IOC Report
BrowserUpdateTool.exe

loading gif

Files

File Path
Type
Category
Malicious
BrowserUpdateTool.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\f89a6234-c655-4792-86ba-7884a20c76f4.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 87533
modified
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\03c8b3c3-bb83-4931-8d62-92d225459629.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\48b96472-ead3-4c2f-b09f-c1badecfcc8b.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\7e34ad29-1df6-41c1-8eb3-72e57ab59d26.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\BrowserMetrics\BrowserMetrics-66D0C7C5-1DC8.pma
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\29ff30a6-11b9-4f64-b466-237d1e99ca47.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\8a6fb023-c232-414b-b7d5-ab9f1e20ed5c.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000001
ASCII text, with very long lines (65447)
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000002
Web Open Font Format (Version 2), TrueType, length 18536, version 1.0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000003
Web Open Font Format (Version 2), TrueType, length 18588, version 1.0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000004
Web Open Font Format (Version 2), TrueType, length 18596, version 1.0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\1afe9cacc9803fd2_0
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\91edad15745f1295_0
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\ce7a59cbee8b4379_0
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF427fed.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\History-journal
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\3ac53f57-dfab-444d-a69f-4fabb3044db1.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\521bd3da-044a-457a-bf4c-25ae3fe771d5.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\5296a21c-cedd-44a4-8f43-06ace8124daa.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Network Persistent State~RF434271.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\SCT Auditing Pending Reports~RF4228a5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\c7dc1db3-3e15-4378-b821-bd833f105d83.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\d649fc31-4291-4e1c-a28f-3a0c5adf4686.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Preferences~RF42c245.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Preferences~RF433775.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\e5e6155a-1c59-47cc-ac23-53d883c0990d.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\ead8be59-5ced-4156-a568-3a7c8885b37f.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF42251b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF422588.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF424bec.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF4335ee.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF439c59.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\e155d714-65be-4e97-807c-4bac3ce3834c.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\e2ef58de-f2e6-4903-a54a-cf2cce2335af.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\e707b652-7fb0-4f82-9b4b-cca4e64c1614.tmp
JSON data
dropped
There are 140 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BrowserUpdateTool.exe
"C:\Users\user\Desktop\BrowserUpdateTool.exe"
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=BrowserUpdateTool.exe --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7536.7584.8340987022922056471
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2

URLs

Name
IP
Malicious
http://anglebug.com/3498n
unknown
http://www.4399.com/flash/32979.htm
unknown
http://anglebug.com/8162K
unknown
https://www.4399.com/flash/180977_3.htm
unknown
http://anglebug.com/6755g
unknown
https://www.4399.com/flash/127539_4.htm
unknown
http://anglebug.com/4633
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
https://anglebug.com/7382
unknown
https://www.4399.com/flash/205462_4.htm
unknown
http://wails.localhost/chromium.svgbackend.App.GetBrowsers-2302447986
unknown
https://www.4399.com/flash/145991_4.htm
unknown
https://iamcrede/v1/projects/-/s:generateAccessT-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.
unknown
http://anglebug.com/6876R
unknown
https://www.4399.com/flash/39379_2.htm
unknown
https://www.4399.com/flash/55146_4.htm
unknown
https://www.4399.com/flash/195673_4.htm
unknown
https://iamcredentials.X-Appengine-Api-TicketX-Google-DappertraceinfoX-Appengine-User-IpX-Appengine-
unknown
https://permanently-removed.invalid/v1:GetHints
unknown
https://www.4399.com/flash/18012.htm
unknown
https://www.4399.com/flash/zmhj.htm#search3-6407
unknown
http://anglebug.com/3452Q
unknown
http://anglebug.com/6929
unknown
https://www.4399.com/flash/217926_2.htm
unknown
https://www.4399.com/flash/218860_1.htm
unknown
https://anglebug.com/7246
unknown
https://www.4399.com/flash/27924_2.htm
unknown
http://wails.localhost/chrome-beta.svghttp://wails.localhost/chromium.svgInternal
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://www.4399.com/flash/18012_4.htm
unknown
https://www.4399.com/flash/48504.htm
unknown
https://issuetracker.google.com/161903006
unknown
https://www.office.com/OfficeeEATE
unknown
http://wails.localhost/wails/ipc.js
unknown
https://gorm.io/docs/hooks.htmlAn
unknown
http://anglebug.com/4722
unknown
https://www.4399.com/flash/zmhj.htm
unknown
http://wails.localhost/wails/runtime.jshttp://wails.localhost/assets/index.25ad37ba.jsInternal
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
unknown
http://anglebug.com/7406;
unknown
http://wails.localhost/favicon.icoInternal
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://ocsp.accv.esTWCA
unknown
https://www.4399.com/flash/69156_1.htm
unknown
https://www.4399.com/flash/198637_4.htm
unknown
https://www.4399.com/flash/133630_4.htm
unknown
http://anglebug.com/5881&
unknown
https://doi.org/GetPartitions:
unknown
https://www.4399.com/flash/218717_2.htm
unknown
https://www.4399.com/flash/136516_3.htm
unknown
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:
unknown
https://www.4399.com/flash/203215_3.htm
unknown
https://www.4399.com/flash/207195_4.htm
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
https://designerapp-int.azurewebsites.net/
unknown
http://anglebug.com/3624
unknown
https://www.4399.com/flash/217855_4.htm
unknown
http://anglebug.com/3862
unknown
http://wails.localhost/brave.svga
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://www.4399.com/flash/21674_3.htm
unknown
https://www.4399.com/flash/204650_1.htm
unknown
https://www.4399.com/flash/115339_1.htm
unknown
https://www.4399.com/flash/203369_3.htm
unknown
http://anglebug.com/68605
unknown
https://www.4399.com/flash/35538.htm
unknown
https://www.4399.com/flash/218066_3.htm
unknown
https://www.4399.com/flash/6232_3.htm
unknown
http://www.quovadisglobal.com/cps0
unknown
https://www.4399.com/flash/195990_1.htm
unknown
https://www.4399.com/flash/12669_4.htm
unknown
https://www.4399.com/flash/204056_4.htm
unknown
http://anglebug.com/3970
unknown
https://www.4399.com/flash/205090_2.htm
unknown
https://www.4399.com/flash/10379_3.htm
unknown
https://www.4399.com/flash/203018_4.htm
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://wails.localhost/http://wails.localhost/
unknown
https://github.com/go-sql-driver/mysql/wiki/strict-modeChannel
unknown
http://wails.localhost/chrome.svgInternal
unknown
http://anglebug.com/5901
unknown
https://anglebug.com/7369J
unknown
http://anglebug.com/3965
unknown
http://ocsp.accv.es0
unknown
https://anglebug.com/7161
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0B1
unknown
https://anglebug.com/7369F
unknown
https://anglebug.com/7162
unknown
https://www.4399.com/flash/202828_2.htm
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://www.4399.com/flash/198491_1.htm
unknown
https://www.4399.com/flash/203453_2.htm
unknown
https://anglebug.com/73697
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
172.64.41.3
code.jquery.com
151.101.130.137
raw.githubusercontent.com
185.199.111.133
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
162.159.61.3
unknown
United States
127.0.0.1
unknown
unknown
185.199.111.133
raw.githubusercontent.com
Netherlands
172.64.41.3
chrome.cloudflare-dns.com
United States
151.101.130.137
code.jquery.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19D0516C000
heap
page read and write
A7400254000
trusted library allocation
page read and write
7858000E4000
trusted library allocation
page read and write
1E7C338B000
unclassified section
page read and write
1A3C002DC000
trusted library allocation
page read and write
6D7C00328000
trusted library allocation
page read and write
4C1800788000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C64036C8000
trusted library allocation
page read and write
1A3C00304000
trusted library allocation
page read and write
19BF43F0000
trusted library allocation
page read and write
4C6403218000
trusted library allocation
page read and write
4C180157A000
trusted library allocation
page read and write
40840008C000
trusted library allocation
page read and write
C000CD9000
direct allocation
page read and write
4C1800824000
trusted library allocation
page read and write
5FF000258000
trusted library allocation
page read and write
A74002D4000
trusted library allocation
page read and write
4C1800A0C000
trusted library allocation
page read and write
1E095EBD000
unclassified section
page readonly
19BF3715000
direct allocation
page read and write
1E7F1A25000
heap
page read and write
4C64031D8000
trusted library allocation
page read and write
4C1800F2C000
trusted library allocation
page read and write
4C64035EC000
trusted library allocation
page read and write
19D09DF9000
unkown
page readonly
4C18011C8000
trusted library allocation
page read and write
4C18014B8000
trusted library allocation
page read and write
5FF000201000
trusted library allocation
page read and write
6190002D0000
trusted library allocation
page read and write
4000334000
trusted library allocation
page read and write
706B5FD000
stack
page read and write
19D0B922000
heap
page read and write
199C0001C000
trusted library allocation
page read and write
631C0040C000
trusted library allocation
page read and write
235400288000
trusted library allocation
page read and write
19D0508D000
heap
page read and write
36600A82000
trusted library allocation
page read and write
5E4800264000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C180142A000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
4C18009E9000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
3660083B000
trusted library allocation
page read and write
A74002D4000
trusted library allocation
page read and write
4C18015F7000
trusted library allocation
page read and write
4C1800B00000
trusted library allocation
page read and write
4C1800EE2000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
1B58FFC000
stack
page read and write
4C640340C000
trusted library allocation
page read and write
408400080000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
1E090582000
unclassified section
page read and write
19D0B800000
heap
page read and write
4C180164A000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
36600D42000
trusted library allocation
page read and write
366008AC000
trusted library allocation
page read and write
366008AC000
trusted library allocation
page read and write
4C6402ACC000
trusted library allocation
page read and write
619000294000
trusted library allocation
page read and write
3208002D8000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
19BF37A0000
direct allocation
page execute read
235400220000
trusted library allocation
page read and write
1C4B4102000
heap
page read and write
3F9BFFE000
stack
page read and write
283B5FC000
stack
page read and write
1E7F1F50000
trusted library allocation
page read and write
1E7F1A02000
heap
page read and write
1E095CD3000
unclassified section
page readonly
6D7C00408000
trusted library allocation
page read and write
1C76D2CD000
heap
page read and write
19D0B91A000
heap
page read and write
19D0512E000
heap
page read and write
4C180080C000
trusted library allocation
page read and write
5FF000220000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
4C6402F48000
trusted library allocation
page read and write
4C18011BC000
trusted library allocation
page read and write
4000270000
trusted library allocation
page read and write
1E093500000
heap
page read and write
4C1800D5C000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
284D5FB000
stack
page read and write
4C08002BC000
direct allocation
page read and write
19BF36E0000
heap
page read and write
4C180102C000
trusted library allocation
page read and write
4C640273C000
trusted library allocation
page read and write
4C6402E5C000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
1E7F1610000
remote allocation
page read and write
4C64027EC000
trusted library allocation
page read and write
36600780000
trusted library allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
1E7C39C9000
unclassified section
page read and write
4C180107C000
trusted library allocation
page read and write
4C18003E8000
trusted library allocation
page read and write
366006C2000
trusted library allocation
page read and write
1E7F1F60000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
A7400263000
trusted library allocation
page read and write
CAC00244000
direct allocation
page read and write
C000559000
direct allocation
page read and write
4C640224E000
trusted library allocation
page read and write
4C1801658000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C180100C000
trusted library allocation
page read and write
4C1801498000
trusted library allocation
page read and write
4C08002D0000
direct allocation
page read and write
6D7C00278000
trusted library allocation
page read and write
C000E90000
direct allocation
page read and write
A7400244000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
3660085B000
trusted library allocation
page read and write
1E7F1A57000
heap
page read and write
19D0A03A000
unclassified section
page read and write
4C1800B24000
trusted library allocation
page read and write
4C6400601000
trusted library allocation
page read and write
2842DFE000
unkown
page readonly
36600442000
trusted library allocation
page read and write
A7400268000
trusted library allocation
page read and write
A74002EC000
trusted library allocation
page read and write
4C1800FE4000
trusted library allocation
page read and write
1C76D28D000
heap
page read and write
4C6402450000
trusted library allocation
page read and write
3F9B7FE000
unkown
page readonly
366007A0000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C18016C8000
trusted library allocation
page read and write
36600402000
trusted library allocation
page read and write
4C1801558000
trusted library allocation
page read and write
1E7C3BD0000
unclassified section
page read and write
36600C82000
trusted library allocation
page read and write
19D0C222000
trusted library allocation
page read and write
36600B42000
trusted library allocation
page read and write
1C4B4210000
heap
page read and write
619000C0C000
trusted library allocation
page read and write
4C64024B4000
trusted library allocation
page read and write
785800038000
trusted library allocation
page read and write
37D4002EC000
direct allocation
page read and write
4C18015A4000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
785800114000
trusted library allocation
page read and write
4C080031E000
direct allocation
page read and write
4084000E0000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C64035EC000
trusted library allocation
page read and write
19D0CA90000
unkown
page readonly
36600BC2000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
707C002A0000
direct allocation
page read and write
5E480033C000
trusted library allocation
page read and write
1E2000278000
trusted library allocation
page read and write
36600500000
trusted library allocation
page read and write
32080024C000
trusted library allocation
page read and write
4C1800694000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
2079B990000
heap
page read and write
19D05072000
heap
page read and write
4C64027EC000
trusted library allocation
page read and write
1E2000248000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
1E0909A0000
unclassified section
page read and write
19D0C702000
heap
page read and write
6190002FC000
trusted library allocation
page read and write
19BCCA9F000
direct allocation
page read and write
6237FE000
unkown
page readonly
366002C2000
trusted library allocation
page read and write
2839DFE000
unkown
page readonly
1A3C002FC000
trusted library allocation
page read and write
631C0020C000
trusted library allocation
page read and write
19BF3A65000
direct allocation
page read and write
4C6402378000
trusted library allocation
page read and write
4C6402A94000
trusted library allocation
page read and write
36600B42000
trusted library allocation
page read and write
A7400188000
trusted library allocation
page read and write
4C18016F4000
trusted library allocation
page read and write
36600542000
trusted library allocation
page read and write
B6231F5000
stack
page read and write
19D0B960000
heap
page read and write
3660083B000
trusted library allocation
page read and write
4C64036D4000
trusted library allocation
page read and write
4C1801568000
trusted library allocation
page read and write
36600082000
trusted library allocation
page read and write
1E09069A000
heap
page read and write
A740021D000
trusted library allocation
page read and write
199C000E8000
trusted library allocation
page read and write
4C6402FA8000
trusted library allocation
page read and write
2AD4DFE000
stack
page read and write
4C1800B04000
trusted library allocation
page read and write
785800289000
trusted library allocation
page read and write
19BF3510000
direct allocation
page read and write
4C6402B84000
trusted library allocation
page read and write
7069BFF000
stack
page read and write
1E0905D0000
trusted library allocation
page read and write
619000338000
trusted library allocation
page read and write
4C1801044000
trusted library allocation
page read and write
6D7C0040C000
trusted library allocation
page read and write
5A680026C000
direct allocation
page read and write
A7400244000
trusted library allocation
page read and write
19BF3A90000
direct allocation
page execute read
6190002B0000
trusted library allocation
page read and write
19D0B960000
heap
page read and write
4C1800881000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
5FF00027C000
trusted library allocation
page read and write
36600477000
trusted library allocation
page read and write
707C00244000
direct allocation
page read and write
40002F0000
trusted library allocation
page read and write
4C18015E4000
trusted library allocation
page read and write
268C002B4000
trusted library allocation
page read and write
1B5EFFE000
stack
page read and write
4C1800F64000
trusted library allocation
page read and write
19D05171000
heap
page read and write
1C4B3EF0000
heap
page read and write
5FF00023C000
trusted library allocation
page read and write
199C00100000
trusted library allocation
page read and write
2079BCE0000
heap
page read and write
4C18009F9000
trusted library allocation
page read and write
282FDFE000
unkown
page readonly
4C180103C000
trusted library allocation
page read and write
3DD400220000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C64030F4000
trusted library allocation
page read and write
4C6402FBC000
trusted library allocation
page read and write
4C180104C000
trusted library allocation
page read and write
4C18014B8000
trusted library allocation
page read and write
61900032C000
trusted library allocation
page read and write
4C1800DD8000
trusted library allocation
page read and write
C000DB8000
direct allocation
page read and write
4C18014E4000
trusted library allocation
page read and write
268C00294000
trusted library allocation
page read and write
4C180161D000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
631C00408000
trusted library allocation
page read and write
199C00128000
trusted library allocation
page read and write
4C6402760000
trusted library allocation
page read and write
4C1800E93000
trusted library allocation
page read and write
4C080031C000
direct allocation
page read and write
4C1800A2C000
trusted library allocation
page read and write
4C1800F05000
trusted library allocation
page read and write
1D7A1F50000
heap
page read and write
C00055B000
direct allocation
page read and write
619000E94000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
4C6402D34000
trusted library allocation
page read and write
C00054C000
direct allocation
page read and write
4C1800FC4000
trusted library allocation
page read and write
4C1800B0E000
trusted library allocation
page read and write
4C1800AEA000
trusted library allocation
page read and write
4C640248C000
trusted library allocation
page read and write
28335FE000
stack
page read and write
5A6800230000
direct allocation
page read and write
4C18012DC000
trusted library allocation
page read and write
4C6402E0C000
trusted library allocation
page read and write
4C6400401000
trusted library allocation
page read and write
619000398000
trusted library allocation
page read and write
1D7A68C0000
unkown
page readonly
4C1800FEC000
trusted library allocation
page read and write
1E095F25000
unclassified section
page readonly
36600842000
trusted library allocation
page read and write
4C1800A54000
trusted library allocation
page read and write
785800130000
trusted library allocation
page read and write
1B680028C000
trusted library allocation
page read and write
4C0800338000
direct allocation
page read and write
19D0B960000
heap
page read and write
37D400264000
direct allocation
page read and write
A7400244000
trusted library allocation
page read and write
A7400134000
trusted library allocation
page read and write
19BCC87D000
heap
page read and write
36600482000
trusted library allocation
page read and write
4C18014A4000
trusted library allocation
page read and write
4C6402BF4000
trusted library allocation
page read and write
4C1800FAC000
trusted library allocation
page read and write
4C18009F9000
trusted library allocation
page read and write
1E09348A000
heap
page read and write
5FF000338000
trusted library allocation
page read and write
4C1800EF4000
trusted library allocation
page read and write
619000250000
trusted library allocation
page read and write
4C18010B0000
trusted library allocation
page read and write
4C0800354000
direct allocation
page read and write
284B5FE000
stack
page read and write
6D7C002B8000
trusted library allocation
page read and write
19D05171000
heap
page read and write
36600B82000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
4C640076C000
trusted library allocation
page read and write
785800178000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
6190002A0000
trusted library allocation
page read and write
36600180000
trusted library allocation
page read and write
4000430000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
3F9F7FE000
unkown
page readonly
4C1800FE3000
trusted library allocation
page read and write
1E7F1670000
heap
page read and write
4C1800F8C000
trusted library allocation
page read and write
4C18016D8000
trusted library allocation
page read and write
C0009FA000
direct allocation
page read and write
36600D02000
trusted library allocation
page read and write
4C180105A000
trusted library allocation
page read and write
4C1801064000
trusted library allocation
page read and write
4C6403104000
trusted library allocation
page read and write
19BF3717000
direct allocation
page read and write
4C1800B04000
trusted library allocation
page read and write
19D09FC9000
unclassified section
page read and write
19BCC82C000
heap
page read and write
4C1800AF4000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
4C6402C50000
trusted library allocation
page read and write
4C18010BC000
trusted library allocation
page read and write
366003C2000
trusted library allocation
page read and write
785800114000
trusted library allocation
page read and write
3660047F000
trusted library allocation
page read and write
1E7F1A23000
heap
page read and write
4C18009F7000
trusted library allocation
page read and write
1E090970000
trusted library allocation
page read and write
7858000C6000
trusted library allocation
page read and write
C00083A000
direct allocation
page read and write
1A3C002F0000
trusted library allocation
page read and write
19BF38A0000
direct allocation
page execute read
4C640240C000
trusted library allocation
page read and write
4C6403688000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
19D0B962000
heap
page read and write
4C1800DA0000
trusted library allocation
page read and write
1E096076000
unclassified section
page readonly
1E7F1A2B000
heap
page read and write
4C6402C80000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
1D7A203C000
heap
page read and write
36600477000
trusted library allocation
page read and write
4C6403654000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
1E095C59000
unclassified section
page readonly
268C002B4000
trusted library allocation
page read and write
1A3C002CC000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
1E096013000
unclassified section
page readonly
4C18009F0000
trusted library allocation
page read and write
4C640250C000
trusted library allocation
page read and write
4C6402DB4000
trusted library allocation
page read and write
4C18012C0000
trusted library allocation
page read and write
785800398000
trusted library allocation
page read and write
1E095D08000
unclassified section
page readonly
A74002D4000
trusted library allocation
page read and write
C000414000
direct allocation
page read and write
36600780000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
5E4800220000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
1E7F1A24000
heap
page read and write
36600AC2000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
C000A0C000
direct allocation
page read and write
4C1800A0C000
trusted library allocation
page read and write
4C1800B0E000
trusted library allocation
page read and write
4C180107C000
trusted library allocation
page read and write
A74001D8000
trusted library allocation
page read and write
19D0B642000
unclassified section
page read and write
1E0934AA000
heap
page read and write
4C6402E78000
trusted library allocation
page read and write
4C1800AE8000
trusted library allocation
page read and write
4C1800FE4000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
36600880000
trusted library allocation
page read and write
4C1800318000
trusted library allocation
page read and write
619000320000
trusted library allocation
page read and write
4C1800EAC000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
3F9C7FE000
unkown
page readonly
366005C2000
trusted library allocation
page read and write
6D7C00288000
trusted library allocation
page read and write
320800270000
trusted library allocation
page read and write
7FF6EC1F9000
unkown
page write copy
4C180106C000
trusted library allocation
page read and write
78580010C000
trusted library allocation
page read and write
619000350000
trusted library allocation
page read and write
1E09349A000
heap
page read and write
639400240000
trusted library allocation
page read and write
1E2000201000
trusted library allocation
page read and write
4C1800AD8000
trusted library allocation
page read and write
A7400230000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
4C180157A000
trusted library allocation
page read and write
4C1800ACC000
trusted library allocation
page read and write
4C1801034000
trusted library allocation
page read and write
1E782BFA000
unclassified section
page read and write
4C1801794000
trusted library allocation
page read and write
2079B9D0000
heap
page readonly
4C18011C8000
trusted library allocation
page read and write
36600782000
trusted library allocation
page read and write
A740006C000
trusted library allocation
page read and write
4C6402A84000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
619000338000
trusted library allocation
page read and write
631C00238000
trusted library allocation
page read and write
40002CC000
trusted library allocation
page read and write
4C18015E4000
trusted library allocation
page read and write
4C6402B90000
trusted library allocation
page read and write
2826DFE000
unkown
page readonly
1B68002A0000
trusted library allocation
page read and write
4C18016B4000
trusted library allocation
page read and write
19BF3780000
direct allocation
page execute read
4C64023F8000
trusted library allocation
page read and write
4C18011D8000
trusted library allocation
page read and write
4C6402784000
trusted library allocation
page read and write
268C00298000
trusted library allocation
page read and write
4C640302C000
trusted library allocation
page read and write
4C6402C1C000
trusted library allocation
page read and write
7858002B0000
trusted library allocation
page read and write
7FF6EF33C000
unkown
page readonly
1B5DFFE000
stack
page read and write
A740029E000
trusted library allocation
page read and write
4C1800EA4000
trusted library allocation
page read and write
4C1800FDC000
trusted library allocation
page read and write
19BF3BF6000
direct allocation
page read and write
B62A9FE000
unkown
page readonly
4C64030B4000
trusted library allocation
page read and write
78580029C000
trusted library allocation
page read and write
1E7F1800000
heap
page read and write
1B5E7FE000
unkown
page readonly
4000404000
trusted library allocation
page read and write
C000BE2000
direct allocation
page read and write
706A7FC000
stack
page read and write
1C76D25A000
heap
page read and write
19BF3698000
direct allocation
page read and write
36600842000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
4C1801081000
trusted library allocation
page read and write
36600D42000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
A74000A8000
trusted library allocation
page read and write
621FFE000
stack
page read and write
36600A42000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
19D05187000
heap
page read and write
4C18009E7000
trusted library allocation
page read and write
A74002DC000
trusted library allocation
page read and write
4C1800B0E000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
7FF6ED5F7000
unkown
page readonly
36600842000
trusted library allocation
page read and write
A74002D7000
trusted library allocation
page read and write
4C6402A14000
trusted library allocation
page read and write
235400230000
trusted library allocation
page read and write
4C64030EC000
trusted library allocation
page read and write
4C6402C3C000
trusted library allocation
page read and write
631C00244000
trusted library allocation
page read and write
C000000000
direct allocation
page read and write
19BF3687000
direct allocation
page read and write
5FF000408000
trusted library allocation
page read and write
36600502000
trusted library allocation
page read and write
C000EBA000
direct allocation
page read and write
4C1800FE4000
trusted library allocation
page read and write
4C1800FBC000
trusted library allocation
page read and write
1C76D286000
heap
page read and write
1C76D286000
heap
page read and write
1E7F1A2B000
heap
page read and write
4C180107C000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C1801546000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
1C76D050000
heap
page read and write
4C18014B8000
trusted library allocation
page read and write
1C76D2A0000
heap
page read and write
4C1800F0C000
trusted library allocation
page read and write
4C18003E8000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
4C6402D8C000
trusted library allocation
page read and write
4C1801572000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
1C76D200000
heap
page read and write
4C18015E4000
trusted library allocation
page read and write
4C1801538000
trusted library allocation
page read and write
C000EC4000
direct allocation
page read and write
4C180105A000
trusted library allocation
page read and write
4C64025A4000
trusted library allocation
page read and write
4C1800A0C000
trusted library allocation
page read and write
1E0934AD000
heap
page read and write
C000888000
direct allocation
page read and write
36600BC2000
trusted library allocation
page read and write
1D7A6A02000
heap
page read and write
4C6400A01000
trusted library allocation
page read and write
3660085B000
trusted library allocation
page read and write
4000244000
trusted library allocation
page read and write
1E0934C5000
heap
page read and write
A7400284000
trusted library allocation
page read and write
785800130000
trusted library allocation
page read and write
6190008CC000
trusted library allocation
page read and write
78580028A000
trusted library allocation
page read and write
4C6402ACD000
trusted library allocation
page read and write
4C18002BC000
trusted library allocation
page read and write
5A6800280000
direct allocation
page read and write
2ADADFE000
stack
page read and write
19D04E10000
heap
page read and write
A7400260000
trusted library allocation
page read and write
4C1800824000
trusted library allocation
page read and write
1C76D28B000
heap
page read and write
624FFE000
stack
page read and write
36600A42000
trusted library allocation
page read and write
4C6402434000
trusted library allocation
page read and write
706ABFB000
stack
page read and write
4C1800EBC000
trusted library allocation
page read and write
4C18009E9000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
19BF3BD0000
direct allocation
page read and write
4C6402CA8000
trusted library allocation
page read and write
785800138000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
4C1800684000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C6402601000
trusted library allocation
page read and write
1E7C2E62000
trusted library allocation
page read and write
19D0CA60000
unkown
page readonly
1E200020C000
trusted library allocation
page read and write
4C1801498000
trusted library allocation
page read and write
19BF39B0000
direct allocation
page execute read
A74002EC000
trusted library allocation
page read and write
1C76D150000
heap
page read and write
4C6400D5E000
trusted library allocation
page read and write
4C64027AC000
trusted library allocation
page read and write
2827DFE000
unkown
page readonly
4C18006AC000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
4C1800FEC000
trusted library allocation
page read and write
19BCC8C8000
heap
page read and write
4C18008A4000
trusted library allocation
page read and write
4C080021C000
direct allocation
page read and write
36600982000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
707C00274000
direct allocation
page read and write
4C6402384000
trusted library allocation
page read and write
4C1800FEC000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
78580015F000
trusted library allocation
page read and write
1E7C3C72000
unclassified section
page read and write
A74002AC000
trusted library allocation
page read and write
1C76D2A0000
heap
page read and write
4C1801644000
trusted library allocation
page read and write
4C1801495000
trusted library allocation
page read and write
78580000C000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
4C640320C000
trusted library allocation
page read and write
A7400218000
trusted library allocation
page read and write
1A3C00290000
trusted library allocation
page read and write
5E4800418000
trusted library allocation
page read and write
1E7C3C23000
unclassified section
page read and write
366005C2000
trusted library allocation
page read and write
4C6402AB3000
trusted library allocation
page read and write
1E7C3C29000
unclassified section
page read and write
1C76D2C9000
heap
page read and write
4C1800C4C000
trusted library allocation
page read and write
36600D02000
trusted library allocation
page read and write
A7400268000
trusted library allocation
page read and write
4C1800EDC000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
639400274000
trusted library allocation
page read and write
4C1800E97000
trusted library allocation
page read and write
619000314000
trusted library allocation
page read and write
4C180163E000
trusted library allocation
page read and write
19BF5901000
heap
page read and write
1E095EFD000
unclassified section
page readonly
C000A18000
direct allocation
page read and write
19D0B960000
heap
page read and write
707C00294000
direct allocation
page read and write
1E7C393F000
unclassified section
page read and write
A74002C8000
trusted library allocation
page read and write
631C00338000
trusted library allocation
page read and write
CAC00220000
direct allocation
page read and write
639400220000
trusted library allocation
page read and write
4C64032C4000
trusted library allocation
page read and write
2D8400294000
direct allocation
page read and write
4C6401036000
trusted library allocation
page read and write
A74002D7000
trusted library allocation
page read and write
7069FFF000
stack
page read and write
4C64023A4000
trusted library allocation
page read and write
C00087E000
direct allocation
page read and write
36600B42000
trusted library allocation
page read and write
4C180103C000
trusted library allocation
page read and write
4C1801584000
trusted library allocation
page read and write
4C1800FB4000
trusted library allocation
page read and write
19D0A022000
unclassified section
page read and write
1E090600000
heap
page read and write
619000320000
trusted library allocation
page read and write
4C6403638000
trusted library allocation
page read and write
19BCCA92000
direct allocation
page read and write
19D0512E000
heap
page read and write
4C1800FDC000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
1E7C3C37000
unclassified section
page read and write
2834DFE000
unkown
page readonly
A74002C8000
trusted library allocation
page read and write
4C1801628000
trusted library allocation
page read and write
C000CD7000
direct allocation
page read and write
A74002C8000
trusted library allocation
page read and write
1A3C002CC000
trusted library allocation
page read and write
1C76D2BF000
heap
page read and write
631C00220000
trusted library allocation
page read and write
1E0934AF000
heap
page read and write
19D0B659000
unclassified section
page read and write
19D0B980000
heap
page read and write
4C6403674000
trusted library allocation
page read and write
631C00254000
trusted library allocation
page read and write
7858000DC000
trusted library allocation
page read and write
A7400260000
trusted library allocation
page read and write
4C180104F000
trusted library allocation
page read and write
1D7A2000000
heap
page read and write
1E09347E000
heap
page read and write
1E7F1843000
heap
page read and write
A7400001000
trusted library allocation
page read and write
62AFFE000
stack
page read and write
61EFFE000
stack
page read and write
A74002AC000
trusted library allocation
page read and write
6190006F8000
trusted library allocation
page read and write
7FF6EC2EC000
unkown
page write copy
4C1800AF6000
trusted library allocation
page read and write
28345FD000
stack
page read and write
36600282000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C1801034000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
1E090640000
heap
page read and write
4C6403218000
trusted library allocation
page read and write
C000242000
direct allocation
page read and write
32080026C000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
19BF3A8D000
direct allocation
page read and write
619000320000
trusted library allocation
page read and write
3DD400244000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
785800411000
trusted library allocation
page read and write
4C180102C000
trusted library allocation
page read and write
37D400404000
direct allocation
page read and write
4C180168C000
trusted library allocation
page read and write
4C64032F8000
trusted library allocation
page read and write
1E782BBD000
unclassified section
page read and write
4C18009E0000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
CAC00284000
direct allocation
page read and write
4C1800F5C000
trusted library allocation
page read and write
4C18003D0000
trusted library allocation
page read and write
4C1801069000
trusted library allocation
page read and write
4C6402450000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
36600CC2000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
3208002A4000
trusted library allocation
page read and write
36600982000
trusted library allocation
page read and write
1C76D276000
heap
page read and write
19BCC88C000
heap
page read and write
4C1800E8C000
trusted library allocation
page read and write
36600B02000
trusted library allocation
page read and write
A7400268000
trusted library allocation
page read and write
C000BA6000
direct allocation
page read and write
36600782000
trusted library allocation
page read and write
6D7C00238000
trusted library allocation
page read and write
A7400104000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4084000CC000
trusted library allocation
page read and write
785800114000
trusted library allocation
page read and write
785800114000
trusted library allocation
page read and write
1C76D1E0000
heap
page read and write
C000C00000
direct allocation
page read and write
6190002CC000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
C000CD5000
direct allocation
page read and write
366009C2000
trusted library allocation
page read and write
1E095CEA000
unclassified section
page readonly
4C1800B0E000
trusted library allocation
page read and write
4C6402A94000
trusted library allocation
page read and write
4C6402B1C000
trusted library allocation
page read and write
707C00234000
direct allocation
page read and write
3DD40020C000
trusted library allocation
page read and write
3FA07FE000
unkown
page readonly
4C18011DC000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
4C18016B4000
trusted library allocation
page read and write
3F93FFC000
stack
page read and write
32080027C000
trusted library allocation
page read and write
4C6402F28000
trusted library allocation
page read and write
C000CE5000
direct allocation
page read and write
C000EB8000
direct allocation
page read and write
A7400290000
trusted library allocation
page read and write
4C6402454000
trusted library allocation
page read and write
C000A24000
direct allocation
page read and write
19D0B980000
heap
page read and write
19D0B964000
heap
page read and write
C000CAC000
direct allocation
page read and write
19D05128000
heap
page read and write
A740029E000
trusted library allocation
page read and write
36600182000
trusted library allocation
page read and write
5E4800328000
trusted library allocation
page read and write
C000A08000
direct allocation
page read and write
A74002AC000
trusted library allocation
page read and write
5E48002AC000
trusted library allocation
page read and write
619000644000
trusted library allocation
page read and write
19D05171000
heap
page read and write
36600842000
trusted library allocation
page read and write
A740020C000
trusted library allocation
page read and write
4C1801568000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
366007A0000
trusted library allocation
page read and write
5E4800284000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
4C180105C000
trusted library allocation
page read and write
C00005D000
direct allocation
page read and write
5FF0002BC000
trusted library allocation
page read and write
6207FE000
unkown
page readonly
19BF3AB0000
heap
page read and write
C0004B2000
direct allocation
page read and write
C000E45000
direct allocation
page read and write
4C18007B0000
trusted library allocation
page read and write
C000CE1000
direct allocation
page read and write
1C76D2F0000
heap
page read and write
4C64030E0000
trusted library allocation
page read and write
4C6400001000
trusted library allocation
page read and write
6D7C00210000
trusted library allocation
page read and write
1D7A1F70000
trusted library allocation
page read and write
1E7F1A69000
heap
page read and write
625FFE000
stack
page read and write
4C1800EE2000
trusted library allocation
page read and write
7FFE21720000
direct allocation
page execute read
28505FE000
stack
page read and write
19D05128000
heap
page read and write
4C18008A4000
trusted library allocation
page read and write
4C6402B08000
trusted library allocation
page read and write
1E7C39C3000
unclassified section
page read and write
1E7F1A2B000
heap
page read and write
4C1800F04000
trusted library allocation
page read and write
61900020C000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
19D0C602000
heap
page read and write
1E782BA0000
unclassified section
page read and write
4C6402BE0000
trusted library allocation
page read and write
19BF3790000
direct allocation
page execute read
4C1801618000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
36600682000
trusted library allocation
page read and write
1C76D22B000
heap
page read and write
4C1800F04000
trusted library allocation
page read and write
4000260000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
4C6402454000
trusted library allocation
page read and write
1B5C7FE000
unkown
page readonly
1B68002B0000
trusted library allocation
page read and write
1E7C3973000
unclassified section
page read and write
1D7A2062000
heap
page read and write
4C18010BC000
trusted library allocation
page read and write
1E090910000
heap
page read and write
19D0516C000
heap
page read and write
4C18015F4000
trusted library allocation
page read and write
1E090560000
heap
page read and write
4C18009E0000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
4C18016D0000
trusted library allocation
page read and write
2D8400288000
direct allocation
page read and write
36600B82000
trusted library allocation
page read and write
1B6800240000
trusted library allocation
page read and write
707C002E0000
direct allocation
page read and write
4C64032F8000
trusted library allocation
page read and write
785800201000
trusted library allocation
page read and write
785800138000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
1E782BCA000
unclassified section
page read and write
4C6402DD0000
trusted library allocation
page read and write
4C1800FEC000
trusted library allocation
page read and write
4C18014B8000
trusted library allocation
page read and write
3208002C8000
trusted library allocation
page read and write
4C1800EAC000
trusted library allocation
page read and write
A7400268000
trusted library allocation
page read and write
36600882000
trusted library allocation
page read and write
631C00274000
trusted library allocation
page read and write
A74000EC000
trusted library allocation
page read and write
36600642000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
4C1801640000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
1E7F177A000
unclassified section
page read and write
4C08002F0000
direct allocation
page read and write
4C18011BC000
trusted library allocation
page read and write
7858002A0000
trusted library allocation
page read and write
12D9DFE000
stack
page read and write
36600C02000
trusted library allocation
page read and write
4C1800AF8000
trusted library allocation
page read and write
1E7C33EA000
unclassified section
page read and write
28355FB000
stack
page read and write
4C6402450000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
4C18011C8000
trusted library allocation
page read and write
619000A01000
trusted library allocation
page read and write
2079BD10000
trusted library allocation
page read and write
1E7F1762000
unclassified section
page read and write
37D40023C000
direct allocation
page read and write
4C180077C000
trusted library allocation
page read and write
7858001C8000
trusted library allocation
page read and write
4C1800AD0000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
4C18009E0000
trusted library allocation
page read and write
C0009DA000
direct allocation
page read and write
36600880000
trusted library allocation
page read and write
19D06F02000
heap
page read and write
A7400160000
trusted library allocation
page read and write
19D0B913000
heap
page read and write
4C18008A8000
trusted library allocation
page read and write
C00025A000
direct allocation
page read and write
4C1800AE0000
trusted library allocation
page read and write
4C1801644000
trusted library allocation
page read and write
61900030C000
trusted library allocation
page read and write
19BCC8BE000
heap
page read and write
1E095DF1000
unclassified section
page readonly
4C1800E98000
trusted library allocation
page read and write
28365FD000
stack
page read and write
19D05178000
heap
page read and write
1E7F1A5C000
heap
page read and write
4000401000
trusted library allocation
page read and write
4C18014ED000
trusted library allocation
page read and write
1E093421000
heap
page read and write
2079B9F9000
unclassified section
page read and write
19BF37E0000
direct allocation
page execute read
1C4B3FF0000
heap
page readonly
1E7F1A24000
heap
page read and write
4C08002D8000
direct allocation
page read and write
1E7C33CE000
unclassified section
page read and write
1E7C2E44000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
4C6400E01000
trusted library allocation
page read and write
12DB5F9000
stack
page read and write
37D400244000
direct allocation
page read and write
1E7C3C4E000
unclassified section
page read and write
1E095F1F000
unclassified section
page readonly
631C002A8000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
4C1800DD8000
trusted library allocation
page read and write
4C180174C000
trusted library allocation
page read and write
1E09052D000
remote allocation
page execute read
366006C2000
trusted library allocation
page read and write
78580038C000
trusted library allocation
page read and write
785800160000
trusted library allocation
page read and write
4C1801568000
trusted library allocation
page read and write
C00057F000
direct allocation
page read and write
19BF3BE7000
direct allocation
page read and write
19BF3B44000
heap
page read and write
1E095EDF000
unclassified section
page readonly
4C180105C000
trusted library allocation
page read and write
4C1800FE2000
trusted library allocation
page read and write
4C1801034000
trusted library allocation
page read and write
19D0512E000
heap
page read and write
36600A02000
trusted library allocation
page read and write
C000C34000
direct allocation
page read and write
5E4800344000
trusted library allocation
page read and write
4C1800AF8000
trusted library allocation
page read and write
1E2000210000
trusted library allocation
page read and write
5FF0002F0000
trusted library allocation
page read and write
4C1800F54000
trusted library allocation
page read and write
2851DFE000
unkown
page readonly
C000570000
direct allocation
page read and write
36600802000
trusted library allocation
page read and write
28275FE000
stack
page read and write
36600382000
trusted library allocation
page read and write
4C180157A000
trusted library allocation
page read and write
1E7F1A24000
heap
page read and write
619000601000
trusted library allocation
page read and write
1A3C002CC000
trusted library allocation
page read and write
C000CC8000
direct allocation
page read and write
C0009CA000
direct allocation
page read and write
1E0906F8000
heap
page read and write
5A680028C000
direct allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
78580016C000
trusted library allocation
page read and write
5E48002A4000
trusted library allocation
page read and write
4C1801572000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
A7400278000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
C0001EA000
direct allocation
page read and write
2D84002A4000
direct allocation
page read and write
1A3C00238000
trusted library allocation
page read and write
4C1800EFC000
trusted library allocation
page read and write
C000CCC000
direct allocation
page read and write
2079BA13000
heap
page read and write
36600C82000
trusted library allocation
page read and write
CAC00288000
direct allocation
page read and write
19BF3694000
direct allocation
page read and write
19BCCAE0000
direct allocation
page read and write
707C00264000
direct allocation
page read and write
4C1801544000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
4C64032D4000
trusted library allocation
page read and write
4C1800AEA000
trusted library allocation
page read and write
6287FE000
unkown
page readonly
1E7F1A2B000
heap
page read and write
19D05040000
heap
page read and write
6317FE000
unkown
page readonly
7FF6EEFB1000
unkown
page readonly
A740012C000
trusted library allocation
page read and write
C00006F000
direct allocation
page read and write
4C6402401000
trusted library allocation
page read and write
1E095CC8000
unclassified section
page readonly
4C1801054000
trusted library allocation
page read and write
4C64027B8000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C18015F7000
trusted library allocation
page read and write
12DEDFE000
stack
page read and write
36600C82000
trusted library allocation
page read and write
4C1800B14000
trusted library allocation
page read and write
4C18003C4000
trusted library allocation
page read and write
4C1801044000
trusted library allocation
page read and write
19BF3900000
direct allocation
page execute read
A7400278000
trusted library allocation
page read and write
4C1800AEC000
trusted library allocation
page read and write
CAC002D0000
direct allocation
page read and write
4C6402F9C000
trusted library allocation
page read and write
3F9D7FE000
unkown
page readonly
4C180107C000
trusted library allocation
page read and write
1E7C3C0F000
unclassified section
page read and write
C000AF8000
direct allocation
page read and write
4C6403758000
trusted library allocation
page read and write
4C1800F92000
trusted library allocation
page read and write
36600482000
trusted library allocation
page read and write
4C1800F94000
trusted library allocation
page read and write
785800114000
trusted library allocation
page read and write
63940020C000
trusted library allocation
page read and write
4C1800B04000
trusted library allocation
page read and write
4C18015CC000
trusted library allocation
page read and write
4C6402D24000
trusted library allocation
page read and write
1A3C00230000
trusted library allocation
page read and write
4C640302C000
trusted library allocation
page read and write
6190003B4000
trusted library allocation
page read and write
5A6800210000
direct allocation
page read and write
1E20002AC000
trusted library allocation
page read and write
707C00220000
direct allocation
page read and write
28435FD000
stack
page read and write
7858003F0000
trusted library allocation
page read and write
4C1800F15000
trusted library allocation
page read and write
4C1801628000
trusted library allocation
page read and write
4C180104F000
trusted library allocation
page read and write
4C6403168000
trusted library allocation
page read and write
1E7C33B4000
unclassified section
page read and write
619000201000
trusted library allocation
page read and write
1A3C0023C000
trusted library allocation
page read and write
4C1801588000
trusted library allocation
page read and write
1E090540000
unclassified section
page readonly
19D0B90C000
heap
page read and write
2D84002A0000
direct allocation
page read and write
4C1801067000
trusted library allocation
page read and write
B6281FE000
stack
page read and write
4C1801081000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
2079BA00000
heap
page read and write
4000344000
trusted library allocation
page read and write
36600B02000
trusted library allocation
page read and write
631C002A0000
trusted library allocation
page read and write
4C640377C000
trusted library allocation
page read and write
1C76D263000
heap
page read and write
4C1800F06000
trusted library allocation
page read and write
36600602000
trusted library allocation
page read and write
4C1800EAC000
trusted library allocation
page read and write
4C180158C000
trusted library allocation
page read and write
4C1800A0C000
trusted library allocation
page read and write
785800388000
trusted library allocation
page read and write
4C18010B0000
trusted library allocation
page read and write
19BF3650000
direct allocation
page read and write
5FF000298000
trusted library allocation
page read and write
36600982000
trusted library allocation
page read and write
19BCC6B0000
heap
page read and write
7FF6EA600000
unkown
page readonly
4C1801550000
trusted library allocation
page read and write
619000344000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
7FF6ED4F4000
unkown
page readonly
4C18015F7000
trusted library allocation
page read and write
C000C2F000
direct allocation
page read and write
4C1800FE4000
trusted library allocation
page read and write
4C1801052000
trusted library allocation
page read and write
7858000D0000
trusted library allocation
page read and write
36600780000
trusted library allocation
page read and write
C0008F8000
direct allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
A74002D4000
trusted library allocation
page read and write
6D7C002CC000
trusted library allocation
page read and write
4C1800318000
trusted library allocation
page read and write
19BF3860000
direct allocation
page execute read
19D04F70000
trusted library allocation
page read and write
1E200027C000
trusted library allocation
page read and write
4C180175C000
trusted library allocation
page read and write
4C1801024000
trusted library allocation
page read and write
4C1800B14000
trusted library allocation
page read and write
4C6403178000
trusted library allocation
page read and write
1E095D02000
unclassified section
page readonly
C000CEF000
direct allocation
page read and write
19D0A510000
trusted library section
page read and write
4C18015E4000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
4C18015F4000
trusted library allocation
page read and write
3660047F000
trusted library allocation
page read and write
283FDFE000
unkown
page readonly
1C76D28B000
heap
page read and write
4C1800300000
trusted library allocation
page read and write
5E4800258000
trusted library allocation
page read and write
4C1800B2C000
trusted library allocation
page read and write
619000244000
trusted library allocation
page read and write
36600880000
trusted library allocation
page read and write
4C180148C000
trusted library allocation
page read and write
4C6402F08000
trusted library allocation
page read and write
B6271FE000
stack
page read and write
4C1801568000
trusted library allocation
page read and write
C000C5C000
direct allocation
page read and write
4C18015F4000
trusted library allocation
page read and write
4C640321C000
trusted library allocation
page read and write
A7400278000
trusted library allocation
page read and write
19D0B960000
heap
page read and write
366004C2000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
1C4B4013000
heap
page read and write
78580019E000
trusted library allocation
page read and write
4C18011BC000
trusted library allocation
page read and write
3F8DFFB000
stack
page read and write
1E2000230000
trusted library allocation
page read and write
CAC00264000
direct allocation
page read and write
4C1800B2C000
trusted library allocation
page read and write
4C1800638000
trusted library allocation
page read and write
1C76D26C000
heap
page read and write
19BF3BCA000
direct allocation
page read and write
785800070000
trusted library allocation
page read and write
4C640249F000
trusted library allocation
page read and write
19D0517E000
heap
page read and write
4C1800FDC000
trusted library allocation
page read and write
4C1800EAC000
trusted library allocation
page read and write
4C1800EE2000
trusted library allocation
page read and write
6394002B4000
trusted library allocation
page read and write
5FF000268000
trusted library allocation
page read and write
2D8400244000
direct allocation
page read and write
19D0CA50000
unkown
page readonly
1A3C002C4000
trusted library allocation
page read and write
1B6800278000
trusted library allocation
page read and write
19D0A060000
trusted library section
page read and write
A7400290000
trusted library allocation
page read and write
6D7C0020C000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
36600842000
trusted library allocation
page read and write
619000350000
trusted library allocation
page read and write
36600582000
trusted library allocation
page read and write
1E2000238000
trusted library allocation
page read and write
1E7C32E1000
unclassified section
page read and write
1E095EE0000
unclassified section
page readonly
37D400201000
direct allocation
page read and write
1E7C330A000
unclassified section
page read and write
4C6402B98000
trusted library allocation
page read and write
4C6403657000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
785800416000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
36600780000
trusted library allocation
page read and write
706A9FE000
stack
page read and write
4C640248C000
trusted library allocation
page read and write
4C6402FA8000
trusted library allocation
page read and write
1E782BE0000
unclassified section
page read and write
4C6402450000
trusted library allocation
page read and write
1E093400000
heap
page read and write
36600602000
trusted library allocation
page read and write
4C1800EDC000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C080034F000
direct allocation
page read and write
4C1800A0C000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
4C6402F9C000
trusted library allocation
page read and write
1E095C43000
unclassified section
page readonly
4C1800F04000
trusted library allocation
page read and write
4000310000
trusted library allocation
page read and write
4C18006AC000
trusted library allocation
page read and write
4C6402D0C000
trusted library allocation
page read and write
5E480020C000
trusted library allocation
page read and write
4C640245A000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
4C180106C000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
4C6402E01000
trusted library allocation
page read and write
4C180127D000
trusted library allocation
page read and write
7FF6EF330000
unkown
page readonly
1D7A2041000
heap
page read and write
A74002AC000
trusted library allocation
page read and write
631C002F0000
trusted library allocation
page read and write
36600102000
trusted library allocation
page read and write
3F90FFE000
stack
page read and write
4C18009E0000
trusted library allocation
page read and write
1E0905B0000
heap
page read and write
2828DFE000
unkown
page readonly
36600477000
trusted library allocation
page read and write
4C180105C000
trusted library allocation
page read and write
36600982000
trusted library allocation
page read and write
4C18003D0000
trusted library allocation
page read and write
C0001BC000
direct allocation
page read and write
A740017C000
trusted library allocation
page read and write
1C4B402B000
heap
page read and write
36600C42000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C1800F24000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
268C002A8000
trusted library allocation
page read and write
4C18008A4000
trusted library allocation
page read and write
19BF36A0000
direct allocation
page read and write
A74002AC000
trusted library allocation
page read and write
4C18009E9000
trusted library allocation
page read and write
639400201000
trusted library allocation
page read and write
61DFF6000
stack
page read and write
1D7A2105000
heap
page read and write
1C76D2B4000
heap
page read and write
19BCCB00000
heap
page read and write
4C1801634000
trusted library allocation
page read and write
1E7C3BED000
unclassified section
page read and write
19BCCA40000
direct allocation
page read and write
707C002B4000
direct allocation
page read and write
5FF000328000
trusted library allocation
page read and write
5E48002CC000
trusted library allocation
page read and write
36600D40000
trusted library allocation
page read and write
4C18006A0000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
4C1800894000
trusted library allocation
page read and write
707C00288000
direct allocation
page read and write
C0004C8000
direct allocation
page read and write
36600BC2000
trusted library allocation
page read and write
2D84002B4000
direct allocation
page read and write
A74002BA000
trusted library allocation
page read and write
2847DFE000
unkown
page readonly
5A68002A8000
direct allocation
page read and write
40002D8000
trusted library allocation
page read and write
5FF00026C000
trusted library allocation
page read and write
37D4002CC000
direct allocation
page read and write
C000498000
direct allocation
page read and write
5FF000210000
trusted library allocation
page read and write
408400028000
trusted library allocation
page read and write
1E782B60000
unclassified section
page readonly
36600442000
trusted library allocation
page read and write
1E09603E000
unclassified section
page readonly
706B1FF000
stack
page read and write
1E782C40000
trusted library allocation
page read and write
785800060000
trusted library allocation
page read and write
4C180157C000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
4C6402B34000
trusted library allocation
page read and write
619000AFC000
trusted library allocation
page read and write
19BF3770000
heap
page read and write
4C18015F4000
trusted library allocation
page read and write
4C180178C000
trusted library allocation
page read and write
61900032C000
trusted library allocation
page read and write
4C640374C000
trusted library allocation
page read and write
4C180100C000
trusted library allocation
page read and write
19BCC8C4000
heap
page read and write
1E7F1660000
unclassified section
page readonly
4C180157A000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
6190006EC000
trusted library allocation
page read and write
28255FD000
stack
page read and write
1E0934B1000
heap
page read and write
320800220000
trusted library allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
6394002B4000
trusted library allocation
page read and write
C0001A2000
direct allocation
page read and write
1E7C3BE0000
unclassified section
page read and write
36600882000
trusted library allocation
page read and write
1E2000258000
trusted library allocation
page read and write
1E7F1A09000
heap
page read and write
4C6403601000
trusted library allocation
page read and write
62BFFD000
stack
page read and write
36600082000
trusted library allocation
page read and write
4C1800DBC000
trusted library allocation
page read and write
1E095F3D000
unclassified section
page readonly
A7400263000
trusted library allocation
page read and write
A74002DC000
trusted library allocation
page read and write
4C1801500000
trusted library allocation
page read and write
4C180060C000
trusted library allocation
page read and write
40840001C000
trusted library allocation
page read and write
4C6400C01000
trusted library allocation
page read and write
631C00201000
trusted library allocation
page read and write
36600342000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
1E093600000
unclassified section
page read and write
5E4800238000
trusted library allocation
page read and write
199C0007C000
trusted library allocation
page read and write
4C1800F3C000
trusted library allocation
page read and write
4C6402258000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
2354002B8000
trusted library allocation
page read and write
7FF6EBA01000
unkown
page execute read
4C1801668000
trusted library allocation
page read and write
19D0CA40000
unkown
page readonly
4C1800DF0000
trusted library allocation
page read and write
4C180077F000
trusted library allocation
page read and write
268C002A8000
trusted library allocation
page read and write
19D05189000
heap
page read and write
6190006F8000
trusted library allocation
page read and write
36600882000
trusted library allocation
page read and write
1E0904B0000
heap
page read and write
36600780000
trusted library allocation
page read and write
1B5BFFE000
stack
page read and write
4C6402AA0000
trusted library allocation
page read and write
6D7C0031C000
trusted library allocation
page read and write
19BF37F0000
direct allocation
page execute read
36600A82000
trusted library allocation
page read and write
36600602000
trusted library allocation
page read and write
4C1800EDC000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C1800B04000
trusted library allocation
page read and write
4C1800FA4000
trusted library allocation
page read and write
4C18012D0000
trusted library allocation
page read and write
366006C2000
trusted library allocation
page read and write
19D05166000
heap
page read and write
A74002C8000
trusted library allocation
page read and write
A74002D4000
trusted library allocation
page read and write
4C6402630000
trusted library allocation
page read and write
4C180106C000
trusted library allocation
page read and write
1E09343B000
heap
page read and write
1B680028C000
trusted library allocation
page read and write
5E4800310000
trusted library allocation
page read and write
19BCC890000
heap
page read and write
4C6402428000
trusted library allocation
page read and write
366005C2000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C1800E94000
trusted library allocation
page read and write
707C00254000
direct allocation
page read and write
4C1801639000
trusted library allocation
page read and write
4C18011C8000
trusted library allocation
page read and write
4C6403484000
trusted library allocation
page read and write
3F92FFB000
stack
page read and write
2D8400250000
direct allocation
page read and write
36600482000
trusted library allocation
page read and write
19BCCA60000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
366008AC000
trusted library allocation
page read and write
4C640260C000
trusted library allocation
page read and write
2079BE05000
heap
page read and write
4C18008A4000
trusted library allocation
page read and write
12E05FC000
stack
page read and write
6190006D0000
trusted library allocation
page read and write
A7400268000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
1E0904A0000
unclassified section
page readonly
1E782C30000
trusted library allocation
page read and write
619000294000
trusted library allocation
page read and write
4C6403670000
trusted library allocation
page read and write
4C1800EAC000
trusted library allocation
page read and write
C0000E8000
direct allocation
page read and write
36600482000
trusted library allocation
page read and write
A74002D4000
trusted library allocation
page read and write
4C64032ED000
trusted library allocation
page read and write
36600702000
trusted library allocation
page read and write
1E7C2C40000
unclassified section
page read and write
19D0B960000
heap
page read and write
4C1800EDC000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C1801639000
trusted library allocation
page read and write
4C6402F6C000
trusted library allocation
page read and write
4C180078C000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C640313C000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
4C1800AF4000
trusted library allocation
page read and write
4C64026A4000
trusted library allocation
page read and write
19BF38F0000
direct allocation
page execute read
A74001F0000
trusted library allocation
page read and write
4C1801064000
trusted library allocation
page read and write
4C1800FAC000
trusted library allocation
page read and write
4C1800FDC000
trusted library allocation
page read and write
4C1801568000
trusted library allocation
page read and write
4C6402ED8000
trusted library allocation
page read and write
4C640314C000
trusted library allocation
page read and write
1E200028C000
trusted library allocation
page read and write
C000CDF000
direct allocation
page read and write
4C1801618000
trusted library allocation
page read and write
284F5FD000
stack
page read and write
366000C2000
trusted library allocation
page read and write
366007A0000
trusted library allocation
page read and write
19D07BE8000
unkown
page read and write
4C64027C4000
trusted library allocation
page read and write
C000D01000
direct allocation
page read and write
36600942000
trusted library allocation
page read and write
4C18010BC000
trusted library allocation
page read and write
36600242000
trusted library allocation
page read and write
4C64025B8000
trusted library allocation
page read and write
4C1800B04000
trusted library allocation
page read and write
4C1801024000
trusted library allocation
page read and write
19BF3BB5000
heap
page read and write
4C6402244000
trusted library allocation
page read and write
1E090A02000
heap
page read and write
4C640304C000
trusted library allocation
page read and write
C000C9A000
direct allocation
page read and write
A7400244000
trusted library allocation
page read and write
36600642000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
36600382000
trusted library allocation
page read and write
5E48002D8000
trusted library allocation
page read and write
1E096031000
unclassified section
page readonly
1E095C3B000
unclassified section
page readonly
5E4800424000
trusted library allocation
page read and write
4C18016B8000
trusted library allocation
page read and write
408400024000
trusted library allocation
page read and write
785800098000
trusted library allocation
page read and write
4C64025A4000
trusted library allocation
page read and write
C000E40000
direct allocation
page read and write
4C080037C000
direct allocation
page read and write
3F9FFFC000
stack
page read and write
A740029E000
trusted library allocation
page read and write
199C000D8000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
4C1800A40000
trusted library allocation
page read and write
36600040000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C640241C000
trusted library allocation
page read and write
4C6402626000
trusted library allocation
page read and write
61900080C000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
1E7F17C0000
trusted library allocation
page read and write
3208002B4000
trusted library allocation
page read and write
4C6402F6C000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
A7400223000
trusted library allocation
page read and write
19BF3910000
direct allocation
page execute read
36600BC2000
trusted library allocation
page read and write
4C1800724000
trusted library allocation
page read and write
19D05188000
heap
page read and write
4C6402644000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
408400060000
trusted library allocation
page read and write
36600102000
trusted library allocation
page read and write
19BF3A82000
direct allocation
page read and write
707C00210000
direct allocation
page read and write
366009C2000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
19D0B900000
heap
page read and write
408400118000
trusted library allocation
page read and write
C0000A4000
direct allocation
page read and write
19D0512E000
heap
page read and write
1D7A2002000
heap
page read and write
366006C2000
trusted library allocation
page read and write
4C6402C2C000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
3F967FE000
unkown
page readonly
36600C82000
trusted library allocation
page read and write
6190002A8000
trusted library allocation
page read and write
1E7C39F2000
unclassified section
page read and write
36600A42000
trusted library allocation
page read and write
4C1800FE2000
trusted library allocation
page read and write
C000436000
direct allocation
page read and write
707C00230000
direct allocation
page read and write
6190006B4000
trusted library allocation
page read and write
4C1800F4C000
trusted library allocation
page read and write
36600AC2000
trusted library allocation
page read and write
4C180106C000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
19D0A527000
trusted library section
page read and write
1D7A1E50000
heap
page read and write
C0001F4000
direct allocation
page read and write
1E7F1A2B000
heap
page read and write
5FF000278000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
4C6402358000
trusted library allocation
page read and write
1B5D7FE000
unkown
page readonly
4C18011D8000
trusted library allocation
page read and write
19D0B980000
heap
page read and write
36600C42000
trusted library allocation
page read and write
199C00120000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
1E200023C000
trusted library allocation
page read and write
4C1800FDC000
trusted library allocation
page read and write
7858002B4000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
4C1801558000
trusted library allocation
page read and write
4C1800A18000
trusted library allocation
page read and write
4C080032C000
direct allocation
page read and write
36600842000
trusted library allocation
page read and write
4C1800788000
trusted library allocation
page read and write
7FF6EFD3C000
unkown
page readonly
1E7F1A2B000
heap
page read and write
619000320000
trusted library allocation
page read and write
5A6800248000
direct allocation
page read and write
28235FB000
stack
page read and write
A7400263000
trusted library allocation
page read and write
36600D42000
trusted library allocation
page read and write
4C1801588000
trusted library allocation
page read and write
1C4B4002000
heap
page read and write
4C6403118000
trusted library allocation
page read and write
1E7C3A09000
unclassified section
page read and write
19D0A52D000
trusted library section
page read and write
4C18016A8000
trusted library allocation
page read and write
40002C4000
trusted library allocation
page read and write
1C76FBE0000
trusted library allocation
page read and write
A74002EC000
trusted library allocation
page read and write
1A3C002B8000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C1800DBC000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
408400094000
trusted library allocation
page read and write
4C1800AE8000
trusted library allocation
page read and write
4C64022A8000
trusted library allocation
page read and write
199C0006C000
trusted library allocation
page read and write
4C1800624000
trusted library allocation
page read and write
4C1801582000
trusted library allocation
page read and write
5E4800201000
trusted library allocation
page read and write
4C6402728000
trusted library allocation
page read and write
631C002B8000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
4C18010B4000
trusted library allocation
page read and write
61900023C000
trusted library allocation
page read and write
235400254000
trusted library allocation
page read and write
4C64025DC000
trusted library allocation
page read and write
619000313000
trusted library allocation
page read and write
6190006F8000
trusted library allocation
page read and write
5A680023C000
direct allocation
page read and write
1E095D48000
unclassified section
page readonly
4C1800E97000
trusted library allocation
page read and write
C000AB3000
direct allocation
page read and write
36600782000
trusted library allocation
page read and write
28225F2000
stack
page read and write
7858003E0000
trusted library allocation
page read and write
4C1800AF4000
trusted library allocation
page read and write
4C1800F9C000
trusted library allocation
page read and write
4C64032A8000
trusted library allocation
page read and write
19BF39D0000
direct allocation
page execute read
4C640373C000
trusted library allocation
page read and write
C000044000
direct allocation
page read and write
36600782000
trusted library allocation
page read and write
4C6403084000
trusted library allocation
page read and write
5E4800254000
trusted library allocation
page read and write
C000564000
direct allocation
page read and write
19BF3A85000
direct allocation
page read and write
1B68002D8000
trusted library allocation
page read and write
1A3C002B0000
trusted library allocation
page read and write
4C18012DC000
trusted library allocation
page read and write
4C18017BC000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
639400270000
trusted library allocation
page read and write
4000408000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
36600782000
trusted library allocation
page read and write
4C1800C5C000
trusted library allocation
page read and write
4C1800AFA000
trusted library allocation
page read and write
28265F9000
stack
page read and write
4C1800F0A000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
1E7F1790000
heap
page read and write
1B5A7FE000
unkown
page readonly
1E782BF7000
unclassified section
page read and write
12DE5FB000
stack
page read and write
7858002A5000
trusted library allocation
page read and write
6277FE000
unkown
page readonly
4C180148C000
trusted library allocation
page read and write
199C000EC000
trusted library allocation
page read and write
4C18016B9000
trusted library allocation
page read and write
CAC002C4000
direct allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
36600402000
trusted library allocation
page read and write
36600782000
trusted library allocation
page read and write
4C180104C000
trusted library allocation
page read and write
4C1800770000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C180160C000
trusted library allocation
page read and write
28395FD000
stack
page read and write
36600442000
trusted library allocation
page read and write
4C180101C000
trusted library allocation
page read and write
366008AC000
trusted library allocation
page read and write
4C1800FD4000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
4C18011DC000
trusted library allocation
page read and write
36600B42000
trusted library allocation
page read and write
4C6403784000
trusted library allocation
page read and write
4C1800EF4000
trusted library allocation
page read and write
61900067C000
trusted library allocation
page read and write
6190002DC000
trusted library allocation
page read and write
4C0800323000
direct allocation
page read and write
4C640360C000
trusted library allocation
page read and write
62D7FE000
unkown
page readonly
36600B02000
trusted library allocation
page read and write
283DDFE000
unkown
page readonly
C000CE3000
direct allocation
page read and write
A7400284000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
2D8400201000
direct allocation
page read and write
4C18014BC000
trusted library allocation
page read and write
B62B9FE000
unkown
page readonly
4C64022C4000
trusted library allocation
page read and write
785800398000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
1E7C3989000
unclassified section
page read and write
19D0B90C000
heap
page read and write
5FF0002CC000
trusted library allocation
page read and write
2850DFE000
unkown
page readonly
36600D40000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
C0001B2000
direct allocation
page read and write
785800101000
trusted library allocation
page read and write
4C6403218000
trusted library allocation
page read and write
1E093474000
heap
page read and write
4C1800B24000
trusted library allocation
page read and write
6D7C002E8000
trusted library allocation
page read and write
C000CA2000
direct allocation
page read and write
19BF36F0000
direct allocation
page execute read
3F947FE000
unkown
page readonly
4C6402424000
trusted library allocation
page read and write
619000314000
trusted library allocation
page read and write
61F7FE000
unkown
page readonly
4C640248F000
trusted library allocation
page read and write
19BF366A000
direct allocation
page read and write
36600477000
trusted library allocation
page read and write
19D0517E000
heap
page read and write
A7400263000
trusted library allocation
page read and write
4C1800F9C000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
1E0934D0000
heap
page read and write
4C1800FEC000
trusted library allocation
page read and write
C000D0F000
direct allocation
page read and write
19D06F00000
heap
page read and write
36600882000
trusted library allocation
page read and write
5E48002C8000
trusted library allocation
page read and write
19BCC7E4000
direct allocation
page read and write
3660085B000
trusted library allocation
page read and write
631C00250000
trusted library allocation
page read and write
5A68002BC000
direct allocation
page read and write
4C1801588000
trusted library allocation
page read and write
36600B02000
trusted library allocation
page read and write
4C6402C50000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
4000304000
trusted library allocation
page read and write
63940029C000
trusted library allocation
page read and write
4C6403574000
trusted library allocation
page read and write
4C6403228000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C1800E94000
trusted library allocation
page read and write
5FF000238000
trusted library allocation
page read and write
4C6402BD4000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
4C6402F28000
trusted library allocation
page read and write
408400108000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
7858002A5000
trusted library allocation
page read and write
C000064000
direct allocation
page read and write
A74002BA000
trusted library allocation
page read and write
37D400294000
direct allocation
page read and write
1E095C93000
unclassified section
page readonly
A74000D4000
trusted library allocation
page read and write
19BF3A00000
direct allocation
page execute read
4C1800F02000
trusted library allocation
page read and write
5E48002A0000
trusted library allocation
page read and write
706A1FE000
stack
page read and write
36600782000
trusted library allocation
page read and write
19D0502B000
heap
page read and write
1E7C3A55000
unclassified section
page read and write
A74002BA000
trusted library allocation
page read and write
785800378000
trusted library allocation
page read and write
1E7C3B90000
unclassified section
page read and write
785800120000
trusted library allocation
page read and write
23540020C000
trusted library allocation
page read and write
1E7C3374000
unclassified section
page read and write
619000314000
trusted library allocation
page read and write
785800388000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
4C0800294000
direct allocation
page read and write
19D0B96F000
heap
page read and write
A74002EC000
trusted library allocation
page read and write
5A6800298000
direct allocation
page read and write
19BF3740000
direct allocation
page execute read
4C1800FDC000
trusted library allocation
page read and write
A74002D7000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
6D7C002AC000
trusted library allocation
page read and write
4C1800A40000
trusted library allocation
page read and write
19BCC8C4000
heap
page read and write
19D0C204000
trusted library allocation
page read and write
1E095D19000
unclassified section
page readonly
4C1800F9C000
trusted library allocation
page read and write
619000260000
trusted library allocation
page read and write
4C64036BC000
trusted library allocation
page read and write
4C180107C000
trusted library allocation
page read and write
36600842000
trusted library allocation
page read and write
B62B1FE000
stack
page read and write
A7400263000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C1801558000
trusted library allocation
page read and write
7858000EA000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
19D05180000
heap
page read and write
2D8400234000
direct allocation
page read and write
6D7C00274000
trusted library allocation
page read and write
4C1800E94000
trusted library allocation
page read and write
2079BA02000
heap
page read and write
4C18009E0000
trusted library allocation
page read and write
19D09E40000
unkown
page readonly
6D7C002A4000
trusted library allocation
page read and write
199C000C0000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
2840DFE000
unkown
page readonly
4C0800250000
direct allocation
page read and write
4C640321C000
trusted library allocation
page read and write
4C18015F7000
trusted library allocation
page read and write
6D7C00248000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
199C000A8000
trusted library allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
19D05167000
heap
page read and write
619000801000
trusted library allocation
page read and write
4C64031E0000
trusted library allocation
page read and write
4C1801644000
trusted library allocation
page read and write
4C1801668000
trusted library allocation
page read and write
A74000E3000
trusted library allocation
page read and write
1E095EF0000
unclassified section
page readonly
366001C2000
trusted library allocation
page read and write
36600802000
trusted library allocation
page read and write
19D0505D000
heap
page read and write
36600B02000
trusted library allocation
page read and write
B6261FE000
stack
page read and write
19BCCA98000
direct allocation
page read and write
19D0516C000
heap
page read and write
4C640233C000
trusted library allocation
page read and write
4C6402B58000
trusted library allocation
page read and write
1E7F1A00000
heap
page read and write
4C1800894000
trusted library allocation
page read and write
19D0516D000
heap
page read and write
4C1801574000
trusted library allocation
page read and write
4C08002AC000
direct allocation
page read and write
4C1801240000
trusted library allocation
page read and write
4C18014A4000
trusted library allocation
page read and write
19D0B95A000
heap
page read and write
B6251FE000
stack
page read and write
1A3C0023C000
trusted library allocation
page read and write
36600482000
trusted library allocation
page read and write
A74002DC000
trusted library allocation
page read and write
4C1801578000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
268C002B8000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
78580018C000
trusted library allocation
page read and write
36600582000
trusted library allocation
page read and write
19BF3950000
direct allocation
page execute read
4C1800C5C000
trusted library allocation
page read and write
4C1800E94000
trusted library allocation
page read and write
2354002B8000
trusted library allocation
page read and write
4C18015EA000
trusted library allocation
page read and write
619000314000
trusted library allocation
page read and write
2ADB5FE000
unkown
page readonly
6D7C00264000
trusted library allocation
page read and write
4C080020C000
direct allocation
page read and write
5E48002A4000
trusted library allocation
page read and write
1E095C83000
unclassified section
page readonly
3F97FFE000
stack
page read and write
A74002BA000
trusted library allocation
page read and write
36600642000
trusted library allocation
page read and write
2354002A0000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
4C1801014000
trusted library allocation
page read and write
619000408000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
19BF3701000
direct allocation
page read and write
4C6402368000
trusted library allocation
page read and write
12DFDFB000
stack
page read and write
19BCCAB3000
direct allocation
page read and write
36600402000
trusted library allocation
page read and write
4C640221C000
trusted library allocation
page read and write
1E7C396B000
unclassified section
page read and write
A740029E000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
6D7C00358000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
C000A70000
direct allocation
page read and write
19D05157000
heap
page read and write
706B7FF000
stack
page read and write
A7400150000
trusted library allocation
page read and write
4C1800320000
trusted library allocation
page read and write
366000C2000
trusted library allocation
page read and write
19BCC7E0000
direct allocation
page read and write
4C640361C000
trusted library allocation
page read and write
A7400170000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
3660083B000
trusted library allocation
page read and write
4C0800329000
direct allocation
page read and write
19D0B90C000
heap
page read and write
639400260000
trusted library allocation
page read and write
C000CB0000
direct allocation
page read and write
19D0B960000
heap
page read and write
707C002D0000
direct allocation
page read and write
5FF00028C000
trusted library allocation
page read and write
5FF00031C000
trusted library allocation
page read and write
4C1801558000
trusted library allocation
page read and write
4C6403198000
trusted library allocation
page read and write
1E095FF1000
unclassified section
page readonly
36600C82000
trusted library allocation
page read and write
19D050DF000
heap
page read and write
19BF3519000
direct allocation
page read and write
19BF3703000
direct allocation
page read and write
4C18011D2000
trusted library allocation
page read and write
4C0800314000
direct allocation
page read and write
A74002AC000
trusted library allocation
page read and write
4C18016D0000
trusted library allocation
page read and write
4C1801626000
trusted library allocation
page read and write
619000308000
trusted library allocation
page read and write
1E095C53000
unclassified section
page readonly
619000A0C000
trusted library allocation
page read and write
4C6402F54000
trusted library allocation
page read and write
4C1801678000
trusted library allocation
page read and write
36600D02000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
4C1800AF4000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
1A3C0020C000
trusted library allocation
page read and write
4C1801770000
trusted library allocation
page read and write
4C6402CDC000
trusted library allocation
page read and write
4C1800DA0000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
5A68002AC000
direct allocation
page read and write
40002A4000
trusted library allocation
page read and write
36600842000
trusted library allocation
page read and write
1C76D279000
heap
page read and write
631C0029C000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
4C08002E8000
direct allocation
page read and write
C000418000
direct allocation
page read and write
28425FE000
stack
page read and write
36600314000
trusted library allocation
page read and write
4C180077C000
trusted library allocation
page read and write
3F96FFE000
stack
page read and write
619000314000
trusted library allocation
page read and write
2846DFE000
unkown
page readonly
4C1801520000
trusted library allocation
page read and write
4C1800E98000
trusted library allocation
page read and write
61900094C000
trusted library allocation
page read and write
36600182000
trusted library allocation
page read and write
1E7C3C20000
unclassified section
page read and write
4C180164D000
trusted library allocation
page read and write
1E7F1A09000
heap
page read and write
619000398000
trusted library allocation
page read and write
4C6402454000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C1800B04000
trusted library allocation
page read and write
C000CBC000
direct allocation
page read and write
4C64023D4000
trusted library allocation
page read and write
5E48002F0000
trusted library allocation
page read and write
6D7C00356000
trusted library allocation
page read and write
4C180060C000
trusted library allocation
page read and write
12D9506000
stack
page read and write
619000708000
trusted library allocation
page read and write
1E096060000
unclassified section
page readonly
C000CAA000
direct allocation
page read and write
706ADFE000
stack
page read and write
283BDFE000
unkown
page readonly
36600D02000
trusted library allocation
page read and write
408400104000
trusted library allocation
page read and write
19D05167000
heap
page read and write
408400140000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
5E4800210000
trusted library allocation
page read and write
4C18010B0000
trusted library allocation
page read and write
4C18010B0000
trusted library allocation
page read and write
7FF6EB001000
unkown
page execute read
A74002BA000
trusted library allocation
page read and write
37D4002DC000
direct allocation
page read and write
C000582000
direct allocation
page read and write
1E2000220000
trusted library allocation
page read and write
4C6402420000
trusted library allocation
page read and write
1E095F39000
unclassified section
page readonly
4C1800B0E000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
4C18007B0000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
282D5FA000
stack
page read and write
4C1800AE8000
trusted library allocation
page read and write
4C18007B0000
trusted library allocation
page read and write
A74002D7000
trusted library allocation
page read and write
19D06E13000
heap
page read and write
785800388000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
1E7C3A43000
unclassified section
page read and write
36600702000
trusted library allocation
page read and write
235400284000
trusted library allocation
page read and write
619000220000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
4C1801572000
trusted library allocation
page read and write
36600982000
trusted library allocation
page read and write
320800298000
trusted library allocation
page read and write
4C1801728000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
1E7C3C2D000
unclassified section
page read and write
4C64022D4000
trusted library allocation
page read and write
1C76D2C5000
heap
page read and write
1E095F33000
unclassified section
page readonly
36600942000
trusted library allocation
page read and write
4C64031D4000
trusted library allocation
page read and write
C00055D000
direct allocation
page read and write
619000E0C000
trusted library allocation
page read and write
19D04FA0000
trusted library section
page readonly
19D0B980000
heap
page read and write
36600A82000
trusted library allocation
page read and write
320800240000
trusted library allocation
page read and write
19BF3870000
direct allocation
page execute read
62FFFE000
stack
page read and write
19D05102000
heap
page read and write
6D7C002A4000
trusted library allocation
page read and write
36600882000
trusted library allocation
page read and write
4C180106C000
trusted library allocation
page read and write
6190006D0000
trusted library allocation
page read and write
4C180148C000
trusted library allocation
page read and write
36600AC2000
trusted library allocation
page read and write
7858002A0000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
1C76D170000
trusted library allocation
page read and write
3660047F000
trusted library allocation
page read and write
A74002EC000
trusted library allocation
page read and write
4C640378C000
trusted library allocation
page read and write
4C1800EB4000
trusted library allocation
page read and write
1C4B401C000
heap
page read and write
4C1800ED4000
trusted library allocation
page read and write
4C1800EDC000
trusted library allocation
page read and write
4C1800EC4000
trusted library allocation
page read and write
B62C1FE000
stack
page read and write
4C6402C50000
trusted library allocation
page read and write
1E7F1902000
heap
page read and write
4C1800788000
trusted library allocation
page read and write
7858002A0000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
C000E8C000
direct allocation
page read and write
4C08002B0000
direct allocation
page read and write
4C6400201000
trusted library allocation
page read and write
3660085B000
trusted library allocation
page read and write
1E7C33A3000
unclassified section
page read and write
19BCCADD000
direct allocation
page read and write
4000220000
trusted library allocation
page read and write
1E7F1A25000
heap
page read and write
1E7F1A2B000
heap
page read and write
36600102000
trusted library allocation
page read and write
19BF371D000
direct allocation
page read and write
4C1801424000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
4C180155F000
trusted library allocation
page read and write
36600CC2000
trusted library allocation
page read and write
4C6402F84000
trusted library allocation
page read and write
19BF37C0000
direct allocation
page execute read
36600C42000
trusted library allocation
page read and write
6D7C00254000
trusted library allocation
page read and write
4C18011BC000
trusted library allocation
page read and write
4C1801496000
trusted library allocation
page read and write
4C64030E0000
trusted library allocation
page read and write
C000503000
direct allocation
page read and write
36600A02000
trusted library allocation
page read and write
785800388000
trusted library allocation
page read and write
4C1800674000
trusted library allocation
page read and write
19BF3B42000
heap
page read and write
C0003E0000
direct allocation
page read and write
19D0512E000
heap
page read and write
283C5FD000
stack
page read and write
4C18014B8000
trusted library allocation
page read and write
4C1800FF4000
trusted library allocation
page read and write
3F917FE000
unkown
page readonly
1E095EA0000
unclassified section
page readonly
6D7C00310000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
32080023C000
trusted library allocation
page read and write
4000348000
trusted library allocation
page read and write
C000E88000
direct allocation
page read and write
1A3C002CC000
trusted library allocation
page read and write
B6291FE000
stack
page read and write
4C1801054000
trusted library allocation
page read and write
1A3C0026C000
trusted library allocation
page read and write
19D0A310000
trusted library section
page read and write
36600982000
trusted library allocation
page read and write
1E7F1650000
unclassified section
page readonly
7858002A0000
trusted library allocation
page read and write
1E7C3277000
unclassified section
page read and write
4C1800CDC000
trusted library allocation
page read and write
4C6402F9C000
trusted library allocation
page read and write
4C64031A8000
trusted library allocation
page read and write
4084000FD000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
A740019C000
trusted library allocation
page read and write
1E095FFB000
unclassified section
page readonly
C0008F0000
direct allocation
page read and write
36600AC2000
trusted library allocation
page read and write
4000370000
trusted library allocation
page read and write
1E095C17000
unclassified section
page read and write
4C6402CF0000
trusted library allocation
page read and write
7FF6EA601000
unkown
page execute read
4C180155D000
trusted library allocation
page read and write
C000569000
direct allocation
page read and write
4C08002E8000
direct allocation
page read and write
4C64031BC000
trusted library allocation
page read and write
4C1801618000
trusted library allocation
page read and write
CAC002B4000
direct allocation
page read and write
4C1800FEC000
trusted library allocation
page read and write
619000EB4000
trusted library allocation
page read and write
1B6800201000
trusted library allocation
page read and write
1C76D2A0000
heap
page read and write
2079B900000
heap
page read and write
4C6402E7D000
trusted library allocation
page read and write
4C180074C000
trusted library allocation
page read and write
639400250000
trusted library allocation
page read and write
4C1800CDC000
trusted library allocation
page read and write
4C6402C50000
trusted library allocation
page read and write
4C180105A000
trusted library allocation
page read and write
4C1801548000
trusted library allocation
page read and write
1E7F1640000
heap
page read and write
4C1800ACC000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
4C18012D8000
trusted library allocation
page read and write
1E200026C000
trusted library allocation
page read and write
C000507000
direct allocation
page read and write
12DCDFE000
stack
page read and write
4C180154B000
trusted library allocation
page read and write
36600880000
trusted library allocation
page read and write
4C180151E000
trusted library allocation
page read and write
19BF3760000
direct allocation
page execute read
4C18015F4000
trusted library allocation
page read and write
199C0000C000
trusted library allocation
page read and write
4C1800AF8000
trusted library allocation
page read and write
4C1800EF4000
trusted library allocation
page read and write
1C76D2B8000
heap
page read and write
707C00250000
direct allocation
page read and write
4C1801052000
trusted library allocation
page read and write
1E095CAB000
unclassified section
page readonly
19BF3850000
direct allocation
page execute read
1E7F15B0000
heap
page read and write
2D8400230000
direct allocation
page read and write
4C1800E9C000
trusted library allocation
page read and write
19D050F4000
heap
page read and write
36600982000
trusted library allocation
page read and write
619000254000
trusted library allocation
page read and write
61900032F000
trusted library allocation
page read and write
4C1800E94000
trusted library allocation
page read and write
4000418000
trusted library allocation
page read and write
4C18015F4000
trusted library allocation
page read and write
4C64035F0000
trusted library allocation
page read and write
4C18014F0000
trusted library allocation
page read and write
785800134000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
2079BB02000
heap
page read and write
4C0800254000
direct allocation
page read and write
4C18015E4000
trusted library allocation
page read and write
3DD4002A8000
trusted library allocation
page read and write
785800144000
trusted library allocation
page read and write
4C64031A8000
trusted library allocation
page read and write
C000CC2000
direct allocation
page read and write
2079B9B0000
unclassified section
page readonly
1E20002C4000
trusted library allocation
page read and write
4C1800ACC000
trusted library allocation
page read and write
2079B976000
remote allocation
page execute read
4C6402B00000
trusted library allocation
page read and write
4C1800E0C000
trusted library allocation
page read and write
A74002D4000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C080030C000
direct allocation
page read and write
4C1800AFA000
trusted library allocation
page read and write
4C1800A54000
trusted library allocation
page read and write
4C640362C000
trusted library allocation
page read and write
4C6402FDC000
trusted library allocation
page read and write
366007A0000
trusted library allocation
page read and write
2D84002B0000
direct allocation
page read and write
1E20002C4000
trusted library allocation
page read and write
4C1800B00000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
4C08002E8000
direct allocation
page read and write
366004C2000
trusted library allocation
page read and write
4C1800AEA000
trusted library allocation
page read and write
1C76FE70000
heap
page read and write
B62D1FE000
stack
page read and write
1E095D13000
unclassified section
page readonly
36600802000
trusted library allocation
page read and write
19D0B962000
heap
page read and write
4C1800A0C000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
366006C2000
trusted library allocation
page read and write
620FFE000
stack
page read and write
4C18009F0000
trusted library allocation
page read and write
7858001A2000
trusted library allocation
page read and write
4C6400B92000
trusted library allocation
page read and write
639400284000
trusted library allocation
page read and write
1E7C3BF7000
unclassified section
page read and write
A740029E000
trusted library allocation
page read and write
268C00274000
trusted library allocation
page read and write
5A680027C000
direct allocation
page read and write
4C0800234000
direct allocation
page read and write
36600B42000
trusted library allocation
page read and write
619000E8C000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
19BF369B000
direct allocation
page read and write
4000334000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
4C1800884000
trusted library allocation
page read and write
4C18009E9000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
2A3800238000
direct allocation
page read and write
C00091C000
direct allocation
page read and write
268C002A8000
trusted library allocation
page read and write
4C1800730000
trusted library allocation
page read and write
4C1800EE2000
trusted library allocation
page read and write
1A3C002DC000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
4C1800E98000
trusted library allocation
page read and write
4C6400162000
trusted library allocation
page read and write
284CDFE000
unkown
page readonly
19BF3A62000
direct allocation
page read and write
1A3C00280000
trusted library allocation
page read and write
1A3C00220000
trusted library allocation
page read and write
4C180074C000
trusted library allocation
page read and write
36600B42000
trusted library allocation
page read and write
1C76D286000
heap
page read and write
A74002C8000
trusted library allocation
page read and write
4C1801064000
trusted library allocation
page read and write
C0009E2000
direct allocation
page read and write
707C002A4000
direct allocation
page read and write
1E7C3BA0000
unclassified section
page read and write
4C1800EDC000
trusted library allocation
page read and write
19D05000000
heap
page read and write
5E48002B8000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
785800298000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
36600182000
trusted library allocation
page read and write
1E090530000
heap
page read and write
4C6403001000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
366006C2000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
4C18009F0000
trusted library allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
4C1801618000
trusted library allocation
page read and write
1E093481000
heap
page read and write
1E7F1A2B000
heap
page read and write
366008AC000
trusted library allocation
page read and write
CAC00274000
direct allocation
page read and write
5FF000304000
trusted library allocation
page read and write
199C00050000
trusted library allocation
page read and write
4C6402ECC000
trusted library allocation
page read and write
19BF3A58000
direct allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
623FFE000
stack
page read and write
19D0500C000
heap
page read and write
19D05171000
heap
page read and write
785800134000
trusted library allocation
page read and write
400023C000
trusted library allocation
page read and write
B6269FE000
unkown
page readonly
78580023C000
trusted library allocation
page read and write
1A3C002B8000
trusted library allocation
page read and write
19BCC8BD000
heap
page read and write
4C180105A000
trusted library allocation
page read and write
2D8400264000
direct allocation
page read and write
3660083B000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
4C6402B7C000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
4C1801067000
trusted library allocation
page read and write
4C180142A000
trusted library allocation
page read and write
12DADF6000
stack
page read and write
A740029E000
trusted library allocation
page read and write
36600780000
trusted library allocation
page read and write
1E7C3381000
unclassified section
page read and write
282C5FB000
stack
page read and write
36600942000
trusted library allocation
page read and write
36600702000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
1E095F20000
unclassified section
page readonly
36600882000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
4C6403661000
trusted library allocation
page read and write
1C76D286000
heap
page read and write
4C1800FEC000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
282EDFE000
unkown
page readonly
19D04E30000
heap
page read and write
4C180107C000
trusted library allocation
page read and write
2837DFE000
unkown
page readonly
4C64034FC000
trusted library allocation
page read and write
C000E4E000
direct allocation
page read and write
4C18014E4000
trusted library allocation
page read and write
1E7C3C15000
unclassified section
page read and write
36600CC2000
trusted library allocation
page read and write
4C180102C000
trusted library allocation
page read and write
1E090550000
unclassified section
page readonly
19BF3BC0000
direct allocation
page read and write
12DD5F9000
stack
page read and write
4C6402AD8000
trusted library allocation
page read and write
3DD400258000
trusted library allocation
page read and write
4C1800290000
trusted library allocation
page read and write
2D8400274000
direct allocation
page read and write
785800114000
trusted library allocation
page read and write
4C1800FE2000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
19BF3800000
direct allocation
page execute read
4C1800A40000
trusted library allocation
page read and write
1A3C002B8000
trusted library allocation
page read and write
C000390000
direct allocation
page read and write
1E200029C000
trusted library allocation
page read and write
6D7C00284000
trusted library allocation
page read and write
3F937FE000
unkown
page readonly
2843DFE000
unkown
page readonly
19D05171000
heap
page read and write
1E7C397F000
unclassified section
page read and write
366007C2000
trusted library allocation
page read and write
4C6402260000
trusted library allocation
page read and write
3F977FE000
unkown
page readonly
3F927FE000
unkown
page readonly
4C1800F14000
trusted library allocation
page read and write
4C640376C000
trusted library allocation
page read and write
19D0A540000
unkown
page readonly
4C18014B8000
trusted library allocation
page read and write
36600742000
trusted library allocation
page read and write
A7400038000
trusted library allocation
page read and write
19D05167000
heap
page read and write
19BCCAB8000
direct allocation
page read and write
78580040C000
trusted library allocation
page read and write
4C18009F8000
trusted library allocation
page read and write
19BF3820000
direct allocation
page execute read
4C6402F78000
trusted library allocation
page read and write
2849DFE000
unkown
page readonly
4C6402EA4000
trusted library allocation
page read and write
619000E01000
trusted library allocation
page read and write
A7400170000
trusted library allocation
page read and write
4C18009E8000
trusted library allocation
page read and write
366004C2000
trusted library allocation
page read and write
619000368000
trusted library allocation
page read and write
4C1800A13000
trusted library allocation
page read and write
4C1801228000
trusted library allocation
page read and write
19D0516D000
heap
page read and write
A740029E000
trusted library allocation
page read and write
4C180078C000
trusted library allocation
page read and write
366003C2000
trusted library allocation
page read and write
61900060C000
trusted library allocation
page read and write
4C1800318000
trusted library allocation
page read and write
19BF368B000
direct allocation
page read and write
4C1800624000
trusted library allocation
page read and write
4C18012DC000
trusted library allocation
page read and write
4C1801651000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
C000904000
direct allocation
page read and write
A7400290000
trusted library allocation
page read and write
36600702000
trusted library allocation
page read and write
4C1800FDC000
trusted library allocation
page read and write
36600802000
trusted library allocation
page read and write
2838DFE000
unkown
page readonly
4000364000
trusted library allocation
page read and write
4C1800AEC000
trusted library allocation
page read and write
366007A0000
trusted library allocation
page read and write
1B5F7FE000
unkown
page readonly
6D7C002F0000
trusted library allocation
page read and write
19BF3960000
direct allocation
page execute read
1E095C8F000
unclassified section
page readonly
19D0516C000
heap
page read and write
A7400114000
trusted library allocation
page read and write
4C18015F7000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
1E090613000
heap
page read and write
619000264000
trusted library allocation
page read and write
320800201000
trusted library allocation
page read and write
78580020C000
trusted library allocation
page read and write
5E4800278000
trusted library allocation
page read and write
4C6402FDC000
trusted library allocation
page read and write
19BF3BE2000
direct allocation
page read and write
19D07BC0000
unkown
page read and write
1E090B02000
heap
page read and write
19D06F02000
heap
page read and write
4C640249C000
trusted library allocation
page read and write
1E09062B000
heap
page read and write
4C1800B04000
trusted library allocation
page read and write
A7400098000
trusted library allocation
page read and write
C00053E000
direct allocation
page read and write
4C18015F4000
trusted library allocation
page read and write
4C1800F4C000
trusted library allocation
page read and write
4C1800AE8000
trusted library allocation
page read and write
4C64026B4000
trusted library allocation
page read and write
36600682000
trusted library allocation
page read and write
36600880000
trusted library allocation
page read and write
282A5FE000
stack
page read and write
19D0516D000
heap
page read and write
366007C2000
trusted library allocation
page read and write
36600402000
trusted library allocation
page read and write
2079BDF7000
unclassified section
page read and write
4C1800E93000
trusted library allocation
page read and write
1E20002AC000
trusted library allocation
page read and write
28465FE000
stack
page read and write
28325FC000
stack
page read and write
707C00201000
direct allocation
page read and write
1E095D65000
unclassified section
page readonly
A74002AC000
trusted library allocation
page read and write
4C0800230000
direct allocation
page read and write
A7400290000
trusted library allocation
page read and write
5A68002D4000
direct allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
631C00210000
trusted library allocation
page read and write
4C1800318000
trusted library allocation
page read and write
7FF6EE2F7000
unkown
page write copy
5FF0002DC000
trusted library allocation
page read and write
283A5FC000
stack
page read and write
4C18008A4000
trusted library allocation
page read and write
2848DFE000
unkown
page readonly
3660078D000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C18009BC000
trusted library allocation
page read and write
5A680029C000
direct allocation
page read and write
4C64030A4000
trusted library allocation
page read and write
1B617FE000
unkown
page readonly
A7400284000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
639400254000
trusted library allocation
page read and write
4C6402328000
trusted library allocation
page read and write
4C18006AC000
trusted library allocation
page read and write
1E095F60000
unclassified section
page readonly
1E0934C8000
heap
page read and write
36600982000
trusted library allocation
page read and write
1E7F1625000
remote allocation
page execute read
366004C2000
trusted library allocation
page read and write
7858000B0000
trusted library allocation
page read and write
5FF000294000
trusted library allocation
page read and write
4C1800EB8000
trusted library allocation
page read and write
631C00284000
trusted library allocation
page read and write
4C1800418000
trusted library allocation
page read and write
28415FC000
stack
page read and write
2825DFE000
unkown
page readonly
4C1800F14000
trusted library allocation
page read and write
4C640364C000
trusted library allocation
page read and write
28375FC000
stack
page read and write
631C00270000
trusted library allocation
page read and write
4C1800EB0000
trusted library allocation
page read and write
4C18006A0000
trusted library allocation
page read and write
627FFB000
stack
page read and write
36600B82000
trusted library allocation
page read and write
4C64036A0000
trusted library allocation
page read and write
785800114000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
4C1801498000
trusted library allocation
page read and write
4C18014C1000
trusted library allocation
page read and write
4C1800FCC000
trusted library allocation
page read and write
C000E49000
direct allocation
page read and write
A74001B0000
trusted library allocation
page read and write
1C76D2A4000
heap
page read and write
1C76D279000
heap
page read and write
A7400284000
trusted library allocation
page read and write
268C002A8000
trusted library allocation
page read and write
19BCCA8D000
direct allocation
page read and write
4C18016D0000
trusted library allocation
page read and write
7858003E0000
trusted library allocation
page read and write
366008AC000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C1800894000
trusted library allocation
page read and write
4C1800F4C000
trusted library allocation
page read and write
4C1800DD8000
trusted library allocation
page read and write
19BF3A7B000
direct allocation
page read and write
4C1800FDC000
trusted library allocation
page read and write
1B6800274000
trusted library allocation
page read and write
408400054000
trusted library allocation
page read and write
36600780000
trusted library allocation
page read and write
36600477000
trusted library allocation
page read and write
4C180061C000
trusted library allocation
page read and write
4C1801562000
trusted library allocation
page read and write
199C000B8000
trusted library allocation
page read and write
1B6800254000
trusted library allocation
page read and write
1E7F1A24000
heap
page read and write
19BF3517000
direct allocation
page read and write
4C180173C000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C1801064000
trusted library allocation
page read and write
4C18015E4000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
36600902000
trusted library allocation
page read and write
199C0005C000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
5E4800334000
trusted library allocation
page read and write
408400100000
trusted library allocation
page read and write
1E09605A000
unclassified section
page readonly
5E48002F8000
trusted library allocation
page read and write
4C1800EAC000
trusted library allocation
page read and write
2845DFE000
unkown
page readonly
6D7C00334000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
19BCC88E000
heap
page read and write
A74002C8000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
37D400288000
direct allocation
page read and write
2832DFE000
unkown
page readonly
19D0B964000
heap
page read and write
3F9CFFE000
stack
page read and write
C000505000
direct allocation
page read and write
28485FE000
stack
page read and write
2841DFE000
unkown
page readonly
1E7F1A2B000
heap
page read and write
235400258000
trusted library allocation
page read and write
4C640366C000
trusted library allocation
page read and write
2ADA5FE000
unkown
page readonly
3DD400284000
trusted library allocation
page read and write
4C6402C0C000
trusted library allocation
page read and write
3660047F000
trusted library allocation
page read and write
4C18016E4000
trusted library allocation
page read and write
1C76FC02000
heap
page read and write
1C76D28B000
heap
page read and write
C000C3E000
direct allocation
page read and write
1E095C29000
unclassified section
page readonly
1E7C3BCF000
unclassified section
page read and write
631C0029C000
trusted library allocation
page read and write
4C0800212000
direct allocation
page read and write
5E480031C000
trusted library allocation
page read and write
235400238000
trusted library allocation
page read and write
7FF6F0487000
unkown
page readonly
1C76D279000
heap
page read and write
36600702000
trusted library allocation
page read and write
4C1800F53000
trusted library allocation
page read and write
19BCC790000
heap
page read and write
4C18006AC000
trusted library allocation
page read and write
4C1800FE2000
trusted library allocation
page read and write
4084000D8000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
706AFFF000
stack
page read and write
4C1800F94000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C1801044000
trusted library allocation
page read and write
4C180156C000
trusted library allocation
page read and write
4C18010BC000
trusted library allocation
page read and write
1E7C3A38000
unclassified section
page read and write
4C18003E8000
trusted library allocation
page read and write
4C18010BC000
trusted library allocation
page read and write
4C640328C000
trusted library allocation
page read and write
36600442000
trusted library allocation
page read and write
37D400298000
direct allocation
page read and write
A7400268000
trusted library allocation
page read and write
3F957FE000
unkown
page readonly
4C64036B0000
trusted library allocation
page read and write
408400058000
trusted library allocation
page read and write
1A3C00270000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
4C6402BAC000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
6D7C00418000
trusted library allocation
page read and write
4C1800EB7000
trusted library allocation
page read and write
282BDFE000
unkown
page readonly
A74002C8000
trusted library allocation
page read and write
36600742000
trusted library allocation
page read and write
4C1800F44000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
5FF0002AC000
trusted library allocation
page read and write
4C6403724000
trusted library allocation
page read and write
4C18009E7000
trusted library allocation
page read and write
4C64022F0000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
631C0031C000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
36600742000
trusted library allocation
page read and write
1D7A207C000
heap
page read and write
1E7C3303000
unclassified section
page read and write
282B5F9000
stack
page read and write
36600A02000
trusted library allocation
page read and write
37D4002BC000
direct allocation
page read and write
19BF38D0000
direct allocation
page execute read
A7400290000
trusted library allocation
page read and write
6190006F8000
trusted library allocation
page read and write
4C0800274000
direct allocation
page read and write
4C6402488000
trusted library allocation
page read and write
631C00240000
trusted library allocation
page read and write
19D050E1000
heap
page read and write
4C1800730000
trusted library allocation
page read and write
4C180074C000
trusted library allocation
page read and write
4C640372C000
trusted library allocation
page read and write
4C1800A54000
trusted library allocation
page read and write
36600D02000
trusted library allocation
page read and write
4C6402EE8000
trusted library allocation
page read and write
1E7F15A0000
unclassified section
page readonly
7FF6EDFF7000
unkown
page readonly
28285FE000
stack
page read and write
4C64031D8000
trusted library allocation
page read and write
785800198000
trusted library allocation
page read and write
36600D42000
trusted library allocation
page read and write
2830DFE000
unkown
page readonly
4C0800217000
direct allocation
page read and write
268C002B4000
trusted library allocation
page read and write
6D7C00220000
trusted library allocation
page read and write
1B6800258000
trusted library allocation
page read and write
4C1800FC4000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
400040C000
trusted library allocation
page read and write
A74000DD000
trusted library allocation
page read and write
619000320000
trusted library allocation
page read and write
C0005BA000
direct allocation
page read and write
1E095D29000
unclassified section
page readonly
1E095DE4000
unclassified section
page readonly
408400044000
trusted library allocation
page read and write
4C1800F94000
trusted library allocation
page read and write
4C180078C000
trusted library allocation
page read and write
4C18015E4000
trusted library allocation
page read and write
19D0B960000
heap
page read and write
4C1800FDC000
trusted library allocation
page read and write
408400110000
trusted library allocation
page read and write
4C1800E97000
trusted library allocation
page read and write
4C18012DC000
trusted library allocation
page read and write
36600602000
trusted library allocation
page read and write
A7400260000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
CAC00294000
direct allocation
page read and write
4C1800F54000
trusted library allocation
page read and write
19D0B960000
heap
page read and write
4C1801698000
trusted library allocation
page read and write
4C64001BE000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
4C1800F6C000
trusted library allocation
page read and write
78580012C000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
19BCC893000
heap
page read and write
235400274000
trusted library allocation
page read and write
3DD4002D4000
trusted library allocation
page read and write
40002B4000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
1E7F1A54000
heap
page read and write
408400070000
trusted library allocation
page read and write
19D0CAE0000
unkown
page readonly
78580022C000
trusted library allocation
page read and write
1E7C3310000
unclassified section
page read and write
5A6800220000
direct allocation
page read and write
4C1800614000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
36600582000
trusted library allocation
page read and write
4C18010B4000
trusted library allocation
page read and write
1E090635000
heap
page read and write
A7400260000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
A740024C000
trusted library allocation
page read and write
1E0934CE000
heap
page read and write
36600802000
trusted library allocation
page read and write
5FF0002E8000
trusted library allocation
page read and write
2079B960000
remote allocation
page read and write
19D0512E000
heap
page read and write
5E4800404000
trusted library allocation
page read and write
400033C000
trusted library allocation
page read and write
19BF37D0000
direct allocation
page execute read
36600C02000
trusted library allocation
page read and write
4C1800FEC000
trusted library allocation
page read and write
1C76D28B000
heap
page read and write
4C6403270000
trusted library allocation
page read and write
C00036E000
direct allocation
page read and write
19BF3980000
direct allocation
page execute read
4C180061C000
trusted library allocation
page read and write
366008AC000
trusted library allocation
page read and write
3DD400210000
trusted library allocation
page read and write
C000B18000
direct allocation
page read and write
36600802000
trusted library allocation
page read and write
1B68002C8000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
19BF3940000
direct allocation
page execute read
1B6800220000
trusted library allocation
page read and write
19BF3A39000
direct allocation
page read and write
19D0B960000
heap
page read and write
CAC00210000
direct allocation
page read and write
28405FE000
stack
page read and write
6D7C002D8000
trusted library allocation
page read and write
7858001C0000
trusted library allocation
page read and write
4C1801592000
trusted library allocation
page read and write
19BF3750000
direct allocation
page execute read
B6299FE000
unkown
page readonly
C000036000
direct allocation
page read and write
366008C2000
trusted library allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
4C1800AE8000
trusted library allocation
page read and write
3DD400248000
trusted library allocation
page read and write
4C6403708000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
1E7C3BD5000
unclassified section
page read and write
4C1800A40000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C18016CB000
trusted library allocation
page read and write
4C180122C000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
268C00294000
trusted library allocation
page read and write
7FF6EA601000
unkown
page execute read
366005C2000
trusted library allocation
page read and write
706B3FF000
stack
page read and write
4C6402E90000
trusted library allocation
page read and write
4C1800EDC000
trusted library allocation
page read and write
4C6402C70000
trusted library allocation
page read and write
19BF3880000
direct allocation
page execute read
19BF3A41000
direct allocation
page read and write
366001C2000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
4C1800E94000
trusted library allocation
page read and write
4C1801052000
trusted library allocation
page read and write
37D400284000
direct allocation
page read and write
4C080031A000
direct allocation
page read and write
19BF39C0000
direct allocation
page execute read
619000698000
trusted library allocation
page read and write
19BCC894000
heap
page read and write
2AD65FE000
unkown
page readonly
619000314000
trusted library allocation
page read and write
A74002EC000
trusted library allocation
page read and write
C0005B6000
direct allocation
page read and write
4C18014D4000
trusted library allocation
page read and write
78580021C000
trusted library allocation
page read and write
4C1800B02000
trusted library allocation
page read and write
619000C8C000
trusted library allocation
page read and write
4C1801710000
trusted library allocation
page read and write
1E095DA0000
unclassified section
page readonly
1E7F1750000
heap
page readonly
284FDFE000
unkown
page readonly
19D0B962000
heap
page read and write
622FFE000
stack
page read and write
37D4002A4000
direct allocation
page read and write
19D0B960000
heap
page read and write
19D0CA70000
unkown
page readonly
366008AC000
trusted library allocation
page read and write
19BCC8CD000
heap
page read and write
19D09FB2000
unclassified section
page read and write
4C1800320000
trusted library allocation
page read and write
6227FE000
unkown
page readonly
4C6402C5C000
trusted library allocation
page read and write
36600742000
trusted library allocation
page read and write
3DD400254000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
19D07BEB000
unkown
page read and write
A74002AC000
trusted library allocation
page read and write
36600982000
trusted library allocation
page read and write
4C1800EB4000
trusted library allocation
page read and write
619000294000
trusted library allocation
page read and write
4C18016C8000
trusted library allocation
page read and write
7858000A4000
trusted library allocation
page read and write
1E0909B7000
unclassified section
page read and write
4C0800278000
direct allocation
page read and write
1C76FBF0000
trusted library allocation
page read and write
4C1800B0E000
trusted library allocation
page read and write
36600482000
trusted library allocation
page read and write
2AD9DFD000
stack
page read and write
235400244000
trusted library allocation
page read and write
1E7C33C1000
unclassified section
page read and write
A74000D8000
trusted library allocation
page read and write
C000D88000
direct allocation
page read and write
5A6800201000
direct allocation
page read and write
3DD400230000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
1D7A202B000
heap
page read and write
4C1801064000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
4C64027EC000
trusted library allocation
page read and write
4C180061C000
trusted library allocation
page read and write
2AD6DFD000
stack
page read and write
62DFFE000
stack
page read and write
199C00044000
trusted library allocation
page read and write
19D04F30000
heap
page read and write
4C18014B8000
trusted library allocation
page read and write
C000412000
direct allocation
page read and write
2836DFE000
unkown
page readonly
366006C2000
trusted library allocation
page read and write
4C1800F54000
trusted library allocation
page read and write
4C1801064000
trusted library allocation
page read and write
1C76D286000
heap
page read and write
3660047F000
trusted library allocation
page read and write
1C76D302000
heap
page read and write
36600402000
trusted library allocation
page read and write
631C00230000
trusted library allocation
page read and write
4C6402FA8000
trusted library allocation
page read and write
4C1800F94000
trusted library allocation
page read and write
C000014000
direct allocation
page read and write
4C1800AFC000
trusted library allocation
page read and write
4C1800A0C000
trusted library allocation
page read and write
36600382000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
4C1800408000
trusted library allocation
page read and write
4C1800EFC000
trusted library allocation
page read and write
4C18016C0000
trusted library allocation
page read and write
C0009F0000
direct allocation
page read and write
366007A0000
trusted library allocation
page read and write
2AD85FE000
unkown
page readonly
3660030E000
trusted library allocation
page read and write
4C64030C4000
trusted library allocation
page read and write
4C18012EC000
trusted library allocation
page read and write
4C18015FA000
trusted library allocation
page read and write
4C1800788000
trusted library allocation
page read and write
199C00024000
trusted library allocation
page read and write
4C180104C000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
1C4B5A02000
heap
page read and write
4084000C3000
trusted library allocation
page read and write
1C4B3F10000
heap
page read and write
366007A0000
trusted library allocation
page read and write
4C1800EFD000
trusted library allocation
page read and write
5FF000300000
trusted library allocation
page read and write
C000BB4000
direct allocation
page read and write
631C002E4000
trusted library allocation
page read and write
366007A0000
trusted library allocation
page read and write
36600882000
trusted library allocation
page read and write
631C00328000
trusted library allocation
page read and write
19D0516E000
heap
page read and write
19D0B960000
heap
page read and write
7858001A4000
trusted library allocation
page read and write
2079BA2B000
heap
page read and write
36600BC2000
trusted library allocation
page read and write
6D7C002A0000
trusted library allocation
page read and write
1B6800210000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
61900094C000
trusted library allocation
page read and write
7FF6EC36F000
unkown
page write copy
36600C02000
trusted library allocation
page read and write
785800090000
trusted library allocation
page read and write
1E7C3943000
unclassified section
page read and write
2079B9E2000
unclassified section
page read and write
4C1800EFC000
trusted library allocation
page read and write
A74002D7000
trusted library allocation
page read and write
C000CA8000
direct allocation
page read and write
36600C42000
trusted library allocation
page read and write
A7400260000
trusted library allocation
page read and write
1D7A2013000
heap
page read and write
36600142000
trusted library allocation
page read and write
12DA5FE000
stack
page read and write
1B607FE000
unkown
page readonly
1E7C3933000
unclassified section
page read and write
4C180178C000
trusted library allocation
page read and write
4C6402334000
trusted library allocation
page read and write
4C6402770000
trusted library allocation
page read and write
1E782BB7000
unclassified section
page read and write
A7400244000
trusted library allocation
page read and write
3F9AFFE000
stack
page read and write
619000EB0000
trusted library allocation
page read and write
4C1800F1A000
trusted library allocation
page read and write
6D7C002A0000
trusted library allocation
page read and write
4C1800DEC000
trusted library allocation
page read and write
4C08002D0000
direct allocation
page read and write
28315FC000
stack
page read and write
12DF5FE000
stack
page read and write
4C1800F94000
trusted library allocation
page read and write
A74000E9000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
19D0C604000
heap
page read and write
78580040C000
trusted library allocation
page read and write
37D400220000
direct allocation
page read and write
4C1800EE2000
trusted library allocation
page read and write
C000923000
direct allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C1801067000
trusted library allocation
page read and write
4C6402E44000
trusted library allocation
page read and write
4C18016C8000
trusted library allocation
page read and write
2D8400220000
direct allocation
page read and write
6217FE000
unkown
page readonly
4C1800EC4000
trusted library allocation
page read and write
366003C2000
trusted library allocation
page read and write
19D0516D000
heap
page read and write
36600542000
trusted library allocation
page read and write
706B5F6000
stack
page read and write
4C6403218000
trusted library allocation
page read and write
19BF3BF8000
direct allocation
page read and write
3DD4002B8000
trusted library allocation
page read and write
282ADFE000
unkown
page readonly
36600880000
trusted library allocation
page read and write
1E0908D0000
unclassified section
page readonly
36600902000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
1C4B4000000
heap
page read and write
C000CEA000
direct allocation
page read and write
282DDFE000
unkown
page readonly
320800238000
trusted library allocation
page read and write
6D7C00244000
trusted library allocation
page read and write
1A3C002DC000
trusted library allocation
page read and write
36600AC2000
trusted library allocation
page read and write
1E090570000
heap
page readonly
4C180120C000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
7858002A5000
trusted library allocation
page read and write
19D05188000
heap
page read and write
2AD75FE000
unkown
page readonly
1E831F50000
trusted library allocation
page read and write
4C1801428000
trusted library allocation
page read and write
37D400234000
direct allocation
page read and write
1D7A1E30000
heap
page read and write
4C1801258000
trusted library allocation
page read and write
1C76D2B0000
heap
page read and write
1A3C002B8000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
36600477000
trusted library allocation
page read and write
4C180078C000
trusted library allocation
page read and write
4C1800D5C000
trusted library allocation
page read and write
619000320000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
4C6402712000
trusted library allocation
page read and write
4C6402684000
trusted library allocation
page read and write
366003C2000
trusted library allocation
page read and write
4C180157A000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
4C64031EC000
trusted library allocation
page read and write
1E7F1630000
remote allocation
page read and write
C000C9C000
direct allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
4C1800EB4000
trusted library allocation
page read and write
785800278000
trusted library allocation
page read and write
4C1800B04000
trusted library allocation
page read and write
A74001D8000
trusted library allocation
page read and write
4C1800F74000
trusted library allocation
page read and write
19D05165000
heap
page read and write
A7400268000
trusted library allocation
page read and write
4C18015EA000
trusted library allocation
page read and write
639400280000
trusted library allocation
page read and write
4C6402B4C000
trusted library allocation
page read and write
36600802000
trusted library allocation
page read and write
5FF0002A0000
trusted library allocation
page read and write
28295FD000
stack
page read and write
4C180032C000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
19D05175000
heap
page read and write
CAC002A4000
direct allocation
page read and write
A74000FC000
trusted library allocation
page read and write
1E7C3959000
unclassified section
page read and write
4C1800EB4000
trusted library allocation
page read and write
1D7A68B0000
heap
page read and write
4C1800A0C000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
2D84002C4000
direct allocation
page read and write
19D05127000
heap
page read and write
4C6402BC4000
trusted library allocation
page read and write
4C6402C01000
trusted library allocation
page read and write
268C00284000
trusted library allocation
page read and write
5E4800244000
trusted library allocation
page read and write
707C002B0000
direct allocation
page read and write
32080025C000
trusted library allocation
page read and write
19BF3930000
direct allocation
page execute read
2831DFE000
unkown
page readonly
4C1800A90000
trusted library allocation
page read and write
2D8400254000
direct allocation
page read and write
6D7C00258000
trusted library allocation
page read and write
A74002D7000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
19BF3BE4000
direct allocation
page read and write
36600B42000
trusted library allocation
page read and write
C000509000
direct allocation
page read and write
4C6402460000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C1800E98000
trusted library allocation
page read and write
1D7A69D0000
unkown
page readonly
4C18016E4000
trusted library allocation
page read and write
4C18014E4000
trusted library allocation
page read and write
785800001000
trusted library allocation
page read and write
3DD400201000
trusted library allocation
page read and write
4C1801794000
trusted library allocation
page read and write
19D05166000
heap
page read and write
4C18015FA000
trusted library allocation
page read and write
1E095FE4000
unclassified section
page readonly
36600A02000
trusted library allocation
page read and write
1E7C32EB000
unclassified section
page read and write
4C1800E94000
trusted library allocation
page read and write
36600902000
trusted library allocation
page read and write
4C1801648000
trusted library allocation
page read and write
4C1800AE8000
trusted library allocation
page read and write
36600311000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
1C76D130000
heap
page readonly
19D0B802000
heap
page read and write
36600902000
trusted library allocation
page read and write
1A3C00258000
trusted library allocation
page read and write
4C1800F7C000
trusted library allocation
page read and write
785800138000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C180105A000
trusted library allocation
page read and write
4C6402F38000
trusted library allocation
page read and write
28495FE000
stack
page read and write
36600902000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
2D8400210000
direct allocation
page read and write
4C18007B0000
trusted library allocation
page read and write
1E095C00000
trusted library allocation
page read and write
1B6800298000
trusted library allocation
page read and write
19BF38E0000
direct allocation
page execute read
4C1800614000
trusted library allocation
page read and write
4C6402A24000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
4C1800EDC000
trusted library allocation
page read and write
619000EA0000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
4C6403764000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
4C1800DF0000
trusted library allocation
page read and write
4C1800F4C000
trusted library allocation
page read and write
5E4800408000
trusted library allocation
page read and write
7DF4E8DB1000
trusted library allocation
page execute read
4C18015F7000
trusted library allocation
page read and write
A7400201000
trusted library allocation
page read and write
4C6402458000
trusted library allocation
page read and write
1E7F1A09000
heap
page read and write
4C1801562000
trusted library allocation
page read and write
1C76D276000
heap
page read and write
282E5FB000
stack
page read and write
2D8400284000
direct allocation
page read and write
4C6402D74000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
1E7C3A19000
unclassified section
page read and write
19BF3614000
direct allocation
page read and write
4C6402F90000
trusted library allocation
page read and write
A7400220000
trusted library allocation
page read and write
4C6400C14000
trusted library allocation
page read and write
CAC00250000
direct allocation
page read and write
1E095CC1000
unclassified section
page readonly
2AD8DFC000
stack
page read and write
1E095CD9000
unclassified section
page readonly
36600342000
trusted library allocation
page read and write
40002F3000
trusted library allocation
page read and write
785800254000
trusted library allocation
page read and write
785800388000
trusted library allocation
page read and write
7858003B0000
trusted library allocation
page read and write
36600742000
trusted library allocation
page read and write
283EDFE000
unkown
page readonly
199C000D0000
trusted library allocation
page read and write
4C08002D0000
direct allocation
page read and write
19D07BF3000
unkown
page read and write
4C6402AC3000
trusted library allocation
page read and write
4C6403160000
trusted library allocation
page read and write
19BF39A0000
direct allocation
page execute read
4C1801498000
trusted library allocation
page read and write
4C18014A4000
trusted library allocation
page read and write
268C00294000
trusted library allocation
page read and write
A7400160000
trusted library allocation
page read and write
36600982000
trusted library allocation
page read and write
36600B02000
trusted library allocation
page read and write
37D400254000
direct allocation
page read and write
4C64025A4000
trusted library allocation
page read and write
C000942000
direct allocation
page read and write
28445FE000
stack
page read and write
4C6403308000
trusted library allocation
page read and write
36600582000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
1E7F1A24000
heap
page read and write
4C1801498000
trusted library allocation
page read and write
5FF00020C000
trusted library allocation
page read and write
1C76D2F0000
heap
page read and write
4C1800FE2000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
CAC00201000
direct allocation
page read and write
C000CBA000
direct allocation
page read and write
1E090702000
heap
page read and write
1C76D244000
heap
page read and write
4C1800EAC000
trusted library allocation
page read and write
1C4B59F0000
heap
page read and write
A7400290000
trusted library allocation
page read and write
4000238000
trusted library allocation
page read and write
4C1800B09000
trusted library allocation
page read and write
1E7F1F60000
trusted library allocation
page read and write
366000C2000
trusted library allocation
page read and write
1E7C3C50000
unclassified section
page read and write
C000A4A000
direct allocation
page read and write
4C1800AF8000
trusted library allocation
page read and write
4C1800EFD000
trusted library allocation
page read and write
1A3C0025C000
trusted library allocation
page read and write
268C00284000
trusted library allocation
page read and write
A7400024000
trusted library allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
19D0B97B000
heap
page read and write
19D09E45000
unkown
page readonly
19BF3A75000
direct allocation
page read and write
2AD5DFE000
stack
page read and write
C00005B000
direct allocation
page read and write
4C18007B0000
trusted library allocation
page read and write
2823DFE000
unkown
page readonly
19D09DF7000
unkown
page readonly
4C6402F60000
trusted library allocation
page read and write
1D7A1F30000
heap
page readonly
A74002BA000
trusted library allocation
page read and write
A7400050000
trusted library allocation
page read and write
A74002D4000
trusted library allocation
page read and write
4C1801210000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C1801568000
trusted library allocation
page read and write
36600D40000
trusted library allocation
page read and write
235400210000
trusted library allocation
page read and write
3660033B000
trusted library allocation
page read and write
4C1800EB0000
trusted library allocation
page read and write
4C1800FE3000
trusted library allocation
page read and write
6267FE000
unkown
page readonly
36600C42000
trusted library allocation
page read and write
2079B8F0000
unclassified section
page readonly
36600602000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
19D09E80000
heap
page read and write
A74002D7000
trusted library allocation
page read and write
4C18015CB000
trusted library allocation
page read and write
366007A0000
trusted library allocation
page read and write
4C1801568000
trusted library allocation
page read and write
C00056B000
direct allocation
page read and write
36600302000
trusted library allocation
page read and write
19D05167000
heap
page read and write
284ADFE000
unkown
page readonly
7858001AC000
trusted library allocation
page read and write
19D05181000
heap
page read and write
366000E2000
trusted library allocation
page read and write
4C1800EF4000
trusted library allocation
page read and write
36600682000
trusted library allocation
page read and write
1B6800230000
trusted library allocation
page read and write
4C6402AC1000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
19BF3BB0000
direct allocation
page execute read
A74002AC000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
6190002EC000
trusted library allocation
page read and write
1E095EE5000
unclassified section
page readonly
36600742000
trusted library allocation
page read and write
4C180033C000
trusted library allocation
page read and write
C000578000
direct allocation
page read and write
5E4800358000
trusted library allocation
page read and write
4C1800620000
trusted library allocation
page read and write
1A3C002DC000
trusted library allocation
page read and write
4C180105A000
trusted library allocation
page read and write
1A3C00248000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
C000E94000
direct allocation
page read and write
4C1801054000
trusted library allocation
page read and write
4C1800834000
trusted library allocation
page read and write
1E09346B000
heap
page read and write
19BCC7B0000
heap
page read and write
A7400260000
trusted library allocation
page read and write
4C6402E84000
trusted library allocation
page read and write
4C6402274000
trusted library allocation
page read and write
4C180107C000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
4C6402EF8000
trusted library allocation
page read and write
1E7F1A09000
heap
page read and write
A7400284000
trusted library allocation
page read and write
4C1800AD8000
trusted library allocation
page read and write
A7400148000
trusted library allocation
page read and write
36600CC2000
trusted library allocation
page read and write
A7400278000
trusted library allocation
page read and write
4C18016C1000
trusted library allocation
page read and write
36600B42000
trusted library allocation
page read and write
1E095EB0000
unclassified section
page readonly
4C6403648000
trusted library allocation
page read and write
4C180104C000
trusted library allocation
page read and write
4C1801588000
trusted library allocation
page read and write
1E7F1A66000
heap
page read and write
639400230000
trusted library allocation
page read and write
A74002DC000
trusted library allocation
page read and write
5FF00040C000
trusted library allocation
page read and write
4C1801622000
trusted library allocation
page read and write
40840000C000
trusted library allocation
page read and write
4C1800FEC000
trusted library allocation
page read and write
4C1800F0A000
trusted library allocation
page read and write
4C64035EC000
trusted library allocation
page read and write
4C1800AE8000
trusted library allocation
page read and write
4C1801498000
trusted library allocation
page read and write
4C6402A38000
trusted library allocation
page read and write
36600802000
trusted library allocation
page read and write
4000250000
trusted library allocation
page read and write
19D06DB0000
trusted library section
page read and write
A7400290000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
4C18015E4000
trusted library allocation
page read and write
5FF0002D0000
trusted library allocation
page read and write
4C18016E4000
trusted library allocation
page read and write
36600782000
trusted library allocation
page read and write
6D7C00334000
trusted library allocation
page read and write
4C1800FF4000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
7FF6EA600000
unkown
page readonly
2354002D4000
trusted library allocation
page read and write
3660047F000
trusted library allocation
page read and write
629FF9000
stack
page read and write
4C1801072000
trusted library allocation
page read and write
4C180107C000
trusted library allocation
page read and write
2079BE02000
heap
page read and write
4C1801568000
trusted library allocation
page read and write
628FFE000
stack
page read and write
36600780000
trusted library allocation
page read and write
C000E92000
direct allocation
page read and write
199C00134000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
4C1801258000
trusted library allocation
page read and write
36600880000
trusted library allocation
page read and write
19BF3660000
direct allocation
page read and write
4C18014A4000
trusted library allocation
page read and write
2829DFE000
unkown
page readonly
4C6402E1C000
trusted library allocation
page read and write
37D400230000
direct allocation
page read and write
4C1800F34000
trusted library allocation
page read and write
4C64022A0000
trusted library allocation
page read and write
1E095E13000
unclassified section
page readonly
62C7FE000
unkown
page readonly
1B5CFFC000
stack
page read and write
3F9EFFE000
stack
page read and write
C000567000
direct allocation
page read and write
4C1800EF4000
trusted library allocation
page read and write
CAC002B0000
direct allocation
page read and write
4C1800A64000
trusted library allocation
page read and write
4C180156C000
trusted library allocation
page read and write
28515FE000
stack
page read and write
199C00108000
trusted library allocation
page read and write
4C1800E98000
trusted library allocation
page read and write
785800054000
trusted library allocation
page read and write
1E095F30000
unclassified section
page readonly
5E4800274000
trusted library allocation
page read and write
4C18011C8000
trusted library allocation
page read and write
6190002B0000
trusted library allocation
page read and write
1E096024000
unclassified section
page readonly
A74002BA000
trusted library allocation
page read and write
36600880000
trusted library allocation
page read and write
284BDFE000
unkown
page readonly
1E090645000
heap
page read and write
61900033E000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
4C1800FDC000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
4C18016C0000
trusted library allocation
page read and write
1E7F1813000
heap
page read and write
619000338000
trusted library allocation
page read and write
36600442000
trusted library allocation
page read and write
630FFE000
stack
page read and write
4C18009F8000
trusted library allocation
page read and write
7858003E0000
trusted library allocation
page read and write
400020C000
trusted library allocation
page read and write
4C1800EF4000
trusted library allocation
page read and write
6D7C002F8000
trusted library allocation
page read and write
7FF6EF06A000
unkown
page readonly
4C1801054000
trusted library allocation
page read and write
785800114000
trusted library allocation
page read and write
C00048E000
direct allocation
page read and write
4C18014E4000
trusted library allocation
page read and write
4C1800F4C000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
C0008EA000
direct allocation
page read and write
707C002C4000
direct allocation
page read and write
320800230000
trusted library allocation
page read and write
1C76D28B000
heap
page read and write
1E7F1A24000
heap
page read and write
5E4800334000
trusted library allocation
page read and write
A74000C1000
trusted library allocation
page read and write
4C080030E000
direct allocation
page read and write
36600942000
trusted library allocation
page read and write
A74001C4000
trusted library allocation
page read and write
28455FE000
stack
page read and write
4C1800D5C000
trusted library allocation
page read and write
5E4800354000
trusted library allocation
page read and write
CAC00230000
direct allocation
page read and write
1E7C39B8000
unclassified section
page read and write
4C64025A4000
trusted library allocation
page read and write
4C6402ABC000
trusted library allocation
page read and write
1A3C00268000
trusted library allocation
page read and write
C000CF9000
direct allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C18015CA000
trusted library allocation
page read and write
4C1800B0D000
trusted library allocation
page read and write
1E7C3C10000
unclassified section
page read and write
C000556000
direct allocation
page read and write
4C1801804000
trusted library allocation
page read and write
1E7C39B1000
unclassified section
page read and write
4C1800A40000
trusted library allocation
page read and write
4C180157A000
trusted library allocation
page read and write
5E48002E8000
trusted library allocation
page read and write
706A3FF000
stack
page read and write
36600902000
trusted library allocation
page read and write
19BF3668000
direct allocation
page read and write
36600D40000
trusted library allocation
page read and write
1A3C002C4000
trusted library allocation
page read and write
4C1800A74000
trusted library allocation
page read and write
3208002B8000
trusted library allocation
page read and write
4C1801538000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
1B68002BC000
trusted library allocation
page read and write
36600842000
trusted library allocation
page read and write
4C1801052000
trusted library allocation
page read and write
1E7C3983000
unclassified section
page read and write
4C1801064000
trusted library allocation
page read and write
4C1800E97000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
4C1800F05000
trusted library allocation
page read and write
1E093440000
heap
page read and write
4C6402AB1000
trusted library allocation
page read and write
1E7C3919000
unclassified section
page read and write
7858000C0000
trusted library allocation
page read and write
6D7C0033C000
trusted library allocation
page read and write
707C00284000
direct allocation
page read and write
19BF3721000
direct allocation
page read and write
62A7FE000
unkown
page readonly
1E0934B8000
heap
page read and write
4C180101C000
trusted library allocation
page read and write
6257FE000
unkown
page readonly
4C18010D0000
trusted library allocation
page read and write
268C002B4000
trusted library allocation
page read and write
4C1801238000
trusted library allocation
page read and write
1E7C399B000
unclassified section
page read and write
A74002DC000
trusted library allocation
page read and write
4C1801696000
trusted library allocation
page read and write
4C18015F2000
trusted library allocation
page read and write
19BCC8C8000
heap
page read and write
19BF38B0000
direct allocation
page execute read
4C18006A0000
trusted library allocation
page read and write
36600D42000
trusted library allocation
page read and write
619000274000
trusted library allocation
page read and write
235400264000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4084000A0000
trusted library allocation
page read and write
36600842000
trusted library allocation
page read and write
4000290000
trusted library allocation
page read and write
785800160000
trusted library allocation
page read and write
1E095D41000
unclassified section
page readonly
4C18015F2000
trusted library allocation
page read and write
4C1800DBC000
trusted library allocation
page read and write
6297FE000
unkown
page readonly
4000300000
trusted library allocation
page read and write
36600742000
trusted library allocation
page read and write
4000328000
trusted library allocation
page read and write
36600342000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
1E093443000
heap
page read and write
4C1800F2C000
trusted library allocation
page read and write
3208002DC000
trusted library allocation
page read and write
4C1800AE8000
trusted library allocation
page read and write
785800420000
trusted library allocation
page read and write
1E7F1A60000
heap
page read and write
19D09DE1000
unkown
page readonly
28385FB000
stack
page read and write
4C6403758000
trusted library allocation
page read and write
4C640220C000
trusted library allocation
page read and write
1E090A13000
heap
page read and write
619000237000
trusted library allocation
page read and write
4C18016B8000
trusted library allocation
page read and write
4C1800F14000
trusted library allocation
page read and write
1E095EC9000
unclassified section
page readonly
4C1801678000
trusted library allocation
page read and write
4C1801510000
trusted library allocation
page read and write
C0002FC000
direct allocation
page read and write
4C1800B09000
trusted library allocation
page read and write
4C0800210000
direct allocation
page read and write
4C1800B0E000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
4C640248C000
trusted library allocation
page read and write
1B680028C000
trusted library allocation
page read and write
4C6400801000
trusted library allocation
page read and write
4C1800F9C000
trusted library allocation
page read and write
36600302000
trusted library allocation
page read and write
4C1800EE4000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
19BF3890000
direct allocation
page execute read
1B6800264000
trusted library allocation
page read and write
1E09601A000
unclassified section
page readonly
19D0B92A000
heap
page read and write
19D0CA80000
unkown
page readonly
2844DFE000
unkown
page readonly
4C18015F7000
trusted library allocation
page read and write
4C1801014000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
5E4800248000
trusted library allocation
page read and write
1C76D2A1000
heap
page read and write
1E095DAA000
unclassified section
page readonly
36600782000
trusted library allocation
page read and write
36600842000
trusted library allocation
page read and write
19BF39F0000
direct allocation
page execute read
1C76D030000
heap
page read and write
7858002C4000
trusted library allocation
page read and write
1E7C3B96000
unclassified section
page read and write
3F95FFB000
stack
page read and write
A740017C000
trusted library allocation
page read and write
7FF6F04CF000
unkown
page readonly
28305FB000
stack
page read and write
4C6403124000
trusted library allocation
page read and write
1E09349D000
heap
page read and write
1A3C002B8000
trusted library allocation
page read and write
4C1800ABC000
trusted library allocation
page read and write
4C6402A01000
trusted library allocation
page read and write
B6249FE000
unkown
page readonly
4C1801024000
trusted library allocation
page read and write
4000308000
trusted library allocation
page read and write
7FF6EECFB000
unkown
page readonly
A74002AC000
trusted library allocation
page read and write
4C1800A0C000
trusted library allocation
page read and write
A740008C000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
4C180148C000
trusted library allocation
page read and write
4084000AC000
trusted library allocation
page read and write
5E480033C000
trusted library allocation
page read and write
4C1800290000
trusted library allocation
page read and write
4C640234C000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
1C76D286000
heap
page read and write
19D0C713000
heap
page read and write
A74002C8000
trusted library allocation
page read and write
4C0800220000
direct allocation
page read and write
36600C82000
trusted library allocation
page read and write
4C6402F18000
trusted library allocation
page read and write
284DDFE000
unkown
page readonly
A74001E9000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
19BCCB05000
heap
page read and write
4C1800B1C000
trusted library allocation
page read and write
6D7C0033C000
trusted library allocation
page read and write
36600442000
trusted library allocation
page read and write
4C640369C000
trusted library allocation
page read and write
4C1801694000
trusted library allocation
page read and write
4C1800A7C000
trusted library allocation
page read and write
C00002C000
direct allocation
page read and write
A7400244000
trusted library allocation
page read and write
36600382000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
4C64022FC000
trusted library allocation
page read and write
4C6402444000
trusted library allocation
page read and write
5FF000418000
trusted library allocation
page read and write
1C76D1A0000
trusted library section
page readonly
1A3C00201000
trusted library allocation
page read and write
19D050EC000
heap
page read and write
1E7C3A31000
unclassified section
page read and write
1E095F07000
unclassified section
page readonly
4C1800B12000
trusted library allocation
page read and write
4C1801588000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
1E7F1830000
heap
page read and write
A740017C000
trusted library allocation
page read and write
4C1801628000
trusted library allocation
page read and write
4C08002D0000
direct allocation
page read and write
4C1801572000
trusted library allocation
page read and write
C00006B000
direct allocation
page read and write
36600682000
trusted library allocation
page read and write
3F98FFB000
stack
page read and write
36600682000
trusted library allocation
page read and write
5FF000404000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
1E095C4F000
unclassified section
page readonly
4C6400FCC000
trusted library allocation
page read and write
36600B42000
trusted library allocation
page read and write
1E093512000
heap
page read and write
A74002D4000
trusted library allocation
page read and write
283F5FF000
stack
page read and write
1E7C33E3000
unclassified section
page read and write
19D05165000
heap
page read and write
366008C2000
trusted library allocation
page read and write
408400038000
trusted library allocation
page read and write
1E20002B8000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
4C1800E9C000
trusted library allocation
page read and write
1E782BFD000
unclassified section
page read and write
6394002C0000
trusted library allocation
page read and write
C000856000
direct allocation
page read and write
366008AC000
trusted library allocation
page read and write
4C180103C000
trusted library allocation
page read and write
785800368000
trusted library allocation
page read and write
36600742000
trusted library allocation
page read and write
19BF3684000
direct allocation
page read and write
199C0008A000
trusted library allocation
page read and write
36600780000
trusted library allocation
page read and write
4C64025A4000
trusted library allocation
page read and write
4C6400882000
trusted library allocation
page read and write
3DD400288000
trusted library allocation
page read and write
707C002E8000
direct allocation
page read and write
4C6403780000
trusted library allocation
page read and write
4C1801592000
trusted library allocation
page read and write
785800388000
trusted library allocation
page read and write
4C64023EC000
trusted library allocation
page read and write
4C1800ACC000
trusted library allocation
page read and write
4C0800264000
direct allocation
page read and write
4C640371C000
trusted library allocation
page read and write
199C00038000
trusted library allocation
page read and write
36600402000
trusted library allocation
page read and write
284EDFE000
unkown
page readonly
36600CC2000
trusted library allocation
page read and write
2AD95FE000
unkown
page readonly
4C1800794000
trusted library allocation
page read and write
4C6402318000
trusted library allocation
page read and write
6394002CC000
trusted library allocation
page read and write
7FF6EE2F6000
unkown
page readonly
19BCC8C4000
heap
page read and write
4C18009E0000
trusted library allocation
page read and write
4C18003E8000
trusted library allocation
page read and write
4C64036F0000
trusted library allocation
page read and write
6190003B4000
trusted library allocation
page read and write
7858002B8000
trusted library allocation
page read and write
C0004E2000
direct allocation
page read and write
6307FE000
unkown
page readonly
4C0800307000
direct allocation
page read and write
1E7C39F8000
unclassified section
page read and write
19BF39E0000
direct allocation
page execute read
C000A0E000
direct allocation
page read and write
4C1800EB0000
trusted library allocation
page read and write
4C18014B8000
trusted library allocation
page read and write
A7400290000
trusted library allocation
page read and write
4C1801510000
trusted library allocation
page read and write
A74001C4000
trusted library allocation
page read and write
19D05179000
heap
page read and write
4C1801558000
trusted library allocation
page read and write
A740017C000
trusted library allocation
page read and write
1E090510000
remote allocation
page read and write
4C1800F54000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
19BF37B0000
direct allocation
page execute read
619000404000
trusted library allocation
page read and write
4C1800A2C000
trusted library allocation
page read and write
19D0516C000
heap
page read and write
366004C2000
trusted library allocation
page read and write
A7400044000
trusted library allocation
page read and write
36600782000
trusted library allocation
page read and write
B6241FE000
stack
page read and write
36600482000
trusted library allocation
page read and write
4C1801548000
trusted library allocation
page read and write
626FFE000
stack
page read and write
4084000BC000
trusted library allocation
page read and write
36600B02000
trusted library allocation
page read and write
4C1800F9C000
trusted library allocation
page read and write
4C1800ABC000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
2079B9C0000
heap
page read and write
4C1800ACC000
trusted library allocation
page read and write
4C080030F000
direct allocation
page read and write
4C0800288000
direct allocation
page read and write
A7400250000
trusted library allocation
page read and write
408400001000
trusted library allocation
page read and write
366001E7000
trusted library allocation
page read and write
4C1800F54000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
4C180040C000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
4C640362C000
trusted library allocation
page read and write
3660078D000
trusted library allocation
page read and write
4C1800E8C000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
1B6800238000
trusted library allocation
page read and write
7858003E4000
trusted library allocation
page read and write
1E7C33AA000
unclassified section
page read and write
A74002BA000
trusted library allocation
page read and write
19D0B962000
heap
page read and write
4C1800B09000
trusted library allocation
page read and write
7858000CA000
trusted library allocation
page read and write
4C1800EF4000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
1E7F1A24000
heap
page read and write
B6289FE000
unkown
page readonly
36600802000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
19D05113000
heap
page read and write
4C6403758000
trusted library allocation
page read and write
4C1800D60000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
631C00260000
trusted library allocation
page read and write
19BF3810000
heap
page read and write
4C080030C000
direct allocation
page read and write
A74000FC000
trusted library allocation
page read and write
4C6402DC4000
trusted library allocation
page read and write
282CDFE000
unkown
page readonly
A74002C8000
trusted library allocation
page read and write
36600AC2000
trusted library allocation
page read and write
1E095DFB000
unclassified section
page readonly
4C6402AB0000
trusted library allocation
page read and write
1E7C32D4000
unclassified section
page read and write
19BF3A88000
direct allocation
page read and write
1E095E1A000
unclassified section
page readonly
4C18007B0000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
1E7F1A13000
heap
page read and write
4C6403314000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
366004C2000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
36600402000
trusted library allocation
page read and write
C000F70000
direct allocation
page read and write
2D84002E0000
direct allocation
page read and write
619000D0C000
trusted library allocation
page read and write
1E095C7B000
unclassified section
page readonly
19D0B964000
heap
page read and write
4C6403238000
trusted library allocation
page read and write
4C64036BE000
trusted library allocation
page read and write
4C18011C8000
trusted library allocation
page read and write
4C6402F60000
trusted library allocation
page read and write
36600882000
trusted library allocation
page read and write
4C64031D8000
trusted library allocation
page read and write
19BF5900000
heap
page read and write
19BCCAF0000
direct allocation
page read and write
4C1800B0E000
trusted library allocation
page read and write
4C6403164000
trusted library allocation
page read and write
619000E9C000
trusted library allocation
page read and write
320800210000
trusted library allocation
page read and write
4C1801568000
trusted library allocation
page read and write
4C1801728000
trusted library allocation
page read and write
2079BA1C000
heap
page read and write
1E095F5E000
unclassified section
page readonly
3F91FFD000
stack
page read and write
4C1800E94000
trusted library allocation
page read and write
4C64024C0000
trusted library allocation
page read and write
C000F00000
direct allocation
page read and write
7858000F4000
trusted library allocation
page read and write
4C6402F9C000
trusted library allocation
page read and write
283D5FE000
unkown
page readonly
366007C2000
trusted library allocation
page read and write
7858001A8000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
36600C82000
trusted library allocation
page read and write
619000344000
trusted library allocation
page read and write
19D0C600000
heap
page read and write
1E7F1A2B000
heap
page read and write
619000314000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C1800F7C000
trusted library allocation
page read and write
19BCC8BE000
heap
page read and write
2079EDF0000
unclassified section
page readonly
4C1800318000
trusted library allocation
page read and write
4C6403308000
trusted library allocation
page read and write
1E095F47000
unclassified section
page readonly
A740029E000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
61900094C000
trusted library allocation
page read and write
C000DF0000
direct allocation
page read and write
4C1800A54000
trusted library allocation
page read and write
4C1800824000
trusted library allocation
page read and write
19D05098000
heap
page read and write
36600802000
trusted library allocation
page read and write
36600D40000
trusted library allocation
page read and write
A740007C000
trusted library allocation
page read and write
4C18009F9000
trusted library allocation
page read and write
2079F030000
unclassified section
page read and write
A74002C8000
trusted library allocation
page read and write
284A5FA000
stack
page read and write
4C1801572000
trusted library allocation
page read and write
1E090980000
trusted library allocation
page read and write
19D050E8000
heap
page read and write
4C18009E0000
trusted library allocation
page read and write
5E48002A0000
trusted library allocation
page read and write
4C1801572000
trusted library allocation
page read and write
639400244000
trusted library allocation
page read and write
3660047F000
trusted library allocation
page read and write
1B680020C000
trusted library allocation
page read and write
19BF3CC0000
heap
page read and write
19D05165000
heap
page read and write
A74002AC000
trusted library allocation
page read and write
1B59FFE000
stack
page read and write
36600442000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C6402201000
trusted library allocation
page read and write
1C76D265000
heap
page read and write
4C180156E000
trusted library allocation
page read and write
36600477000
trusted library allocation
page read and write
4C1801210000
trusted library allocation
page read and write
4C1800824000
trusted library allocation
page read and write
4C180107C000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C1801648000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
C000308000
direct allocation
page read and write
4C180104C000
trusted library allocation
page read and write
366008C2000
trusted library allocation
page read and write
1B60FFE000
stack
page read and write
78580038C000
trusted library allocation
page read and write
1E20002AC000
trusted library allocation
page read and write
4C0800320000
direct allocation
page read and write
4C0800364000
direct allocation
page read and write
36600C42000
trusted library allocation
page read and write
19BF3A50000
direct allocation
page read and write
B62D9FE000
unkown
page readonly
19BF3C30000
heap
page read and write
A7400244000
trusted library allocation
page read and write
199C0010C000
trusted library allocation
page read and write
619000698000
trusted library allocation
page read and write
28475FE000
stack
page read and write
4C1801639000
trusted library allocation
page read and write
61FFFE000
stack
page read and write
4C180107C000
trusted library allocation
page read and write
4C18015F4000
trusted library allocation
page read and write
4C1800EE3000
trusted library allocation
page read and write
4C64032FD000
trusted library allocation
page read and write
1E200024C000
trusted library allocation
page read and write
1E2000268000
trusted library allocation
page read and write
4C64036E4000
trusted library allocation
page read and write
2354002C4000
trusted library allocation
page read and write
CAC002A0000
direct allocation
page read and write
282F5FC000
stack
page read and write
4C1800AE8000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
19BF38C0000
direct allocation
page execute read
4C1800FEC000
trusted library allocation
page read and write
4C180154B000
trusted library allocation
page read and write
C000E4C000
direct allocation
page read and write
5A68002C8000
direct allocation
page read and write
19D050C7000
heap
page read and write
19BF3A60000
direct allocation
page read and write
366004C2000
trusted library allocation
page read and write
4000424000
trusted library allocation
page read and write
19BF3BB2000
heap
page read and write
4C1800730000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
4C6402AE0000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
B6259FE000
unkown
page readonly
4C6402F9C000
trusted library allocation
page read and write
6190002A8000
trusted library allocation
page read and write
619000EA4000
trusted library allocation
page read and write
C000062000
direct allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
61900032C000
trusted library allocation
page read and write
1E7C3949000
unclassified section
page read and write
1E7C392B000
unclassified section
page read and write
366008AC000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C18016A8000
trusted library allocation
page read and write
4C6402C70000
trusted library allocation
page read and write
1B5FFFE000
stack
page read and write
4C1800654000
trusted library allocation
page read and write
19D05165000
heap
page read and write
36600542000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
19D05165000
heap
page read and write
78580019A000
trusted library allocation
page read and write
19BF36A3000
direct allocation
page read and write
4C1800F94000
trusted library allocation
page read and write
4C6402394000
trusted library allocation
page read and write
4000380000
trusted library allocation
page read and write
C00045E000
direct allocation
page read and write
1C4B4230000
trusted library allocation
page read and write
C000A34000
direct allocation
page read and write
19BF3920000
direct allocation
page execute read
36600142000
trusted library allocation
page read and write
19D050DD000
heap
page read and write
4C1800F05000
trusted library allocation
page read and write
5A6800234000
direct allocation
page read and write
19D0B932000
heap
page read and write
6190002C0000
trusted library allocation
page read and write
4C1800AE0000
trusted library allocation
page read and write
4C1800ABC000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
36600C42000
trusted library allocation
page read and write
1E7C3A03000
unclassified section
page read and write
1E2000294000
trusted library allocation
page read and write
1E7C3BAD000
unclassified section
page read and write
5A680025C000
direct allocation
page read and write
6D7C002C8000
trusted library allocation
page read and write
78580011C000
trusted library allocation
page read and write
19BF3830000
direct allocation
page execute read
A74002AC000
trusted library allocation
page read and write
36600442000
trusted library allocation
page read and write
785800288000
trusted library allocation
page read and write
4C64030D4000
trusted library allocation
page read and write
1B680027C000
trusted library allocation
page read and write
4C6403320000
trusted library allocation
page read and write
1E09061C000
heap
page read and write
4C6403758000
trusted library allocation
page read and write
19D0C614000
heap
page read and write
6D7C00201000
trusted library allocation
page read and write
19D0A440000
trusted library section
page read and write
C000B8A000
direct allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
631C002D4000
trusted library allocation
page read and write
4C6402D54000
trusted library allocation
page read and write
631C002D8000
trusted library allocation
page read and write
4C64031F8000
trusted library allocation
page read and write
7858000E8000
trusted library allocation
page read and write
C000CD2000
direct allocation
page read and write
366008C2000
trusted library allocation
page read and write
1B6800248000
trusted library allocation
page read and write
4C18015F4000
trusted library allocation
page read and write
19BF3689000
direct allocation
page read and write
C000E8E000
direct allocation
page read and write
4C1800EB4000
trusted library allocation
page read and write
5A680024C000
direct allocation
page read and write
4C6402BB4000
trusted library allocation
page read and write
19D050B8000
heap
page read and write
4C6403130000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
1A3C002E0000
trusted library allocation
page read and write
4C0800201000
direct allocation
page read and write
3DD4002B8000
trusted library allocation
page read and write
4C6402E38000
trusted library allocation
page read and write
4C6402DC9000
trusted library allocation
page read and write
19BCCAD0000
direct allocation
page read and write
3F987FE000
unkown
page readonly
1E7F1802000
heap
page read and write
19BF36E3000
heap
page read and write
C000A16000
direct allocation
page read and write
3DD4002B8000
trusted library allocation
page read and write
5FF000230000
trusted library allocation
page read and write
36600882000
trusted library allocation
page read and write
3DD400238000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
C000F80000
direct allocation
page read and write
4C180107C000
trusted library allocation
page read and write
7069DFE000
stack
page read and write
4C1801582000
trusted library allocation
page read and write
1E090599000
unclassified section
page read and write
268C00284000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
36600040000
trusted library allocation
page readonly
19D0CA10000
unkown
page readonly
4C180104C000
trusted library allocation
page read and write
CAC00234000
direct allocation
page read and write
4C1801648000
trusted library allocation
page read and write
A7400124000
trusted library allocation
page read and write
1E09066C000
heap
page read and write
619000EAC000
trusted library allocation
page read and write
4C1800E9C000
trusted library allocation
page read and write
631C00418000
trusted library allocation
page read and write
4C1801618000
trusted library allocation
page read and write
A740000C000
trusted library allocation
page read and write
7858002AA000
trusted library allocation
page read and write
1E7F1A25000
heap
page read and write
1E7C3A49000
unclassified section
page read and write
1E782BC0000
unclassified section
page read and write
A740017C000
trusted library allocation
page read and write
1E093462000
heap
page read and write
4C180173C000
trusted library allocation
page read and write
1E093498000
heap
page read and write
706B9FE000
stack
page read and write
4C1800EEC000
trusted library allocation
page read and write
1B680028C000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
1A3C002A4000
trusted library allocation
page read and write
19D04F50000
heap
page read and write
70699FF000
stack
page read and write
4C180104C000
trusted library allocation
page read and write
4000288000
trusted library allocation
page read and write
199C00098000
trusted library allocation
page read and write
C000978000
direct allocation
page read and write
4C180074C000
trusted library allocation
page read and write
5E4800230000
trusted library allocation
page read and write
4C1800FE2000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C6402CCC000
trusted library allocation
page read and write
2AD3DFB000
stack
page read and write
3660078D000
trusted library allocation
page read and write
A74001DC000
trusted library allocation
page read and write
4C6403094000
trusted library allocation
page read and write
2AD7DFE000
stack
page read and write
284C5FB000
stack
page read and write
A74002AC000
trusted library allocation
page read and write
36600A02000
trusted library allocation
page read and write
4C6403758000
trusted library allocation
page read and write
7FF6ECAF4000
unkown
page readonly
19BCC834000
heap
page read and write
5E480040C000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
19D05171000
heap
page read and write
A7400254000
trusted library allocation
page read and write
4C18010B0000
trusted library allocation
page read and write
4C1800FE2000
trusted library allocation
page read and write
36600702000
trusted library allocation
page read and write
1E0934C3000
heap
page read and write
4C1800EFC000
trusted library allocation
page read and write
4C1801548000
trusted library allocation
page read and write
36600AC2000
trusted library allocation
page read and write
4C1801544000
trusted library allocation
page read and write
4C1801710000
trusted library allocation
page read and write
A74002BA000
trusted library allocation
page read and write
4C6403254000
trusted library allocation
page read and write
B6279FE000
unkown
page readonly
C000CA6000
direct allocation
page read and write
4C18011C8000
trusted library allocation
page read and write
4C6402D9C000
trusted library allocation
page read and write
199C00114000
trusted library allocation
page read and write
4C1800AF8000
trusted library allocation
page read and write
61900032C000
trusted library allocation
page read and write
62CFFE000
stack
page read and write
4C1801568000
trusted library allocation
page read and write
C0004F6000
direct allocation
page read and write
36600202000
trusted library allocation
page read and write
19D050A3000
heap
page read and write
4000278000
trusted library allocation
page read and write
19D05186000
heap
page read and write
2835DFE000
unkown
page readonly
36600B42000
trusted library allocation
page read and write
631C002C4000
trusted library allocation
page read and write
36600D40000
trusted library allocation
page read and write
19BF3970000
direct allocation
page execute read
4C0800315000
direct allocation
page read and write
631C00304000
trusted library allocation
page read and write
4C1800C0C000
trusted library allocation
page read and write
61900032C000
trusted library allocation
page read and write
4C18010B0000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
4C180173C000
trusted library allocation
page read and write
4C1800EB0000
trusted library allocation
page read and write
36600D02000
trusted library allocation
page read and write
1B68002C8000
trusted library allocation
page read and write
4C18010B6000
trusted library allocation
page read and write
1D7A2102000
heap
page read and write
C00018C000
direct allocation
page read and write
284E5FC000
stack
page read and write
36600942000
trusted library allocation
page read and write
619000230000
trusted library allocation
page read and write
36600802000
trusted library allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C18010BC000
trusted library allocation
page read and write
4C64027EC000
trusted library allocation
page read and write
7858003E0000
trusted library allocation
page read and write
6190002CC000
trusted library allocation
page read and write
4C6402FDC000
trusted library allocation
page read and write
4C1800F9C000
trusted library allocation
page read and write
785800398000
trusted library allocation
page read and write
3660083B000
trusted library allocation
page read and write
4C64023B4000
trusted library allocation
page read and write
706BBFE000
stack
page read and write
4C1801542000
trusted library allocation
page read and write
4C1800F04000
trusted library allocation
page read and write
6247FE000
unkown
page readonly
7FF6F0477000
unkown
page readonly
2354002A8000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
4C1801558000
trusted library allocation
page read and write
785800154000
trusted library allocation
page read and write
5FF0002D0000
trusted library allocation
page read and write
4C1801582000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
235400201000
trusted library allocation
page read and write
B62C9FE000
unkown
page readonly
36600742000
trusted library allocation
page read and write
4C1800634000
trusted library allocation
page read and write
3F997FE000
unkown
page readonly
C000226000
direct allocation
page read and write
A7400240000
trusted library allocation
page read and write
7FF6ECAC4000
unkown
page write copy
4C1800818000
trusted library allocation
page read and write
4C6402A0C000
trusted library allocation
page read and write
5E4800288000
trusted library allocation
page read and write
C000E80000
direct allocation
page read and write
1E095D59000
unclassified section
page readonly
1E095EA6000
unclassified section
page readonly
366007A0000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
4C1800F0A000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
1E7F1A2B000
heap
page read and write
36600842000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
400031C000
trusted library allocation
page read and write
6190003B4000
trusted library allocation
page read and write
4C18006AC000
trusted library allocation
page read and write
268C002B8000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
4C1801228000
trusted library allocation
page read and write
1E095C99000
unclassified section
page readonly
785800288000
trusted library allocation
page read and write
1E7F1A25000
heap
page read and write
4C18014E4000
trusted library allocation
page read and write
785800388000
trusted library allocation
page read and write
C00006D000
direct allocation
page read and write
4C6403178000
trusted library allocation
page read and write
4C180106C000
trusted library allocation
page read and write
12DBDFB000
stack
page read and write
A740029E000
trusted library allocation
page read and write
A74002D7000
trusted library allocation
page read and write
366004C2000
trusted library allocation
page read and write
19BF3D41000
heap
page read and write
19BF3644000
direct allocation
page read and write
4C1800F7C000
trusted library allocation
page read and write
4C1800684000
trusted library allocation
page read and write
4C18003E8000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
4C1800F94000
trusted library allocation
page read and write
19BCC7E9000
direct allocation
page read and write
4C6403768000
trusted library allocation
page read and write
36600142000
trusted library allocation
page read and write
4C64032DC000
trusted library allocation
page read and write
4C180027C000
trusted library allocation
page read and write
4C1800788000
trusted library allocation
page read and write
4C1800ACC000
trusted library allocation
page read and write
4C1800718000
trusted library allocation
page read and write
235400278000
trusted library allocation
page read and write
7858001B4000
trusted library allocation
page read and write
36600602000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
4C1800EDC000
trusted library allocation
page read and write
4C6402B2C000
trusted library allocation
page read and write
4000201000
trusted library allocation
page read and write
37D400210000
direct allocation
page read and write
4C1800684000
trusted library allocation
page read and write
4C0800284000
direct allocation
page read and write
36600582000
trusted library allocation
page read and write
4C6402794000
trusted library allocation
page read and write
36600000000
trusted library allocation
page readonly
1C772802000
heap
page read and write
4C1800FDC000
trusted library allocation
page read and write
36600880000
trusted library allocation
page read and write
4C6403201000
trusted library allocation
page read and write
62E7FE000
unkown
page readonly
4C18014B8000
trusted library allocation
page read and write
4C6402CE4000
trusted library allocation
page read and write
19BCCA80000
direct allocation
page read and write
A7400278000
trusted library allocation
page read and write
A74002AC000
trusted library allocation
page read and write
4C640244A000
trusted library allocation
page read and write
4C08002C4000
direct allocation
page read and write
37D4002D4000
direct allocation
page read and write
4C640080A000
trusted library allocation
page read and write
5E48002CC000
trusted library allocation
page read and write
4C6402718000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
4C1801698000
trusted library allocation
page read and write
36600A42000
trusted library allocation
page read and write
19D05167000
heap
page read and write
19D0B960000
heap
page read and write
4C1800F04000
trusted library allocation
page read and write
1E7F1840000
heap
page read and write
4C1800E90000
trusted library allocation
page read and write
4C080031C000
direct allocation
page read and write
A7400090000
trusted library allocation
page read and write
619000C01000
trusted library allocation
page read and write
1C76D231000
heap
page read and write
4C1800F54000
trusted library allocation
page read and write
4C1800FE4000
trusted library allocation
page read and write
19BF3AA0000
direct allocation
page execute read
1E7C3BB9000
unclassified section
page read and write
36600B82000
trusted library allocation
page read and write
36600882000
trusted library allocation
page read and write
4C1800F1C000
trusted library allocation
page read and write
4C1800F06000
trusted library allocation
page read and write
36600B02000
trusted library allocation
page read and write
4C1800730000
trusted library allocation
page read and write
36600B42000
trusted library allocation
page read and write
7FF6F0492000
unkown
page readonly
4C180133C000
trusted library allocation
page read and write
1E090657000
heap
page read and write
235400248000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
1C76D213000
heap
page read and write
785800388000
trusted library allocation
page read and write
7FF6EEFBD000
unkown
page readonly
2D84002D0000
direct allocation
page read and write
B62A1FB000
stack
page read and write
6D7C00404000
trusted library allocation
page read and write
C000914000
direct allocation
page read and write
3DD4002C4000
trusted library allocation
page read and write
4C18012EC000
trusted library allocation
page read and write
2AD55FE000
unkown
page readonly
36600AC2000
trusted library allocation
page read and write
4C1801424000
trusted library allocation
page read and write
4C64023C0000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
4C1801634000
trusted library allocation
page read and write
78580038C000
trusted library allocation
page read and write
36600B02000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
1E095D53000
unclassified section
page readonly
1E7C39DA000
unclassified section
page read and write
283E5FE000
stack
page read and write
19BCC883000
heap
page read and write
4000310000
trusted library allocation
page read and write
4C18009F0000
trusted library allocation
page read and write
4C6403401000
trusted library allocation
page read and write
36600182000
trusted library allocation
page read and write
19BF3990000
direct allocation
page execute read
6394002A4000
trusted library allocation
page read and write
4C64023DC000
trusted library allocation
page read and write
3F94FF5000
stack
page read and write
619000284000
trusted library allocation
page read and write
36600D42000
trusted library allocation
page read and write
4C64005EE000
trusted library allocation
page read and write
631C00404000
trusted library allocation
page read and write
19BCC820000
heap
page read and write
619000E8C000
trusted library allocation
page read and write
4C0800298000
direct allocation
page read and write
19D0B960000
heap
page read and write
37D4002A8000
direct allocation
page read and write
A740005C000
trusted library allocation
page read and write
1E7F1A24000
heap
page read and write
4C1800AF8000
trusted library allocation
page read and write
4C1800614000
trusted library allocation
page read and write
4C1800A5C000
trusted library allocation
page read and write
4C6402F38000
trusted library allocation
page read and write
7FF6ED5F2000
unkown
page readonly
A740014D000
trusted library allocation
page read and write
366003C2000
trusted library allocation
page read and write
4C1800E90000
trusted library allocation
page read and write
C00090C000
direct allocation
page read and write
A7400284000
trusted library allocation
page read and write
4C1800EFC000
trusted library allocation
page read and write
1E7F1A0B000
heap
page read and write
619000C8C000
trusted library allocation
page read and write
1C4B402E000
heap
page read and write
C0009D2000
direct allocation
page read and write
785800268000
trusted library allocation
page read and write
4C180142A000
trusted library allocation
page read and write
19D05013000
heap
page read and write
639400238000
trusted library allocation
page read and write
4C18015BC000
trusted library allocation
page read and write
4C1800F54000
trusted library allocation
page read and write
19BCC8C8000
heap
page read and write
37D4002C0000
direct allocation
page read and write
283CDFE000
stack
page read and write
4084000F0000
trusted library allocation
page read and write
19BF3713000
direct allocation
page read and write
1E095C69000
unclassified section
page readonly
37D400274000
direct allocation
page read and write
1E7F182A000
heap
page read and write
4C1800AE8000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
3DD400264000
trusted library allocation
page read and write
4C64027EC000
trusted library allocation
page read and write
4C1800AD0000
trusted library allocation
page read and write
4C6402450000
trusted library allocation
page read and write
4C6401001000
trusted library allocation
page read and write
4C6402445000
trusted library allocation
page read and write
37D400250000
direct allocation
page read and write
1E093492000
heap
page read and write
36600802000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
4C1800E8C000
trusted library allocation
page read and write
36600B82000
trusted library allocation
page read and write
366007C2000
trusted library allocation
page read and write
4C18003DC000
trusted library allocation
page read and write
4C6403218000
trusted library allocation
page read and write
4C6402BB4000
trusted library allocation
page read and write
A7400244000
trusted library allocation
page read and write
19D0B960000
heap
page read and write
36600C42000
trusted library allocation
page read and write
199C00028000
trusted library allocation
page read and write
1D7A206A000
heap
page read and write
C000CBE000
direct allocation
page read and write
1E0934A5000
heap
page read and write
5FF000248000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
C000400000
direct allocation
page read and write
A740017C000
trusted library allocation
page read and write
3DD400274000
trusted library allocation
page read and write
4C1800F8C000
trusted library allocation
page read and write
6D7C00230000
trusted library allocation
page read and write
785800024000
trusted library allocation
page read and write
2079B9A0000
unclassified section
page readonly
1C76D28B000
heap
page read and write
19BF3840000
direct allocation
page execute read
1C76D271000
heap
page read and write
A74002AC000
trusted library allocation
page read and write
19D06E02000
heap
page read and write
4C6402C50000
trusted library allocation
page read and write
199C00001000
trusted library allocation
page read and write
1D7A201C000
heap
page read and write
1E7F1A2B000
heap
page read and write
4C18016BB000
trusted library allocation
page read and write
4C6402A5C000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
A7400254000
trusted library allocation
page read and write
78580017C000
trusted library allocation
page read and write
283ADFE000
unkown
page readonly
7858003B0000
trusted library allocation
page read and write
36600702000
trusted library allocation
page read and write
3DD400278000
trusted library allocation
page read and write
36600C02000
trusted library allocation
page read and write
4C1800ECC000
trusted library allocation
page read and write
7FF6EEFB5000
unkown
page readonly
4C18015F4000
trusted library allocation
page read and write
1E7C3326000
unclassified section
page read and write
19D0B90C000
heap
page read and write
CAC00254000
direct allocation
page read and write
4C6402AF4000
trusted library allocation
page read and write
4C1801688000
trusted library allocation
page read and write
1E093485000
heap
page read and write
4C180074C000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
4C6402F28000
trusted library allocation
page read and write
4000210000
trusted library allocation
page read and write
4C180105A000
trusted library allocation
page read and write
C0004E8000
direct allocation
page read and write
5FF00024C000
trusted library allocation
page read and write
268C002B4000
trusted library allocation
page read and write
400033C000
trusted library allocation
page read and write
1E093502000
heap
page read and write
36600C02000
trusted library allocation
page read and write
1E095F82000
unclassified section
page readonly
4C18014B8000
trusted library allocation
page read and write
7FF6EE2FB000
unkown
page readonly
6190008CC000
trusted library allocation
page read and write
36600702000
trusted library allocation
page read and write
4000298000
trusted library allocation
page read and write
619000EA8000
trusted library allocation
page read and write
36600CC2000
trusted library allocation
page read and write
4C1800FDD000
trusted library allocation
page read and write
36600942000
trusted library allocation
page read and write
4C18003E8000
trusted library allocation
page read and write
37D400408000
direct allocation
page read and write
4C1800E93000
trusted library allocation
page read and write
1E090669000
heap
page read and write
199C00084000
trusted library allocation
page read and write
4C1801054000
trusted library allocation
page read and write
268C00284000
trusted library allocation
page read and write
6D7C00344000
trusted library allocation
page read and write
4C180105C000
trusted library allocation
page read and write
4C1801728000
trusted library allocation
page read and write
1E7C2C37000
unclassified section
page read and write
12DDDFF000
stack
page read and write
4C1801574000
trusted library allocation
page read and write
19D0B90C000
heap
page read and write
12DC5FF000
stack
page read and write
A7400228000
trusted library allocation
page read and write
619000368000
trusted library allocation
page read and write
4C18009E7000
trusted library allocation
page read and write
19D0B962000
heap
page read and write
4C180155F000
trusted library allocation
page read and write
4000230000
trusted library allocation
page read and write
36600A82000
trusted library allocation
page read and write
2833DFE000
unkown
page readonly
4C6402FD0000
trusted library allocation
page read and write
4C64031C8000
trusted library allocation
page read and write
3680000C000
trusted library allocation
page read and write
4C640245A000
trusted library allocation
page read and write
4C1800EB0000
trusted library allocation
page read and write
A740013C000
trusted library allocation
page read and write
A740029E000
trusted library allocation
page read and write
19D04F10000
heap
page readonly
4C1800F14000
trusted library allocation
page read and write
3DD4002A0000
trusted library allocation
page read and write
36600BC2000
trusted library allocation
page read and write
A74002C8000
trusted library allocation
page read and write
4C18009E0000
trusted library allocation
page read and write
268C00284000
trusted library allocation
page read and write
4C1800A2C000
trusted library allocation
page read and write
4C1800B1C000
trusted library allocation
page read and write
1E096053000
unclassified section
page readonly
4C0800240000
direct allocation
page read and write
320800280000
trusted library allocation
page read and write
1D7A1FA0000
trusted library section
page readonly
4C180104C000
trusted library allocation
page read and write
366005C2000
trusted library allocation
page read and write
4C1800ACC000
trusted library allocation
page read and write
4C1801581000
trusted library allocation
page read and write
4C640225E000
trusted library allocation
page read and write
62B7FE000
unkown
page readonly
C000071000
direct allocation
page read and write
19D0B90C000
heap
page read and write
4C640321C000
trusted library allocation
page read and write
4C1800CDC000
trusted library allocation
page read and write
366009C2000
trusted library allocation
page read and write
19BF366C000
direct allocation
page read and write
631C00280000
trusted library allocation
page read and write
4C640321C000
trusted library allocation
page read and write
70695C8000
stack
page read and write
1D7A2055000
heap
page read and write
A7400254000
trusted library allocation
page read and write
6D7C002CC000
trusted library allocation
page read and write
There are 4036 hidden memdumps, click here to show them.