CACC6CC000
heap
page read and write
33FC003C4000
trusted library allocation
page read and write
5BC800230000
direct allocation
page read and write
14E657B3000
unclassified section
page read and write
61C00A04000
trusted library allocation
page read and write
123F1000
trusted library allocation
page read and write
3B0000
heap
page read and write
14D9D4E0000
trusted library allocation
page read and write
1AAD1357000
heap
page read and write
23A00217C000
trusted library allocation
page read and write
23A002043000
trusted library allocation
page read and write
1DC8800D000
unclassified section
page readonly
49B000324000
trusted library allocation
page read and write
23A003408000
trusted library allocation
page read and write
23A000D50000
trusted library allocation
page read and write
1CACC66C000
heap
page read and write
15D0000
trusted library allocation
page read and write
2EB8000D8000
trusted library allocation
page read and write
14D9D62E000
heap
page read and write
23A000C7C000
trusted library allocation
page read and write
1CACDBBE000
heap
page read and write
77C0002BC000
direct allocation
page read and write
23A001F98000
trusted library allocation
page read and write
23A003D3E000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACDBBC000
heap
page read and write
123F8000
trusted library allocation
page read and write
61C002D0000
trusted library allocation
page read and write
14802908000
trusted library allocation
page read and write
23A002118000
trusted library allocation
page read and write
1AAD1387000
heap
page read and write
14D9D62B000
heap
page read and write
148030A4000
trusted library allocation
page read and write
2EB800154000
trusted library allocation
page read and write
23A0022BC000
trusted library allocation
page read and write
447800230000
trusted library allocation
page read and write
1B443000
heap
page read and write
14802D1D000
trusted library allocation
page read and write
182C00254000
trusted library allocation
page read and write
1CACDBE8000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
6A767FE000
unkown
page readonly
7FFD9B9BD000
trusted library allocation
page execute and read and write
3948002D4000
direct allocation
page read and write
1DC84841000
heap
page read and write
23A001878000
trusted library allocation
page read and write
1CACE2C4000
heap
page read and write
14E65929000
unclassified section
page read and write
6A24002E0000
direct allocation
page read and write
B7F6648000
stack
page read and write
2EB8000E0000
trusted library allocation
page read and write
23A000AE4000
trusted library allocation
page read and write
2EE0000
heap
page read and write
31C09FB000
stack
page read and write
76100048C000
trusted library allocation
page read and write
148023C0000
trusted library allocation
page read and write
1CACA3E3000
heap
page read and write
14802DD4000
trusted library allocation
page read and write
23A003D1D000
trusted library allocation
page read and write
23A001BCC000
trusted library allocation
page read and write
1CACDD21000
heap
page read and write
77C000325000
direct allocation
page read and write
1CACC6DE000
heap
page read and write
23A000F1C000
trusted library allocation
page read and write
1CACDCA7000
heap
page read and write
1AAD3186000
heap
page read and write
1CACC7D6000
heap
page read and write
23A0023D0000
trusted library allocation
page read and write
23A002118000
trusted library allocation
page read and write
1CACC691000
heap
page read and write
14802456000
trusted library allocation
page read and write
AF4000
stack
page read and write
76100035C000
trusted library allocation
page read and write
23A002EAD000
trusted library allocation
page read and write
10B0000
heap
page read and write
1CACE1F1000
heap
page read and write
1AAD8302000
heap
page read and write
611400338000
trusted library allocation
page read and write
23A001B44000
trusted library allocation
page read and write
6A71FFE000
stack
page read and write
14E65838000
unclassified section
page read and write
963D9FE000
unkown
page readonly
1CACC69A000
heap
page read and write
14D9D624000
heap
page read and write
23A0033B5000
trusted library allocation
page read and write
23A00060C000
trusted library allocation
page read and write
14E65E59000
unclassified section
page read and write
1CACDBC6000
heap
page read and write
35CC00220000
direct allocation
page read and write
1AAD67D7000
trusted library section
page read and write
761000284000
trusted library allocation
page read and write
1AAD1328000
heap
page read and write
761000300000
trusted library allocation
page read and write
14E6578D000
unclassified section
page read and write
23A000F20000
trusted library allocation
page read and write
23A002188000
trusted library allocation
page read and write
14803198000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A001FBC000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
1CACDCAE000
heap
page read and write
C5800284000
trusted library allocation
page read and write
1CACDF32000
heap
page read and write
23A000C84000
trusted library allocation
page read and write
14802794000
trusted library allocation
page read and write
14E65F0D000
unclassified section
page read and write
1AAD136F000
heap
page read and write
1CACE146000
heap
page read and write
761000214000
trusted library allocation
page read and write
23A001F54000
trusted library allocation
page read and write
148030B0000
trusted library allocation
page read and write
14803EB4000
trusted library allocation
page read and write
4A2C002A8000
trusted library allocation
page read and write
23A0021B4000
trusted library allocation
page read and write
33FC004B9000
trusted library allocation
page read and write
23A0023B0000
trusted library allocation
page read and write
17F004C2000
trusted library allocation
page read and write
1CACDD51000
heap
page read and write
14802FF0000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
33FC004F0000
trusted library allocation
page read and write
14D9D0C0000
unclassified section
page readonly
1800000C000
trusted library allocation
page read and write
C5800244000
trusted library allocation
page read and write
33FC0022A000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1AAD316E000
heap
page read and write
1AAD314B000
heap
page read and write
14802A04000
trusted library allocation
page read and write
4A2C0029C000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
447800418000
trusted library allocation
page read and write
66715FE000
unkown
page readonly
4A2C00288000
trusted library allocation
page read and write
23A002CF0000
trusted library allocation
page read and write
23A0007CC000
trusted library allocation
page read and write
C58002CC000
trusted library allocation
page read and write
23A000B00000
trusted library allocation
page read and write
963D1FC000
stack
page read and write
23A000CF0000
trusted library allocation
page read and write
497C00244000
direct allocation
page read and write
1CACC68D000
heap
page read and write
700C0031C000
trusted library allocation
page read and write
17F00500000
trusted library allocation
page read and write
14E60607000
unclassified section
page read and write
23A000C1B000
trusted library allocation
page read and write
1678002BC000
trusted library allocation
page read and write
6A24002B4000
direct allocation
page read and write
23A0008AF000
trusted library allocation
page read and write
14E61AA1000
unclassified section
page read and write
23A00080C000
trusted library allocation
page read and write
1DC84841000
heap
page read and write
1CACC6DD000
heap
page read and write
1CACE141000
heap
page read and write
23A000824000
trusted library allocation
page read and write
31C79FB000
stack
page read and write
14D9D60A000
heap
page read and write
1CACA3F1000
heap
page read and write
14E658D4000
unclassified section
page read and write
14E20600000
trusted library allocation
page read and write
1CACC6B2000
heap
page read and write
1678002C8000
trusted library allocation
page read and write
1860000
heap
page read and write
1CACDBF6000
heap
page read and write
23A002980000
trusted library allocation
page read and write
1CACDEE6000
heap
page read and write
550000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
1AFE0000
heap
page read and write
401000
unkown
page execute read
23A003D69000
trusted library allocation
page read and write
14E65E8B000
unclassified section
page read and write
1CACDC9D000
heap
page read and write
76100035C000
trusted library allocation
page read and write
2CD76845000
heap
page read and write
1CACDD03000
heap
page read and write
14803058000
trusted library allocation
page read and write
23A000A4C000
trusted library allocation
page read and write
FA0000
heap
page execute and read and write
23A001CDC000
trusted library allocation
page read and write
23A001F24000
trusted library allocation
page read and write
1CACDC4F000
heap
page read and write
950000
trusted library allocation
page read and write
761000264000
trusted library allocation
page read and write
61140020C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A00343C000
trusted library allocation
page read and write
23A00088C000
trusted library allocation
page read and write
23A00040C000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
61C00C8C000
trusted library allocation
page read and write
23A00106C000
trusted library allocation
page read and write
48E000264000
trusted library allocation
page read and write
761000118000
trusted library allocation
page read and write
23A002178000
trusted library allocation
page read and write
1AAD1381000
heap
page read and write
1CACDD06000
heap
page read and write
14800E01000
trusted library allocation
page read and write
23A003D79000
trusted library allocation
page read and write
7610004F8000
trusted library allocation
page read and write
A00000
heap
page read and write
76100040C000
trusted library allocation
page read and write
148031E8000
trusted library allocation
page read and write
1CACE148000
heap
page read and write
1A04002F8000
trusted library allocation
page read and write
76100021C000
trusted library allocation
page read and write
5BC800234000
direct allocation
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
2A3C000
trusted library allocation
page read and write
B7EEBF1000
stack
page read and write
1BBA0000
heap
page execute and read and write
1CACE1BD000
heap
page read and write
1CACC6A0000
heap
page read and write
1CACDCF7000
heap
page read and write
1678002D4000
trusted library allocation
page read and write
4A2C0040C000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
2EB800024000
trusted library allocation
page read and write
23A0033C8000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
5BC800264000
direct allocation
page read and write
1CACC7A0000
heap
page read and write
3EADDFE000
unkown
page readonly
23A000BB8000
trusted library allocation
page read and write
148030A4000
trusted library allocation
page read and write
2EB800070000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A002568000
trusted library allocation
page read and write
23A000D68000
trusted library allocation
page read and write
4A2C0027C000
trusted library allocation
page read and write
1BD7E000
stack
page read and write
17F00882000
trusted library allocation
page read and write
23A001F5C000
trusted library allocation
page read and write
1AAD316E000
heap
page read and write
761000300000
trusted library allocation
page read and write
CA5000
heap
page read and write
61C00360000
trusted library allocation
page read and write
14803C0C000
trusted library allocation
page read and write
23A001BF4000
trusted library allocation
page read and write
761000240000
trusted library allocation
page read and write
12713000
trusted library allocation
page read and write
1CACDB7F000
heap
page read and write
2EB800038000
trusted library allocation
page read and write
B7F67AE000
stack
page read and write
1CACE1DC000
heap
page read and write
61C00C0C000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
1AAD132F000
heap
page read and write
E12F7FE000
stack
page read and write
1CACDB97000
heap
page read and write
4A2C0025C000
trusted library allocation
page read and write
23A000A0C000
trusted library allocation
page read and write
BD0000
heap
page read and write
1CACDD09000
heap
page read and write
14803218000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
6A77FFE000
stack
page read and write
21986AF0000
heap
page read and write
23A002255000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
77C0002F0000
direct allocation
page read and write
14D9D624000
heap
page read and write
23A001E0C000
trusted library allocation
page read and write
23A0008AF000
trusted library allocation
page read and write
2CD767D0000
heap
page read and write
48E000230000
trusted library allocation
page read and write
17F00040000
trusted library allocation
page readonly
23A003C1C000
trusted library allocation
page read and write
23A0019DC000
trusted library allocation
page read and write
A40000
heap
page read and write
33FC002B0000
trusted library allocation
page read and write
61140032C000
trusted library allocation
page read and write
23A0022D8000
trusted library allocation
page read and write
B7F0E2E000
stack
page read and write
1379000
heap
page read and write
23A000B30000
trusted library allocation
page read and write
1CACE30E000
heap
page read and write
61C01404000
trusted library allocation
page read and write
23A003422000
trusted library allocation
page read and write
23A002170000
trusted library allocation
page read and write
14800001000
trusted library allocation
page read and write
23A002175000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
33FC00420000
trusted library allocation
page read and write
14D9D659000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
23A000C04000
trusted library allocation
page read and write
14E65765000
unclassified section
page read and write
1DC81A20000
heap
page read and write
23A0002CC000
trusted library allocation
page read and write
1AAD6780000
unkown
page readonly
76100038C000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1CACC598000
heap
page read and write
1CACC6CC000
heap
page read and write
1CACDE3E000
heap
page read and write
14E65E31000
unclassified section
page read and write
4A2C0032C000
trusted library allocation
page read and write
1CACE2C2000
heap
page read and write
B7EEB38000
stack
page read and write
14D9D1CA000
unclassified section
page read and write
7FFD9B984000
trusted library allocation
page read and write
1AAD12BC000
heap
page read and write
77C000314000
direct allocation
page read and write
23A000CE0000
trusted library allocation
page read and write
1AAD316E000
heap
page read and write
14E66438000
unclassified section
page read and write
33FC00418000
trusted library allocation
page read and write
33FC004A8000
trusted library allocation
page read and write
761000138000
trusted library allocation
page read and write
1CACE5E5000
heap
page read and write
1CACDD02000
heap
page read and write
23A002E9F000
trusted library allocation
page read and write
1370000
heap
page read and write
14803034000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
14E65E60000
unclassified section
page read and write
2CD76858000
heap
page read and write
49B000274000
trusted library allocation
page read and write
23A0003C4000
trusted library allocation
page read and write
14E66450000
unclassified section
page read and write
23A0023D0000
trusted library allocation
page read and write
CB2000
heap
page read and write
14802488000
trusted library allocation
page read and write
6A2400234000
direct allocation
page read and write
1480226B000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
14802314000
trusted library allocation
page read and write
14803290000
trusted library allocation
page read and write
14E6576C000
unclassified section
page read and write
6A2400264000
direct allocation
page read and write
1AAD132F000
heap
page read and write
23A0020B0000
trusted library allocation
page read and write
1480307C000
trusted library allocation
page read and write
C70000
heap
page read and write
1CACC78E000
heap
page read and write
14DE0600000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
14E6591D000
unclassified section
page read and write
35CC00298000
direct allocation
page read and write
77C000294000
direct allocation
page read and write
761000300000
trusted library allocation
page read and write
1D9B8800000
heap
page read and write
14E658FC000
unclassified section
page read and write
1CACE191000
heap
page read and write
1CACE162000
heap
page read and write
6A69FFE000
stack
page read and write
1A04002A0000
trusted library allocation
page read and write
1CACDC93000
heap
page read and write
14E60862000
trusted library allocation
page read and write
1CACE323000
heap
page read and write
23A002B8C000
trusted library allocation
page read and write
1FBE20B0000
heap
page read and write
761000178000
trusted library allocation
page read and write
B7F664C000
stack
page read and write
148028C4000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A000834000
trusted library allocation
page read and write
23A00342E000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
61C00980000
trusted library allocation
page read and write
23A003401000
trusted library allocation
page read and write
700C00254000
trusted library allocation
page read and write
23A001F6C000
trusted library allocation
page read and write
1CACDBBC000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
1FBE2170000
heap
page read and write
1CACDC74000
heap
page read and write
1CACC72D000
heap
page read and write
B7F6448000
stack
page read and write
1AEAD000
stack
page read and write
23A0018AC000
trusted library allocation
page read and write
23A0009B6000
trusted library allocation
page read and write
14E65767000
unclassified section
page read and write
23A002B0B000
trusted library allocation
page read and write
447800334000
trusted library allocation
page read and write
23A003CC3000
trusted library allocation
page read and write
14E6566C000
unclassified section
page read and write
1CACE5E1000
heap
page read and write
1480307C000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
7610000B8000
trusted library allocation
page read and write
23A000C0C000
trusted library allocation
page read and write
9B8000
heap
page read and write
1AAD1333000
heap
page read and write
31CD1FE000
unkown
page readonly
76100044E000
trusted library allocation
page read and write
23A001F5C000
trusted library allocation
page read and write
23A0021AC000
trusted library allocation
page read and write
1AAD3002000
heap
page read and write
B7F6671000
stack
page read and write
6A6EFFB000
stack
page read and write
2EB8000C8000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
6A2400250000
direct allocation
page read and write
7FF7888A0000
unkown
page readonly
33FC0012C000
trusted library allocation
page read and write
14DA0610000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
33FC002BC000
trusted library allocation
page read and write
23A0021A4000
trusted library allocation
page read and write
148032AC000
trusted library allocation
page read and write
23A0020C0000
trusted library allocation
page read and write
148032E0000
trusted library allocation
page read and write
761000284000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
96301FD000
stack
page read and write
1CACDCBA000
heap
page read and write
271F000
trusted library allocation
page read and write
23A0033CD000
trusted library allocation
page read and write
23A003CC1000
trusted library allocation
page read and write
23A001F3C000
trusted library allocation
page read and write
1CACE032000
heap
page read and write
497C00254000
direct allocation
page read and write
23A0020B8000
trusted library allocation
page read and write
33FC000CC000
trusted library allocation
page read and write
14D9D180000
unclassified section
page readonly
1CACE331000
heap
page read and write
1AAD3DED000
unkown
page read and write
1AAD3181000
heap
page read and write
1CACC691000
heap
page read and write
33FC00148000
trusted library allocation
page read and write
14803034000
trusted library allocation
page read and write
17F00A82000
trusted library allocation
page read and write
61C0023C000
trusted library allocation
page read and write
2EB800170000
trusted library allocation
page read and write
23A002176000
trusted library allocation
page read and write
23A001F2C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
49B000334000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
23A002568000
trusted library allocation
page read and write
1AAD1327000
heap
page read and write
33FC0014D000
trusted library allocation
page read and write
23A000BE4000
trusted library allocation
page read and write
1CACA48D000
heap
page read and write
7610000E8000
trusted library allocation
page read and write
B6D000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
23A003CBE000
trusted library allocation
page read and write
14E65687000
unclassified section
page read and write
666DDFB000
stack
page read and write
1CACA3EF000
heap
page read and write
148028C4000
trusted library allocation
page read and write
17F00A40000
trusted library allocation
page read and write
33FC00220000
trusted library allocation
page read and write
1CACE5F9000
heap
page read and write
14E619A0000
unclassified section
page read and write
23A003CC8000
trusted library allocation
page read and write
23A001830000
trusted library allocation
page read and write
14E6060D000
unclassified section
page read and write
1CACDE03000
heap
page read and write
E1307FE000
stack
page read and write
1CACC72D000
heap
page read and write
1480360C000
trusted library allocation
page read and write
447800344000
trusted library allocation
page read and write
1CACDCBA000
heap
page read and write
24EEFFB0000
unkown
page readonly
B2C000
heap
page read and write
14802C30000
trusted library allocation
page read and write
14802664000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
9EE000
heap
page read and write
E12CFFE000
unkown
page readonly
23A000D26000
trusted library allocation
page read and write
6A24002E8000
direct allocation
page read and write
1AAD1328000
heap
page read and write
6A24002C4000
direct allocation
page read and write
761000371000
trusted library allocation
page read and write
611400338000
trusted library allocation
page read and write
1CACE151000
heap
page read and write
1CACDC9D000
heap
page read and write
23A001EB4000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
E12A7FE000
stack
page read and write
14E6581B000
unclassified section
page read and write
1480286C000
trusted library allocation
page read and write
182C00244000
trusted library allocation
page read and write
61C00884000
trusted library allocation
page read and write
1CACE2E3000
heap
page read and write
14E65EBF000
unclassified section
page read and write
1CACC677000
heap
page read and write
23A002171000
trusted library allocation
page read and write
1CACDB9E000
heap
page read and write
23A000330000
trusted library allocation
page read and write
1AAD1333000
heap
page read and write
23A003D18000
trusted library allocation
page read and write
61C0036C000
trusted library allocation
page read and write
12968000
trusted library allocation
page read and write
23A003D37000
trusted library allocation
page read and write
1CACC6AC000
heap
page read and write
17F00542000
trusted library allocation
page read and write
23A001918000
trusted library allocation
page read and write
1CACC5BD000
heap
page read and write
23A000824000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACC71C000
heap
page read and write
23A002BB4000
trusted library allocation
page read and write
700C002A8000
trusted library allocation
page read and write
31C89FC000
stack
page read and write
23A002118000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1DC84821000
heap
page read and write
23A000B60000
trusted library allocation
page read and write
1CACE4C8000
heap
page read and write
76100044E000
trusted library allocation
page read and write
33FC003B4000
trusted library allocation
page read and write
14D9D22A000
heap
page read and write
61C00237000
trusted library allocation
page read and write
1480244C000
trusted library allocation
page read and write
23A001F78000
trusted library allocation
page read and write
23A000A94000
trusted library allocation
page read and write
1CACC69C000
heap
page read and write
148027A4000
trusted library allocation
page read and write
61C00408000
trusted library allocation
page read and write
23A001928000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
148028CC000
trusted library allocation
page read and write
61C00354000
trusted library allocation
page read and write
23A0008AD000
trusted library allocation
page read and write
33FC0046C000
trusted library allocation
page read and write
14D9D625000
heap
page read and write
1CACC69E000
heap
page read and write
B7F65FF000
stack
page read and write
17F00A42000
trusted library allocation
page read and write
23A002120000
trusted library allocation
page read and write
23A0020C6000
trusted library allocation
page read and write
14802F68000
trusted library allocation
page read and write
23A000B40000
trusted library allocation
page read and write
23A001898000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
4A2C002BC000
trusted library allocation
page read and write
23A001858000
trusted library allocation
page read and write
33FC003C8000
trusted library allocation
page read and write
761000108000
trusted library allocation
page read and write
1480245C000
trusted library allocation
page read and write
10EC002C4000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1AAD1340000
heap
page read and write
1480220C000
trusted library allocation
page read and write
14E6566F000
unclassified section
page read and write
5BC800254000
direct allocation
page read and write
14803150000
trusted library allocation
page read and write
2EB80001C000
trusted library allocation
page read and write
1AAD129E000
heap
page read and write
14803401000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
1CACC72D000
heap
page read and write
23A00224C000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
23A0020D7000
trusted library allocation
page read and write
1CACC71F000
heap
page read and write
23A003CE4000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A0003D4000
trusted library allocation
page read and write
14E6582C000
unclassified section
page read and write
1AAD1200000
heap
page read and write
14D9D624000
heap
page read and write
1CACC6CC000
heap
page read and write
88E000
stack
page read and write
23A000788000
trusted library allocation
page read and write
1D0000
heap
page read and write
1CACC6AC000
heap
page read and write
14803358000
trusted library allocation
page read and write
1AAD12EE000
heap
page read and write
1CACC681000
heap
page read and write
14803B2C000
trusted library allocation
page read and write
1480389C000
trusted library allocation
page read and write
23A000624000
trusted library allocation
page read and write
14E6591B000
unclassified section
page read and write
14D9D60A000
heap
page read and write
23A00089C000
trusted library allocation
page read and write
77C0002CC000
direct allocation
page read and write
76100048C000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
148023DC000
trusted library allocation
page read and write
33FC00449000
trusted library allocation
page read and write
1480244C000
trusted library allocation
page read and write
33FC004BE000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1CACDBC2000
heap
page read and write
61C00924000
trusted library allocation
page read and write
14803D68000
trusted library allocation
page read and write
1FBE222B000
heap
page read and write
C8D000
heap
page read and write
7B0000
heap
page read and write
14800132000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
3C34002B0000
trusted library allocation
page read and write
14D9D190000
heap
page read and write
1AAD132E000
heap
page read and write
5BC800288000
direct allocation
page read and write
10EC002C8000
trusted library allocation
page read and write
14803B2C000
trusted library allocation
page read and write
1CACA406000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
2CD04A02000
heap
page read and write
14803DDC000
trusted library allocation
page read and write
23A003D35000
trusted library allocation
page read and write
49B00030C000
trusted library allocation
page read and write
23A000F6C000
trusted library allocation
page read and write
2EB800001000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A002DD8000
trusted library allocation
page read and write
14E6576A000
unclassified section
page read and write
31D19FB000
stack
page read and write
76100044E000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1B5AD000
stack
page read and write
1CACA440000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
1CACC612000
heap
page read and write
1AAD3167000
heap
page read and write
14E65ED2000
unclassified section
page read and write
14D9D666000
heap
page read and write
6A74FFE000
stack
page read and write
33FC00120000
trusted library allocation
page read and write
A37000
heap
page read and write
1D9B8A00000
heap
page read and write
2CD7689F000
heap
page read and write
76100048C000
trusted library allocation
page read and write
1CACDB6A000
heap
page read and write
23A00218C000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
1CACE34B000
heap
page read and write
1320000
heap
page read and write
1CACDBB6000
heap
page read and write
23A002A0C000
trusted library allocation
page read and write
1AAD8302000
heap
page read and write
B7EEB77000
stack
page read and write
49B0002D4000
trusted library allocation
page read and write
148033C4000
trusted library allocation
page read and write
1B9FD000
heap
page read and write
761000300000
trusted library allocation
page read and write
761000318000
trusted library allocation
page read and write
C5800230000
trusted library allocation
page read and write
23A001CA4000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14802C0C000
trusted library allocation
page read and write
1CACC616000
heap
page read and write
761000250000
trusted library allocation
page read and write
1CACA455000
heap
page read and write
700C002B8000
trusted library allocation
page read and write
14802F74000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
14802900000
trusted library allocation
page read and write
14802254000
trusted library allocation
page read and write
148023B4000
trusted library allocation
page read and write
1CACDCAE000
heap
page read and write
148029D4000
trusted library allocation
page read and write
23A002078000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
1AAD136F000
heap
page read and write
61C00354000
trusted library allocation
page read and write
14E65EC6000
unclassified section
page read and write
17F00A82000
trusted library allocation
page read and write
3FDC0001C000
trusted library allocation
page read and write
8F0000
heap
page read and write
23A001BB4000
trusted library allocation
page read and write
23A000D1A000
trusted library allocation
page read and write
1CACE3D5000
heap
page read and write
14E6585B000
unclassified section
page read and write
23A002BA8000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
49B0002A0000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
61C00918000
trusted library allocation
page read and write
7DF4CDDA1000
trusted library allocation
page execute read
23A002E93000
trusted library allocation
page read and write
96361FD000
stack
page read and write
31DA1FE000
unkown
page readonly
23A0003E8000
trusted library allocation
page read and write
1CACDC68000
heap
page read and write
23A001C44000
trusted library allocation
page read and write
31CB9FD000
stack
page read and write
3C3400248000
trusted library allocation
page read and write
31BD9FD000
stack
page read and write
15B0000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
182C00201000
trusted library allocation
page read and write
14E60832000
trusted library allocation
page read and write
23A003443000
trusted library allocation
page read and write
23A00343E000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
1CACDC93000
heap
page read and write
497C00284000
direct allocation
page read and write
1CACE339000
heap
page read and write
1CACE2A7000
heap
page read and write
23A003CE9000
trusted library allocation
page read and write
23A003429000
trusted library allocation
page read and write
148031DC000
trusted library allocation
page read and write
23A002D5D000
trusted library allocation
page read and write
14E65881000
unclassified section
page read and write
23A000D74000
trusted library allocation
page read and write
447800334000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
23A002176000
trusted library allocation
page read and write
1DC81C02000
heap
page read and write
23A003D3C000
trusted library allocation
page read and write
2CD76861000
heap
page read and write
23A001FA0000
trusted library allocation
page read and write
14E655B0000
unclassified section
page read and write
23A0003D0000
trusted library allocation
page read and write
14E60C4A000
unclassified section
page read and write
31CE9FD000
stack
page read and write
45B000
unkown
page readonly
33FC001A0000
trusted library allocation
page read and write
23A00080C000
trusted library allocation
page read and write
5BC8002C4000
direct allocation
page read and write
1CACA428000
heap
page read and write
23A001D54000
trusted library allocation
page read and write
23A003CD1000
trusted library allocation
page read and write
14802C4E000
trusted library allocation
page read and write
1CACE2AF000
heap
page read and write
23A0020C8000
trusted library allocation
page read and write
761000228000
trusted library allocation
page read and write
1CACDCF5000
heap
page read and write
C40000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
1CACE32B000
heap
page read and write
C5800260000
trusted library allocation
page read and write
148030B0000
trusted library allocation
page read and write
96331F5000
stack
page read and write
23A002E98000
trusted library allocation
page read and write
23A003D70000
trusted library allocation
page read and write
14802DAC000
trusted library allocation
page read and write
23A000818000
trusted library allocation
page read and write
1DC81A00000
unclassified section
page readonly
1CACDBD9000
heap
page read and write
17F00500000
trusted library allocation
page read and write
23A0010CC000
trusted library allocation
page read and write
2CD768B3000
heap
page read and write
1CACE333000
heap
page read and write
14E6588D000
unclassified section
page read and write
700C0040C000
trusted library allocation
page read and write
14803380000
trusted library allocation
page read and write
33FC00401000
trusted library allocation
page read and write
14802F3C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
77C00033C000
direct allocation
page read and write
61C0033C000
trusted library allocation
page read and write
33FC003B4000
trusted library allocation
page read and write
14803CAC000
trusted library allocation
page read and write
14803508000
trusted library allocation
page read and write
C70000
heap
page read and write
3C340020C000
trusted library allocation
page read and write
182C00250000
trusted library allocation
page read and write
23A000D50000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
1CACDCC6000
heap
page read and write
17F00A82000
trusted library allocation
page read and write
1CACA422000
heap
page read and write
1CACC691000
heap
page read and write
1CACE1B3000
heap
page read and write
61C00C8C000
trusted library allocation
page read and write
B7F659C000
stack
page read and write
76100048C000
trusted library allocation
page read and write
4478003A1000
trusted library allocation
page read and write
1AAD316E000
heap
page read and write
77C00032E000
direct allocation
page read and write
1CACC716000
heap
page read and write
23A000770000
trusted library allocation
page read and write
1B630000
heap
page execute and read and write
182C00280000
trusted library allocation
page read and write
1A0400268000
trusted library allocation
page read and write
1CACE210000
heap
page read and write
61C0031C000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
23A000BA8000
trusted library allocation
page read and write
14E62B01000
unclassified section
page read and write
23A000AC3000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
C89000
heap
page read and write
1CACDEDA000
heap
page read and write
761000238000
trusted library allocation
page read and write
447800310000
trusted library allocation
page read and write
14802C24000
trusted library allocation
page read and write
14802450000
trusted library allocation
page read and write
669000244000
trusted library allocation
page read and write
761000264000
trusted library allocation
page read and write
23A001EE8000
trusted library allocation
page read and write
24EEB640000
heap
page read and write
23A001CCC000
trusted library allocation
page read and write
761000284000
trusted library allocation
page read and write
76100035C000
trusted library allocation
page read and write
14802F48000
trusted library allocation
page read and write
61C008FC000
trusted library allocation
page read and write
33FC004D2000
trusted library allocation
page read and write
1CACA3F8000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
23A001860000
trusted library allocation
page read and write
23A000818000
trusted library allocation
page read and write
2CD7687C000
heap
page read and write
761000270000
trusted library allocation
page read and write
6114002A8000
trusted library allocation
page read and write
669000201000
trusted library allocation
page read and write
2B0E000
stack
page read and write
23A000B88000
trusted library allocation
page read and write
9EC000
heap
page read and write
1CACE15B000
heap
page read and write
1CACA455000
heap
page read and write
761000504000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
76100048C000
trusted library allocation
page read and write
7FF789226000
unkown
page read and write
1AAD2FF0000
trusted library section
page readonly
2CD76AF0000
heap
page read and write
700C00300000
trusted library allocation
page read and write
1CACE17E000
heap
page read and write
23A000330000
trusted library allocation
page read and write
182C002B4000
trusted library allocation
page read and write
31C39FB000
stack
page read and write
23A001EFC000
trusted library allocation
page read and write
14E654CC000
unclassified section
page read and write
23A002E83000
trusted library allocation
page read and write
167800201000
trusted library allocation
page read and write
61C00294000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
14E654B4000
unclassified section
page read and write
33FC00278000
trusted library allocation
page read and write
1CACDB3D000
heap
page read and write
1CACA3D9000
heap
page read and write
1CACDCB2000
heap
page read and write
1CACC798000
heap
page read and write
23A002DF0000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
23A002CCF000
trusted library allocation
page read and write
1CACDCDF000
heap
page read and write
700C00250000
trusted library allocation
page read and write
23A0003DC000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
14803040000
trusted library allocation
page read and write
31D79FD000
stack
page read and write
61C0077C000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1DC87900000
unclassified section
page readonly
14D9D66E000
heap
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
7610003BC000
trusted library allocation
page read and write
10EC002C4000
trusted library allocation
page read and write
2EB8000E8000
trusted library allocation
page read and write
23A0020B0000
trusted library allocation
page read and write
14E6586C000
unclassified section
page read and write
3C3400230000
trusted library allocation
page read and write
10EC002B8000
trusted library allocation
page read and write
14E61F7A000
unclassified section
page read and write
76100015C000
trusted library allocation
page read and write
761000514000
trusted library allocation
page read and write
1678002D4000
trusted library allocation
page read and write
23A001C24000
trusted library allocation
page read and write
6690002B4000
trusted library allocation
page read and write
14803A9C000
trusted library allocation
page read and write
49B000338000
trusted library allocation
page read and write
31C61FE000
unkown
page readonly
12A38000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1CACA43C000
heap
page read and write
148031C8000
trusted library allocation
page read and write
1AAD1379000
heap
page read and write
1DC81770000
heap
page read and write
B7F7A85000
stack
page read and write
23A00346E000
trusted library allocation
page read and write
14802E2C000
trusted library allocation
page read and write
1A04002C0000
trusted library allocation
page read and write
23A003D0A000
trusted library allocation
page read and write
2CD768F1000
heap
page read and write
1CACDD06000
heap
page read and write
1CACDF0D000
heap
page read and write
156E000
stack
page read and write
14800F96000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
14803E01000
trusted library allocation
page read and write
17F00942000
trusted library allocation
page read and write
1AAD315C000
heap
page read and write
1678002D4000
trusted library allocation
page read and write
14802958000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
14E65937000
unclassified section
page read and write
14E656B9000
unclassified section
page read and write
2EB800028000
trusted library allocation
page read and write
1CACC616000
heap
page read and write
76100040C000
trusted library allocation
page read and write
23A002CCA000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
1CACE34B000
heap
page read and write
13093000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACE2FF000
heap
page read and write
1DC84737000
unclassified section
page read and write
23A001D24000
trusted library allocation
page read and write
23A002A5C000
trusted library allocation
page read and write
1CACE205000
heap
page read and write
23A00089F000
trusted library allocation
page read and write
23A000A0C000
trusted library allocation
page read and write
1CACC70A000
heap
page read and write
14803D74000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
23A002E0A000
trusted library allocation
page read and write
23A002E85000
trusted library allocation
page read and write
1AEB0000
heap
page execute and read and write
761000371000
trusted library allocation
page read and write
6A707FE000
unkown
page readonly
1AAD1213000
heap
page read and write
1B93D000
stack
page read and write
761000254000
trusted library allocation
page read and write
14802801000
trusted library allocation
page read and write
14803070000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A0033A7000
trusted library allocation
page read and write
14803490000
trusted library allocation
page read and write
61C00754000
trusted library allocation
page read and write
33FC00464000
trusted library allocation
page read and write
1DC848D6000
heap
page read and write
1CACE34B000
heap
page read and write
61C00348000
trusted library allocation
page read and write
33FC0036C000
trusted library allocation
page read and write
23A000C94000
trusted library allocation
page read and write
148023C5000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
33FC004CD000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
14D9D627000
heap
page read and write
14D9D0D0000
heap
page read and write
14803308000
trusted library allocation
page read and write
2F80000
heap
page execute and read and write
23A002344000
trusted library allocation
page read and write
23A001204000
trusted library allocation
page read and write
988000
unkown
page readonly
23A000328000
trusted library allocation
page read and write
14802418000
trusted library allocation
page read and write
1AAD8D99000
unclassified section
page read and write
23A00225A000
trusted library allocation
page read and write
1AAD1389000
heap
page read and write
49B00020C000
trusted library allocation
page read and write
14802FD8000
trusted library allocation
page read and write
1CACA390000
heap
page read and write
23A0008AD000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A001C94000
trusted library allocation
page read and write
1CACDCB2000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
2CD76873000
heap
page read and write
76100001C000
trusted library allocation
page read and write
23A003D5F000
trusted library allocation
page read and write
23A003CC6000
trusted library allocation
page read and write
7610001E8000
trusted library allocation
page read and write
2939BFC000
stack
page read and write
1AAD2FC0000
trusted library allocation
page read and write
23A000CC0000
trusted library allocation
page read and write
77C0002D4000
direct allocation
page read and write
23A001DCC000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1CACE140000
heap
page read and write
23A001F54000
trusted library allocation
page read and write
14E658B3000
unclassified section
page read and write
77C00030F000
direct allocation
page read and write
611400270000
trusted library allocation
page read and write
61C00918000
trusted library allocation
page read and write
23A0008AD000
trusted library allocation
page read and write
4A2C002E0000
trusted library allocation
page read and write
1FBE2213000
heap
page read and write
1480221C000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
23A002074000
trusted library allocation
page read and write
C58002A4000
trusted library allocation
page read and write
23A0020A0000
trusted library allocation
page read and write
611400408000
trusted library allocation
page read and write
1CACE4C7000
heap
page read and write
14802601000
trusted library allocation
page read and write
B7F6634000
stack
page read and write
296C000
trusted library allocation
page read and write
35CC002C8000
direct allocation
page read and write
14D9D624000
heap
page read and write
253C000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1CACDCB2000
heap
page read and write
14E62170000
unclassified section
page read and write
23A0021D8000
trusted library allocation
page read and write
148030F8000
trusted library allocation
page read and write
1C17A000
stack
page read and write
14DA0600000
trusted library allocation
page read and write
96339FE000
unkown
page readonly
23A001D34000
trusted library allocation
page read and write
2520000
heap
page execute and read and write
666FDFE000
stack
page read and write
23A001F48000
trusted library allocation
page read and write
23A001BA4000
trusted library allocation
page read and write
1CACDCC6000
heap
page read and write
14D9D60A000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
669000230000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1CACE23B000
heap
page read and write
14802C78000
trusted library allocation
page read and write
1CACE1E9000
heap
page read and write
7FF488B50000
trusted library allocation
page execute and read and write
14D9D609000
heap
page read and write
14802398000
trusted library allocation
page read and write
14802C24000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
1CACDD97000
heap
page read and write
61C00230000
trusted library allocation
page read and write
1480244C000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
76100030C000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
1CACC6AC000
heap
page read and write
7610002F4000
trusted library allocation
page read and write
1DC84892000
heap
page read and write
23A0033BA000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14D9D62B000
heap
page read and write
76100048C000
trusted library allocation
page read and write
C5800274000
trusted library allocation
page read and write
23A00080C000
trusted library allocation
page read and write
1CACA41A000
heap
page read and write
1CACDE93000
heap
page read and write
33FC00118000
trusted library allocation
page read and write
1CACC691000
heap
page read and write
17F00502000
trusted library allocation
page read and write
14803358000
trusted library allocation
page read and write
61C01204000
trusted library allocation
page read and write
14803028000
trusted library allocation
page read and write
17F00A40000
trusted library allocation
page read and write
23A001F5C000
trusted library allocation
page read and write
1DC848CB000
heap
page read and write
23A00220C000
trusted library allocation
page read and write
14E654A9000
unclassified section
page read and write
B4F000
stack
page read and write
1A0400220000
trusted library allocation
page read and write
23A000B24000
trusted library allocation
page read and write
17F00902000
trusted library allocation
page read and write
23A00231B000
trusted library allocation
page read and write
1CACC7D4000
heap
page read and write
1480293C000
trusted library allocation
page read and write
1CACDF1E000
heap
page read and write
14802D1B000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
31B91FE000
unkown
page readonly
33FC000E0000
trusted library allocation
page read and write
1CACDC9D000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
1CACC624000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1FBE221B000
heap
page read and write
1CACDB7F000
heap
page read and write
23A002248000
trusted library allocation
page read and write
23A001EE8000
trusted library allocation
page read and write
2C0F000
stack
page read and write
14E65E6A000
unclassified section
page read and write
1CACC6EA000
heap
page read and write
1CACC68D000
heap
page read and write
C70000
heap
page read and write
FC5000
heap
page read and write
6A2400244000
direct allocation
page read and write
7D0000
heap
page read and write
1CACE209000
heap
page read and write
5BC800244000
direct allocation
page read and write
761000178000
trusted library allocation
page read and write
761000201000
trusted library allocation
page read and write
148005C4000
trusted library allocation
page read and write
497C00294000
direct allocation
page read and write
33FC00508000
trusted library allocation
page read and write
23A000C8E000
trusted library allocation
page read and write
7FFD9BB62000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
17F000C2000
trusted library allocation
page read and write
2CD76859000
heap
page read and write
930000
trusted library allocation
page read and write
23A00207C000
trusted library allocation
page read and write
14E658DB000
unclassified section
page read and write
CD8000
heap
page read and write
761000293000
trusted library allocation
page read and write
1CACA412000
heap
page read and write
12961000
trusted library allocation
page read and write
23A0033B0000
trusted library allocation
page read and write
17F00502000
trusted library allocation
page read and write
148028F0000
trusted library allocation
page read and write
14E657A0000
unclassified section
page read and write
14E63100000
unclassified section
page read and write
15C0000
trusted library allocation
page read and write
23A003CCA000
trusted library allocation
page read and write
4A2C0024C000
trusted library allocation
page read and write
23A002179000
trusted library allocation
page read and write
1CACDBB8000
heap
page read and write
1FBE2302000
heap
page read and write
44780024C000
trusted library allocation
page read and write
2CD7687C000
heap
page read and write
23A000F7C000
trusted library allocation
page read and write
23A000D4A000
trusted library allocation
page read and write
1480225A000
trusted library allocation
page read and write
33FC002BC000
trusted library allocation
page read and write
23A0009EC000
trusted library allocation
page read and write
611400244000
trusted library allocation
page read and write
12718000
trusted library allocation
page read and write
1CACE341000
heap
page read and write
CA8000
heap
page read and write
497C00408000
direct allocation
page read and write
14E65E44000
unclassified section
page read and write
1480260C000
trusted library allocation
page read and write
148029F4000
trusted library allocation
page read and write
1CACA483000
heap
page read and write
23A0033F5000
trusted library allocation
page read and write
14E65E57000
unclassified section
page read and write
9B0000
heap
page read and write
14D9D609000
heap
page read and write
1CACDCBA000
heap
page read and write
33FC00384000
trusted library allocation
page read and write
14E65EF8000
unclassified section
page read and write
1CACC73D000
heap
page read and write
23A00219B000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
1DC84861000
heap
page read and write
1CACC6E0000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
33FC001E5000
trusted library allocation
page read and write
E12C7FE000
stack
page read and write
77C00032C000
direct allocation
page read and write
14802794000
trusted library allocation
page read and write
23A003D7E000
trusted library allocation
page read and write
1CACA430000
heap
page read and write
14D9D662000
heap
page read and write
61C0093C000
trusted library allocation
page read and write
1AAD1327000
heap
page read and write
1CACDC7E000
heap
page read and write
23A000D14000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1CACE5EB000
heap
page read and write
23A003D01000
trusted library allocation
page read and write
1DC8486B000
heap
page read and write
14E65EF3000
unclassified section
page read and write
1CACE34B000
heap
page read and write
1CACC7A0000
heap
page read and write
1CACC7B7000
heap
page read and write
14E65841000
unclassified section
page read and write
23A000F64000
trusted library allocation
page read and write
14E655F3000
unclassified section
page read and write
1C470000
heap
page read and write
23A00074C000
trusted library allocation
page read and write
761000339000
trusted library allocation
page read and write
3EACDFE000
unkown
page readonly
76100048C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A002DCF000
trusted library allocation
page read and write
1CACC6AA000
heap
page read and write
33FC004A8000
trusted library allocation
page read and write
1AAD12B7000
heap
page read and write
23A001DD4000
trusted library allocation
page read and write
14D9D628000
heap
page read and write
1DC87AC0000
unclassified section
page readonly
23A00208C000
trusted library allocation
page read and write
1CACE1B5000
heap
page read and write
14E65613000
unclassified section
page read and write
14D9D62B000
heap
page read and write
7610002F4000
trusted library allocation
page read and write
10EC002B8000
trusted library allocation
page read and write
1CACA41C000
heap
page read and write
61C00D0C000
trusted library allocation
page read and write
23A00208C000
trusted library allocation
page read and write
1AAD8C09000
unkown
page readonly
1CACC670000
heap
page read and write
76100048C000
trusted library allocation
page read and write
23A001EF0000
trusted library allocation
page read and write
1AAD11D0000
heap
page read and write
23A0019F4000
trusted library allocation
page read and write
308F000
stack
page read and write
14D9D626000
heap
page read and write
14803E80000
trusted library allocation
page read and write
23A002C04000
trusted library allocation
page read and write
1AAD8622000
trusted library allocation
page read and write
1CACDC9D000
heap
page read and write
23A003396000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACA440000
heap
page read and write
23A000A18000
trusted library allocation
page read and write
1CACC6C4000
heap
page read and write
23A001B74000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
1DC818F8000
heap
page read and write
14D9D62B000
heap
page read and write
23A000A0C000
trusted library allocation
page read and write
1CACC6B0000
heap
page read and write
48E00028C000
trusted library allocation
page read and write
14803140000
trusted library allocation
page read and write
14E621F0000
unclassified section
page read and write
1CACC4C1000
heap
page read and write
1AAD1329000
heap
page read and write
148024CC000
trusted library allocation
page read and write
447000
unkown
page readonly
23A000B00000
trusted library allocation
page read and write
23A002458000
trusted library allocation
page read and write
500000
heap
page read and write
761000284000
trusted library allocation
page read and write
49B000250000
trusted library allocation
page read and write
7FFD9B9A1000
trusted library allocation
page read and write
23A000D50000
trusted library allocation
page read and write
23A002188000
trusted library allocation
page read and write
14E65461000
unclassified section
page read and write
14802E01000
trusted library allocation
page read and write
14800930000
trusted library allocation
page read and write
FDE000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
23A0020B8000
trusted library allocation
page read and write
14803580000
trusted library allocation
page read and write
61C00958000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
23A00078C000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
1CACA401000
heap
page read and write
6114002E8000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
6671DFE000
stack
page read and write
1AAD8C0D000
unkown
page readonly
44780026C000
trusted library allocation
page read and write
14802764000
trusted library allocation
page read and write
23A000A6C000
trusted library allocation
page read and write
3FDC000B8000
trusted library allocation
page read and write
1CACE539000
heap
page read and write
23A001930000
trusted library allocation
page read and write
1CACC72D000
heap
page read and write
77C00035F000
direct allocation
page read and write
1CACDB6D000
heap
page read and write
14D9D62B000
heap
page read and write
7FFD9BB42000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
1CACA3DF000
heap
page read and write
17F00582000
trusted library allocation
page read and write
23A002308000
trusted library allocation
page read and write
1DC81902000
heap
page read and write
14802C24000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1CACBD83000
heap
page read and write
77C000264000
direct allocation
page read and write
61C0032C000
trusted library allocation
page read and write
3EAA5FE000
stack
page read and write
2EB800080000
trusted library allocation
page read and write
700C00244000
trusted library allocation
page read and write
1CACC66C000
heap
page read and write
7610000A6000
trusted library allocation
page read and write
61C00254000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
23A0006AC000
trusted library allocation
page read and write
2A80000
heap
page read and write
23A003CD4000
trusted library allocation
page read and write
1480250C000
trusted library allocation
page read and write
14803434000
trusted library allocation
page read and write
14E6568A000
unclassified section
page read and write
1AAD6360000
trusted library section
page read and write
1CACE5DF000
heap
page read and write
1D9B8B02000
heap
page read and write
23A00338F000
trusted library allocation
page read and write
23A003CEE000
trusted library allocation
page read and write
23A00080C000
trusted library allocation
page read and write
33FC0043D000
trusted library allocation
page read and write
1AAD1333000
heap
page read and write
31C21FE000
unkown
page readonly
14E658E0000
unclassified section
page read and write
1CACE34C000
heap
page read and write
17F00542000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
23A000C04000
trusted library allocation
page read and write
23A002DC8000
trusted library allocation
page read and write
23A00077C000
trusted library allocation
page read and write
1CACC5A0000
heap
page read and write
23F0000
heap
page read and write
23A002250000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
1CACE348000
heap
page read and write
31C01FE000
unkown
page readonly
761000308000
trusted library allocation
page read and write
148025D4000
trusted library allocation
page read and write
23A002118000
trusted library allocation
page read and write
23A000D2C000
trusted library allocation
page read and write
182C00240000
trusted library allocation
page read and write
23A002458000
trusted library allocation
page read and write
9C7E34F000
unkown
page read and write
61C002C0000
trusted library allocation
page read and write
14E62130000
unclassified section
page read and write
1CACDEB7000
heap
page read and write
1AAD314B000
heap
page read and write
611400274000
trusted library allocation
page read and write
167800278000
trusted library allocation
page read and write
1CACDD37000
heap
page read and write
48E000274000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A003D77000
trusted library allocation
page read and write
23A000418000
trusted library allocation
page read and write
14E65691000
unclassified section
page read and write
33FC00360000
trusted library allocation
page read and write
23A002E05000
trusted library allocation
page read and write
AD0000
heap
page read and write
33FC00230000
trusted library allocation
page read and write
DAE000
stack
page read and write
48E00028C000
trusted library allocation
page read and write
23A002DF7000
trusted library allocation
page read and write
1CACDD38000
heap
page read and write
1CACE2A8000
heap
page read and write
2EB800144000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
1AAD316E000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
148029C0000
trusted library allocation
page read and write
23A003CDB000
trusted library allocation
page read and write
28FE000
heap
page read and write
23A002198000
trusted library allocation
page read and write
1AAD8202000
heap
page read and write
6A65FFE000
stack
page read and write
33FC000F0000
trusted library allocation
page read and write
700C00270000
trusted library allocation
page read and write
14E65ECD000
unclassified section
page read and write
1AAD8202000
heap
page read and write
167800288000
trusted library allocation
page read and write
14802794000
trusted library allocation
page read and write
14803198000
trusted library allocation
page read and write
23A000D56000
trusted library allocation
page read and write
23A001DAC000
trusted library allocation
page read and write
23A000770000
trusted library allocation
page read and write
23A000ED0000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
23A001D94000
trusted library allocation
page read and write
1CACC6CC000
heap
page read and write
447800220000
trusted library allocation
page read and write
23A000620000
trusted library allocation
page read and write
49B000338000
trusted library allocation
page read and write
23A001F98000
trusted library allocation
page read and write
23A001F48000
trusted library allocation
page read and write
24EEB5F0000
unkown
page readonly
14802C51000
trusted library allocation
page read and write
61C00354000
trusted library allocation
page read and write
1DC81813000
heap
page read and write
76100048C000
trusted library allocation
page read and write
2CD76E50000
trusted library allocation
page read and write
1CACDB85000
heap
page read and write
ED0000
heap
page read and write
1AAD3123000
heap
page read and write
5E0000
unkown
page readonly
14D9D62B000
heap
page read and write
76100044E000
trusted library allocation
page read and write
1CACDE25000
heap
page read and write
23A00224A000
trusted library allocation
page read and write
1CACC72D000
heap
page read and write
761000188000
trusted library allocation
page read and write
761000278000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
14803ED8000
trusted library allocation
page read and write
14803434000
trusted library allocation
page read and write
1AAD81F5000
unkown
page readonly
23A002304000
trusted library allocation
page read and write
23A002120000
trusted library allocation
page read and write
317E000
stack
page read and write
148005EA000
trusted library allocation
page read and write
148033A8000
trusted library allocation
page read and write
14803508000
trusted library allocation
page read and write
1CACE2C8000
heap
page read and write
23A00207A000
trusted library allocation
page read and write
14E65920000
unclassified section
page read and write
14802288000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACC655000
heap
page read and write
167800220000
trusted library allocation
page read and write
33FC0011C000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
1CACE218000
heap
page read and write
76100038C000
trusted library allocation
page read and write
14E6583A000
unclassified section
page read and write
31D81FE000
unkown
page readonly
17F00882000
trusted library allocation
page read and write
24EEB64A000
heap
page read and write
761000293000
trusted library allocation
page read and write
6672DFC000
stack
page read and write
1480235C000
trusted library allocation
page read and write
4A2C00258000
trusted library allocation
page read and write
14803150000
trusted library allocation
page read and write
77C000314000
direct allocation
page read and write
17F00082000
trusted library allocation
page read and write
14D9D657000
heap
page read and write
1CACDCAE000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
14E65886000
unclassified section
page read and write
3FDC0007C000
trusted library allocation
page read and write
14803090000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
23A002EA4000
trusted library allocation
page read and write
1FBE2160000
unclassified section
page readonly
14803040000
trusted library allocation
page read and write
23A001FA0000
trusted library allocation
page read and write
23A002D70000
trusted library allocation
page read and write
1480248B000
trusted library allocation
page read and write
77C000333000
direct allocation
page read and write
7610001D8000
trusted library allocation
page read and write
1CACDD35000
heap
page read and write
23A000694000
trusted library allocation
page read and write
24EEB702000
heap
page read and write
14D9D302000
heap
page read and write
1B9EE000
stack
page read and write
1CACDCBA000
heap
page read and write
14802484000
trusted library allocation
page read and write
23A002DF2000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1B9CC000
heap
page read and write
23A00217E000
trusted library allocation
page read and write
B7EEB4D000
stack
page read and write
31DB9FE000
stack
page read and write
1CACE2C7000
heap
page read and write
761000300000
trusted library allocation
page read and write
1DC87E70000
unclassified section
page readonly
61C0032C000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
23EF000
stack
page read and write
1A04002B4000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
24EEB613000
heap
page read and write
14E65E3A000
unclassified section
page read and write
14D9D160000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
23A001C54000
trusted library allocation
page read and write
1CACC710000
heap
page read and write
23A0003E8000
trusted library allocation
page read and write
61C00264000
trusted library allocation
page read and write
49B0002B4000
trusted library allocation
page read and write
D4A000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
23A0033B3000
trusted library allocation
page read and write
1CACE2B3000
heap
page read and write
1CACC766000
heap
page read and write
14802758000
trusted library allocation
page read and write
1CACE2FD000
heap
page read and write
1480380C000
trusted library allocation
page read and write
2CD02602000
heap
page read and write
148033AC000
trusted library allocation
page read and write
4A2C00408000
trusted library allocation
page read and write
61C00288000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14E657A7000
unclassified section
page read and write
761000284000
trusted library allocation
page read and write
21986A10000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A00088C000
trusted library allocation
page read and write
CB2000
heap
page read and write
1CACC73D000
heap
page read and write
48E0002BC000
trusted library allocation
page read and write
23A0020B5000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
796000
heap
page read and write
23A001B3C000
trusted library allocation
page read and write
23A0006A0000
trusted library allocation
page read and write
23A0021A0000
trusted library allocation
page read and write
1CACC67E000
heap
page read and write
1CACE2BE000
heap
page read and write
14D9D60A000
heap
page read and write
497C00298000
direct allocation
page read and write
1CACDEFA000
heap
page read and write
49B00032C000
trusted library allocation
page read and write
6A2400230000
direct allocation
page read and write
2CD76832000
heap
page read and write
35CC002D4000
direct allocation
page read and write
7610001D8000
trusted library allocation
page read and write
23A003D51000
trusted library allocation
page read and write
14802794000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
23A001EF0000
trusted library allocation
page read and write
31BE9FE000
stack
page read and write
C80000
heap
page read and write
76100038C000
trusted library allocation
page read and write
CA0000
heap
page read and write
13AE000
heap
page read and write
1CACC6E6000
heap
page read and write
700C00201000
trusted library allocation
page read and write
FD4000
stack
page read and write
23A001EF0000
trusted library allocation
page read and write
14803330000
trusted library allocation
page read and write
148030BC000
trusted library allocation
page read and write
447800364000
trusted library allocation
page read and write
23A000A38000
trusted library allocation
page read and write
1CACC663000
heap
page read and write
23A003D22000
trusted library allocation
page read and write
33FC00508000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
1AAD1333000
heap
page read and write
8D0000
heap
page read and write
1CACE205000
heap
page read and write
12A31000
trusted library allocation
page read and write
23A000818000
trusted library allocation
page read and write
1CACDBD2000
heap
page read and write
23A00080C000
trusted library allocation
page read and write
23A0021B0000
trusted library allocation
page read and write
76100050C000
trusted library allocation
page read and write
61C00930000
trusted library allocation
page read and write
14E65F06000
unclassified section
page read and write
761000303000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
14E6565D000
unclassified section
page read and write
14803280000
trusted library allocation
page read and write
14E65EB1000
unclassified section
page read and write
76100038C000
trusted library allocation
page read and write
31D99FD000
stack
page read and write
31BB9FE000
stack
page read and write
B7F6A71000
stack
page read and write
23A000CFC000
trusted library allocation
page read and write
6A24002A4000
direct allocation
page read and write
14D9D62B000
heap
page read and write
3C34002DC000
trusted library allocation
page read and write
D7E000
stack
page read and write
23A002076000
trusted library allocation
page read and write
23A00219B000
trusted library allocation
page read and write
23A002DFE000
trusted library allocation
page read and write
1CACE2C8000
heap
page read and write
148031AC000
trusted library allocation
page read and write
B7F660C000
stack
page read and write
61C00384000
trusted library allocation
page read and write
33FC000C5000
trusted library allocation
page read and write
14802EC4000
trusted library allocation
page read and write
17F00AC2000
trusted library allocation
page read and write
1678002A4000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
D64000
heap
page read and write
669000250000
trusted library allocation
page read and write
14E66457000
unclassified section
page read and write
1B420000
heap
page read and write
14E65794000
unclassified section
page read and write
1CACC5D6000
heap
page read and write
1CACC659000
heap
page read and write
23A000D50000
trusted library allocation
page read and write
23A000D2C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
48E000254000
trusted library allocation
page read and write
4478002F8000
trusted library allocation
page read and write
33FC00148000
trusted library allocation
page read and write
33FC00484000
trusted library allocation
page read and write
23A00077C000
trusted library allocation
page read and write
23A002DC5000
trusted library allocation
page read and write
14E66442000
unclassified section
page read and write
23A000C84000
trusted library allocation
page read and write
2CD7689A000
heap
page read and write
E12AFFE000
unkown
page readonly
14D9D624000
heap
page read and write
1CACE339000
heap
page read and write
FC0000
heap
page read and write
44780040C000
trusted library allocation
page read and write
13091000
trusted library allocation
page read and write
23A00235C000
trusted library allocation
page read and write
31BA9FE000
stack
page read and write
14E65E2C000
unclassified section
page read and write
23A001D5C000
trusted library allocation
page read and write
CEA000
heap
page read and write
14E6586E000
unclassified section
page read and write
14803684000
trusted library allocation
page read and write
6A6BFFE000
stack
page read and write
E129FFE000
unkown
page readonly
CCB000
heap
page read and write
23A000C84000
trusted library allocation
page read and write
23A001C0C000
trusted library allocation
page read and write
1CACC714000
heap
page read and write
23A000788000
trusted library allocation
page read and write
1CACE5E7000
heap
page read and write
1D9B8820000
heap
page read and write
14E60632000
unclassified section
page read and write
1CACC68D000
heap
page read and write
17F00542000
trusted library allocation
page read and write
148023E0000
trusted library allocation
page read and write
23A001EEE000
trusted library allocation
page read and write
1DC8769A000
unclassified section
page readonly
6A727FE000
unkown
page readonly
1870000
heap
page read and write
14D9D626000
heap
page read and write
7FFD9B9B1000
trusted library allocation
page read and write
13028000
trusted library allocation
page read and write
14802401000
trusted library allocation
page read and write
23A002E6B000
trusted library allocation
page read and write
61C0093C000
trusted library allocation
page read and write
17F00182000
trusted library allocation
page read and write
23A000D4A000
trusted library allocation
page read and write
14802E64000
trusted library allocation
page read and write
1CACC508000
heap
page read and write
5BC800210000
direct allocation
page read and write
611400418000
trusted library allocation
page read and write
1CACC677000
heap
page read and write
13023000
trusted library allocation
page read and write
CBC000
heap
page read and write
1358000
heap
page read and write
6A6F7FE000
unkown
page readonly
5BC800274000
direct allocation
page read and write
49B00040C000
trusted library allocation
page read and write
B10000
heap
page read and write
C70000
trusted library allocation
page read and write
14803D5F000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A000B68000
trusted library allocation
page read and write
1CACC6CC000
heap
page read and write
1678002BC000
trusted library allocation
page read and write
6A70FF9000
stack
page read and write
14802970000
trusted library allocation
page read and write
1CACA41A000
heap
page read and write
23A000AC0000
trusted library allocation
page read and write
148022E8000
trusted library allocation
page read and write
23A000F08000
trusted library allocation
page read and write
77C00037C000
direct allocation
page read and write
14E65908000
unclassified section
page read and write
1CACA415000
heap
page read and write
6A677FE000
unkown
page readonly
23A001F1C000
trusted library allocation
page read and write
31CD9FB000
stack
page read and write
5BC800284000
direct allocation
page read and write
2FFF000
stack
page read and write
1CACC68D000
heap
page read and write
14803F08000
trusted library allocation
page read and write
14802D30000
trusted library allocation
page read and write
BC1000
heap
page read and write
2CD7685D000
heap
page read and write
23A000D20000
trusted library allocation
page read and write
23A000ED0000
trusted library allocation
page read and write
1CACE2A2000
heap
page read and write
23A000674000
trusted library allocation
page read and write
1AAD316A000
heap
page read and write
14E65773000
unclassified section
page read and write
61C00804000
trusted library allocation
page read and write
1CACC6E9000
heap
page read and write
23A002DB5000
trusted library allocation
page read and write
1CACC677000
heap
page read and write
14E628A0000
unclassified section
page read and write
1CACE1CD000
heap
page read and write
14803604000
trusted library allocation
page read and write
14E65637000
unclassified section
page read and write
31C99FD000
stack
page read and write
14D9D624000
heap
page read and write
1B5BE000
stack
page read and write
23A002D77000
trusted library allocation
page read and write
1CACE5E1000
heap
page read and write
761000284000
trusted library allocation
page read and write
2A20000
heap
page read and write
23A002A0C000
trusted library allocation
page read and write
14E65672000
unclassified section
page read and write
447800284000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
77C00032A000
direct allocation
page read and write
31CC9FD000
stack
page read and write
6A73FFE000
stack
page read and write
23A001C7C000
trusted library allocation
page read and write
1FBE20A0000
unclassified section
page readonly
14E653D6000
unclassified section
page read and write
14E631C0000
unclassified section
page read and write
76100048C000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A003464000
trusted library allocation
page read and write
6114002A0000
trusted library allocation
page read and write
7FFE21720000
direct allocation
page execute read
3FDC0008C000
trusted library allocation
page read and write
C75000
heap
page read and write
31C31FE000
unkown
page readonly
3948002C0000
direct allocation
page read and write
23A002D37000
trusted library allocation
page read and write
23A003451000
trusted library allocation
page read and write
182C002B4000
trusted library allocation
page read and write
761000293000
trusted library allocation
page read and write
1CACDB83000
heap
page read and write
761000278000
trusted library allocation
page read and write
23A00240C000
trusted library allocation
page read and write
23A0020C8000
trusted library allocation
page read and write
23A0033E7000
trusted library allocation
page read and write
23A002D8F000
trusted library allocation
page read and write
761000278000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1CACA402000
heap
page read and write
761000284000
trusted library allocation
page read and write
1AAD8D82000
unclassified section
page read and write
23A00345D000
trusted library allocation
page read and write
2932BEC000
stack
page read and write
1CACA455000
heap
page read and write
23A0006A0000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
17F00A40000
trusted library allocation
page read and write
14E65E50000
unclassified section
page read and write
C58002B4000
trusted library allocation
page read and write
B7F6592000
stack
page read and write
31BE1FE000
unkown
page readonly
2EB80009A000
trusted library allocation
page read and write
33FC00478000
trusted library allocation
page read and write
14802368000
trusted library allocation
page read and write
23A003458000
trusted library allocation
page read and write
23A0021A0000
trusted library allocation
page read and write
23A000C84000
trusted library allocation
page read and write
23A0021A4000
trusted library allocation
page read and write
31D69FC000
stack
page read and write
14E65E78000
unclassified section
page read and write
14803034000
trusted library allocation
page read and write
1A0400230000
trusted library allocation
page read and write
4A2C0031C000
trusted library allocation
page read and write
1B1EF000
stack
page read and write
17F00A42000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
1CACC502000
heap
page read and write
76100044E000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
CB9000
heap
page read and write
14802CF0000
trusted library allocation
page read and write
77C0002A4000
direct allocation
page read and write
1B942000
heap
page read and write
14802EE0000
trusted library allocation
page read and write
1A04002C0000
trusted library allocation
page read and write
61C00C01000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
14D9D62B000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
1CACA3F1000
heap
page read and write
61C00A01000
trusted library allocation
page read and write
148032AC000
trusted library allocation
page read and write
1CACA498000
heap
page read and write
61C00278000
trusted library allocation
page read and write
1CACDCC7000
heap
page read and write
14D9D624000
heap
page read and write
2EB800044000
trusted library allocation
page read and write
2936BF3000
stack
page read and write
1480244C000
trusted library allocation
page read and write
CEC000
heap
page read and write
1DC8487E000
heap
page read and write
761000300000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
23A001DAC000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
61C00994000
trusted library allocation
page read and write
23A0020B0000
trusted library allocation
page read and write
23A001C4C000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
2A80000
heap
page read and write
23A0021B4000
trusted library allocation
page read and write
1B5FE000
stack
page read and write
31C91FE000
unkown
page readonly
1678002AC000
trusted library allocation
page read and write
7FF789230000
unkown
page read and write
23A002E3E000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
33FC00258000
trusted library allocation
page read and write
394800250000
direct allocation
page read and write
148032AC000
trusted library allocation
page read and write
29383FF000
stack
page read and write
D01000
heap
page read and write
1AAD1327000
heap
page read and write
1CACC730000
heap
page read and write
23A000B90000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
700C00230000
trusted library allocation
page read and write
14E6590D000
unclassified section
page read and write
1CACE21F000
heap
page read and write
1CACC72D000
heap
page read and write
61C0039C000
trusted library allocation
page read and write
148028C4000
trusted library allocation
page read and write
1AAD8604000
trusted library allocation
page read and write
96321FC000
stack
page read and write
1CACC6A2000
heap
page read and write
23A00297C000
trusted library allocation
page read and write
17F00AC2000
trusted library allocation
page read and write
23A002DA2000
trusted library allocation
page read and write
14E65E67000
unclassified section
page read and write
23A001F6C000
trusted library allocation
page read and write
23A000D6E000
trusted library allocation
page read and write
2EB800058000
trusted library allocation
page read and write
23A002320000
trusted library allocation
page read and write
23A00200C000
trusted library allocation
page read and write
61C0033C000
trusted library allocation
page read and write
23A001C4C000
trusted library allocation
page read and write
666000
heap
page read and write
1DC817D0000
remote allocation
page read and write
4A2C0030C000
trusted library allocation
page read and write
23A000D56000
trusted library allocation
page read and write
23A00344A000
trusted library allocation
page read and write
23A001C4C000
trusted library allocation
page read and write
17F0058B000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
497C00250000
direct allocation
page read and write
14802388000
trusted library allocation
page read and write
1CACC6E6000
heap
page read and write
3C3400210000
trusted library allocation
page read and write
14D9D65C000
heap
page read and write
E127FFE000
unkown
page readonly
2938BFE000
stack
page read and write
23A00080C000
trusted library allocation
page read and write
23A000F54000
trusted library allocation
page read and write
23A000674000
trusted library allocation
page read and write
49B000244000
trusted library allocation
page read and write
14D9D170000
unclassified section
page readonly
7610001D8000
trusted library allocation
page read and write
1CACC6DA000
heap
page read and write
76100038C000
trusted library allocation
page read and write
76100040C000
trusted library allocation
page read and write
23A002175000
trusted library allocation
page read and write
23A001898000
trusted library allocation
page read and write
23A0018C8000
trusted library allocation
page read and write
1CACE1D2000
heap
page read and write
61C00244000
trusted library allocation
page read and write
1DC8765A000
unclassified section
page readonly
1DC81B00000
heap
page readonly
23A0020B8000
trusted library allocation
page read and write
14E65827000
unclassified section
page read and write
4A2C00248000
trusted library allocation
page read and write
49B000280000
trusted library allocation
page read and write
23A000F94000
trusted library allocation
page read and write
96379FE000
unkown
page readonly
1CACE2B0000
heap
page read and write
611400280000
trusted library allocation
page read and write
61C00900000
trusted library allocation
page read and write
1CACDCC2000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
1CACDB4A000
heap
page read and write
E12B7FD000
stack
page read and write
7610001D8000
trusted library allocation
page read and write
1AAD132E000
heap
page read and write
23A000BC0000
trusted library allocation
page read and write
1CACC677000
heap
page read and write
1B440000
heap
page read and write
1CACDB97000
heap
page read and write
33FC000C3000
trusted library allocation
page read and write
167800258000
trusted library allocation
page read and write
1CACDC7E000
heap
page read and write
23A000F70000
trusted library allocation
page read and write
1AAD132E000
heap
page read and write
96359FE000
unkown
page readonly
1CACDCC2000
heap
page read and write
1CACC67E000
heap
page read and write
1DC848CD000
heap
page read and write
61C0066C000
trusted library allocation
page read and write
23A002DE9000
trusted library allocation
page read and write
1CACA3DF000
heap
page read and write
23A001D0C000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
1375000
heap
page read and write
23A000EAC000
trusted library allocation
page read and write
1CACE311000
heap
page read and write
3FDC00024000
trusted library allocation
page read and write
1CACDB90000
heap
page read and write
23A003D03000
trusted library allocation
page read and write
1CACDE6D000
heap
page read and write
1CACD6B0000
remote allocation
page read and write
7FF789226000
unkown
page write copy
33FC0047C000
trusted library allocation
page read and write
1CACC67E000
heap
page read and write
1CACC72D000
heap
page read and write
49B000404000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
23A000ED8000
trusted library allocation
page read and write
14D9D150000
remote allocation
page read and write
23A001D2C000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
700C00408000
trusted library allocation
page read and write
23A003D64000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A000B0C000
trusted library allocation
page read and write
7610004C8000
trusted library allocation
page read and write
1AAD1313000
heap
page read and write
7610000C0000
trusted library allocation
page read and write
14802F35000
trusted library allocation
page read and write
1B5FE000
stack
page read and write
14D9D62B000
heap
page read and write
23A001F6C000
trusted library allocation
page read and write
182C00284000
trusted library allocation
page read and write
23A0022DB000
trusted library allocation
page read and write
31C59FD000
stack
page read and write
14803070000
trusted library allocation
page read and write
1DC848CB000
heap
page read and write
23A0028FC000
trusted library allocation
page read and write
23A0018D8000
trusted library allocation
page read and write
148023A4000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
23A0022C1000
trusted library allocation
page read and write
61C0020C000
trusted library allocation
page read and write
1CACC52A000
heap
page read and write
14803001000
trusted library allocation
page read and write
975000
heap
page read and write
14E65EDB000
unclassified section
page read and write
17F00942000
trusted library allocation
page read and write
6A72FFD000
stack
page read and write
1CACA439000
heap
page read and write
148028C4000
trusted library allocation
page read and write
1DC84875000
heap
page read and write
14802DC4000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
23A001B4C000
trusted library allocation
page read and write
1CACE5E3000
heap
page read and write
1AAD126E000
heap
page read and write
2CD76838000
heap
page read and write
23A0009EC000
trusted library allocation
page read and write
61140030C000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
9E1000
heap
page read and write
1CACA3D6000
heap
page read and write
61C0080C000
trusted library allocation
page read and write
23A002D1D000
trusted library allocation
page read and write
31BF9F9000
stack
page read and write
23A003D32000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
1CACE2C1000
heap
page read and write
14803E38000
trusted library allocation
page read and write
700C002F0000
trusted library allocation
page read and write
295E000
stack
page read and write
14E655D5000
unclassified section
page read and write
14802A04000
trusted library allocation
page read and write
1480325C000
trusted library allocation
page read and write
7E0000
heap
page read and write
1A040026C000
trusted library allocation
page read and write
1CACE348000
heap
page read and write
76100038C000
trusted library allocation
page read and write
23A0033FA000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
14D9D62B000
heap
page read and write
31C29FB000
stack
page read and write
14E65786000
unclassified section
page read and write
4A2C002F8000
trusted library allocation
page read and write
5BC800220000
direct allocation
page read and write
3948002AC000
direct allocation
page read and write
14803EC4000
trusted library allocation
page read and write
23A00341B000
trusted library allocation
page read and write
B7F6467000
stack
page read and write
23A000B70000
trusted library allocation
page read and write
23A000614000
trusted library allocation
page read and write
1AAD66F0000
unkown
page readonly
1CACDB57000
heap
page read and write
497C002D4000
direct allocation
page read and write
7610003BC000
trusted library allocation
page read and write
23A002076000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
23A0033A0000
trusted library allocation
page read and write
1CACE30D000
heap
page read and write
1AAD314B000
heap
page read and write
1A04002E4000
trusted library allocation
page read and write
49B000210000
trusted library allocation
page read and write
1CACDED9000
heap
page read and write
14802EA8000
trusted library allocation
page read and write
2CD76813000
heap
page read and write
7610002F4000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
33FC00508000
trusted library allocation
page read and write
1CACDBC4000
heap
page read and write
61C0034E000
trusted library allocation
page read and write
48E000240000
trusted library allocation
page read and write
1CACA3D5000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
2830000
heap
page execute and read and write
B7F6853000
stack
page read and write
23A0022BC000
trusted library allocation
page read and write
23A0020B5000
trusted library allocation
page read and write
31BC1FE000
unkown
page readonly
148031B8000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
1CACE348000
heap
page read and write
14E658CD000
unclassified section
page read and write
1AAD8513000
heap
page read and write
1AAD8D20000
heap
page read and write
1480339C000
trusted library allocation
page read and write
61C00404000
trusted library allocation
page read and write
1CACE27D000
heap
page read and write
48E000248000
trusted library allocation
page read and write
23A001880000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
23A000D2C000
trusted library allocation
page read and write
1CACDBC4000
heap
page read and write
23A00088C000
trusted library allocation
page read and write
1CACDC30000
heap
page read and write
14802454000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
23A00219B000
trusted library allocation
page read and write
1CACC72D000
heap
page read and write
1CACE32D000
heap
page read and write
23A000D44000
trusted library allocation
page read and write
14E65EB8000
unclassified section
page read and write
1FBE2192000
unclassified section
page read and write
31DA9FE000
stack
page read and write
76100048C000
trusted library allocation
page read and write
14803410000
trusted library allocation
page read and write
23A002198000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
5E0000
heap
page read and write
1CACE5E1000
heap
page read and write
23A000A0C000
trusted library allocation
page read and write
4478002A0000
trusted library allocation
page read and write
1AAD136E000
heap
page read and write
1DC87EB0000
unclassified section
page readonly
14D9D60D000
heap
page read and write
13098000
trusted library allocation
page read and write
2AB0000
heap
page execute and read and write
14E60C30000
unclassified section
page read and write
76100040C000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
286E000
stack
page read and write
14E65EB3000
unclassified section
page read and write
C58002CC000
trusted library allocation
page read and write
1CACE208000
heap
page read and write
14E65F01000
unclassified section
page read and write
14E65943000
unclassified section
page read and write
14D9D62B000
heap
page read and write
14E62AD0000
unclassified section
page read and write
1DC848C5000
heap
page read and write
497C002A8000
direct allocation
page read and write
1B190000
heap
page read and write
23FC000
trusted library allocation
page read and write
1AAD12E9000
heap
page read and write
E12D7FC000
stack
page read and write
23A0022F0000
trusted library allocation
page read and write
2CD7687C000
heap
page read and write
14E665C9000
unclassified section
page read and write
1CACE1CD000
heap
page read and write
1AAD8502000
heap
page read and write
23A001BAC000
trusted library allocation
page read and write
761000290000
trusted library allocation
page read and write
23A000D20000
trusted library allocation
page read and write
1AAD11F0000
heap
page read and write
D4A000
heap
page read and write
23A001204000
trusted library allocation
page read and write
7FF789202000
unkown
page readonly
23A000D38000
trusted library allocation
page read and write
3C3400294000
trusted library allocation
page read and write
31C11FE000
unkown
page readonly
23A001F74000
trusted library allocation
page read and write
1CACE1DC000
heap
page read and write
31D21FE000
unkown
page readonly
31D61FE000
unkown
page readonly
1B0D0000
heap
page execute and read and write
1CACC4D4000
heap
page read and write
33FC00148000
trusted library allocation
page read and write
23A000D32000
trusted library allocation
page read and write
1CACC68D000
heap
page read and write
1CACC670000
heap
page read and write
4A2C00210000
trusted library allocation
page read and write
23A00218C000
trusted library allocation
page read and write
23A001B94000
trusted library allocation
page read and write
1CACC68D000
heap
page read and write
1DC848CD000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
447800290000
trusted library allocation
page read and write
7610002E8000
trusted library allocation
page read and write
1320000
heap
page read and write
23A0021B0000
trusted library allocation
page read and write
23A000D38000
trusted library allocation
page read and write
1B9C9000
heap
page read and write
761000290000
trusted library allocation
page read and write
23A0018D8000
trusted library allocation
page read and write
33FC00384000
trusted library allocation
page read and write
14802324000
trusted library allocation
page read and write
14D9D213000
heap
page read and write
14D9D60B000
heap
page read and write
14E6203A000
unclassified section
page read and write
23A003441000
trusted library allocation
page read and write
33FC004A8000
trusted library allocation
page read and write
33FC00088000
trusted library allocation
page read and write
B7F6471000
stack
page read and write
1AAD132E000
heap
page read and write
148023D4000
trusted library allocation
page read and write
1CACDBA2000
heap
page read and write
1CACE29A000
heap
page read and write
2EB80010C000
trusted library allocation
page read and write
23A003462000
trusted library allocation
page read and write
2EB8000E0000
trusted library allocation
page read and write
23A002179000
trusted library allocation
page read and write
1AAD310D000
heap
page read and write
1CACC79A000
heap
page read and write
761000184000
trusted library allocation
page read and write
1CACE331000
heap
page read and write
14803E60000
trusted library allocation
page read and write
1480287C000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
23A0006AC000
trusted library allocation
page read and write
23A000D38000
trusted library allocation
page read and write
1AAD8300000
heap
page read and write
4478002D4000
trusted library allocation
page read and write
61C0031C000
trusted library allocation
page read and write
669000260000
trusted library allocation
page read and write
497C0023C000
direct allocation
page read and write
1CACE191000
heap
page read and write
76100000C000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
B7F9EAF000
stack
page read and write
1CACDC9D000
heap
page read and write
1CACDDAC000
heap
page read and write
3FDC00134000
trusted library allocation
page read and write
1CACC4C0000
heap
page read and write
1CACC691000
heap
page read and write
77C00033C000
direct allocation
page read and write
23A000328000
trusted library allocation
page read and write
1CACC67E000
heap
page read and write
1CACC68D000
heap
page read and write
4A2C0020C000
trusted library allocation
page read and write
33FC0021C000
trusted library allocation
page read and write
1CACE1BC000
heap
page read and write
31DF1FE000
unkown
page readonly
1200000
heap
page read and write
6A6D7FE000
unkown
page readonly
1CACE21E000
heap
page read and write
1CACC79A000
heap
page read and write
1D9B8920000
heap
page read and write
14D9D624000
heap
page read and write
447800288000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
761000074000
trusted library allocation
page read and write
14802948000
trusted library allocation
page read and write
23A003D14000
trusted library allocation
page read and write
23A001EB2000
trusted library allocation
page read and write
1CACDCB2000
heap
page read and write
23A0021B4000
trusted library allocation
page read and write
14E62AD6000
unclassified section
page read and write
447800274000
trusted library allocation
page read and write
1DC873A0000
unclassified section
page readonly
14D9D60A000
heap
page read and write
23A001F5C000
trusted library allocation
page read and write
1CACDB94000
heap
page read and write
14E66452000
unclassified section
page read and write
1AADC910000
unkown
page readonly
1CACE1A4000
heap
page read and write
14E65922000
unclassified section
page read and write
1AAD137F000
heap
page read and write
7FF789231000
unkown
page readonly
33FC00268000
trusted library allocation
page read and write
6114002B4000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
23A000CFC000
trusted library allocation
page read and write
1D9B8900000
heap
page readonly
23A001D1C000
trusted library allocation
page read and write
B7EEC00000
stack
page read and write
76100044E000
trusted library allocation
page read and write
1CACC500000
heap
page read and write
1AAD8302000
heap
page read and write
1CACDBC8000
heap
page read and write
23A000B14000
trusted library allocation
page read and write
14802E54000
trusted library allocation
page read and write
1CACDC01000
heap
page read and write
10EC002C8000
trusted library allocation
page read and write
1A0400264000
trusted library allocation
page read and write
1CACDD11000
heap
page read and write
700C00220000
trusted library allocation
page read and write
14E65894000
unclassified section
page read and write
E12E7FE000
stack
page read and write
1AAD1329000
heap
page read and write
14802FC8000
trusted library allocation
page read and write
963D1FE000
stack
page read and write
23A003437000
trusted library allocation
page read and write
7610004D8000
trusted library allocation
page read and write
1DC848B8000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
137F000
heap
page read and write
14E62910000
unclassified section
page read and write
17F00A82000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
14803D75000
trusted library allocation
page read and write
15F0000
heap
page read and write
14D9D1A0000
heap
page readonly
182C002CC000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
10EC00294000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
14803A54000
trusted library allocation
page read and write
29373FF000
stack
page read and write
761000178000
trusted library allocation
page read and write
23A000D38000
trusted library allocation
page read and write
761000100000
trusted library allocation
page read and write
14E6643B000
unclassified section
page read and write
23A002BA8000
trusted library allocation
page read and write
1AAD132E000
heap
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
14803090000
trusted library allocation
page read and write
1CACDBF0000
heap
page read and write
1AAD132E000
heap
page read and write
1CACC72D000
heap
page read and write
23A000F3C000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
1CACE5E1000
heap
page read and write
1CACE2B4000
heap
page read and write
1AAD8302000
heap
page read and write
1CACE2BE000
heap
page read and write
761000298000
trusted library allocation
page read and write
14E658EE000
unclassified section
page read and write
1CACE312000
heap
page read and write
1CACC593000
heap
page read and write
21986E55000
heap
page read and write
1AAD3182000
heap
page read and write
23A001EE8000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
2711000
trusted library allocation
page read and write
61C0077C000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
14D9D62B000
heap
page read and write
23A000D44000
trusted library allocation
page read and write
1CACE03C000
heap
page read and write
61C0023C000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
CE8000
heap
page read and write
77C000364000
direct allocation
page read and write
76100040C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACDC6B000
heap
page read and write
23A002074000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
23A001F6C000
trusted library allocation
page read and write
1CACDCC6000
heap
page read and write
23A000328000
trusted library allocation
page read and write
7610004C8000
trusted library allocation
page read and write
1CACDCC5000
heap
page read and write
14E658C6000
unclassified section
page read and write
14E65799000
unclassified section
page read and write
1AAD317B000
heap
page read and write
23A001EE8000
trusted library allocation
page read and write
31BD1FE000
unkown
page readonly
1AAD67C0000
trusted library section
page read and write
76100022E000
trusted library allocation
page read and write
14803DB4000
trusted library allocation
page read and write
23A002D30000
trusted library allocation
page read and write
1CACC765000
heap
page read and write
23A000A0C000
trusted library allocation
page read and write
BF9000
heap
page read and write
1AAD12C6000
heap
page read and write
14E658A0000
unclassified section
page read and write
23A00399E000
trusted library allocation
page read and write
CBA000
heap
page read and write
1CACDDA9000
heap
page read and write
1CACDE43000
heap
page read and write
23A001F64000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
49B000324000
trusted library allocation
page read and write
23A0003C4000
trusted library allocation
page read and write
669000240000
trusted library allocation
page read and write
23A000AA4000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1AAD132F000
heap
page read and write
23A00219B000
trusted library allocation
page read and write
1CACC742000
heap
page read and write
497C00264000
direct allocation
page read and write
23A0008AF000
trusted library allocation
page read and write
1CACE337000
heap
page read and write
23A00231D000
trusted library allocation
page read and write
13B8000
heap
page read and write
6A717FE000
unkown
page readonly
1B37B000
stack
page read and write
23A003456000
trusted library allocation
page read and write
23A001F1C000
trusted library allocation
page read and write
700C00338000
trusted library allocation
page read and write
CED000
heap
page read and write
B7F6A1F000
stack
page read and write
7610002F4000
trusted library allocation
page read and write
182C002CC000
trusted library allocation
page read and write
1AAF0000
trusted library allocation
page read and write
1FBE2110000
remote allocation
page read and write
761000278000
trusted library allocation
page read and write
1CACC6CC000
heap
page read and write
23A0033BC000
trusted library allocation
page read and write
23A00101F000
trusted library allocation
page read and write
1CACA455000
heap
page read and write
14E65E2A000
unclassified section
page read and write
17F00842000
trusted library allocation
page read and write
1CACC677000
heap
page read and write
148027B8000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
1CACDB75000
heap
page read and write
23A0022F0000
trusted library allocation
page read and write
61C00378000
trusted library allocation
page read and write
14802574000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
1678002BC000
trusted library allocation
page read and write
23A001EF4000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
23A0033C3000
trusted library allocation
page read and write
23A000AC0000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
14D9D625000
heap
page read and write
23A002E51000
trusted library allocation
page read and write
33FC00384000
trusted library allocation
page read and write
B7FBAAC000
stack
page read and write
14803580000
trusted library allocation
page read and write
14803228000
trusted library allocation
page read and write
1CACC7B7000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
14803140000
trusted library allocation
page read and write
1CACC710000
heap
page read and write
14D9D1E0000
heap
page read and write
14802EBD000
trusted library allocation
page read and write
23A002118000
trusted library allocation
page read and write
23A000310000
trusted library allocation
page read and write
1CACC6AE000
heap
page read and write
14E62990000
unclassified section
page read and write
3C34002C8000
trusted library allocation
page read and write
1CACC68D000
heap
page read and write
23A000F5C000
trusted library allocation
page read and write
33FC0048C000
trusted library allocation
page read and write
23A001DBC000
trusted library allocation
page read and write
1CACE1BC000
heap
page read and write
700C00328000
trusted library allocation
page read and write
F7F000
stack
page read and write
23A0003C4000
trusted library allocation
page read and write
2CD02580000
trusted library allocation
page read and write
14E62A50000
unclassified section
page read and write
23A002B8C000
trusted library allocation
page read and write
76100035C000
trusted library allocation
page read and write
61C00B0C000
trusted library allocation
page read and write
23A002CDD000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
23A000829000
trusted library allocation
page read and write
1AAD62E2000
unclassified section
page read and write
14D9D624000
heap
page read and write
761000300000
trusted library allocation
page read and write
33FC000FE000
trusted library allocation
page read and write
14802D4C000
trusted library allocation
page read and write
962F1FE000
stack
page read and write
14E6583F000
unclassified section
page read and write
6A2400201000
direct allocation
page read and write
76100044E000
trusted library allocation
page read and write
31DC9FE000
stack
page read and write
13A2000
heap
page read and write
1A04002A0000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
1CACE1A5000
heap
page read and write
23A00089F000
trusted library allocation
page read and write
7610002C0000
trusted library allocation
page read and write
1CACE348000
heap
page read and write
23A00100C000
trusted library allocation
page read and write
14E653DD000
unclassified section
page read and write
61C0077C000
trusted library allocation
page read and write
14803D68000
trusted library allocation
page read and write
14E6577A000
unclassified section
page read and write
14803EA0000
trusted library allocation
page read and write
6114002D4000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
23A002D9B000
trusted library allocation
page read and write
447800380000
trusted library allocation
page read and write
1CACC0D0000
heap
page read and write
14E65EFF000
unclassified section
page read and write
14E65608000
unclassified section
page read and write
23A003435000
trusted library allocation
page read and write
14803D9C000
trusted library allocation
page read and write
3FDC0006C000
trusted library allocation
page read and write
7610004C2000
trusted library allocation
page read and write
23A002390000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
AC0000
heap
page read and write
77C00031C000
direct allocation
page read and write
14D9D62B000
heap
page read and write
1CACDC7E000
heap
page read and write
23A002E1D000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
49B0002E8000
trusted library allocation
page read and write
23A000818000
trusted library allocation
page read and write
23A001DAC000
trusted library allocation
page read and write
182C00270000
trusted library allocation
page read and write
1B83C000
stack
page read and write
1DC848AF000
heap
page read and write
1CACDBDA000
heap
page read and write
1DC848A5000
heap
page read and write
1CACDCC6000
heap
page read and write
1CACBD10000
heap
page read and write
33FC004A8000
trusted library allocation
page read and write
23A002CF7000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
9EA000
heap
page read and write
23A000614000
trusted library allocation
page read and write
1CACDB77000
heap
page read and write
66755FE000
unkown
page readonly
23A000D20000
trusted library allocation
page read and write
10EC002C4000
trusted library allocation
page read and write
10EC002A4000
trusted library allocation
page read and write
B7F63AF000
stack
page read and write
10EC002B8000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
1AAD60F0000
trusted library section
page read and write
1DC848CF000
heap
page read and write
96369FE000
unkown
page readonly
D17000
heap
page read and write
1480329C000
trusted library allocation
page read and write
148025CA000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
1AAD6790000
unkown
page readonly
611400260000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
611400404000
trusted library allocation
page read and write
35CC00210000
direct allocation
page read and write
76100038C000
trusted library allocation
page read and write
17F00542000
trusted library allocation
page read and write
1CACA3A6000
heap
page read and write
1CACDB80000
heap
page read and write
23A00080C000
trusted library allocation
page read and write
23A001EE8000
trusted library allocation
page read and write
1CACDC9D000
heap
page read and write
555000
heap
page read and write
23A0009BC000
trusted library allocation
page read and write
1A04002A0000
trusted library allocation
page read and write
1CACC6CD000
heap
page read and write
14803194000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
148032B8000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
622000
unkown
page readonly
23A0008AD000
trusted library allocation
page read and write
14E65E4B000
unclassified section
page read and write
761000068000
trusted library allocation
page read and write
1DC87A76000
unclassified section
page readonly
1CACDD97000
heap
page read and write
6A6CFFE000
stack
page read and write
1CACC73D000
heap
page read and write
14802C20000
trusted library allocation
page read and write
1CACDB6B000
heap
page read and write
23A002193000
trusted library allocation
page read and write
85F000
heap
page read and write
14E658A7000
unclassified section
page read and write
1CACE2C7000
heap
page read and write
B7F627E000
stack
page read and write
23A002171000
trusted library allocation
page read and write
23A000AE8000
trusted library allocation
page read and write
761000100000
trusted library allocation
page read and write
23A002CCD000
trusted library allocation
page read and write
1CACC66B000
heap
page read and write
14D9D624000
heap
page read and write
96319FE000
unkown
page readonly
31CA1FE000
unkown
page readonly
14D9D60D000
heap
page read and write
76100048C000
trusted library allocation
page read and write
14802454000
trusted library allocation
page read and write
61C00A8C000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
33FC00080000
trusted library allocation
page read and write
7B9000
heap
page read and write
1CACDCC2000
heap
page read and write
23A000D32000
trusted library allocation
page read and write
1CACE211000
heap
page read and write
1CACDC93000
heap
page read and write
148032AC000
trusted library allocation
page read and write
23A002D7E000
trusted library allocation
page read and write
14803EE8000
trusted library allocation
page read and write
CF1000
heap
page read and write
33FC004D8000
trusted library allocation
page read and write
14803290000
trusted library allocation
page read and write
1AAD8402000
heap
page read and write
2EB8000B0000
trusted library allocation
page read and write
1DC848AD000
heap
page read and write
1CACC720000
heap
page read and write
14803280000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
14E62C50000
unclassified section
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7610001C4000
trusted library allocation
page read and write
1CACC710000
heap
page read and write
3FDC000C4000
trusted library allocation
page read and write
1CACE1E7000
heap
page read and write
1CACE34B000
heap
page read and write
1AAD8402000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
1FBE2602000
heap
page read and write
C7B000
heap
page read and write
10EC00294000
trusted library allocation
page read and write
1480329C000
trusted library allocation
page read and write
1CACDC93000
heap
page read and write
23A000A24000
trusted library allocation
page read and write
761000300000
trusted library allocation
page read and write
761000178000
trusted library allocation
page read and write
1A04002A0000
trusted library allocation
page read and write
1B0EF000
stack
page read and write
1CACC626000
heap
page read and write
24EEB661000
heap
page read and write
1CACC676000
heap
page read and write
1DC8186C000
heap
page read and write
33FC00148000
trusted library allocation
page read and write
1CACC664000
heap
page read and write
61C01604000
trusted library allocation
page read and write
1CACC7B7000
heap
page read and write
1A0400238000
trusted library allocation
page read and write
148022F8000
trusted library allocation
page read and write
3FDC00104000
trusted library allocation
page read and write
3FDC00028000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
CA0000
heap
page read and write
76100048C000
trusted library allocation
page read and write
23A001F5C000
trusted library allocation
page read and write
14803290000
trusted library allocation
page read and write
23A003CF3000
trusted library allocation
page read and write
14803434000
trusted library allocation
page read and write
B42000
heap
page read and write
1DC87A80000
unclassified section
page readonly
148024A0000
trusted library allocation
page read and write
17F00A40000
trusted library allocation
page read and write
23A0021E8000
trusted library allocation
page read and write
1AAD138A000
heap
page read and write
23A002120000
trusted library allocation
page read and write
761000333000
trusted library allocation
page read and write
6670DFD000
stack
page read and write
D45000
heap
page read and write
96351FE000
stack
page read and write
148028C4000
trusted library allocation
page read and write
76100025C000
trusted library allocation
page read and write
14D9D625000
heap
page read and write
761000284000
trusted library allocation
page read and write
2CD7685A000
heap
page read and write
1CACA417000
heap
page read and write
23A000D14000
trusted library allocation
page read and write
4478002AC000
trusted library allocation
page read and write
1CACE5EB000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
1CACE141000
heap
page read and write
669000280000
trusted library allocation
page read and write
700C002D8000
trusted library allocation
page read and write
23A0018D8000
trusted library allocation
page read and write
666F5FE000
unkown
page readonly
14802D5C000
trusted library allocation
page read and write
23A00224C000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
7610004BC000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
14E654C5000
unclassified section
page read and write
23A003D06000
trusted library allocation
page read and write
1ADA0000
heap
page execute and read and write
23A003D11000
trusted library allocation
page read and write
76100030C000
trusted library allocation
page read and write
148027CC000
trusted library allocation
page read and write
E130FFE000
unkown
page readonly
1CACC616000
heap
page read and write
14E6587C000
unclassified section
page read and write
23A000674000
trusted library allocation
page read and write
1CACE33D000
heap
page read and write
CE6000
heap
page read and write
1AAD6322000
unclassified section
page read and write
61C009B0000
trusted library allocation
page read and write
3FDC00050000
trusted library allocation
page read and write
13D9000
heap
page read and write
23A002EA6000
trusted library allocation
page read and write
1CACC7A4000
heap
page read and write
49B000230000
trusted library allocation
page read and write
1A04002C4000
trusted library allocation
page read and write
1CACE17E000
heap
page read and write
49B000358000
trusted library allocation
page read and write
23A00088C000
trusted library allocation
page read and write
182C002A4000
trusted library allocation
page read and write
23A002D03000
trusted library allocation
page read and write
700C00280000
trusted library allocation
page read and write
23A0022BF000
trusted library allocation
page read and write
1CACC6AC000
heap
page read and write
D19000
heap
page read and write
1AAD314B000
heap
page read and write
1DC87610000
unclassified section
page readonly
1480307C000
trusted library allocation
page read and write
1CACDB78000
heap
page read and write
2EB800110000
trusted library allocation
page read and write
14802C78000
trusted library allocation
page read and write
14800C01000
trusted library allocation
page read and write
3FDC000DD000
trusted library allocation
page read and write
23A002E43000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
14802C24000
trusted library allocation
page read and write
14802C58000
trusted library allocation
page read and write
1AAD316E000
heap
page read and write
963A9FE000
unkown
page readonly
14800801000
trusted library allocation
page read and write
1CACC72D000
heap
page read and write
31D09FC000
stack
page read and write
10B5000
heap
page read and write
23A002311000
trusted library allocation
page read and write
24FF000
stack
page read and write
1CACDCA7000
heap
page read and write
1CACE21B000
heap
page read and write
17F00542000
trusted library allocation
page read and write
447800408000
trusted library allocation
page read and write
1CACA455000
heap
page read and write
A45000
heap
page read and write
1CACA48D000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
23A001880000
trusted library allocation
page read and write
61C00930000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACC677000
heap
page read and write
23A000718000
trusted library allocation
page read and write
23A00080C000
trusted library allocation
page read and write
44780020C000
trusted library allocation
page read and write
1CACDDC9000
heap
page read and write
33FC00110000
trusted library allocation
page read and write
23A00089C000
trusted library allocation
page read and write
61C00350000
trusted library allocation
page read and write
23A00061C000
trusted library allocation
page read and write
61C009A8000
trusted library allocation
page read and write
23A00206C000
trusted library allocation
page read and write
23A0020A0000
trusted library allocation
page read and write
3C34002B4000
trusted library allocation
page read and write
61C008D4000
trusted library allocation
page read and write
CB0000
heap
page read and write
1CACE5DF000
heap
page read and write
23A0020B0000
trusted library allocation
page read and write
A80000
heap
page read and write
1CACC6A6000
heap
page read and write
23A002E37000
trusted library allocation
page read and write
76100044E000
trusted library allocation
page read and write
23A003CFA000
trusted library allocation
page read and write
1B29F000
stack
page read and write
14802948000
trusted library allocation
page read and write
17F00942000
trusted library allocation
page read and write
3FDC00120000
trusted library allocation
page read and write
408000
unkown
page readonly
761000178000
trusted library allocation
page read and write
1CACE2AF000
heap
page read and write
761000264000
trusted library allocation
page read and write
48E000220000
trusted library allocation
page read and write
1CACDE70000
heap
page read and write
C50000
trusted library allocation
page read and write
313F000
stack
page read and write
1CACE327000
heap
page read and write
77C000348000
direct allocation
page read and write
1CACC646000
heap
page read and write
1CACDD47000
heap
page read and write
14D9D60D000
heap
page read and write
23A000A54000
trusted library allocation
page read and write
23A000E04000
trusted library allocation
page read and write
1CACDCAE000
heap
page read and write
14D9D602000
heap
page read and write
1AAD3DC0000
unkown
page read and write
6A6C7FE000
unkown
page readonly
1CACBD60000
heap
page read and write
33FC00054000
trusted library allocation
page read and write
148029DC000
trusted library allocation
page read and write
23A0021A8000
trusted library allocation
page read and write
23A00218C000
trusted library allocation
page read and write
700C002B4000
trusted library allocation
page read and write
3FDC0000C000
trusted library allocation
page read and write
148024BC000
trusted library allocation
page read and write
1B6BE000
stack
page read and write
14D9D60D000
heap
page read and write
700C00418000
trusted library allocation
page read and write
14803DD0000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
1CACC7BD000
heap
page read and write
23A001EAC000
trusted library allocation
page read and write
33FC001D0000
trusted library allocation
page read and write
33FC00148000
trusted library allocation
page read and write
77C000260000
direct allocation
page read and write
14E657FA000
unclassified section
page read and write
B7EEBC8000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
14D9D609000
heap
page read and write
14D9D624000
heap
page read and write
14802C85000
trusted library allocation
page read and write
1DC81D02000
heap
page read and write
2CD768F1000
heap
page read and write
1CACDD21000
heap
page read and write
1DC81B40000
heap
page read and write
23A0003E8000
trusted library allocation
page read and write
9C7E2C9000
stack
page read and write
23A00088C000
trusted library allocation
page read and write
182C00238000
trusted library allocation
page read and write
14803260000
trusted library allocation
page read and write
23A000F9C000
trusted library allocation
page read and write
23A000D38000
trusted library allocation
page read and write
962E9FE000
unkown
page readonly
1CACDD51000
heap
page read and write
1CACC699000
heap
page read and write
76100048C000
trusted library allocation
page read and write
23A0021A0000
trusted library allocation
page read and write
23A001C84000
trusted library allocation
page read and write
14D9D623000
heap
page read and write
1CACA455000
heap
page read and write
23A002DBC000
trusted library allocation
page read and write
23A001898000
trusted library allocation
page read and write
23A0021A6000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1DC84720000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
61C00804000
trusted library allocation
page read and write
61C00201000
trusted library allocation
page read and write
33FC006CC000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
3FDC000FC000
trusted library allocation
page read and write
9D7000
heap
page read and write
33FC00060000
trusted library allocation
page read and write
23A002DB2000
trusted library allocation
page read and write
23A002AFC000
trusted library allocation
page read and write
148032E0000
trusted library allocation
page read and write
1CACC657000
heap
page read and write
148023E8000
trusted library allocation
page read and write
1A040027C000
trusted library allocation
page read and write
1CACDD35000
heap
page read and write
1A04002C4000
trusted library allocation
page read and write
14E6590F000
unclassified section
page read and write
31B69FB000
stack
page read and write
49B000254000
trusted library allocation
page read and write
14E62070000
unclassified section
page read and write
6A667FE000
unkown
page readonly
7610003BC000
trusted library allocation
page read and write
1CACA3D6000
heap
page read and write
14D9D624000
heap
page read and write
1397000
heap
page read and write
14E658A2000
unclassified section
page read and write
1CACE5FB000
heap
page read and write
3FDC00128000
trusted library allocation
page read and write
23A001F1C000
trusted library allocation
page read and write
14E60610000
unclassified section
page read and write
77C000298000
direct allocation
page read and write
14D9D5FD000
unclassified section
page read and write
7FFD9B9CC000
trusted library allocation
page execute and read and write
76100030C000
trusted library allocation
page read and write
23A001E0C000
trusted library allocation
page read and write
14E65916000
unclassified section
page read and write
761000300000
trusted library allocation
page read and write
61E000
unkown
page readonly
1CACDD26000
heap
page read and write
23A001C34000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
7610004BC000
trusted library allocation
page read and write
CD0000
heap
page read and write
23A002DF9000
trusted library allocation
page read and write
497C002CC000
direct allocation
page read and write
6A2400254000
direct allocation
page read and write
14E66449000
unclassified section
page read and write
C5800240000
trusted library allocation
page read and write
23A002CC1000
trusted library allocation
page read and write
23A001F34000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14D9D62B000
heap
page read and write
23A0033D4000
trusted library allocation
page read and write
1CACE325000
heap
page read and write
360000
heap
page read and write
24EEB62B000
heap
page read and write
2CD768A3000
heap
page read and write
16780020C000
trusted library allocation
page read and write
1FBE2200000
heap
page read and write
23A003D75000
trusted library allocation
page read and write
14800248000
trusted library allocation
page read and write
1CACE2A3000
heap
page read and write
23A000674000
trusted library allocation
page read and write
148028C4000
trusted library allocation
page read and write
61C0023C000
trusted library allocation
page read and write
23A0022BC000
trusted library allocation
page read and write
1CACC691000
heap
page read and write
14802EBF000
trusted library allocation
page read and write
1A040028C000
trusted library allocation
page read and write
7FFDC31C4000
trusted library allocation
page execute and read and write
962F9FE000
unkown
page readonly
1CACC78E000
heap
page read and write
23A000818000
trusted library allocation
page read and write
B7F6654000
stack
page read and write
23A001FAF000
trusted library allocation
page read and write
1CACE32B000
heap
page read and write
76100036B000
trusted library allocation
page read and write
C10000
heap
page read and write
14D9D624000
heap
page read and write
1220000
heap
page read and write
23A002D64000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A002AFC000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
1CACDCBA000
heap
page read and write
1FBE57F0000
unclassified section
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
14D9D600000
heap
page read and write
10EC002B8000
trusted library allocation
page read and write
14800401000
trusted library allocation
page read and write
1CACDD04000
heap
page read and write
CA5000
heap
page read and write
4478002CC000
trusted library allocation
page read and write
1CACE2BF000
heap
page read and write
14D9D62B000
heap
page read and write
394800270000
direct allocation
page read and write
700C00404000
trusted library allocation
page read and write
33FC002B4000
trusted library allocation
page read and write
1CACC67E000
heap
page read and write
33FC0036C000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
4A2C00338000
trusted library allocation
page read and write
23A001CEC000
trusted library allocation
page read and write
14D9D60A000
heap
page read and write
14803DB6000
trusted library allocation
page read and write
6690002C0000
trusted library allocation
page read and write
23A000D5C000
trusted library allocation
page read and write
1AAD8402000
heap
page read and write
139A000
heap
page read and write
23A000D2C000
trusted library allocation
page read and write
1CACDCEB000
heap
page read and write
23A002180000
trusted library allocation
page read and write
1CACE1D2000
heap
page read and write
24EF0002000
heap
page read and write
B7F7A8D000
stack
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
14D9D62B000
heap
page read and write
23A000D1A000
trusted library allocation
page read and write
77C0002A8000
direct allocation
page read and write
1DC817F0000
heap
page read and write
D76000
heap
page read and write
B7F6998000
stack
page read and write
7FF7888A1000
unkown
page execute read
1AAD1329000
heap
page read and write
76100048C000
trusted library allocation
page read and write
761000050000
trusted library allocation
page read and write
2CD768CA000
heap
page read and write
23A002A5C000
trusted library allocation
page read and write
761000167000
trusted library allocation
page read and write
23A002311000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
123F3000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
23A000D68000
trusted library allocation
page read and write
28E0000
heap
page read and write
14E65771000
unclassified section
page read and write
17F00102000
trusted library allocation
page read and write
3C3400220000
trusted library allocation
page read and write
23A00089C000
trusted library allocation
page read and write
7610002F4000
trusted library allocation
page read and write
C5800201000
trusted library allocation
page read and write
6E4C00238000
direct allocation
page read and write
7610003BC000
trusted library allocation
page read and write
1CACDB97000
heap
page read and write
14802F04000
trusted library allocation
page read and write
23A002DAB000
trusted library allocation
page read and write
1CACE33B000
heap
page read and write
23A002314000
trusted library allocation
page read and write
76100035C000
trusted library allocation
page read and write
23A000C8E000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
14E65801000
unclassified section
page read and write
1CACA43E000
heap
page read and write
B7F699F000
stack
page read and write
14802858000
trusted library allocation
page read and write
23A002188000
trusted library allocation
page read and write
1AAD11B0000
heap
page readonly
76100044E000
trusted library allocation
page read and write
23A001D64000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
2CD76861000
heap
page read and write
1CACE5EB000
heap
page read and write
76100038C000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
700C00237000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
23A002DA4000
trusted library allocation
page read and write
1CACC730000
heap
page read and write
14D9D60A000
heap
page read and write
1480266E000
trusted library allocation
page read and write
1B32E000
stack
page read and write
5BC800250000
direct allocation
page read and write
14802430000
trusted library allocation
page read and write
23A001E0C000
trusted library allocation
page read and write
1DC8184C000
heap
page read and write
17F00AC2000
trusted library allocation
page read and write
23A002034000
trusted library allocation
page read and write
1CACE333000
heap
page read and write
23A00088C000
trusted library allocation
page read and write
1CACDC2B000
heap
page read and write
2CD7689A000
heap
page read and write
3EA75FC000
stack
page read and write
14D9D624000
heap
page read and write
3C3400201000
trusted library allocation
page read and write
14802264000
trusted library allocation
page read and write
1480280C000
trusted library allocation
page read and write
1CACDE70000
heap
page read and write
1DC81B12000
unclassified section
page read and write
14803028000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
61C0036C000
trusted library allocation
page read and write
23A001F1C000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1AAD1327000
heap
page read and write
14E654C2000
unclassified section
page read and write
7610002C0000
trusted library allocation
page read and write
96311FC000
stack
page read and write
1678002D4000
trusted library allocation
page read and write
669000238000
trusted library allocation
page read and write
2700000
heap
page execute and read and write
23A003CF0000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1CACDD15000
heap
page read and write
1DC87EF0000
unclassified section
page readonly
1CACE187000
heap
page read and write
1CACDBBA000
heap
page read and write
962C1FB000
stack
page read and write
23A001CE4000
trusted library allocation
page read and write
1CACDD06000
heap
page read and write
1CACDCF2000
heap
page read and write
B7F6A56000
stack
page read and write
23A002D98000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
669000284000
trusted library allocation
page read and write
96349FE000
unkown
page readonly
7610001D8000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
4A2C00278000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
1CACC691000
heap
page read and write
1D9B8A2E000
heap
page read and write
6A24002B0000
direct allocation
page read and write
3FDC00038000
trusted library allocation
page read and write
76100036B000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
6A2400294000
direct allocation
page read and write
1CACE348000
heap
page read and write
23A002E8C000
trusted library allocation
page read and write
23A000F90000
trusted library allocation
page read and write
1CACC616000
heap
page read and write
48E000210000
trusted library allocation
page read and write
1CACD6B0000
remote allocation
page read and write
1AAD66D0000
unkown
page readonly
33FC001BC000
trusted library allocation
page read and write
14802E74000
trusted library allocation
page read and write
23A002CDB000
trusted library allocation
page read and write
1CACDCF6000
heap
page read and write
1CACDB9A000
heap
page read and write
14803040000
trusted library allocation
page read and write
23A003CD9000
trusted library allocation
page read and write
394800284000
direct allocation
page read and write
1CACC67E000
heap
page read and write
61C0093C000
trusted library allocation
page read and write
B7F6A24000
stack
page read and write
14802758000
trusted library allocation
page read and write
1480314C000
trusted library allocation
page read and write
962D1FC000
stack
page read and write
B7F102F000
stack
page read and write
33FC0040C000
trusted library allocation
page read and write
14E65833000
unclassified section
page read and write
1CACA340000
heap
page read and write
303E000
stack
page read and write
1DC81B60000
trusted library allocation
page read and write
1D9B8A2B000
heap
page read and write
1CACE311000
heap
page read and write
23A003D58000
trusted library allocation
page read and write
23A002428000
trusted library allocation
page read and write
700C002C8000
trusted library allocation
page read and write
1CACE2CE000
heap
page read and write
14D9D62B000
heap
page read and write
23A00231D000
trusted library allocation
page read and write
23A0033AE000
trusted library allocation
page read and write
17F00902000
trusted library allocation
page read and write
447800310000
trusted library allocation
page read and write
33FC00288000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
33FC000AC000
trusted library allocation
page read and write
23A0021BA000
trusted library allocation
page read and write
23A001DB4000
trusted library allocation
page read and write
1CACE2BF000
heap
page read and write
1CACE323000
heap
page read and write
33FC0014A000
trusted library allocation
page read and write
23A000AC0000
trusted library allocation
page read and write
1CACC691000
heap
page read and write
23A0033CA000
trusted library allocation
page read and write
17F00582000
trusted library allocation
page read and write
7C0000
heap
page read and write
14E6594A000
unclassified section
page read and write
1480240C000
trusted library allocation
page read and write
1CACE2C1000
heap
page read and write
7610001D8000
trusted library allocation
page read and write
23A002188000
trusted library allocation
page read and write
C5800220000
trusted library allocation
page read and write
2CD76864000
heap
page read and write
B7F684B000
stack
page read and write
1DC876F9000
unclassified section
page readonly
1CACA400000
heap
page read and write
14D9D241000
heap
page read and write
1CACA484000
heap
page read and write
23FF000
trusted library allocation
page read and write
14E65EFA000
unclassified section
page read and write
23A0007A4000
trusted library allocation
page read and write
14D9D624000
heap
page read and write
1CACA493000
heap
page read and write
23A002EAB000
trusted library allocation
page read and write
C580029C000
trusted library allocation
page read and write
1CACDBB2000
heap
page read and write
14D9D625000
heap
page read and write
6A2400288000
direct allocation
page read and write
23A002BA8000
trusted library allocation
page read and write
6A687FE000
unkown
page readonly
1CACA3E2000
heap
page read and write
574000
stack
page read and write
394800230000
direct allocation
page read and write
14803A0C000
trusted library allocation
page read and write
7FE000
heap
page read and write
CB3000
heap
page read and write
6674DFC000
stack
page read and write
61C00354000
trusted library allocation
page read and write
5BC800201000
direct allocation
page read and write
1CACC67E000
heap
page read and write
14802C60000
trusted library allocation
page read and write
14803198000
trusted library allocation
page read and write
23A001E94000
trusted library allocation
page read and write
1CACDD7A000
heap
page read and write
14E657CD000
unclassified section
page read and write
5C0000
heap
page read and write
23A003D24000
trusted library allocation
page read and write
1CACC663000
heap
page read and write
1D9B8940000
trusted library allocation
page read and write
33FC00158000
trusted library allocation
page read and write
23A002DDF000
trusted library allocation
page read and write
76100014C000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
14803DA8000
trusted library allocation
page read and write
1AAD1386000
heap
page read and write
1CACA3A0000
heap
page read and write
1CACE1AB000
heap
page read and write
33FC003D8000
trusted library allocation
page read and write
3FDC00044000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
3948002C4000
direct allocation
page read and write
76100030C000
trusted library allocation
page read and write
31BA1FE000
unkown
page readonly
23A00088C000
trusted library allocation
page read and write
1A04002B4000
trusted library allocation
page read and write
148031EC000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
14803218000
trusted library allocation
page read and write
1CACC6E6000
heap
page read and write
254E000
stack
page read and write
14803508000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
23A001F48000
trusted library allocation
page read and write
1DC8182B000
heap
page read and write
61C00804000
trusted library allocation
page read and write
497C002BC000
direct allocation
page read and write
23A000A5C000
trusted library allocation
page read and write
35CC00280000
direct allocation
page read and write
14D9D624000
heap
page read and write
76100048C000
trusted library allocation
page read and write
14803064000
trusted library allocation
page read and write
61C00C04000
trusted library allocation
page read and write
1CACDEB7000
heap
page read and write
7610003BC000
trusted library allocation
page read and write
17F00A40000
trusted library allocation
page read and write
1678002C8000
trusted library allocation
page read and write
1CACDBC6000
heap
page read and write
14E654A6000
unclassified section
page read and write
10EC002B8000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
D3F000
heap
page read and write
23A0020C0000
trusted library allocation
page read and write
14E65E84000
unclassified section
page read and write
1CACE33D000
heap
page read and write
148030E8000
trusted library allocation
page read and write
79C000
heap
page read and write
7E0000
heap
page read and write
14803178000
trusted library allocation
page read and write
761000254000
trusted library allocation
page read and write
23A002DB0000
trusted library allocation
page read and write
1AAD1226000
heap
page read and write
761000371000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
7610003AE000
trusted library allocation
page read and write
14E658AE000
unclassified section
page read and write
14D9D624000
heap
page read and write
77C000230000
direct allocation
page read and write
1CACA490000
heap
page read and write
6114002B8000
trusted library allocation
page read and write
1CACC6E6000
heap
page read and write
B6B000
heap
page read and write
14E65901000
unclassified section
page read and write
1D9BA402000
heap
page read and write
1CACE205000
heap
page read and write
167800248000
trusted library allocation
page read and write
1CACDC16000
heap
page read and write
14802D9C000
trusted library allocation
page read and write
23A0019CC000
trusted library allocation
page read and write
1CACE2C4000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
1CACDDAA000
heap
page read and write
14D9D62B000
heap
page read and write
1678002BC000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14E65E33000
unclassified section
page read and write
1CACDBE2000
heap
page read and write
167800238000
trusted library allocation
page read and write
23A000BA0000
trusted library allocation
page read and write
611400210000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
23A000A99000
trusted library allocation
page read and write
1CACDB9C000
heap
page read and write
33FC0018A000
trusted library allocation
page read and write
1CACC68D000
heap
page read and write
148028F8000
trusted library allocation
page read and write
33FC00118000
trusted library allocation
page read and write
12B20000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
669000274000
trusted library allocation
page read and write
447800328000
trusted library allocation
page read and write
23A001F5C000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
14803E98000
trusted library allocation
page read and write
1CACDBA2000
heap
page read and write
23A001FC8000
trusted library allocation
page read and write
1AAD314B000
heap
page read and write
1CACE1CC000
heap
page read and write
15B5000
heap
page read and write
761000264000
trusted library allocation
page read and write
23A002C1C000
trusted library allocation
page read and write
61C00354000
trusted library allocation
page read and write
33FC00538000
trusted library allocation
page read and write
14803040000
trusted library allocation
page read and write
1B0000
heap
page read and write
23A001CFC000
trusted library allocation
page read and write
1CACA431000
heap
page read and write
1CACE2A5000
heap
page read and write
1C278000
stack
page read and write
2935BFE000
stack
page read and write
23A002DBE000
trusted library allocation
page read and write
23A001DC4000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
1CACDBB0000
heap
page read and write
1CACDB93000
heap
page read and write
497C00234000
direct allocation
page read and write
23A002385000
trusted library allocation
page read and write
4478002F3000
trusted library allocation
page read and write
1DC87A46000
unclassified section
page readonly
4A2C00201000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1CACE34B000
heap
page read and write
2CD76887000
heap
page read and write
1CACE2C7000
heap
page read and write
7610001C4000
trusted library allocation
page read and write
C5800250000
trusted library allocation
page read and write
23A002DC3000
trusted library allocation
page read and write
1DC848B1000
heap
page read and write
17F00040000
trusted library allocation
page read and write
1CACDC93000
heap
page read and write
148028E0000
trusted library allocation
page read and write
1CACDEE5000
heap
page read and write
1AAD6700000
trusted library section
page read and write
1CACC72D000
heap
page read and write
14E6643D000
unclassified section
page read and write
2E4F000
stack
page read and write
1FBE2140000
heap
page read and write
33FC000C8000
trusted library allocation
page read and write
1AAD3167000
heap
page read and write
1CACC4C4000
heap
page read and write
271C000
trusted library allocation
page read and write
14D9D613000
heap
page read and write
23A001D3C000
trusted library allocation
page read and write
1480329C000
trusted library allocation
page read and write
761000284000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1CACC78E000
heap
page read and write
14802F14000
trusted library allocation
page read and write
1DC848D2000
heap
page read and write
7610002C0000
trusted library allocation
page read and write
D40000
heap
page read and write
17F00500000
trusted library allocation
page read and write
48E000201000
trusted library allocation
page read and write
17F00AC2000
trusted library allocation
page read and write
23A000F8C000
trusted library allocation
page read and write
14802D7C000
trusted library allocation
page read and write
9CD000
heap
page read and write
14800A64000
trusted library allocation
page read and write
23A000D2C000
trusted library allocation
page read and write
17F00A82000
trusted library allocation
page read and write
23A0008AF000
trusted library allocation
page read and write
1CACDEB4000
heap
page read and write
76100038C000
trusted library allocation
page read and write
31CB1FE000
unkown
page readonly
96309FE000
unkown
page readonly
48E0002C8000
trusted library allocation
page read and write
1CA6C000
stack
page read and write
33FC0011C000
trusted library allocation
page read and write
14E65E71000
unclassified section
page read and write
14D9D62B000
heap
page read and write
14D9D60A000
heap
page read and write
66745FE000
unkown
page readonly
14E65ED9000
unclassified section
page read and write
182C0020C000
trusted library allocation
page read and write
14E65846000
unclassified section
page read and write
1AAD8BF5000
unkown
page readonly
1FBE212F000
remote allocation
page execute read
B7F645D000
stack
page read and write
1590000
trusted library allocation
page read and write
23A003CDD000
trusted library allocation
page read and write
14803E48000
trusted library allocation
page read and write
49B000270000
trusted library allocation
page read and write
14E65859000
unclassified section
page read and write
148031AC000
trusted library allocation
page read and write
76100048C000
trusted library allocation
page read and write
1CACC6CC000
heap
page read and write
14803D80000
trusted library allocation
page read and write
1B940000
heap
page read and write
1CACC563000
heap
page read and write
761000504000
trusted library allocation
page read and write
33FC004B4000
trusted library allocation
page read and write
B7F8C9F000
stack
page read and write
33FC0014A000
trusted library allocation
page read and write
1A97D000
stack
page read and write
23A00219B000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
14E6593C000
unclassified section
page read and write
23A00028C000
trusted library allocation
page read and write
6A2400220000
direct allocation
page read and write
497C00288000
direct allocation
page read and write
23A001204000
trusted library allocation
page read and write
23A001F0C000
trusted library allocation
page read and write
35CC002A8000
direct allocation
page read and write
35CC0029C000
direct allocation
page read and write
7610001DA000
trusted library allocation
page read and write
1CACE170000
heap
page read and write
BF2000
heap
page read and write
1AAD316E000
heap
page read and write
14D9D624000
heap
page read and write
14E6560F000
unclassified section
page read and write
7610002F4000
trusted library allocation
page read and write
1CACDBC2000
heap
page read and write
7FFD9BB42000
trusted library allocation
page read and write
14D9D60D000
heap
page read and write
1CACE5F7000
heap
page read and write
31B89FE000
stack
page read and write
666EDFE000
stack
page read and write
B5E000
stack
page read and write
1CACDF27000
heap
page read and write
23A0009D4000
trusted library allocation
page read and write
5BC8002B4000
direct allocation
page read and write
32BC000
stack
page read and write
1DC81BF0000
trusted library allocation
page read and write
700C00260000
trusted library allocation
page read and write
33FC00148000
trusted library allocation
page read and write
23A002DA9000
trusted library allocation
page read and write
C580020C000
trusted library allocation
page read and write
1B59E000
stack
page read and write
14DE0620000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
17F00582000
trusted library allocation
page read and write
23A0033A2000
trusted library allocation
page read and write
23A00230F000
trusted library allocation
page read and write
1CACC79A000
heap
page read and write
148005D2000
trusted library allocation
page read and write
1CACE348000
heap
page read and write
B7F69AF000
stack
page read and write
31DB1FE000
unkown
page readonly
1CACDCB2000
heap
page read and write
14D9D62B000
heap
page read and write
23A0024F8000
trusted library allocation
page read and write
1AAD1328000
heap
page read and write
1DC81A10000
unclassified section
page readonly
14DE0630000
trusted library allocation
page read and write
611400284000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
61C0080C000
trusted library allocation
page read and write
1AAD1329000
heap
page read and write
61C002EC000
trusted library allocation
page read and write
23A002198000
trusted library allocation
page read and write
1300000
heap
page read and write
14E6568E000
unclassified section
page read and write
2CD76902000
heap
page read and write
B7F6A76000
stack
page read and write
1CACDE6E000
heap
page read and write
23A0021BA000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
138A000
heap
page read and write
1B3D0000
heap
page execute and read and write
447800348000
trusted library allocation
page read and write
E1287FE000
stack
page read and write
61C0039C000
trusted library allocation
page read and write
148030A4000
trusted library allocation
page read and write
23A000EB8000
trusted library allocation
page read and write
35CC00230000
direct allocation
page read and write
23A001EEC000
trusted library allocation
page read and write
611400318000
trusted library allocation
page read and write
761000371000
trusted library allocation
page read and write
1CACC72D000
heap
page read and write
23A000F88000
trusted library allocation
page read and write
1AAD1377000
heap
page read and write
1DC87710000
unclassified section
page readonly
23A002193000
trusted library allocation
page read and write
182C00230000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
1CACA350000
heap
page read and write
14E6588F000
unclassified section
page read and write
14D9D62B000
heap
page read and write
14E6593A000
unclassified section
page read and write
1CACE34B000
heap
page read and write
17F00582000
trusted library allocation
page read and write
7610003BC000
trusted library allocation
page read and write
1A0400254000
trusted library allocation
page read and write
23A000674000
trusted library allocation
page read and write
10EC002A8000
trusted library allocation
page read and write
14D9D62B000
heap
page read and write
1678002D4000
trusted library allocation
page read and write
23A002B88000
trusted library allocation
page read and write
23A002B4C000
trusted library allocation
page read and write
1CACE5EF000
heap
page read and write
77C000288000
direct allocation
page read and write
148031C4000
trusted library allocation
page read and write
2EB8000A8000
trusted library allocation
page read and write
23A002E9A000
trusted library allocation
page read and write
1CACDB7A000
heap
page read and write
23A002AFC000
trusted library allocation
page read and write
148005C0000
trusted library allocation
page read and write
21986B90000
heap
page read and write
1B99F000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
23A000D20000
trusted library allocation
page read and write
1DC84902000
heap
page read and write
700C00210000
trusted library allocation
page read and write
1CACE1DC000
heap
page read and write
1CACDE93000
heap
page read and write
148030E8000
trusted library allocation
page read and write
23A000F18000
trusted library allocation
page read and write
1D9B8960000
heap
page read and write
14E61FFA000
unclassified section
page read and write
14D9D243000
heap
page read and write
1480316C000
trusted library allocation
page read and write
14E65860000
unclassified section
page read and write
29353FB000
stack
page read and write
14802700000
trusted library allocation
page read and write
14803434000
trusted library allocation
page read and write
23A001BBC000
trusted library allocation
page read and write
23A00217E000
trusted library allocation
page read and write
14E6587F000
unclassified section
page read and write
14E65EEE000
unclassified section
page read and write
6A787FE000
unkown
page readonly
23A001F48000
trusted library allocation
page read and write
12711000
trusted library allocation
page read and write
1AAD11A0000
heap
page read and write
A05000
heap
page read and write
23A0039AC000
trusted library allocation
page read and write
23A000CB0000
trusted library allocation
page read and write
1CACE323000
heap
page read and write
23A001880000
trusted library allocation
page read and write
1DC84881000
heap
page read and write
76100048C000
trusted library allocation
page read and write
24EEB65E000
heap
page read and write
6A777FE000
unkown
page readonly
7FFD9B993000
trusted library allocation
page execute and read and write
182C002C0000
trusted library allocation
page read and write
1AAD8BF1000
unkown
page readonly
1CACDB7A000
heap
page read and write
1CACDB8A000
heap
page read and write
61C008D4000
trusted library allocation
page read and write
23A003D39000
trusted library allocation
page read and write
23A003D08000
trusted library allocation
page read and write
1CACDBB2000
heap
page read and write
76100038C000
trusted library allocation
page read and write
14802DF4000
trusted library allocation
page read and write
96329FE000
unkown
page readonly
14D9D624000
heap
page read and write
23A002D9D000
trusted library allocation
page read and write
77C000244000
direct allocation
page read and write
1678002BC000
trusted library allocation
page read and write
12531000
trusted library allocation
page read and write
33FC00038000
trusted library allocation
page read and write
761000001000
trusted library allocation
page read and write
1CACE33B000
heap
page read and write
14D9D62B000
heap
page read and write
761000300000
trusted library allocation
page read and write
3C340026C000
trusted library allocation
page read and write
23A001F6C000
trusted library allocation
page read and write
23A000D20000
trusted library allocation
page read and write
3FDC00098000
trusted library allocation
page read and write
9C7E3CE000
stack
page read and write
23A001EE8000
trusted library allocation
page read and write
1AAD3100000
heap
page read and write
14803188000
trusted library allocation
page read and write
1CACE2C2000
heap
page read and write
23A000EC0000
trusted library allocation
page read and write
1CACC797000
heap
page read and write
6690002CC000
trusted library allocation
page read and write
1CACE213000
heap
page read and write
6A2400210000
direct allocation
page read and write
14E658F5000
unclassified section
page read and write
5FB000
heap
page read and write
23A00077C000
trusted library allocation
page read and write
1DC84640000
unclassified section
page read and write
7610001C4000
trusted library allocation
page read and write
1CACE5F5000
heap
page read and write
77C000314000
direct allocation
page read and write
14803E6C000
trusted library allocation
page read and write
6A75FFC000
stack
page read and write
1CACC6CC000
heap
page read and write
23A001FBC000
trusted library allocation
page read and write
23A000F5C000
trusted library allocation
page read and write
1AADC920000
unkown
page readonly
23A000C8E000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
3FDC000D8000
trusted library allocation
page read and write
23A000D5C000
trusted library allocation
page read and write
31B99FE000
stack
page read and write
1CACE348000
heap
page read and write
23A0033A9000
trusted library allocation
page read and write
1CACE34C000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
23A00197C000
trusted library allocation
page read and write
7610003AE000
trusted library allocation
page read and write
7610001D8000
trusted library allocation
page read and write
31D31FE000
unkown
page readonly
23A000B58000
trusted library allocation
page read and write
3948002A0000
direct allocation
page read and write
14E6560C000
unclassified section
page read and write
3EAF5FE000
stack
page read and write
1CACC7B7000
heap
page read and write
1480307C000
trusted library allocation
page read and write
35CC00248000
direct allocation
page read and write
23A00268C000
trusted library allocation
page read and write
23A0018B4000
trusted library allocation
page read and write
23A000AE4000
trusted library allocation
page read and write
23A00230C000
trusted library allocation
page read and write
7610001C4000
trusted library allocation
page read and write
1CACC79F000
heap
page read and write
D61000
heap
page read and write
1CACC6B6000
heap
page read and write
1CACA435000
heap
page read and write
1CACC797000
heap
page read and write
14E65935000
unclassified section
page read and write
1CACC732000
heap
page read and write
1480310C000
trusted library allocation
page read and write
394800290000
direct allocation
page read and write
31D91FE000
unkown
page readonly
14E622B0000
unclassified section
page read and write
7610001C4000
trusted library allocation
page read and write
1CACDF1F000
heap
page read and write
1FBE5887000
unclassified section
page read and write
23A003430000
trusted library allocation
page read and write
61C00804000
trusted library allocation
page read and write
14E62B06000
unclassified section
page read and write
5C0000
heap
page read and write
2EB8000E0000
trusted library allocation
page read and write
23A001C5C000
trusted library allocation
page read and write
33FC00168000
trusted library allocation
page read and write
1CACDBA6000
heap
page read and write
23A000B02000
trusted library allocation
page read and write
447800210000
trusted library allocation
page read and write
23A001D8C000
trusted library allocation
page read and write
2EB8000A6000
trusted library allocation
page read and write
7610004C2000
trusted library allocation
page read and write
14E65F08000
unclassified section
page read and write
2850000
heap
page read and write
23A003CF7000
trusted library allocation
page read and write
801000
heap
page read and write
23A003469000
trusted library allocation
page read and write
17F00482000
trusted library allocation
page read and write
23A000CC0000
trusted library allocation
page read and write
23A0009B0000
trusted library allocation
page read and write
6690002CC000
trusted library allocation
page read and write
31C19FB000
stack
page read and write
23A002072000
trusted library allocation
page read and write
76100016C000
trusted library allocation
page read and write
14802FB8000
trusted library allocation
page read and write
29333FE000
stack
page read and write
6673DFE000
stack
page read and write
23A003D56000
trusted library allocation
page read and write
1AAD1180000
heap
page read and write
2EFE000
stack
page read and write
76100044E000
trusted library allocation
page read and write
7610002E8000
trusted library allocation
page read and write
23A001EEC000
trusted library allocation
page read and write
1CACE34C000
heap
page read and write
1434000
heap
page read and write
148022C0000
trusted library allocation
page read and write
76100038C000
trusted library allocation
page read and write
1CACC767000
heap
page read and write
10EC00294000
trusted library allocation
page read and write
29343F9000
stack
page read and write
23A0009B0000
trusted library allocation
page read and write
There are 5719 hidden memdumps, click here to show them.