Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
BrowserUpdateTool.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
|
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\f89a6234-c655-4792-86ba-7884a20c76f4.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 87533
|
modified
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\03c8b3c3-bb83-4931-8d62-92d225459629.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\48b96472-ead3-4c2f-b09f-c1badecfcc8b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\7e34ad29-1df6-41c1-8eb3-72e57ab59d26.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\BrowserMetrics-spare.pma (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\BrowserMetrics-spare.pma.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\BrowserMetrics\BrowserMetrics-66D0C7C5-1DC8.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad\throttle_store.dat
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\29ff30a6-11b9-4f64-b466-237d1e99ca47.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\8a6fb023-c232-414b-b7d5-ab9f1e20ed5c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000001
|
ASCII text, with very long lines (65447)
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000002
|
Web Open Font Format (Version 2), TrueType, length 18536, version 1.0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000003
|
Web Open Font Format (Version 2), TrueType, length 18588, version 1.0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\f_000004
|
Web Open Font Format (Version 2), TrueType, length 18596, version 1.0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\1afe9cacc9803fd2_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\91edad15745f1295_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\ce7a59cbee8b4379_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF427fed.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\wasm\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DIPS
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8,
version-valid-for 14
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\ExtensionActivityComp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\ExtensionActivityEdge
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie
0x8, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\History-journal
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Login Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie
0xc, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network Action Predictor
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\3ac53f57-dfab-444d-a69f-4fabb3044db1.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\521bd3da-044a-457a-bf4c-25ae3fe771d5.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\5296a21c-cedd-44a4-8f43-06ace8124daa.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Network Persistent State~RF434271.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Reporting and NEL
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\SCT Auditing Pending Reports~RF4228a5.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\Trust Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\c7dc1db3-3e15-4378-b821-bd833f105d83.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\d649fc31-4291-4e1c-a28f-3a0c5adf4686.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Preferences~RF42c245.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Preferences~RF433775.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\PreferredApps
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\README
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Top Sites
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie
0x36, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\e5e6155a-1c59-47cc-ac23-53d883c0990d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\ead8be59-5ced-4156-a568-3a7c8885b37f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\heavy_ad_intervention_opt_out.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GrShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\GraphiteDawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF42251b.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF422588.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF424bec.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF4335ee.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Local State~RF439c59.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\ShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\e155d714-65be-4e97-807c-4bac3ce3834c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\e2ef58de-f2e6-4903-a54a-cf2cce2335af.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\e707b652-7fb0-4f82-9b4b-cca4e64c1614.tmp
|
JSON data
|
dropped
|
There are 140 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\BrowserUpdateTool.exe
|
"C:\Users\user\Desktop\BrowserUpdateTool.exe"
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=BrowserUpdateTool.exe
--user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1
--disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7536.7584.8340987022922056471
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView
/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad
--annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program
Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge
WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1
--embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz
--disable-features=msSmartScreenProtection /prefetch:2
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView"
--webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780
--field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService
--lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView"
--webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020
--field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1
--embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc
--ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508
--field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection
/prefetch:1
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox
--use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546
--noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz
--disable-features=msSmartScreenProtection /prefetch:2
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://anglebug.com/3498n
|
unknown
|
||
http://www.4399.com/flash/32979.htm
|
unknown
|
||
http://anglebug.com/8162K
|
unknown
|
||
https://www.4399.com/flash/180977_3.htm
|
unknown
|
||
http://anglebug.com/6755g
|
unknown
|
||
https://www.4399.com/flash/127539_4.htm
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://www.4399.com/flash/205462_4.htm
|
unknown
|
||
http://wails.localhost/chromium.svgbackend.App.GetBrowsers-2302447986
|
unknown
|
||
https://www.4399.com/flash/145991_4.htm
|
unknown
|
||
https://iamcrede/v1/projects/-/s:generateAccessT-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.
|
unknown
|
||
http://anglebug.com/6876R
|
unknown
|
||
https://www.4399.com/flash/39379_2.htm
|
unknown
|
||
https://www.4399.com/flash/55146_4.htm
|
unknown
|
||
https://www.4399.com/flash/195673_4.htm
|
unknown
|
||
https://iamcredentials.X-Appengine-Api-TicketX-Google-DappertraceinfoX-Appengine-User-IpX-Appengine-
|
unknown
|
||
https://permanently-removed.invalid/v1:GetHints
|
unknown
|
||
https://www.4399.com/flash/18012.htm
|
unknown
|
||
https://www.4399.com/flash/zmhj.htm#search3-6407
|
unknown
|
||
http://anglebug.com/3452Q
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://www.4399.com/flash/217926_2.htm
|
unknown
|
||
https://www.4399.com/flash/218860_1.htm
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://www.4399.com/flash/27924_2.htm
|
unknown
|
||
http://wails.localhost/chrome-beta.svghttp://wails.localhost/chromium.svgInternal
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
https://www.4399.com/flash/18012_4.htm
|
unknown
|
||
https://www.4399.com/flash/48504.htm
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.office.com/OfficeeEATE
|
unknown
|
||
http://wails.localhost/wails/ipc.js
|
unknown
|
||
https://gorm.io/docs/hooks.htmlAn
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://www.4399.com/flash/zmhj.htm
|
unknown
|
||
http://wails.localhost/wails/runtime.jshttp://wails.localhost/assets/index.25ad37ba.jsInternal
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
|
unknown
|
||
http://anglebug.com/7406;
|
unknown
|
||
http://wails.localhost/favicon.icoInternal
|
unknown
|
||
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
|
unknown
|
||
http://ocsp.accv.esTWCA
|
unknown
|
||
https://www.4399.com/flash/69156_1.htm
|
unknown
|
||
https://www.4399.com/flash/198637_4.htm
|
unknown
|
||
https://www.4399.com/flash/133630_4.htm
|
unknown
|
||
http://anglebug.com/5881&
|
unknown
|
||
https://doi.org/GetPartitions:
|
unknown
|
||
https://www.4399.com/flash/218717_2.htm
|
unknown
|
||
https://www.4399.com/flash/136516_3.htm
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:
|
unknown
|
||
https://www.4399.com/flash/203215_3.htm
|
unknown
|
||
https://www.4399.com/flash/207195_4.htm
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
https://designerapp-int.azurewebsites.net/
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://www.4399.com/flash/217855_4.htm
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
http://wails.localhost/brave.svga
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://www.4399.com/flash/21674_3.htm
|
unknown
|
||
https://www.4399.com/flash/204650_1.htm
|
unknown
|
||
https://www.4399.com/flash/115339_1.htm
|
unknown
|
||
https://www.4399.com/flash/203369_3.htm
|
unknown
|
||
http://anglebug.com/68605
|
unknown
|
||
https://www.4399.com/flash/35538.htm
|
unknown
|
||
https://www.4399.com/flash/218066_3.htm
|
unknown
|
||
https://www.4399.com/flash/6232_3.htm
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
https://www.4399.com/flash/195990_1.htm
|
unknown
|
||
https://www.4399.com/flash/12669_4.htm
|
unknown
|
||
https://www.4399.com/flash/204056_4.htm
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://www.4399.com/flash/205090_2.htm
|
unknown
|
||
https://www.4399.com/flash/10379_3.htm
|
unknown
|
||
https://www.4399.com/flash/203018_4.htm
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://wails.localhost/http://wails.localhost/
|
unknown
|
||
https://github.com/go-sql-driver/mysql/wiki/strict-modeChannel
|
unknown
|
||
http://wails.localhost/chrome.svgInternal
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
https://anglebug.com/7369J
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://ocsp.accv.es0
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0B1
|
unknown
|
||
https://anglebug.com/7369F
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
https://www.4399.com/flash/202828_2.htm
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
||
http://anglebug.com/4937
|
unknown
|
||
https://www.4399.com/flash/198491_1.htm
|
unknown
|
||
https://www.4399.com/flash/203453_2.htm
|
unknown
|
||
https://anglebug.com/73697
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
chrome.cloudflare-dns.com
|
172.64.41.3
|
||
code.jquery.com
|
151.101.130.137
|
||
raw.githubusercontent.com
|
185.199.111.133
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.159.61.3
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
185.199.111.133
|
raw.githubusercontent.com
|
Netherlands
|
||
172.64.41.3
|
chrome.cloudflare-dns.com
|
United States
|
||
151.101.130.137
|
code.jquery.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
dr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
|
UsageStatsInSample
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
usagestats
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
urlstats
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
failed_count
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19D0516C000
|
heap
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
7858000E4000
|
trusted library allocation
|
page read and write
|
||
1E7C338B000
|
unclassified section
|
page read and write
|
||
1A3C002DC000
|
trusted library allocation
|
page read and write
|
||
6D7C00328000
|
trusted library allocation
|
page read and write
|
||
4C1800788000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C64036C8000
|
trusted library allocation
|
page read and write
|
||
1A3C00304000
|
trusted library allocation
|
page read and write
|
||
19BF43F0000
|
trusted library allocation
|
page read and write
|
||
4C6403218000
|
trusted library allocation
|
page read and write
|
||
4C180157A000
|
trusted library allocation
|
page read and write
|
||
40840008C000
|
trusted library allocation
|
page read and write
|
||
C000CD9000
|
direct allocation
|
page read and write
|
||
4C1800824000
|
trusted library allocation
|
page read and write
|
||
5FF000258000
|
trusted library allocation
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
1E095EBD000
|
unclassified section
|
page readonly
|
||
19BF3715000
|
direct allocation
|
page read and write
|
||
1E7F1A25000
|
heap
|
page read and write
|
||
4C64031D8000
|
trusted library allocation
|
page read and write
|
||
4C1800F2C000
|
trusted library allocation
|
page read and write
|
||
4C64035EC000
|
trusted library allocation
|
page read and write
|
||
19D09DF9000
|
unkown
|
page readonly
|
||
4C18011C8000
|
trusted library allocation
|
page read and write
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
5FF000201000
|
trusted library allocation
|
page read and write
|
||
6190002D0000
|
trusted library allocation
|
page read and write
|
||
4000334000
|
trusted library allocation
|
page read and write
|
||
706B5FD000
|
stack
|
page read and write
|
||
19D0B922000
|
heap
|
page read and write
|
||
199C0001C000
|
trusted library allocation
|
page read and write
|
||
631C0040C000
|
trusted library allocation
|
page read and write
|
||
235400288000
|
trusted library allocation
|
page read and write
|
||
19D0508D000
|
heap
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
5E4800264000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C180142A000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
4C18009E9000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
4C18015F7000
|
trusted library allocation
|
page read and write
|
||
4C1800B00000
|
trusted library allocation
|
page read and write
|
||
4C1800EE2000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
1B58FFC000
|
stack
|
page read and write
|
||
4C640340C000
|
trusted library allocation
|
page read and write
|
||
408400080000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
1E090582000
|
unclassified section
|
page read and write
|
||
19D0B800000
|
heap
|
page read and write
|
||
4C180164A000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
36600D42000
|
trusted library allocation
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
4C6402ACC000
|
trusted library allocation
|
page read and write
|
||
619000294000
|
trusted library allocation
|
page read and write
|
||
3208002D8000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
19BF37A0000
|
direct allocation
|
page execute read
|
||
235400220000
|
trusted library allocation
|
page read and write
|
||
1C4B4102000
|
heap
|
page read and write
|
||
3F9BFFE000
|
stack
|
page read and write
|
||
283B5FC000
|
stack
|
page read and write
|
||
1E7F1F50000
|
trusted library allocation
|
page read and write
|
||
1E7F1A02000
|
heap
|
page read and write
|
||
1E095CD3000
|
unclassified section
|
page readonly
|
||
6D7C00408000
|
trusted library allocation
|
page read and write
|
||
1C76D2CD000
|
heap
|
page read and write
|
||
19D0B91A000
|
heap
|
page read and write
|
||
19D0512E000
|
heap
|
page read and write
|
||
4C180080C000
|
trusted library allocation
|
page read and write
|
||
5FF000220000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
4C6402F48000
|
trusted library allocation
|
page read and write
|
||
4C18011BC000
|
trusted library allocation
|
page read and write
|
||
4000270000
|
trusted library allocation
|
page read and write
|
||
1E093500000
|
heap
|
page read and write
|
||
4C1800D5C000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
284D5FB000
|
stack
|
page read and write
|
||
4C08002BC000
|
direct allocation
|
page read and write
|
||
19BF36E0000
|
heap
|
page read and write
|
||
4C180102C000
|
trusted library allocation
|
page read and write
|
||
4C640273C000
|
trusted library allocation
|
page read and write
|
||
4C6402E5C000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
1E7F1610000
|
remote allocation
|
page read and write
|
||
4C64027EC000
|
trusted library allocation
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
1E7C39C9000
|
unclassified section
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
4C18003E8000
|
trusted library allocation
|
page read and write
|
||
366006C2000
|
trusted library allocation
|
page read and write
|
||
1E7F1F60000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
A7400263000
|
trusted library allocation
|
page read and write
|
||
CAC00244000
|
direct allocation
|
page read and write
|
||
C000559000
|
direct allocation
|
page read and write
|
||
4C640224E000
|
trusted library allocation
|
page read and write
|
||
4C1801658000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C180100C000
|
trusted library allocation
|
page read and write
|
||
4C1801498000
|
trusted library allocation
|
page read and write
|
||
4C08002D0000
|
direct allocation
|
page read and write
|
||
6D7C00278000
|
trusted library allocation
|
page read and write
|
||
C000E90000
|
direct allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
3660085B000
|
trusted library allocation
|
page read and write
|
||
1E7F1A57000
|
heap
|
page read and write
|
||
19D0A03A000
|
unclassified section
|
page read and write
|
||
4C1800B24000
|
trusted library allocation
|
page read and write
|
||
4C6400601000
|
trusted library allocation
|
page read and write
|
||
2842DFE000
|
unkown
|
page readonly
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
A7400268000
|
trusted library allocation
|
page read and write
|
||
A74002EC000
|
trusted library allocation
|
page read and write
|
||
4C1800FE4000
|
trusted library allocation
|
page read and write
|
||
1C76D28D000
|
heap
|
page read and write
|
||
4C6402450000
|
trusted library allocation
|
page read and write
|
||
3F9B7FE000
|
unkown
|
page readonly
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C18016C8000
|
trusted library allocation
|
page read and write
|
||
36600402000
|
trusted library allocation
|
page read and write
|
||
4C1801558000
|
trusted library allocation
|
page read and write
|
||
1E7C3BD0000
|
unclassified section
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
19D0C222000
|
trusted library allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
1C4B4210000
|
heap
|
page read and write
|
||
619000C0C000
|
trusted library allocation
|
page read and write
|
||
4C64024B4000
|
trusted library allocation
|
page read and write
|
||
785800038000
|
trusted library allocation
|
page read and write
|
||
37D4002EC000
|
direct allocation
|
page read and write
|
||
4C18015A4000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
4C080031E000
|
direct allocation
|
page read and write
|
||
4084000E0000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C64035EC000
|
trusted library allocation
|
page read and write
|
||
19D0CA90000
|
unkown
|
page readonly
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
707C002A0000
|
direct allocation
|
page read and write
|
||
5E480033C000
|
trusted library allocation
|
page read and write
|
||
1E2000278000
|
trusted library allocation
|
page read and write
|
||
36600500000
|
trusted library allocation
|
page read and write
|
||
32080024C000
|
trusted library allocation
|
page read and write
|
||
4C1800694000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
2079B990000
|
heap
|
page read and write
|
||
19D05072000
|
heap
|
page read and write
|
||
4C64027EC000
|
trusted library allocation
|
page read and write
|
||
1E2000248000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
1E0909A0000
|
unclassified section
|
page read and write
|
||
19D0C702000
|
heap
|
page read and write
|
||
6190002FC000
|
trusted library allocation
|
page read and write
|
||
19BCCA9F000
|
direct allocation
|
page read and write
|
||
6237FE000
|
unkown
|
page readonly
|
||
366002C2000
|
trusted library allocation
|
page read and write
|
||
2839DFE000
|
unkown
|
page readonly
|
||
1A3C002FC000
|
trusted library allocation
|
page read and write
|
||
631C0020C000
|
trusted library allocation
|
page read and write
|
||
19BF3A65000
|
direct allocation
|
page read and write
|
||
4C6402378000
|
trusted library allocation
|
page read and write
|
||
4C6402A94000
|
trusted library allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
A7400188000
|
trusted library allocation
|
page read and write
|
||
4C18016F4000
|
trusted library allocation
|
page read and write
|
||
36600542000
|
trusted library allocation
|
page read and write
|
||
B6231F5000
|
stack
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
4C64036D4000
|
trusted library allocation
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
36600082000
|
trusted library allocation
|
page read and write
|
||
1E09069A000
|
heap
|
page read and write
|
||
A740021D000
|
trusted library allocation
|
page read and write
|
||
199C000E8000
|
trusted library allocation
|
page read and write
|
||
4C6402FA8000
|
trusted library allocation
|
page read and write
|
||
2AD4DFE000
|
stack
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
785800289000
|
trusted library allocation
|
page read and write
|
||
19BF3510000
|
direct allocation
|
page read and write
|
||
4C6402B84000
|
trusted library allocation
|
page read and write
|
||
7069BFF000
|
stack
|
page read and write
|
||
1E0905D0000
|
trusted library allocation
|
page read and write
|
||
619000338000
|
trusted library allocation
|
page read and write
|
||
4C1801044000
|
trusted library allocation
|
page read and write
|
||
6D7C0040C000
|
trusted library allocation
|
page read and write
|
||
5A680026C000
|
direct allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
19BF3A90000
|
direct allocation
|
page execute read
|
||
6190002B0000
|
trusted library allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
4C1800881000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
5FF00027C000
|
trusted library allocation
|
page read and write
|
||
36600477000
|
trusted library allocation
|
page read and write
|
||
707C00244000
|
direct allocation
|
page read and write
|
||
40002F0000
|
trusted library allocation
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
268C002B4000
|
trusted library allocation
|
page read and write
|
||
1B5EFFE000
|
stack
|
page read and write
|
||
4C1800F64000
|
trusted library allocation
|
page read and write
|
||
19D05171000
|
heap
|
page read and write
|
||
1C4B3EF0000
|
heap
|
page read and write
|
||
5FF00023C000
|
trusted library allocation
|
page read and write
|
||
199C00100000
|
trusted library allocation
|
page read and write
|
||
2079BCE0000
|
heap
|
page read and write
|
||
4C18009F9000
|
trusted library allocation
|
page read and write
|
||
282FDFE000
|
unkown
|
page readonly
|
||
4C180103C000
|
trusted library allocation
|
page read and write
|
||
3DD400220000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C64030F4000
|
trusted library allocation
|
page read and write
|
||
4C6402FBC000
|
trusted library allocation
|
page read and write
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
61900032C000
|
trusted library allocation
|
page read and write
|
||
4C1800DD8000
|
trusted library allocation
|
page read and write
|
||
C000DB8000
|
direct allocation
|
page read and write
|
||
4C18014E4000
|
trusted library allocation
|
page read and write
|
||
268C00294000
|
trusted library allocation
|
page read and write
|
||
4C180161D000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
631C00408000
|
trusted library allocation
|
page read and write
|
||
199C00128000
|
trusted library allocation
|
page read and write
|
||
4C6402760000
|
trusted library allocation
|
page read and write
|
||
4C1800E93000
|
trusted library allocation
|
page read and write
|
||
4C080031C000
|
direct allocation
|
page read and write
|
||
4C1800A2C000
|
trusted library allocation
|
page read and write
|
||
4C1800F05000
|
trusted library allocation
|
page read and write
|
||
1D7A1F50000
|
heap
|
page read and write
|
||
C00055B000
|
direct allocation
|
page read and write
|
||
619000E94000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
4C6402D34000
|
trusted library allocation
|
page read and write
|
||
C00054C000
|
direct allocation
|
page read and write
|
||
4C1800FC4000
|
trusted library allocation
|
page read and write
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
4C1800AEA000
|
trusted library allocation
|
page read and write
|
||
4C640248C000
|
trusted library allocation
|
page read and write
|
||
28335FE000
|
stack
|
page read and write
|
||
5A6800230000
|
direct allocation
|
page read and write
|
||
4C18012DC000
|
trusted library allocation
|
page read and write
|
||
4C6402E0C000
|
trusted library allocation
|
page read and write
|
||
4C6400401000
|
trusted library allocation
|
page read and write
|
||
619000398000
|
trusted library allocation
|
page read and write
|
||
1D7A68C0000
|
unkown
|
page readonly
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
1E095F25000
|
unclassified section
|
page readonly
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
4C1800A54000
|
trusted library allocation
|
page read and write
|
||
785800130000
|
trusted library allocation
|
page read and write
|
||
1B680028C000
|
trusted library allocation
|
page read and write
|
||
4C0800338000
|
direct allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
37D400264000
|
direct allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
A7400134000
|
trusted library allocation
|
page read and write
|
||
19BCC87D000
|
heap
|
page read and write
|
||
36600482000
|
trusted library allocation
|
page read and write
|
||
4C18014A4000
|
trusted library allocation
|
page read and write
|
||
4C6402BF4000
|
trusted library allocation
|
page read and write
|
||
4C1800FAC000
|
trusted library allocation
|
page read and write
|
||
4C18009F9000
|
trusted library allocation
|
page read and write
|
||
1E09348A000
|
heap
|
page read and write
|
||
5FF000338000
|
trusted library allocation
|
page read and write
|
||
4C1800EF4000
|
trusted library allocation
|
page read and write
|
||
619000250000
|
trusted library allocation
|
page read and write
|
||
4C18010B0000
|
trusted library allocation
|
page read and write
|
||
4C0800354000
|
direct allocation
|
page read and write
|
||
284B5FE000
|
stack
|
page read and write
|
||
6D7C002B8000
|
trusted library allocation
|
page read and write
|
||
19D05171000
|
heap
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
4C640076C000
|
trusted library allocation
|
page read and write
|
||
785800178000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
6190002A0000
|
trusted library allocation
|
page read and write
|
||
36600180000
|
trusted library allocation
|
page read and write
|
||
4000430000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
3F9F7FE000
|
unkown
|
page readonly
|
||
4C1800FE3000
|
trusted library allocation
|
page read and write
|
||
1E7F1670000
|
heap
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
4C18016D8000
|
trusted library allocation
|
page read and write
|
||
C0009FA000
|
direct allocation
|
page read and write
|
||
36600D02000
|
trusted library allocation
|
page read and write
|
||
4C180105A000
|
trusted library allocation
|
page read and write
|
||
4C1801064000
|
trusted library allocation
|
page read and write
|
||
4C6403104000
|
trusted library allocation
|
page read and write
|
||
19BF3717000
|
direct allocation
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
19D09FC9000
|
unclassified section
|
page read and write
|
||
19BCC82C000
|
heap
|
page read and write
|
||
4C1800AF4000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
4C6402C50000
|
trusted library allocation
|
page read and write
|
||
4C18010BC000
|
trusted library allocation
|
page read and write
|
||
366003C2000
|
trusted library allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
3660047F000
|
trusted library allocation
|
page read and write
|
||
1E7F1A23000
|
heap
|
page read and write
|
||
4C18009F7000
|
trusted library allocation
|
page read and write
|
||
1E090970000
|
trusted library allocation
|
page read and write
|
||
7858000C6000
|
trusted library allocation
|
page read and write
|
||
C00083A000
|
direct allocation
|
page read and write
|
||
1A3C002F0000
|
trusted library allocation
|
page read and write
|
||
19BF38A0000
|
direct allocation
|
page execute read
|
||
4C640240C000
|
trusted library allocation
|
page read and write
|
||
4C6403688000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
19D0B962000
|
heap
|
page read and write
|
||
4C1800DA0000
|
trusted library allocation
|
page read and write
|
||
1E096076000
|
unclassified section
|
page readonly
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C6402C80000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
1D7A203C000
|
heap
|
page read and write
|
||
36600477000
|
trusted library allocation
|
page read and write
|
||
4C6403654000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
1E095C59000
|
unclassified section
|
page readonly
|
||
268C002B4000
|
trusted library allocation
|
page read and write
|
||
1A3C002CC000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
1E096013000
|
unclassified section
|
page readonly
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
4C640250C000
|
trusted library allocation
|
page read and write
|
||
4C6402DB4000
|
trusted library allocation
|
page read and write
|
||
4C18012C0000
|
trusted library allocation
|
page read and write
|
||
785800398000
|
trusted library allocation
|
page read and write
|
||
1E095D08000
|
unclassified section
|
page readonly
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
C000414000
|
direct allocation
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
5E4800220000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
C000A0C000
|
direct allocation
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
A74001D8000
|
trusted library allocation
|
page read and write
|
||
19D0B642000
|
unclassified section
|
page read and write
|
||
1E0934AA000
|
heap
|
page read and write
|
||
4C6402E78000
|
trusted library allocation
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
4C1800FE4000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
4C1800318000
|
trusted library allocation
|
page read and write
|
||
619000320000
|
trusted library allocation
|
page read and write
|
||
4C1800EAC000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
3F9C7FE000
|
unkown
|
page readonly
|
||
366005C2000
|
trusted library allocation
|
page read and write
|
||
6D7C00288000
|
trusted library allocation
|
page read and write
|
||
320800270000
|
trusted library allocation
|
page read and write
|
||
7FF6EC1F9000
|
unkown
|
page write copy
|
||
4C180106C000
|
trusted library allocation
|
page read and write
|
||
78580010C000
|
trusted library allocation
|
page read and write
|
||
619000350000
|
trusted library allocation
|
page read and write
|
||
1E09349A000
|
heap
|
page read and write
|
||
639400240000
|
trusted library allocation
|
page read and write
|
||
1E2000201000
|
trusted library allocation
|
page read and write
|
||
4C1800AD8000
|
trusted library allocation
|
page read and write
|
||
A7400230000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
4C180157A000
|
trusted library allocation
|
page read and write
|
||
4C1800ACC000
|
trusted library allocation
|
page read and write
|
||
4C1801034000
|
trusted library allocation
|
page read and write
|
||
1E782BFA000
|
unclassified section
|
page read and write
|
||
4C1801794000
|
trusted library allocation
|
page read and write
|
||
2079B9D0000
|
heap
|
page readonly
|
||
4C18011C8000
|
trusted library allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
A740006C000
|
trusted library allocation
|
page read and write
|
||
4C6402A84000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
619000338000
|
trusted library allocation
|
page read and write
|
||
631C00238000
|
trusted library allocation
|
page read and write
|
||
40002CC000
|
trusted library allocation
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
4C6402B90000
|
trusted library allocation
|
page read and write
|
||
2826DFE000
|
unkown
|
page readonly
|
||
1B68002A0000
|
trusted library allocation
|
page read and write
|
||
4C18016B4000
|
trusted library allocation
|
page read and write
|
||
19BF3780000
|
direct allocation
|
page execute read
|
||
4C64023F8000
|
trusted library allocation
|
page read and write
|
||
4C18011D8000
|
trusted library allocation
|
page read and write
|
||
4C6402784000
|
trusted library allocation
|
page read and write
|
||
268C00298000
|
trusted library allocation
|
page read and write
|
||
4C640302C000
|
trusted library allocation
|
page read and write
|
||
4C6402C1C000
|
trusted library allocation
|
page read and write
|
||
7858002B0000
|
trusted library allocation
|
page read and write
|
||
7FF6EF33C000
|
unkown
|
page readonly
|
||
1B5DFFE000
|
stack
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
4C1800EA4000
|
trusted library allocation
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
19BF3BF6000
|
direct allocation
|
page read and write
|
||
B62A9FE000
|
unkown
|
page readonly
|
||
4C64030B4000
|
trusted library allocation
|
page read and write
|
||
78580029C000
|
trusted library allocation
|
page read and write
|
||
1E7F1800000
|
heap
|
page read and write
|
||
1B5E7FE000
|
unkown
|
page readonly
|
||
4000404000
|
trusted library allocation
|
page read and write
|
||
C000BE2000
|
direct allocation
|
page read and write
|
||
706A7FC000
|
stack
|
page read and write
|
||
1C76D25A000
|
heap
|
page read and write
|
||
19BF3698000
|
direct allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
4C1801081000
|
trusted library allocation
|
page read and write
|
||
36600D42000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
A74000A8000
|
trusted library allocation
|
page read and write
|
||
621FFE000
|
stack
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
19D05187000
|
heap
|
page read and write
|
||
4C18009E7000
|
trusted library allocation
|
page read and write
|
||
A74002DC000
|
trusted library allocation
|
page read and write
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
7FF6ED5F7000
|
unkown
|
page readonly
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
4C6402A14000
|
trusted library allocation
|
page read and write
|
||
235400230000
|
trusted library allocation
|
page read and write
|
||
4C64030EC000
|
trusted library allocation
|
page read and write
|
||
4C6402C3C000
|
trusted library allocation
|
page read and write
|
||
631C00244000
|
trusted library allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
19BF3687000
|
direct allocation
|
page read and write
|
||
5FF000408000
|
trusted library allocation
|
page read and write
|
||
36600502000
|
trusted library allocation
|
page read and write
|
||
C000EBA000
|
direct allocation
|
page read and write
|
||
4C1800FE4000
|
trusted library allocation
|
page read and write
|
||
4C1800FBC000
|
trusted library allocation
|
page read and write
|
||
1C76D286000
|
heap
|
page read and write
|
||
1C76D286000
|
heap
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C1801546000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
1C76D050000
|
heap
|
page read and write
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
1C76D2A0000
|
heap
|
page read and write
|
||
4C1800F0C000
|
trusted library allocation
|
page read and write
|
||
4C18003E8000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
4C6402D8C000
|
trusted library allocation
|
page read and write
|
||
4C1801572000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
1C76D200000
|
heap
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
4C1801538000
|
trusted library allocation
|
page read and write
|
||
C000EC4000
|
direct allocation
|
page read and write
|
||
4C180105A000
|
trusted library allocation
|
page read and write
|
||
4C64025A4000
|
trusted library allocation
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
1E0934AD000
|
heap
|
page read and write
|
||
C000888000
|
direct allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
1D7A6A02000
|
heap
|
page read and write
|
||
4C6400A01000
|
trusted library allocation
|
page read and write
|
||
3660085B000
|
trusted library allocation
|
page read and write
|
||
4000244000
|
trusted library allocation
|
page read and write
|
||
1E0934C5000
|
heap
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
785800130000
|
trusted library allocation
|
page read and write
|
||
6190008CC000
|
trusted library allocation
|
page read and write
|
||
78580028A000
|
trusted library allocation
|
page read and write
|
||
4C6402ACD000
|
trusted library allocation
|
page read and write
|
||
4C18002BC000
|
trusted library allocation
|
page read and write
|
||
5A6800280000
|
direct allocation
|
page read and write
|
||
2ADADFE000
|
stack
|
page read and write
|
||
19D04E10000
|
heap
|
page read and write
|
||
A7400260000
|
trusted library allocation
|
page read and write
|
||
4C1800824000
|
trusted library allocation
|
page read and write
|
||
1C76D28B000
|
heap
|
page read and write
|
||
624FFE000
|
stack
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
4C6402434000
|
trusted library allocation
|
page read and write
|
||
706ABFB000
|
stack
|
page read and write
|
||
4C1800EBC000
|
trusted library allocation
|
page read and write
|
||
4C18009E9000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
19BF3BD0000
|
direct allocation
|
page read and write
|
||
4C6402CA8000
|
trusted library allocation
|
page read and write
|
||
785800138000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
4C1800684000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C6402601000
|
trusted library allocation
|
page read and write
|
||
1E7C2E62000
|
trusted library allocation
|
page read and write
|
||
19D0CA60000
|
unkown
|
page readonly
|
||
1E200020C000
|
trusted library allocation
|
page read and write
|
||
4C1801498000
|
trusted library allocation
|
page read and write
|
||
19BF39B0000
|
direct allocation
|
page execute read
|
||
A74002EC000
|
trusted library allocation
|
page read and write
|
||
1C76D150000
|
heap
|
page read and write
|
||
4C6400D5E000
|
trusted library allocation
|
page read and write
|
||
4C64027AC000
|
trusted library allocation
|
page read and write
|
||
2827DFE000
|
unkown
|
page readonly
|
||
4C18006AC000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
19BCC8C8000
|
heap
|
page read and write
|
||
4C18008A4000
|
trusted library allocation
|
page read and write
|
||
4C080021C000
|
direct allocation
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
707C00274000
|
direct allocation
|
page read and write
|
||
4C6402384000
|
trusted library allocation
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
78580015F000
|
trusted library allocation
|
page read and write
|
||
1E7C3C72000
|
unclassified section
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
1C76D2A0000
|
heap
|
page read and write
|
||
4C1801644000
|
trusted library allocation
|
page read and write
|
||
4C1801495000
|
trusted library allocation
|
page read and write
|
||
78580000C000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
4C640320C000
|
trusted library allocation
|
page read and write
|
||
A7400218000
|
trusted library allocation
|
page read and write
|
||
1A3C00290000
|
trusted library allocation
|
page read and write
|
||
5E4800418000
|
trusted library allocation
|
page read and write
|
||
1E7C3C23000
|
unclassified section
|
page read and write
|
||
366005C2000
|
trusted library allocation
|
page read and write
|
||
4C6402AB3000
|
trusted library allocation
|
page read and write
|
||
1E7C3C29000
|
unclassified section
|
page read and write
|
||
1C76D2C9000
|
heap
|
page read and write
|
||
4C1800C4C000
|
trusted library allocation
|
page read and write
|
||
36600D02000
|
trusted library allocation
|
page read and write
|
||
A7400268000
|
trusted library allocation
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
639400274000
|
trusted library allocation
|
page read and write
|
||
4C1800E97000
|
trusted library allocation
|
page read and write
|
||
619000314000
|
trusted library allocation
|
page read and write
|
||
4C180163E000
|
trusted library allocation
|
page read and write
|
||
19BF5901000
|
heap
|
page read and write
|
||
1E095EFD000
|
unclassified section
|
page readonly
|
||
C000A18000
|
direct allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
707C00294000
|
direct allocation
|
page read and write
|
||
1E7C393F000
|
unclassified section
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
631C00338000
|
trusted library allocation
|
page read and write
|
||
CAC00220000
|
direct allocation
|
page read and write
|
||
639400220000
|
trusted library allocation
|
page read and write
|
||
4C64032C4000
|
trusted library allocation
|
page read and write
|
||
2D8400294000
|
direct allocation
|
page read and write
|
||
4C6401036000
|
trusted library allocation
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
7069FFF000
|
stack
|
page read and write
|
||
4C64023A4000
|
trusted library allocation
|
page read and write
|
||
C00087E000
|
direct allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
4C180103C000
|
trusted library allocation
|
page read and write
|
||
4C1801584000
|
trusted library allocation
|
page read and write
|
||
4C1800FB4000
|
trusted library allocation
|
page read and write
|
||
19D0A022000
|
unclassified section
|
page read and write
|
||
1E090600000
|
heap
|
page read and write
|
||
619000320000
|
trusted library allocation
|
page read and write
|
||
4C6403638000
|
trusted library allocation
|
page read and write
|
||
19BCCA92000
|
direct allocation
|
page read and write
|
||
19D0512E000
|
heap
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
1E7C3C37000
|
unclassified section
|
page read and write
|
||
2834DFE000
|
unkown
|
page readonly
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C1801628000
|
trusted library allocation
|
page read and write
|
||
C000CD7000
|
direct allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
1A3C002CC000
|
trusted library allocation
|
page read and write
|
||
1C76D2BF000
|
heap
|
page read and write
|
||
631C00220000
|
trusted library allocation
|
page read and write
|
||
1E0934AF000
|
heap
|
page read and write
|
||
19D0B659000
|
unclassified section
|
page read and write
|
||
19D0B980000
|
heap
|
page read and write
|
||
4C6403674000
|
trusted library allocation
|
page read and write
|
||
631C00254000
|
trusted library allocation
|
page read and write
|
||
7858000DC000
|
trusted library allocation
|
page read and write
|
||
A7400260000
|
trusted library allocation
|
page read and write
|
||
4C180104F000
|
trusted library allocation
|
page read and write
|
||
1D7A2000000
|
heap
|
page read and write
|
||
1E09347E000
|
heap
|
page read and write
|
||
1E7F1843000
|
heap
|
page read and write
|
||
A7400001000
|
trusted library allocation
|
page read and write
|
||
62AFFE000
|
stack
|
page read and write
|
||
61EFFE000
|
stack
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
6190006F8000
|
trusted library allocation
|
page read and write
|
||
7FF6EC2EC000
|
unkown
|
page write copy
|
||
4C1800AF6000
|
trusted library allocation
|
page read and write
|
||
28345FD000
|
stack
|
page read and write
|
||
36600282000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C1801034000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
1E090640000
|
heap
|
page read and write
|
||
4C6403218000
|
trusted library allocation
|
page read and write
|
||
C000242000
|
direct allocation
|
page read and write
|
||
32080026C000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
19BF3A8D000
|
direct allocation
|
page read and write
|
||
619000320000
|
trusted library allocation
|
page read and write
|
||
3DD400244000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
785800411000
|
trusted library allocation
|
page read and write
|
||
4C180102C000
|
trusted library allocation
|
page read and write
|
||
37D400404000
|
direct allocation
|
page read and write
|
||
4C180168C000
|
trusted library allocation
|
page read and write
|
||
4C64032F8000
|
trusted library allocation
|
page read and write
|
||
1E782BBD000
|
unclassified section
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
CAC00284000
|
direct allocation
|
page read and write
|
||
4C1800F5C000
|
trusted library allocation
|
page read and write
|
||
4C18003D0000
|
trusted library allocation
|
page read and write
|
||
4C1801069000
|
trusted library allocation
|
page read and write
|
||
4C6402450000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
36600CC2000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
3208002A4000
|
trusted library allocation
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
1C76D276000
|
heap
|
page read and write
|
||
19BCC88C000
|
heap
|
page read and write
|
||
4C1800E8C000
|
trusted library allocation
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
A7400268000
|
trusted library allocation
|
page read and write
|
||
C000BA6000
|
direct allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
6D7C00238000
|
trusted library allocation
|
page read and write
|
||
A7400104000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4084000CC000
|
trusted library allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
1C76D1E0000
|
heap
|
page read and write
|
||
C000C00000
|
direct allocation
|
page read and write
|
||
6190002CC000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
C000CD5000
|
direct allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
1E095CEA000
|
unclassified section
|
page readonly
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
4C6402A94000
|
trusted library allocation
|
page read and write
|
||
4C6402B1C000
|
trusted library allocation
|
page read and write
|
||
707C00234000
|
direct allocation
|
page read and write
|
||
3DD40020C000
|
trusted library allocation
|
page read and write
|
||
3FA07FE000
|
unkown
|
page readonly
|
||
4C18011DC000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
4C18016B4000
|
trusted library allocation
|
page read and write
|
||
3F93FFC000
|
stack
|
page read and write
|
||
32080027C000
|
trusted library allocation
|
page read and write
|
||
4C6402F28000
|
trusted library allocation
|
page read and write
|
||
C000CE5000
|
direct allocation
|
page read and write
|
||
C000EB8000
|
direct allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4C6402454000
|
trusted library allocation
|
page read and write
|
||
C000A24000
|
direct allocation
|
page read and write
|
||
19D0B980000
|
heap
|
page read and write
|
||
19D0B964000
|
heap
|
page read and write
|
||
C000CAC000
|
direct allocation
|
page read and write
|
||
19D05128000
|
heap
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
36600182000
|
trusted library allocation
|
page read and write
|
||
5E4800328000
|
trusted library allocation
|
page read and write
|
||
C000A08000
|
direct allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
5E48002AC000
|
trusted library allocation
|
page read and write
|
||
619000644000
|
trusted library allocation
|
page read and write
|
||
19D05171000
|
heap
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
A740020C000
|
trusted library allocation
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
5E4800284000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
4C180105C000
|
trusted library allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
5FF0002BC000
|
trusted library allocation
|
page read and write
|
||
6207FE000
|
unkown
|
page readonly
|
||
19BF3AB0000
|
heap
|
page read and write
|
||
C0004B2000
|
direct allocation
|
page read and write
|
||
C000E45000
|
direct allocation
|
page read and write
|
||
4C18007B0000
|
trusted library allocation
|
page read and write
|
||
C000CE1000
|
direct allocation
|
page read and write
|
||
1C76D2F0000
|
heap
|
page read and write
|
||
4C64030E0000
|
trusted library allocation
|
page read and write
|
||
4C6400001000
|
trusted library allocation
|
page read and write
|
||
6D7C00210000
|
trusted library allocation
|
page read and write
|
||
1D7A1F70000
|
trusted library allocation
|
page read and write
|
||
1E7F1A69000
|
heap
|
page read and write
|
||
625FFE000
|
stack
|
page read and write
|
||
4C1800EE2000
|
trusted library allocation
|
page read and write
|
||
7FFE21720000
|
direct allocation
|
page execute read
|
||
28505FE000
|
stack
|
page read and write
|
||
19D05128000
|
heap
|
page read and write
|
||
4C18008A4000
|
trusted library allocation
|
page read and write
|
||
4C6402B08000
|
trusted library allocation
|
page read and write
|
||
1E7C39C3000
|
unclassified section
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
61900020C000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
19D0C602000
|
heap
|
page read and write
|
||
1E782BA0000
|
unclassified section
|
page read and write
|
||
4C6402BE0000
|
trusted library allocation
|
page read and write
|
||
19BF3790000
|
direct allocation
|
page execute read
|
||
4C1801618000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
36600682000
|
trusted library allocation
|
page read and write
|
||
1C76D22B000
|
heap
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
4000260000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
4C6402454000
|
trusted library allocation
|
page read and write
|
||
1B5C7FE000
|
unkown
|
page readonly
|
||
1B68002B0000
|
trusted library allocation
|
page read and write
|
||
1E7C3973000
|
unclassified section
|
page read and write
|
||
1D7A2062000
|
heap
|
page read and write
|
||
4C18010BC000
|
trusted library allocation
|
page read and write
|
||
1E090910000
|
heap
|
page read and write
|
||
19D0516C000
|
heap
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
1E090560000
|
heap
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
4C18016D0000
|
trusted library allocation
|
page read and write
|
||
2D8400288000
|
direct allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
1B6800240000
|
trusted library allocation
|
page read and write
|
||
707C002E0000
|
direct allocation
|
page read and write
|
||
4C64032F8000
|
trusted library allocation
|
page read and write
|
||
785800201000
|
trusted library allocation
|
page read and write
|
||
785800138000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
1E782BCA000
|
unclassified section
|
page read and write
|
||
4C6402DD0000
|
trusted library allocation
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
3208002C8000
|
trusted library allocation
|
page read and write
|
||
4C1800EAC000
|
trusted library allocation
|
page read and write
|
||
A7400268000
|
trusted library allocation
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
631C00274000
|
trusted library allocation
|
page read and write
|
||
A74000EC000
|
trusted library allocation
|
page read and write
|
||
36600642000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4C1801640000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
1E7F177A000
|
unclassified section
|
page read and write
|
||
4C08002F0000
|
direct allocation
|
page read and write
|
||
4C18011BC000
|
trusted library allocation
|
page read and write
|
||
7858002A0000
|
trusted library allocation
|
page read and write
|
||
12D9DFE000
|
stack
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
4C1800AF8000
|
trusted library allocation
|
page read and write
|
||
1E7C33EA000
|
unclassified section
|
page read and write
|
||
28355FB000
|
stack
|
page read and write
|
||
4C6402450000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
4C18011C8000
|
trusted library allocation
|
page read and write
|
||
619000A01000
|
trusted library allocation
|
page read and write
|
||
2079BD10000
|
trusted library allocation
|
page read and write
|
||
1E7F1762000
|
unclassified section
|
page read and write
|
||
37D40023C000
|
direct allocation
|
page read and write
|
||
4C180077C000
|
trusted library allocation
|
page read and write
|
||
7858001C8000
|
trusted library allocation
|
page read and write
|
||
4C1800AD0000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
C0009DA000
|
direct allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
19D06F02000
|
heap
|
page read and write
|
||
A7400160000
|
trusted library allocation
|
page read and write
|
||
19D0B913000
|
heap
|
page read and write
|
||
4C18008A8000
|
trusted library allocation
|
page read and write
|
||
C00025A000
|
direct allocation
|
page read and write
|
||
4C1800AE0000
|
trusted library allocation
|
page read and write
|
||
4C1801644000
|
trusted library allocation
|
page read and write
|
||
61900030C000
|
trusted library allocation
|
page read and write
|
||
19BCC8BE000
|
heap
|
page read and write
|
||
1E095DF1000
|
unclassified section
|
page readonly
|
||
4C1800E98000
|
trusted library allocation
|
page read and write
|
||
28365FD000
|
stack
|
page read and write
|
||
19D05178000
|
heap
|
page read and write
|
||
1E7F1A5C000
|
heap
|
page read and write
|
||
4000401000
|
trusted library allocation
|
page read and write
|
||
4C18014ED000
|
trusted library allocation
|
page read and write
|
||
1E093421000
|
heap
|
page read and write
|
||
2079B9F9000
|
unclassified section
|
page read and write
|
||
19BF37E0000
|
direct allocation
|
page execute read
|
||
1C4B3FF0000
|
heap
|
page readonly
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
4C08002D8000
|
direct allocation
|
page read and write
|
||
1E7C33CE000
|
unclassified section
|
page read and write
|
||
1E7C2E44000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
4C6400E01000
|
trusted library allocation
|
page read and write
|
||
12DB5F9000
|
stack
|
page read and write
|
||
37D400244000
|
direct allocation
|
page read and write
|
||
1E7C3C4E000
|
unclassified section
|
page read and write
|
||
1E095F1F000
|
unclassified section
|
page readonly
|
||
631C002A8000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
4C1800DD8000
|
trusted library allocation
|
page read and write
|
||
4C180174C000
|
trusted library allocation
|
page read and write
|
||
1E09052D000
|
remote allocation
|
page execute read
|
||
366006C2000
|
trusted library allocation
|
page read and write
|
||
78580038C000
|
trusted library allocation
|
page read and write
|
||
785800160000
|
trusted library allocation
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
C00057F000
|
direct allocation
|
page read and write
|
||
19BF3BE7000
|
direct allocation
|
page read and write
|
||
19BF3B44000
|
heap
|
page read and write
|
||
1E095EDF000
|
unclassified section
|
page readonly
|
||
4C180105C000
|
trusted library allocation
|
page read and write
|
||
4C1800FE2000
|
trusted library allocation
|
page read and write
|
||
4C1801034000
|
trusted library allocation
|
page read and write
|
||
19D0512E000
|
heap
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
C000C34000
|
direct allocation
|
page read and write
|
||
5E4800344000
|
trusted library allocation
|
page read and write
|
||
4C1800AF8000
|
trusted library allocation
|
page read and write
|
||
1E2000210000
|
trusted library allocation
|
page read and write
|
||
5FF0002F0000
|
trusted library allocation
|
page read and write
|
||
4C1800F54000
|
trusted library allocation
|
page read and write
|
||
2851DFE000
|
unkown
|
page readonly
|
||
C000570000
|
direct allocation
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
28275FE000
|
stack
|
page read and write
|
||
36600382000
|
trusted library allocation
|
page read and write
|
||
4C180157A000
|
trusted library allocation
|
page read and write
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
619000601000
|
trusted library allocation
|
page read and write
|
||
1A3C002CC000
|
trusted library allocation
|
page read and write
|
||
C000CC8000
|
direct allocation
|
page read and write
|
||
C0009CA000
|
direct allocation
|
page read and write
|
||
1E0906F8000
|
heap
|
page read and write
|
||
5A680028C000
|
direct allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
78580016C000
|
trusted library allocation
|
page read and write
|
||
5E48002A4000
|
trusted library allocation
|
page read and write
|
||
4C1801572000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
A7400278000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
C0001EA000
|
direct allocation
|
page read and write
|
||
2D84002A4000
|
direct allocation
|
page read and write
|
||
1A3C00238000
|
trusted library allocation
|
page read and write
|
||
4C1800EFC000
|
trusted library allocation
|
page read and write
|
||
C000CCC000
|
direct allocation
|
page read and write
|
||
2079BA13000
|
heap
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
CAC00288000
|
direct allocation
|
page read and write
|
||
19BF3694000
|
direct allocation
|
page read and write
|
||
19BCCAE0000
|
direct allocation
|
page read and write
|
||
707C00264000
|
direct allocation
|
page read and write
|
||
4C1801544000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
4C64032D4000
|
trusted library allocation
|
page read and write
|
||
4C1800AEA000
|
trusted library allocation
|
page read and write
|
||
6287FE000
|
unkown
|
page readonly
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
19D05040000
|
heap
|
page read and write
|
||
6317FE000
|
unkown
|
page readonly
|
||
7FF6EEFB1000
|
unkown
|
page readonly
|
||
A740012C000
|
trusted library allocation
|
page read and write
|
||
C00006F000
|
direct allocation
|
page read and write
|
||
4C6402401000
|
trusted library allocation
|
page read and write
|
||
1E095CC8000
|
unclassified section
|
page readonly
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
4C64027B8000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C18015F7000
|
trusted library allocation
|
page read and write
|
||
12DEDFE000
|
stack
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
4C1800B14000
|
trusted library allocation
|
page read and write
|
||
4C18003C4000
|
trusted library allocation
|
page read and write
|
||
4C1801044000
|
trusted library allocation
|
page read and write
|
||
19BF3900000
|
direct allocation
|
page execute read
|
||
A7400278000
|
trusted library allocation
|
page read and write
|
||
4C1800AEC000
|
trusted library allocation
|
page read and write
|
||
CAC002D0000
|
direct allocation
|
page read and write
|
||
4C6402F9C000
|
trusted library allocation
|
page read and write
|
||
3F9D7FE000
|
unkown
|
page readonly
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
1E7C3C0F000
|
unclassified section
|
page read and write
|
||
C000AF8000
|
direct allocation
|
page read and write
|
||
4C6403758000
|
trusted library allocation
|
page read and write
|
||
4C1800F92000
|
trusted library allocation
|
page read and write
|
||
36600482000
|
trusted library allocation
|
page read and write
|
||
4C1800F94000
|
trusted library allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
63940020C000
|
trusted library allocation
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
4C18015CC000
|
trusted library allocation
|
page read and write
|
||
4C6402D24000
|
trusted library allocation
|
page read and write
|
||
1A3C00230000
|
trusted library allocation
|
page read and write
|
||
4C640302C000
|
trusted library allocation
|
page read and write
|
||
6190003B4000
|
trusted library allocation
|
page read and write
|
||
5A6800210000
|
direct allocation
|
page read and write
|
||
1E20002AC000
|
trusted library allocation
|
page read and write
|
||
707C00220000
|
direct allocation
|
page read and write
|
||
28435FD000
|
stack
|
page read and write
|
||
7858003F0000
|
trusted library allocation
|
page read and write
|
||
4C1800F15000
|
trusted library allocation
|
page read and write
|
||
4C1801628000
|
trusted library allocation
|
page read and write
|
||
4C180104F000
|
trusted library allocation
|
page read and write
|
||
4C6403168000
|
trusted library allocation
|
page read and write
|
||
1E7C33B4000
|
unclassified section
|
page read and write
|
||
619000201000
|
trusted library allocation
|
page read and write
|
||
1A3C0023C000
|
trusted library allocation
|
page read and write
|
||
4C1801588000
|
trusted library allocation
|
page read and write
|
||
1E090540000
|
unclassified section
|
page readonly
|
||
19D0B90C000
|
heap
|
page read and write
|
||
2D84002A0000
|
direct allocation
|
page read and write
|
||
4C1801067000
|
trusted library allocation
|
page read and write
|
||
B6281FE000
|
stack
|
page read and write
|
||
4C1801081000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
2079BA00000
|
heap
|
page read and write
|
||
4000344000
|
trusted library allocation
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
631C002A0000
|
trusted library allocation
|
page read and write
|
||
4C640377C000
|
trusted library allocation
|
page read and write
|
||
1C76D263000
|
heap
|
page read and write
|
||
4C1800F06000
|
trusted library allocation
|
page read and write
|
||
36600602000
|
trusted library allocation
|
page read and write
|
||
4C1800EAC000
|
trusted library allocation
|
page read and write
|
||
4C180158C000
|
trusted library allocation
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
4C18010B0000
|
trusted library allocation
|
page read and write
|
||
19BF3650000
|
direct allocation
|
page read and write
|
||
5FF000298000
|
trusted library allocation
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
19BCC6B0000
|
heap
|
page read and write
|
||
7FF6EA600000
|
unkown
|
page readonly
|
||
4C1801550000
|
trusted library allocation
|
page read and write
|
||
619000344000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
7FF6ED4F4000
|
unkown
|
page readonly
|
||
4C18015F7000
|
trusted library allocation
|
page read and write
|
||
C000C2F000
|
direct allocation
|
page read and write
|
||
4C1800FE4000
|
trusted library allocation
|
page read and write
|
||
4C1801052000
|
trusted library allocation
|
page read and write
|
||
7858000D0000
|
trusted library allocation
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
C0008F8000
|
direct allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
6D7C002CC000
|
trusted library allocation
|
page read and write
|
||
4C1800318000
|
trusted library allocation
|
page read and write
|
||
19BF3860000
|
direct allocation
|
page execute read
|
||
19D04F70000
|
trusted library allocation
|
page read and write
|
||
1E200027C000
|
trusted library allocation
|
page read and write
|
||
4C180175C000
|
trusted library allocation
|
page read and write
|
||
4C1801024000
|
trusted library allocation
|
page read and write
|
||
4C1800B14000
|
trusted library allocation
|
page read and write
|
||
4C6403178000
|
trusted library allocation
|
page read and write
|
||
1E095D02000
|
unclassified section
|
page readonly
|
||
C000CEF000
|
direct allocation
|
page read and write
|
||
19D0A510000
|
trusted library section
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
3660047F000
|
trusted library allocation
|
page read and write
|
||
283FDFE000
|
unkown
|
page readonly
|
||
1C76D28B000
|
heap
|
page read and write
|
||
4C1800300000
|
trusted library allocation
|
page read and write
|
||
5E4800258000
|
trusted library allocation
|
page read and write
|
||
4C1800B2C000
|
trusted library allocation
|
page read and write
|
||
619000244000
|
trusted library allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
4C180148C000
|
trusted library allocation
|
page read and write
|
||
4C6402F08000
|
trusted library allocation
|
page read and write
|
||
B6271FE000
|
stack
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
C000C5C000
|
direct allocation
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
4C640321C000
|
trusted library allocation
|
page read and write
|
||
A7400278000
|
trusted library allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
1C4B4013000
|
heap
|
page read and write
|
||
78580019E000
|
trusted library allocation
|
page read and write
|
||
4C18011BC000
|
trusted library allocation
|
page read and write
|
||
3F8DFFB000
|
stack
|
page read and write
|
||
1E2000230000
|
trusted library allocation
|
page read and write
|
||
CAC00264000
|
direct allocation
|
page read and write
|
||
4C1800B2C000
|
trusted library allocation
|
page read and write
|
||
4C1800638000
|
trusted library allocation
|
page read and write
|
||
1C76D26C000
|
heap
|
page read and write
|
||
19BF3BCA000
|
direct allocation
|
page read and write
|
||
785800070000
|
trusted library allocation
|
page read and write
|
||
4C640249F000
|
trusted library allocation
|
page read and write
|
||
19D0517E000
|
heap
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
4C1800EAC000
|
trusted library allocation
|
page read and write
|
||
4C1800EE2000
|
trusted library allocation
|
page read and write
|
||
6394002B4000
|
trusted library allocation
|
page read and write
|
||
5FF000268000
|
trusted library allocation
|
page read and write
|
||
2D8400244000
|
direct allocation
|
page read and write
|
||
19D0CA50000
|
unkown
|
page readonly
|
||
1A3C002C4000
|
trusted library allocation
|
page read and write
|
||
1B6800278000
|
trusted library allocation
|
page read and write
|
||
19D0A060000
|
trusted library section
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
6D7C0020C000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
619000350000
|
trusted library allocation
|
page read and write
|
||
36600582000
|
trusted library allocation
|
page read and write
|
||
1E2000238000
|
trusted library allocation
|
page read and write
|
||
1E7C32E1000
|
unclassified section
|
page read and write
|
||
1E095EE0000
|
unclassified section
|
page readonly
|
||
37D400201000
|
direct allocation
|
page read and write
|
||
1E7C330A000
|
unclassified section
|
page read and write
|
||
4C6402B98000
|
trusted library allocation
|
page read and write
|
||
4C6403657000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
785800416000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
706A9FE000
|
stack
|
page read and write
|
||
4C640248C000
|
trusted library allocation
|
page read and write
|
||
4C6402FA8000
|
trusted library allocation
|
page read and write
|
||
1E782BE0000
|
unclassified section
|
page read and write
|
||
4C6402450000
|
trusted library allocation
|
page read and write
|
||
1E093400000
|
heap
|
page read and write
|
||
36600602000
|
trusted library allocation
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C080034F000
|
direct allocation
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
4C6402F9C000
|
trusted library allocation
|
page read and write
|
||
1E095C43000
|
unclassified section
|
page readonly
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
4000310000
|
trusted library allocation
|
page read and write
|
||
4C18006AC000
|
trusted library allocation
|
page read and write
|
||
4C6402D0C000
|
trusted library allocation
|
page read and write
|
||
5E480020C000
|
trusted library allocation
|
page read and write
|
||
4C640245A000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
4C180106C000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
4C6402E01000
|
trusted library allocation
|
page read and write
|
||
4C180127D000
|
trusted library allocation
|
page read and write
|
||
7FF6EF330000
|
unkown
|
page readonly
|
||
1D7A2041000
|
heap
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
631C002F0000
|
trusted library allocation
|
page read and write
|
||
36600102000
|
trusted library allocation
|
page read and write
|
||
3F90FFE000
|
stack
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
1E0905B0000
|
heap
|
page read and write
|
||
2828DFE000
|
unkown
|
page readonly
|
||
36600477000
|
trusted library allocation
|
page read and write
|
||
4C180105C000
|
trusted library allocation
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
4C18003D0000
|
trusted library allocation
|
page read and write
|
||
C0001BC000
|
direct allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
1C4B402B000
|
heap
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C1800F24000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
268C002A8000
|
trusted library allocation
|
page read and write
|
||
4C18008A4000
|
trusted library allocation
|
page read and write
|
||
19BF36A0000
|
direct allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C18009E9000
|
trusted library allocation
|
page read and write
|
||
639400201000
|
trusted library allocation
|
page read and write
|
||
61DFF6000
|
stack
|
page read and write
|
||
1D7A2105000
|
heap
|
page read and write
|
||
1C76D2B4000
|
heap
|
page read and write
|
||
19BCCB00000
|
heap
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
1E7C3BED000
|
unclassified section
|
page read and write
|
||
19BCCA40000
|
direct allocation
|
page read and write
|
||
707C002B4000
|
direct allocation
|
page read and write
|
||
5FF000328000
|
trusted library allocation
|
page read and write
|
||
5E48002CC000
|
trusted library allocation
|
page read and write
|
||
36600D40000
|
trusted library allocation
|
page read and write
|
||
4C18006A0000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
4C1800894000
|
trusted library allocation
|
page read and write
|
||
707C00288000
|
direct allocation
|
page read and write
|
||
C0004C8000
|
direct allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
2D84002B4000
|
direct allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
2847DFE000
|
unkown
|
page readonly
|
||
5A68002A8000
|
direct allocation
|
page read and write
|
||
40002D8000
|
trusted library allocation
|
page read and write
|
||
5FF00026C000
|
trusted library allocation
|
page read and write
|
||
37D4002CC000
|
direct allocation
|
page read and write
|
||
C000498000
|
direct allocation
|
page read and write
|
||
5FF000210000
|
trusted library allocation
|
page read and write
|
||
408400028000
|
trusted library allocation
|
page read and write
|
||
1E782B60000
|
unclassified section
|
page readonly
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
1E09603E000
|
unclassified section
|
page readonly
|
||
706B1FF000
|
stack
|
page read and write
|
||
1E782C40000
|
trusted library allocation
|
page read and write
|
||
785800060000
|
trusted library allocation
|
page read and write
|
||
4C180157C000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
4C6402B34000
|
trusted library allocation
|
page read and write
|
||
619000AFC000
|
trusted library allocation
|
page read and write
|
||
19BF3770000
|
heap
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
4C180178C000
|
trusted library allocation
|
page read and write
|
||
61900032C000
|
trusted library allocation
|
page read and write
|
||
4C640374C000
|
trusted library allocation
|
page read and write
|
||
4C180100C000
|
trusted library allocation
|
page read and write
|
||
19BCC8C4000
|
heap
|
page read and write
|
||
1E7F1660000
|
unclassified section
|
page readonly
|
||
4C180157A000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
6190006EC000
|
trusted library allocation
|
page read and write
|
||
28255FD000
|
stack
|
page read and write
|
||
1E0934B1000
|
heap
|
page read and write
|
||
320800220000
|
trusted library allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
6394002B4000
|
trusted library allocation
|
page read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
1E7C3BE0000
|
unclassified section
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
1E2000258000
|
trusted library allocation
|
page read and write
|
||
1E7F1A09000
|
heap
|
page read and write
|
||
4C6403601000
|
trusted library allocation
|
page read and write
|
||
62BFFD000
|
stack
|
page read and write
|
||
36600082000
|
trusted library allocation
|
page read and write
|
||
4C1800DBC000
|
trusted library allocation
|
page read and write
|
||
1E095F3D000
|
unclassified section
|
page readonly
|
||
A7400263000
|
trusted library allocation
|
page read and write
|
||
A74002DC000
|
trusted library allocation
|
page read and write
|
||
4C1801500000
|
trusted library allocation
|
page read and write
|
||
4C180060C000
|
trusted library allocation
|
page read and write
|
||
40840001C000
|
trusted library allocation
|
page read and write
|
||
4C6400C01000
|
trusted library allocation
|
page read and write
|
||
631C00201000
|
trusted library allocation
|
page read and write
|
||
36600342000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
1E093600000
|
unclassified section
|
page read and write
|
||
5E4800238000
|
trusted library allocation
|
page read and write
|
||
199C0007C000
|
trusted library allocation
|
page read and write
|
||
4C1800F3C000
|
trusted library allocation
|
page read and write
|
||
4C6402258000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
2354002B8000
|
trusted library allocation
|
page read and write
|
||
7FF6EBA01000
|
unkown
|
page execute read
|
||
4C1801668000
|
trusted library allocation
|
page read and write
|
||
19D0CA40000
|
unkown
|
page readonly
|
||
4C1800DF0000
|
trusted library allocation
|
page read and write
|
||
4C180077F000
|
trusted library allocation
|
page read and write
|
||
268C002A8000
|
trusted library allocation
|
page read and write
|
||
19D05189000
|
heap
|
page read and write
|
||
6190006F8000
|
trusted library allocation
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
1E0904B0000
|
heap
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
1B5BFFE000
|
stack
|
page read and write
|
||
4C6402AA0000
|
trusted library allocation
|
page read and write
|
||
6D7C0031C000
|
trusted library allocation
|
page read and write
|
||
19BF37F0000
|
direct allocation
|
page execute read
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
36600602000
|
trusted library allocation
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
4C1800FA4000
|
trusted library allocation
|
page read and write
|
||
4C18012D0000
|
trusted library allocation
|
page read and write
|
||
366006C2000
|
trusted library allocation
|
page read and write
|
||
19D05166000
|
heap
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
4C6402630000
|
trusted library allocation
|
page read and write
|
||
4C180106C000
|
trusted library allocation
|
page read and write
|
||
1E09343B000
|
heap
|
page read and write
|
||
1B680028C000
|
trusted library allocation
|
page read and write
|
||
5E4800310000
|
trusted library allocation
|
page read and write
|
||
19BCC890000
|
heap
|
page read and write
|
||
4C6402428000
|
trusted library allocation
|
page read and write
|
||
366005C2000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
707C00254000
|
direct allocation
|
page read and write
|
||
4C1801639000
|
trusted library allocation
|
page read and write
|
||
4C18011C8000
|
trusted library allocation
|
page read and write
|
||
4C6403484000
|
trusted library allocation
|
page read and write
|
||
3F92FFB000
|
stack
|
page read and write
|
||
2D8400250000
|
direct allocation
|
page read and write
|
||
36600482000
|
trusted library allocation
|
page read and write
|
||
19BCCA60000
|
direct allocation
|
page read and write
|
||
C00005F000
|
direct allocation
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
4C640260C000
|
trusted library allocation
|
page read and write
|
||
2079BE05000
|
heap
|
page read and write
|
||
4C18008A4000
|
trusted library allocation
|
page read and write
|
||
12E05FC000
|
stack
|
page read and write
|
||
6190006D0000
|
trusted library allocation
|
page read and write
|
||
A7400268000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
1E0904A0000
|
unclassified section
|
page readonly
|
||
1E782C30000
|
trusted library allocation
|
page read and write
|
||
619000294000
|
trusted library allocation
|
page read and write
|
||
4C6403670000
|
trusted library allocation
|
page read and write
|
||
4C1800EAC000
|
trusted library allocation
|
page read and write
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
36600482000
|
trusted library allocation
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
4C64032ED000
|
trusted library allocation
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
1E7C2C40000
|
unclassified section
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C1801639000
|
trusted library allocation
|
page read and write
|
||
4C6402F6C000
|
trusted library allocation
|
page read and write
|
||
4C180078C000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C640313C000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
4C1800AF4000
|
trusted library allocation
|
page read and write
|
||
4C64026A4000
|
trusted library allocation
|
page read and write
|
||
19BF38F0000
|
direct allocation
|
page execute read
|
||
A74001F0000
|
trusted library allocation
|
page read and write
|
||
4C1801064000
|
trusted library allocation
|
page read and write
|
||
4C1800FAC000
|
trusted library allocation
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
4C6402ED8000
|
trusted library allocation
|
page read and write
|
||
4C640314C000
|
trusted library allocation
|
page read and write
|
||
1E200028C000
|
trusted library allocation
|
page read and write
|
||
C000CDF000
|
direct allocation
|
page read and write
|
||
4C1801618000
|
trusted library allocation
|
page read and write
|
||
284F5FD000
|
stack
|
page read and write
|
||
366000C2000
|
trusted library allocation
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
19D07BE8000
|
unkown
|
page read and write
|
||
4C64027C4000
|
trusted library allocation
|
page read and write
|
||
C000D01000
|
direct allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
4C18010BC000
|
trusted library allocation
|
page read and write
|
||
36600242000
|
trusted library allocation
|
page read and write
|
||
4C64025B8000
|
trusted library allocation
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
4C1801024000
|
trusted library allocation
|
page read and write
|
||
19BF3BB5000
|
heap
|
page read and write
|
||
4C6402244000
|
trusted library allocation
|
page read and write
|
||
1E090A02000
|
heap
|
page read and write
|
||
4C640304C000
|
trusted library allocation
|
page read and write
|
||
C000C9A000
|
direct allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
36600642000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
36600382000
|
trusted library allocation
|
page read and write
|
||
5E48002D8000
|
trusted library allocation
|
page read and write
|
||
1E096031000
|
unclassified section
|
page readonly
|
||
1E095C3B000
|
unclassified section
|
page readonly
|
||
5E4800424000
|
trusted library allocation
|
page read and write
|
||
4C18016B8000
|
trusted library allocation
|
page read and write
|
||
408400024000
|
trusted library allocation
|
page read and write
|
||
785800098000
|
trusted library allocation
|
page read and write
|
||
4C64025A4000
|
trusted library allocation
|
page read and write
|
||
C000E40000
|
direct allocation
|
page read and write
|
||
4C080037C000
|
direct allocation
|
page read and write
|
||
3F9FFFC000
|
stack
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
199C000D8000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
4C1800A40000
|
trusted library allocation
|
page read and write
|
||
36600040000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C640241C000
|
trusted library allocation
|
page read and write
|
||
4C6402626000
|
trusted library allocation
|
page read and write
|
||
61900080C000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
1E7F17C0000
|
trusted library allocation
|
page read and write
|
||
3208002B4000
|
trusted library allocation
|
page read and write
|
||
4C6402F6C000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
A7400223000
|
trusted library allocation
|
page read and write
|
||
19BF3910000
|
direct allocation
|
page execute read
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
4C1800724000
|
trusted library allocation
|
page read and write
|
||
19D05188000
|
heap
|
page read and write
|
||
4C6402644000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
408400060000
|
trusted library allocation
|
page read and write
|
||
36600102000
|
trusted library allocation
|
page read and write
|
||
19BF3A82000
|
direct allocation
|
page read and write
|
||
707C00210000
|
direct allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
19D0B900000
|
heap
|
page read and write
|
||
408400118000
|
trusted library allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
19D0512E000
|
heap
|
page read and write
|
||
1D7A2002000
|
heap
|
page read and write
|
||
366006C2000
|
trusted library allocation
|
page read and write
|
||
4C6402C2C000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
3F967FE000
|
unkown
|
page readonly
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
6190002A8000
|
trusted library allocation
|
page read and write
|
||
1E7C39F2000
|
unclassified section
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
4C1800FE2000
|
trusted library allocation
|
page read and write
|
||
C000436000
|
direct allocation
|
page read and write
|
||
707C00230000
|
direct allocation
|
page read and write
|
||
6190006B4000
|
trusted library allocation
|
page read and write
|
||
4C1800F4C000
|
trusted library allocation
|
page read and write
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
4C180106C000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
19D0A527000
|
trusted library section
|
page read and write
|
||
1D7A1E50000
|
heap
|
page read and write
|
||
C0001F4000
|
direct allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
5FF000278000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
4C6402358000
|
trusted library allocation
|
page read and write
|
||
1B5D7FE000
|
unkown
|
page readonly
|
||
4C18011D8000
|
trusted library allocation
|
page read and write
|
||
19D0B980000
|
heap
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
199C00120000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
1E200023C000
|
trusted library allocation
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
7858002B4000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
4C1801558000
|
trusted library allocation
|
page read and write
|
||
4C1800A18000
|
trusted library allocation
|
page read and write
|
||
4C080032C000
|
direct allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
4C1800788000
|
trusted library allocation
|
page read and write
|
||
7FF6EFD3C000
|
unkown
|
page readonly
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
619000320000
|
trusted library allocation
|
page read and write
|
||
5A6800248000
|
direct allocation
|
page read and write
|
||
28235FB000
|
stack
|
page read and write
|
||
A7400263000
|
trusted library allocation
|
page read and write
|
||
36600D42000
|
trusted library allocation
|
page read and write
|
||
4C1801588000
|
trusted library allocation
|
page read and write
|
||
1C4B4002000
|
heap
|
page read and write
|
||
4C6403118000
|
trusted library allocation
|
page read and write
|
||
1E7C3A09000
|
unclassified section
|
page read and write
|
||
19D0A52D000
|
trusted library section
|
page read and write
|
||
4C18016A8000
|
trusted library allocation
|
page read and write
|
||
40002C4000
|
trusted library allocation
|
page read and write
|
||
1C76FBE0000
|
trusted library allocation
|
page read and write
|
||
A74002EC000
|
trusted library allocation
|
page read and write
|
||
1A3C002B8000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C1800DBC000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
408400094000
|
trusted library allocation
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
4C64022A8000
|
trusted library allocation
|
page read and write
|
||
199C0006C000
|
trusted library allocation
|
page read and write
|
||
4C1800624000
|
trusted library allocation
|
page read and write
|
||
4C1801582000
|
trusted library allocation
|
page read and write
|
||
5E4800201000
|
trusted library allocation
|
page read and write
|
||
4C6402728000
|
trusted library allocation
|
page read and write
|
||
631C002B8000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
4C18010B4000
|
trusted library allocation
|
page read and write
|
||
61900023C000
|
trusted library allocation
|
page read and write
|
||
235400254000
|
trusted library allocation
|
page read and write
|
||
4C64025DC000
|
trusted library allocation
|
page read and write
|
||
619000313000
|
trusted library allocation
|
page read and write
|
||
6190006F8000
|
trusted library allocation
|
page read and write
|
||
5A680023C000
|
direct allocation
|
page read and write
|
||
1E095D48000
|
unclassified section
|
page readonly
|
||
4C1800E97000
|
trusted library allocation
|
page read and write
|
||
C000AB3000
|
direct allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
28225F2000
|
stack
|
page read and write
|
||
7858003E0000
|
trusted library allocation
|
page read and write
|
||
4C1800AF4000
|
trusted library allocation
|
page read and write
|
||
4C1800F9C000
|
trusted library allocation
|
page read and write
|
||
4C64032A8000
|
trusted library allocation
|
page read and write
|
||
19BF39D0000
|
direct allocation
|
page execute read
|
||
4C640373C000
|
trusted library allocation
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
4C6403084000
|
trusted library allocation
|
page read and write
|
||
5E4800254000
|
trusted library allocation
|
page read and write
|
||
C000564000
|
direct allocation
|
page read and write
|
||
19BF3A85000
|
direct allocation
|
page read and write
|
||
1B68002D8000
|
trusted library allocation
|
page read and write
|
||
1A3C002B0000
|
trusted library allocation
|
page read and write
|
||
4C18012DC000
|
trusted library allocation
|
page read and write
|
||
4C18017BC000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
639400270000
|
trusted library allocation
|
page read and write
|
||
4000408000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
4C1800C5C000
|
trusted library allocation
|
page read and write
|
||
4C1800AFA000
|
trusted library allocation
|
page read and write
|
||
28265F9000
|
stack
|
page read and write
|
||
4C1800F0A000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
1E7F1790000
|
heap
|
page read and write
|
||
1B5A7FE000
|
unkown
|
page readonly
|
||
1E782BF7000
|
unclassified section
|
page read and write
|
||
12DE5FB000
|
stack
|
page read and write
|
||
7858002A5000
|
trusted library allocation
|
page read and write
|
||
6277FE000
|
unkown
|
page readonly
|
||
4C180148C000
|
trusted library allocation
|
page read and write
|
||
199C000EC000
|
trusted library allocation
|
page read and write
|
||
4C18016B9000
|
trusted library allocation
|
page read and write
|
||
CAC002C4000
|
direct allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
36600402000
|
trusted library allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
4C1800770000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C180160C000
|
trusted library allocation
|
page read and write
|
||
28395FD000
|
stack
|
page read and write
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
4C180101C000
|
trusted library allocation
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
4C1800FD4000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
4C18011DC000
|
trusted library allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
4C6403784000
|
trusted library allocation
|
page read and write
|
||
4C1800EF4000
|
trusted library allocation
|
page read and write
|
||
61900067C000
|
trusted library allocation
|
page read and write
|
||
6190002DC000
|
trusted library allocation
|
page read and write
|
||
4C0800323000
|
direct allocation
|
page read and write
|
||
4C640360C000
|
trusted library allocation
|
page read and write
|
||
62D7FE000
|
unkown
|
page readonly
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
283DDFE000
|
unkown
|
page readonly
|
||
C000CE3000
|
direct allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
2D8400201000
|
direct allocation
|
page read and write
|
||
4C18014BC000
|
trusted library allocation
|
page read and write
|
||
B62B9FE000
|
unkown
|
page readonly
|
||
4C64022C4000
|
trusted library allocation
|
page read and write
|
||
785800398000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
1E7C3989000
|
unclassified section
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
5FF0002CC000
|
trusted library allocation
|
page read and write
|
||
2850DFE000
|
unkown
|
page readonly
|
||
36600D40000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
C0001B2000
|
direct allocation
|
page read and write
|
||
785800101000
|
trusted library allocation
|
page read and write
|
||
4C6403218000
|
trusted library allocation
|
page read and write
|
||
1E093474000
|
heap
|
page read and write
|
||
4C1800B24000
|
trusted library allocation
|
page read and write
|
||
6D7C002E8000
|
trusted library allocation
|
page read and write
|
||
C000CA2000
|
direct allocation
|
page read and write
|
||
19BF36F0000
|
direct allocation
|
page execute read
|
||
3F947FE000
|
unkown
|
page readonly
|
||
4C6402424000
|
trusted library allocation
|
page read and write
|
||
619000314000
|
trusted library allocation
|
page read and write
|
||
61F7FE000
|
unkown
|
page readonly
|
||
4C640248F000
|
trusted library allocation
|
page read and write
|
||
19BF366A000
|
direct allocation
|
page read and write
|
||
36600477000
|
trusted library allocation
|
page read and write
|
||
19D0517E000
|
heap
|
page read and write
|
||
A7400263000
|
trusted library allocation
|
page read and write
|
||
4C1800F9C000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
1E0934D0000
|
heap
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
C000D0F000
|
direct allocation
|
page read and write
|
||
19D06F00000
|
heap
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
5E48002C8000
|
trusted library allocation
|
page read and write
|
||
19BCC7E4000
|
direct allocation
|
page read and write
|
||
3660085B000
|
trusted library allocation
|
page read and write
|
||
631C00250000
|
trusted library allocation
|
page read and write
|
||
5A68002BC000
|
direct allocation
|
page read and write
|
||
4C1801588000
|
trusted library allocation
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
4C6402C50000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
4000304000
|
trusted library allocation
|
page read and write
|
||
63940029C000
|
trusted library allocation
|
page read and write
|
||
4C6403574000
|
trusted library allocation
|
page read and write
|
||
4C6403228000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
5FF000238000
|
trusted library allocation
|
page read and write
|
||
4C6402BD4000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
4C6402F28000
|
trusted library allocation
|
page read and write
|
||
408400108000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
7858002A5000
|
trusted library allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
37D400294000
|
direct allocation
|
page read and write
|
||
1E095C93000
|
unclassified section
|
page readonly
|
||
A74000D4000
|
trusted library allocation
|
page read and write
|
||
19BF3A00000
|
direct allocation
|
page execute read
|
||
4C1800F02000
|
trusted library allocation
|
page read and write
|
||
5E48002A0000
|
trusted library allocation
|
page read and write
|
||
706A1FE000
|
stack
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
19D0502B000
|
heap
|
page read and write
|
||
1E7C3A55000
|
unclassified section
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
785800378000
|
trusted library allocation
|
page read and write
|
||
1E7C3B90000
|
unclassified section
|
page read and write
|
||
785800120000
|
trusted library allocation
|
page read and write
|
||
23540020C000
|
trusted library allocation
|
page read and write
|
||
1E7C3374000
|
unclassified section
|
page read and write
|
||
619000314000
|
trusted library allocation
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4C0800294000
|
direct allocation
|
page read and write
|
||
19D0B96F000
|
heap
|
page read and write
|
||
A74002EC000
|
trusted library allocation
|
page read and write
|
||
5A6800298000
|
direct allocation
|
page read and write
|
||
19BF3740000
|
direct allocation
|
page execute read
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
6D7C002AC000
|
trusted library allocation
|
page read and write
|
||
4C1800A40000
|
trusted library allocation
|
page read and write
|
||
19BCC8C4000
|
heap
|
page read and write
|
||
19D0C204000
|
trusted library allocation
|
page read and write
|
||
1E095D19000
|
unclassified section
|
page readonly
|
||
4C1800F9C000
|
trusted library allocation
|
page read and write
|
||
619000260000
|
trusted library allocation
|
page read and write
|
||
4C64036BC000
|
trusted library allocation
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
B62B1FE000
|
stack
|
page read and write
|
||
A7400263000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C1801558000
|
trusted library allocation
|
page read and write
|
||
7858000EA000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
19D05180000
|
heap
|
page read and write
|
||
2D8400234000
|
direct allocation
|
page read and write
|
||
6D7C00274000
|
trusted library allocation
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
2079BA02000
|
heap
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
19D09E40000
|
unkown
|
page readonly
|
||
6D7C002A4000
|
trusted library allocation
|
page read and write
|
||
199C000C0000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
2840DFE000
|
unkown
|
page readonly
|
||
4C0800250000
|
direct allocation
|
page read and write
|
||
4C640321C000
|
trusted library allocation
|
page read and write
|
||
4C18015F7000
|
trusted library allocation
|
page read and write
|
||
6D7C00248000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
199C000A8000
|
trusted library allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
19D05167000
|
heap
|
page read and write
|
||
619000801000
|
trusted library allocation
|
page read and write
|
||
4C64031E0000
|
trusted library allocation
|
page read and write
|
||
4C1801644000
|
trusted library allocation
|
page read and write
|
||
4C1801668000
|
trusted library allocation
|
page read and write
|
||
A74000E3000
|
trusted library allocation
|
page read and write
|
||
1E095EF0000
|
unclassified section
|
page readonly
|
||
366001C2000
|
trusted library allocation
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
19D0505D000
|
heap
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
B6261FE000
|
stack
|
page read and write
|
||
19BCCA98000
|
direct allocation
|
page read and write
|
||
19D0516C000
|
heap
|
page read and write
|
||
4C640233C000
|
trusted library allocation
|
page read and write
|
||
4C6402B58000
|
trusted library allocation
|
page read and write
|
||
1E7F1A00000
|
heap
|
page read and write
|
||
4C1800894000
|
trusted library allocation
|
page read and write
|
||
19D0516D000
|
heap
|
page read and write
|
||
4C1801574000
|
trusted library allocation
|
page read and write
|
||
4C08002AC000
|
direct allocation
|
page read and write
|
||
4C1801240000
|
trusted library allocation
|
page read and write
|
||
4C18014A4000
|
trusted library allocation
|
page read and write
|
||
19D0B95A000
|
heap
|
page read and write
|
||
B6251FE000
|
stack
|
page read and write
|
||
1A3C0023C000
|
trusted library allocation
|
page read and write
|
||
36600482000
|
trusted library allocation
|
page read and write
|
||
A74002DC000
|
trusted library allocation
|
page read and write
|
||
4C1801578000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
268C002B8000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
78580018C000
|
trusted library allocation
|
page read and write
|
||
36600582000
|
trusted library allocation
|
page read and write
|
||
19BF3950000
|
direct allocation
|
page execute read
|
||
4C1800C5C000
|
trusted library allocation
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
2354002B8000
|
trusted library allocation
|
page read and write
|
||
4C18015EA000
|
trusted library allocation
|
page read and write
|
||
619000314000
|
trusted library allocation
|
page read and write
|
||
2ADB5FE000
|
unkown
|
page readonly
|
||
6D7C00264000
|
trusted library allocation
|
page read and write
|
||
4C080020C000
|
direct allocation
|
page read and write
|
||
5E48002A4000
|
trusted library allocation
|
page read and write
|
||
1E095C83000
|
unclassified section
|
page readonly
|
||
3F97FFE000
|
stack
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
36600642000
|
trusted library allocation
|
page read and write
|
||
2354002A0000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
4C1801014000
|
trusted library allocation
|
page read and write
|
||
619000408000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
19BF3701000
|
direct allocation
|
page read and write
|
||
4C6402368000
|
trusted library allocation
|
page read and write
|
||
12DFDFB000
|
stack
|
page read and write
|
||
19BCCAB3000
|
direct allocation
|
page read and write
|
||
36600402000
|
trusted library allocation
|
page read and write
|
||
4C640221C000
|
trusted library allocation
|
page read and write
|
||
1E7C396B000
|
unclassified section
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
6D7C00358000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
C000A70000
|
direct allocation
|
page read and write
|
||
19D05157000
|
heap
|
page read and write
|
||
706B7FF000
|
stack
|
page read and write
|
||
A7400150000
|
trusted library allocation
|
page read and write
|
||
4C1800320000
|
trusted library allocation
|
page read and write
|
||
366000C2000
|
trusted library allocation
|
page read and write
|
||
19BCC7E0000
|
direct allocation
|
page read and write
|
||
4C640361C000
|
trusted library allocation
|
page read and write
|
||
A7400170000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
4C0800329000
|
direct allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
639400260000
|
trusted library allocation
|
page read and write
|
||
C000CB0000
|
direct allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
707C002D0000
|
direct allocation
|
page read and write
|
||
5FF00028C000
|
trusted library allocation
|
page read and write
|
||
5FF00031C000
|
trusted library allocation
|
page read and write
|
||
4C1801558000
|
trusted library allocation
|
page read and write
|
||
4C6403198000
|
trusted library allocation
|
page read and write
|
||
1E095FF1000
|
unclassified section
|
page readonly
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
19D050DF000
|
heap
|
page read and write
|
||
19BF3519000
|
direct allocation
|
page read and write
|
||
19BF3703000
|
direct allocation
|
page read and write
|
||
4C18011D2000
|
trusted library allocation
|
page read and write
|
||
4C0800314000
|
direct allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C18016D0000
|
trusted library allocation
|
page read and write
|
||
4C1801626000
|
trusted library allocation
|
page read and write
|
||
619000308000
|
trusted library allocation
|
page read and write
|
||
1E095C53000
|
unclassified section
|
page readonly
|
||
619000A0C000
|
trusted library allocation
|
page read and write
|
||
4C6402F54000
|
trusted library allocation
|
page read and write
|
||
4C1801678000
|
trusted library allocation
|
page read and write
|
||
36600D02000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
4C1800AF4000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
1A3C0020C000
|
trusted library allocation
|
page read and write
|
||
4C1801770000
|
trusted library allocation
|
page read and write
|
||
4C6402CDC000
|
trusted library allocation
|
page read and write
|
||
4C1800DA0000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
5A68002AC000
|
direct allocation
|
page read and write
|
||
40002A4000
|
trusted library allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
1C76D279000
|
heap
|
page read and write
|
||
631C0029C000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
4C08002E8000
|
direct allocation
|
page read and write
|
||
C000418000
|
direct allocation
|
page read and write
|
||
28425FE000
|
stack
|
page read and write
|
||
36600314000
|
trusted library allocation
|
page read and write
|
||
4C180077C000
|
trusted library allocation
|
page read and write
|
||
3F96FFE000
|
stack
|
page read and write
|
||
619000314000
|
trusted library allocation
|
page read and write
|
||
2846DFE000
|
unkown
|
page readonly
|
||
4C1801520000
|
trusted library allocation
|
page read and write
|
||
4C1800E98000
|
trusted library allocation
|
page read and write
|
||
61900094C000
|
trusted library allocation
|
page read and write
|
||
36600182000
|
trusted library allocation
|
page read and write
|
||
1E7C3C20000
|
unclassified section
|
page read and write
|
||
4C180164D000
|
trusted library allocation
|
page read and write
|
||
1E7F1A09000
|
heap
|
page read and write
|
||
619000398000
|
trusted library allocation
|
page read and write
|
||
4C6402454000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
C000CBC000
|
direct allocation
|
page read and write
|
||
4C64023D4000
|
trusted library allocation
|
page read and write
|
||
5E48002F0000
|
trusted library allocation
|
page read and write
|
||
6D7C00356000
|
trusted library allocation
|
page read and write
|
||
4C180060C000
|
trusted library allocation
|
page read and write
|
||
12D9506000
|
stack
|
page read and write
|
||
619000708000
|
trusted library allocation
|
page read and write
|
||
1E096060000
|
unclassified section
|
page readonly
|
||
C000CAA000
|
direct allocation
|
page read and write
|
||
706ADFE000
|
stack
|
page read and write
|
||
283BDFE000
|
unkown
|
page readonly
|
||
36600D02000
|
trusted library allocation
|
page read and write
|
||
408400104000
|
trusted library allocation
|
page read and write
|
||
19D05167000
|
heap
|
page read and write
|
||
408400140000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
5E4800210000
|
trusted library allocation
|
page read and write
|
||
4C18010B0000
|
trusted library allocation
|
page read and write
|
||
4C18010B0000
|
trusted library allocation
|
page read and write
|
||
7FF6EB001000
|
unkown
|
page execute read
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
37D4002DC000
|
direct allocation
|
page read and write
|
||
C000582000
|
direct allocation
|
page read and write
|
||
1E2000220000
|
trusted library allocation
|
page read and write
|
||
4C6402420000
|
trusted library allocation
|
page read and write
|
||
1E095F39000
|
unclassified section
|
page readonly
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
4C18007B0000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
282D5FA000
|
stack
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
4C18007B0000
|
trusted library allocation
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
19D06E13000
|
heap
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
1E7C3A43000
|
unclassified section
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
235400284000
|
trusted library allocation
|
page read and write
|
||
619000220000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
4C1801572000
|
trusted library allocation
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
320800298000
|
trusted library allocation
|
page read and write
|
||
4C1801728000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
1E7C3C2D000
|
unclassified section
|
page read and write
|
||
4C64022D4000
|
trusted library allocation
|
page read and write
|
||
1C76D2C5000
|
heap
|
page read and write
|
||
1E095F33000
|
unclassified section
|
page readonly
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
4C64031D4000
|
trusted library allocation
|
page read and write
|
||
C00055D000
|
direct allocation
|
page read and write
|
||
619000E0C000
|
trusted library allocation
|
page read and write
|
||
19D04FA0000
|
trusted library section
|
page readonly
|
||
19D0B980000
|
heap
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
320800240000
|
trusted library allocation
|
page read and write
|
||
19BF3870000
|
direct allocation
|
page execute read
|
||
62FFFE000
|
stack
|
page read and write
|
||
19D05102000
|
heap
|
page read and write
|
||
6D7C002A4000
|
trusted library allocation
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
4C180106C000
|
trusted library allocation
|
page read and write
|
||
6190006D0000
|
trusted library allocation
|
page read and write
|
||
4C180148C000
|
trusted library allocation
|
page read and write
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
7858002A0000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
1C76D170000
|
trusted library allocation
|
page read and write
|
||
3660047F000
|
trusted library allocation
|
page read and write
|
||
A74002EC000
|
trusted library allocation
|
page read and write
|
||
4C640378C000
|
trusted library allocation
|
page read and write
|
||
4C1800EB4000
|
trusted library allocation
|
page read and write
|
||
1C4B401C000
|
heap
|
page read and write
|
||
4C1800ED4000
|
trusted library allocation
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
4C1800EC4000
|
trusted library allocation
|
page read and write
|
||
B62C1FE000
|
stack
|
page read and write
|
||
4C6402C50000
|
trusted library allocation
|
page read and write
|
||
1E7F1902000
|
heap
|
page read and write
|
||
4C1800788000
|
trusted library allocation
|
page read and write
|
||
7858002A0000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
C000E8C000
|
direct allocation
|
page read and write
|
||
4C08002B0000
|
direct allocation
|
page read and write
|
||
4C6400201000
|
trusted library allocation
|
page read and write
|
||
3660085B000
|
trusted library allocation
|
page read and write
|
||
1E7C33A3000
|
unclassified section
|
page read and write
|
||
19BCCADD000
|
direct allocation
|
page read and write
|
||
4000220000
|
trusted library allocation
|
page read and write
|
||
1E7F1A25000
|
heap
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
36600102000
|
trusted library allocation
|
page read and write
|
||
19BF371D000
|
direct allocation
|
page read and write
|
||
4C1801424000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
4C180155F000
|
trusted library allocation
|
page read and write
|
||
36600CC2000
|
trusted library allocation
|
page read and write
|
||
4C6402F84000
|
trusted library allocation
|
page read and write
|
||
19BF37C0000
|
direct allocation
|
page execute read
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
6D7C00254000
|
trusted library allocation
|
page read and write
|
||
4C18011BC000
|
trusted library allocation
|
page read and write
|
||
4C1801496000
|
trusted library allocation
|
page read and write
|
||
4C64030E0000
|
trusted library allocation
|
page read and write
|
||
C000503000
|
direct allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
4C1800674000
|
trusted library allocation
|
page read and write
|
||
19BF3B42000
|
heap
|
page read and write
|
||
C0003E0000
|
direct allocation
|
page read and write
|
||
19D0512E000
|
heap
|
page read and write
|
||
283C5FD000
|
stack
|
page read and write
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
4C1800FF4000
|
trusted library allocation
|
page read and write
|
||
3F917FE000
|
unkown
|
page readonly
|
||
1E095EA0000
|
unclassified section
|
page readonly
|
||
6D7C00310000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
32080023C000
|
trusted library allocation
|
page read and write
|
||
4000348000
|
trusted library allocation
|
page read and write
|
||
C000E88000
|
direct allocation
|
page read and write
|
||
1A3C002CC000
|
trusted library allocation
|
page read and write
|
||
B6291FE000
|
stack
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
1A3C0026C000
|
trusted library allocation
|
page read and write
|
||
19D0A310000
|
trusted library section
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
1E7F1650000
|
unclassified section
|
page readonly
|
||
7858002A0000
|
trusted library allocation
|
page read and write
|
||
1E7C3277000
|
unclassified section
|
page read and write
|
||
4C1800CDC000
|
trusted library allocation
|
page read and write
|
||
4C6402F9C000
|
trusted library allocation
|
page read and write
|
||
4C64031A8000
|
trusted library allocation
|
page read and write
|
||
4084000FD000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
A740019C000
|
trusted library allocation
|
page read and write
|
||
1E095FFB000
|
unclassified section
|
page readonly
|
||
C0008F0000
|
direct allocation
|
page read and write
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
4000370000
|
trusted library allocation
|
page read and write
|
||
1E095C17000
|
unclassified section
|
page read and write
|
||
4C6402CF0000
|
trusted library allocation
|
page read and write
|
||
7FF6EA601000
|
unkown
|
page execute read
|
||
4C180155D000
|
trusted library allocation
|
page read and write
|
||
C000569000
|
direct allocation
|
page read and write
|
||
4C08002E8000
|
direct allocation
|
page read and write
|
||
4C64031BC000
|
trusted library allocation
|
page read and write
|
||
4C1801618000
|
trusted library allocation
|
page read and write
|
||
CAC002B4000
|
direct allocation
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
619000EB4000
|
trusted library allocation
|
page read and write
|
||
1B6800201000
|
trusted library allocation
|
page read and write
|
||
1C76D2A0000
|
heap
|
page read and write
|
||
2079B900000
|
heap
|
page read and write
|
||
4C6402E7D000
|
trusted library allocation
|
page read and write
|
||
4C180074C000
|
trusted library allocation
|
page read and write
|
||
639400250000
|
trusted library allocation
|
page read and write
|
||
4C1800CDC000
|
trusted library allocation
|
page read and write
|
||
4C6402C50000
|
trusted library allocation
|
page read and write
|
||
4C180105A000
|
trusted library allocation
|
page read and write
|
||
4C1801548000
|
trusted library allocation
|
page read and write
|
||
1E7F1640000
|
heap
|
page read and write
|
||
4C1800ACC000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
4C18012D8000
|
trusted library allocation
|
page read and write
|
||
1E200026C000
|
trusted library allocation
|
page read and write
|
||
C000507000
|
direct allocation
|
page read and write
|
||
12DCDFE000
|
stack
|
page read and write
|
||
4C180154B000
|
trusted library allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
4C180151E000
|
trusted library allocation
|
page read and write
|
||
19BF3760000
|
direct allocation
|
page execute read
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
199C0000C000
|
trusted library allocation
|
page read and write
|
||
4C1800AF8000
|
trusted library allocation
|
page read and write
|
||
4C1800EF4000
|
trusted library allocation
|
page read and write
|
||
1C76D2B8000
|
heap
|
page read and write
|
||
707C00250000
|
direct allocation
|
page read and write
|
||
4C1801052000
|
trusted library allocation
|
page read and write
|
||
1E095CAB000
|
unclassified section
|
page readonly
|
||
19BF3850000
|
direct allocation
|
page execute read
|
||
1E7F15B0000
|
heap
|
page read and write
|
||
2D8400230000
|
direct allocation
|
page read and write
|
||
4C1800E9C000
|
trusted library allocation
|
page read and write
|
||
19D050F4000
|
heap
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
619000254000
|
trusted library allocation
|
page read and write
|
||
61900032F000
|
trusted library allocation
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
4000418000
|
trusted library allocation
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
4C64035F0000
|
trusted library allocation
|
page read and write
|
||
4C18014F0000
|
trusted library allocation
|
page read and write
|
||
785800134000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
2079BB02000
|
heap
|
page read and write
|
||
4C0800254000
|
direct allocation
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
3DD4002A8000
|
trusted library allocation
|
page read and write
|
||
785800144000
|
trusted library allocation
|
page read and write
|
||
4C64031A8000
|
trusted library allocation
|
page read and write
|
||
C000CC2000
|
direct allocation
|
page read and write
|
||
2079B9B0000
|
unclassified section
|
page readonly
|
||
1E20002C4000
|
trusted library allocation
|
page read and write
|
||
4C1800ACC000
|
trusted library allocation
|
page read and write
|
||
2079B976000
|
remote allocation
|
page execute read
|
||
4C6402B00000
|
trusted library allocation
|
page read and write
|
||
4C1800E0C000
|
trusted library allocation
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C080030C000
|
direct allocation
|
page read and write
|
||
4C1800AFA000
|
trusted library allocation
|
page read and write
|
||
4C1800A54000
|
trusted library allocation
|
page read and write
|
||
4C640362C000
|
trusted library allocation
|
page read and write
|
||
4C6402FDC000
|
trusted library allocation
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
2D84002B0000
|
direct allocation
|
page read and write
|
||
1E20002C4000
|
trusted library allocation
|
page read and write
|
||
4C1800B00000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C08002E8000
|
direct allocation
|
page read and write
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
4C1800AEA000
|
trusted library allocation
|
page read and write
|
||
1C76FE70000
|
heap
|
page read and write
|
||
B62D1FE000
|
stack
|
page read and write
|
||
1E095D13000
|
unclassified section
|
page readonly
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
19D0B962000
|
heap
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
366006C2000
|
trusted library allocation
|
page read and write
|
||
620FFE000
|
stack
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
7858001A2000
|
trusted library allocation
|
page read and write
|
||
4C6400B92000
|
trusted library allocation
|
page read and write
|
||
639400284000
|
trusted library allocation
|
page read and write
|
||
1E7C3BF7000
|
unclassified section
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
268C00274000
|
trusted library allocation
|
page read and write
|
||
5A680027C000
|
direct allocation
|
page read and write
|
||
4C0800234000
|
direct allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
619000E8C000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
19BF369B000
|
direct allocation
|
page read and write
|
||
4000334000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
4C1800884000
|
trusted library allocation
|
page read and write
|
||
4C18009E9000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
2A3800238000
|
direct allocation
|
page read and write
|
||
C00091C000
|
direct allocation
|
page read and write
|
||
268C002A8000
|
trusted library allocation
|
page read and write
|
||
4C1800730000
|
trusted library allocation
|
page read and write
|
||
4C1800EE2000
|
trusted library allocation
|
page read and write
|
||
1A3C002DC000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
4C1800E98000
|
trusted library allocation
|
page read and write
|
||
4C6400162000
|
trusted library allocation
|
page read and write
|
||
284CDFE000
|
unkown
|
page readonly
|
||
19BF3A62000
|
direct allocation
|
page read and write
|
||
1A3C00280000
|
trusted library allocation
|
page read and write
|
||
1A3C00220000
|
trusted library allocation
|
page read and write
|
||
4C180074C000
|
trusted library allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
1C76D286000
|
heap
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C1801064000
|
trusted library allocation
|
page read and write
|
||
C0009E2000
|
direct allocation
|
page read and write
|
||
707C002A4000
|
direct allocation
|
page read and write
|
||
1E7C3BA0000
|
unclassified section
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
19D05000000
|
heap
|
page read and write
|
||
5E48002B8000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
785800298000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
36600182000
|
trusted library allocation
|
page read and write
|
||
1E090530000
|
heap
|
page read and write
|
||
4C6403001000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
366006C2000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
4C1801618000
|
trusted library allocation
|
page read and write
|
||
1E093481000
|
heap
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
CAC00274000
|
direct allocation
|
page read and write
|
||
5FF000304000
|
trusted library allocation
|
page read and write
|
||
199C00050000
|
trusted library allocation
|
page read and write
|
||
4C6402ECC000
|
trusted library allocation
|
page read and write
|
||
19BF3A58000
|
direct allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
623FFE000
|
stack
|
page read and write
|
||
19D0500C000
|
heap
|
page read and write
|
||
19D05171000
|
heap
|
page read and write
|
||
785800134000
|
trusted library allocation
|
page read and write
|
||
400023C000
|
trusted library allocation
|
page read and write
|
||
B6269FE000
|
unkown
|
page readonly
|
||
78580023C000
|
trusted library allocation
|
page read and write
|
||
1A3C002B8000
|
trusted library allocation
|
page read and write
|
||
19BCC8BD000
|
heap
|
page read and write
|
||
4C180105A000
|
trusted library allocation
|
page read and write
|
||
2D8400264000
|
direct allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
4C6402B7C000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
4C1801067000
|
trusted library allocation
|
page read and write
|
||
4C180142A000
|
trusted library allocation
|
page read and write
|
||
12DADF6000
|
stack
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
1E7C3381000
|
unclassified section
|
page read and write
|
||
282C5FB000
|
stack
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
1E095F20000
|
unclassified section
|
page readonly
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
4C6403661000
|
trusted library allocation
|
page read and write
|
||
1C76D286000
|
heap
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
282EDFE000
|
unkown
|
page readonly
|
||
19D04E30000
|
heap
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
2837DFE000
|
unkown
|
page readonly
|
||
4C64034FC000
|
trusted library allocation
|
page read and write
|
||
C000E4E000
|
direct allocation
|
page read and write
|
||
4C18014E4000
|
trusted library allocation
|
page read and write
|
||
1E7C3C15000
|
unclassified section
|
page read and write
|
||
36600CC2000
|
trusted library allocation
|
page read and write
|
||
4C180102C000
|
trusted library allocation
|
page read and write
|
||
1E090550000
|
unclassified section
|
page readonly
|
||
19BF3BC0000
|
direct allocation
|
page read and write
|
||
12DD5F9000
|
stack
|
page read and write
|
||
4C6402AD8000
|
trusted library allocation
|
page read and write
|
||
3DD400258000
|
trusted library allocation
|
page read and write
|
||
4C1800290000
|
trusted library allocation
|
page read and write
|
||
2D8400274000
|
direct allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
4C1800FE2000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
19BF3800000
|
direct allocation
|
page execute read
|
||
4C1800A40000
|
trusted library allocation
|
page read and write
|
||
1A3C002B8000
|
trusted library allocation
|
page read and write
|
||
C000390000
|
direct allocation
|
page read and write
|
||
1E200029C000
|
trusted library allocation
|
page read and write
|
||
6D7C00284000
|
trusted library allocation
|
page read and write
|
||
3F937FE000
|
unkown
|
page readonly
|
||
2843DFE000
|
unkown
|
page readonly
|
||
19D05171000
|
heap
|
page read and write
|
||
1E7C397F000
|
unclassified section
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
4C6402260000
|
trusted library allocation
|
page read and write
|
||
3F977FE000
|
unkown
|
page readonly
|
||
3F927FE000
|
unkown
|
page readonly
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
4C640376C000
|
trusted library allocation
|
page read and write
|
||
19D0A540000
|
unkown
|
page readonly
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
A7400038000
|
trusted library allocation
|
page read and write
|
||
19D05167000
|
heap
|
page read and write
|
||
19BCCAB8000
|
direct allocation
|
page read and write
|
||
78580040C000
|
trusted library allocation
|
page read and write
|
||
4C18009F8000
|
trusted library allocation
|
page read and write
|
||
19BF3820000
|
direct allocation
|
page execute read
|
||
4C6402F78000
|
trusted library allocation
|
page read and write
|
||
2849DFE000
|
unkown
|
page readonly
|
||
4C6402EA4000
|
trusted library allocation
|
page read and write
|
||
619000E01000
|
trusted library allocation
|
page read and write
|
||
A7400170000
|
trusted library allocation
|
page read and write
|
||
4C18009E8000
|
trusted library allocation
|
page read and write
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
619000368000
|
trusted library allocation
|
page read and write
|
||
4C1800A13000
|
trusted library allocation
|
page read and write
|
||
4C1801228000
|
trusted library allocation
|
page read and write
|
||
19D0516D000
|
heap
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
4C180078C000
|
trusted library allocation
|
page read and write
|
||
366003C2000
|
trusted library allocation
|
page read and write
|
||
61900060C000
|
trusted library allocation
|
page read and write
|
||
4C1800318000
|
trusted library allocation
|
page read and write
|
||
19BF368B000
|
direct allocation
|
page read and write
|
||
4C1800624000
|
trusted library allocation
|
page read and write
|
||
4C18012DC000
|
trusted library allocation
|
page read and write
|
||
4C1801651000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
C000904000
|
direct allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
2838DFE000
|
unkown
|
page readonly
|
||
4000364000
|
trusted library allocation
|
page read and write
|
||
4C1800AEC000
|
trusted library allocation
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
1B5F7FE000
|
unkown
|
page readonly
|
||
6D7C002F0000
|
trusted library allocation
|
page read and write
|
||
19BF3960000
|
direct allocation
|
page execute read
|
||
1E095C8F000
|
unclassified section
|
page readonly
|
||
19D0516C000
|
heap
|
page read and write
|
||
A7400114000
|
trusted library allocation
|
page read and write
|
||
4C18015F7000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
1E090613000
|
heap
|
page read and write
|
||
619000264000
|
trusted library allocation
|
page read and write
|
||
320800201000
|
trusted library allocation
|
page read and write
|
||
78580020C000
|
trusted library allocation
|
page read and write
|
||
5E4800278000
|
trusted library allocation
|
page read and write
|
||
4C6402FDC000
|
trusted library allocation
|
page read and write
|
||
19BF3BE2000
|
direct allocation
|
page read and write
|
||
19D07BC0000
|
unkown
|
page read and write
|
||
1E090B02000
|
heap
|
page read and write
|
||
19D06F02000
|
heap
|
page read and write
|
||
4C640249C000
|
trusted library allocation
|
page read and write
|
||
1E09062B000
|
heap
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
A7400098000
|
trusted library allocation
|
page read and write
|
||
C00053E000
|
direct allocation
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
4C1800F4C000
|
trusted library allocation
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
4C64026B4000
|
trusted library allocation
|
page read and write
|
||
36600682000
|
trusted library allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
282A5FE000
|
stack
|
page read and write
|
||
19D0516D000
|
heap
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
36600402000
|
trusted library allocation
|
page read and write
|
||
2079BDF7000
|
unclassified section
|
page read and write
|
||
4C1800E93000
|
trusted library allocation
|
page read and write
|
||
1E20002AC000
|
trusted library allocation
|
page read and write
|
||
28465FE000
|
stack
|
page read and write
|
||
28325FC000
|
stack
|
page read and write
|
||
707C00201000
|
direct allocation
|
page read and write
|
||
1E095D65000
|
unclassified section
|
page readonly
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C0800230000
|
direct allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
5A68002D4000
|
direct allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
631C00210000
|
trusted library allocation
|
page read and write
|
||
4C1800318000
|
trusted library allocation
|
page read and write
|
||
7FF6EE2F7000
|
unkown
|
page write copy
|
||
5FF0002DC000
|
trusted library allocation
|
page read and write
|
||
283A5FC000
|
stack
|
page read and write
|
||
4C18008A4000
|
trusted library allocation
|
page read and write
|
||
2848DFE000
|
unkown
|
page readonly
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C18009BC000
|
trusted library allocation
|
page read and write
|
||
5A680029C000
|
direct allocation
|
page read and write
|
||
4C64030A4000
|
trusted library allocation
|
page read and write
|
||
1B617FE000
|
unkown
|
page readonly
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
639400254000
|
trusted library allocation
|
page read and write
|
||
4C6402328000
|
trusted library allocation
|
page read and write
|
||
4C18006AC000
|
trusted library allocation
|
page read and write
|
||
1E095F60000
|
unclassified section
|
page readonly
|
||
1E0934C8000
|
heap
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
1E7F1625000
|
remote allocation
|
page execute read
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
7858000B0000
|
trusted library allocation
|
page read and write
|
||
5FF000294000
|
trusted library allocation
|
page read and write
|
||
4C1800EB8000
|
trusted library allocation
|
page read and write
|
||
631C00284000
|
trusted library allocation
|
page read and write
|
||
4C1800418000
|
trusted library allocation
|
page read and write
|
||
28415FC000
|
stack
|
page read and write
|
||
2825DFE000
|
unkown
|
page readonly
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
4C640364C000
|
trusted library allocation
|
page read and write
|
||
28375FC000
|
stack
|
page read and write
|
||
631C00270000
|
trusted library allocation
|
page read and write
|
||
4C1800EB0000
|
trusted library allocation
|
page read and write
|
||
4C18006A0000
|
trusted library allocation
|
page read and write
|
||
627FFB000
|
stack
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
4C64036A0000
|
trusted library allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
4C1801498000
|
trusted library allocation
|
page read and write
|
||
4C18014C1000
|
trusted library allocation
|
page read and write
|
||
4C1800FCC000
|
trusted library allocation
|
page read and write
|
||
C000E49000
|
direct allocation
|
page read and write
|
||
A74001B0000
|
trusted library allocation
|
page read and write
|
||
1C76D2A4000
|
heap
|
page read and write
|
||
1C76D279000
|
heap
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
268C002A8000
|
trusted library allocation
|
page read and write
|
||
19BCCA8D000
|
direct allocation
|
page read and write
|
||
4C18016D0000
|
trusted library allocation
|
page read and write
|
||
7858003E0000
|
trusted library allocation
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C1800894000
|
trusted library allocation
|
page read and write
|
||
4C1800F4C000
|
trusted library allocation
|
page read and write
|
||
4C1800DD8000
|
trusted library allocation
|
page read and write
|
||
19BF3A7B000
|
direct allocation
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
1B6800274000
|
trusted library allocation
|
page read and write
|
||
408400054000
|
trusted library allocation
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
36600477000
|
trusted library allocation
|
page read and write
|
||
4C180061C000
|
trusted library allocation
|
page read and write
|
||
4C1801562000
|
trusted library allocation
|
page read and write
|
||
199C000B8000
|
trusted library allocation
|
page read and write
|
||
1B6800254000
|
trusted library allocation
|
page read and write
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
19BF3517000
|
direct allocation
|
page read and write
|
||
4C180173C000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C1801064000
|
trusted library allocation
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
199C0005C000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
5E4800334000
|
trusted library allocation
|
page read and write
|
||
408400100000
|
trusted library allocation
|
page read and write
|
||
1E09605A000
|
unclassified section
|
page readonly
|
||
5E48002F8000
|
trusted library allocation
|
page read and write
|
||
4C1800EAC000
|
trusted library allocation
|
page read and write
|
||
2845DFE000
|
unkown
|
page readonly
|
||
6D7C00334000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
19BCC88E000
|
heap
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
37D400288000
|
direct allocation
|
page read and write
|
||
2832DFE000
|
unkown
|
page readonly
|
||
19D0B964000
|
heap
|
page read and write
|
||
3F9CFFE000
|
stack
|
page read and write
|
||
C000505000
|
direct allocation
|
page read and write
|
||
28485FE000
|
stack
|
page read and write
|
||
2841DFE000
|
unkown
|
page readonly
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
235400258000
|
trusted library allocation
|
page read and write
|
||
4C640366C000
|
trusted library allocation
|
page read and write
|
||
2ADA5FE000
|
unkown
|
page readonly
|
||
3DD400284000
|
trusted library allocation
|
page read and write
|
||
4C6402C0C000
|
trusted library allocation
|
page read and write
|
||
3660047F000
|
trusted library allocation
|
page read and write
|
||
4C18016E4000
|
trusted library allocation
|
page read and write
|
||
1C76FC02000
|
heap
|
page read and write
|
||
1C76D28B000
|
heap
|
page read and write
|
||
C000C3E000
|
direct allocation
|
page read and write
|
||
1E095C29000
|
unclassified section
|
page readonly
|
||
1E7C3BCF000
|
unclassified section
|
page read and write
|
||
631C0029C000
|
trusted library allocation
|
page read and write
|
||
4C0800212000
|
direct allocation
|
page read and write
|
||
5E480031C000
|
trusted library allocation
|
page read and write
|
||
235400238000
|
trusted library allocation
|
page read and write
|
||
7FF6F0487000
|
unkown
|
page readonly
|
||
1C76D279000
|
heap
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
4C1800F53000
|
trusted library allocation
|
page read and write
|
||
19BCC790000
|
heap
|
page read and write
|
||
4C18006AC000
|
trusted library allocation
|
page read and write
|
||
4C1800FE2000
|
trusted library allocation
|
page read and write
|
||
4084000D8000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
706AFFF000
|
stack
|
page read and write
|
||
4C1800F94000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C1801044000
|
trusted library allocation
|
page read and write
|
||
4C180156C000
|
trusted library allocation
|
page read and write
|
||
4C18010BC000
|
trusted library allocation
|
page read and write
|
||
1E7C3A38000
|
unclassified section
|
page read and write
|
||
4C18003E8000
|
trusted library allocation
|
page read and write
|
||
4C18010BC000
|
trusted library allocation
|
page read and write
|
||
4C640328C000
|
trusted library allocation
|
page read and write
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
37D400298000
|
direct allocation
|
page read and write
|
||
A7400268000
|
trusted library allocation
|
page read and write
|
||
3F957FE000
|
unkown
|
page readonly
|
||
4C64036B0000
|
trusted library allocation
|
page read and write
|
||
408400058000
|
trusted library allocation
|
page read and write
|
||
1A3C00270000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
4C6402BAC000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
6D7C00418000
|
trusted library allocation
|
page read and write
|
||
4C1800EB7000
|
trusted library allocation
|
page read and write
|
||
282BDFE000
|
unkown
|
page readonly
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
4C1800F44000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
5FF0002AC000
|
trusted library allocation
|
page read and write
|
||
4C6403724000
|
trusted library allocation
|
page read and write
|
||
4C18009E7000
|
trusted library allocation
|
page read and write
|
||
4C64022F0000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
631C0031C000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
1D7A207C000
|
heap
|
page read and write
|
||
1E7C3303000
|
unclassified section
|
page read and write
|
||
282B5F9000
|
stack
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
37D4002BC000
|
direct allocation
|
page read and write
|
||
19BF38D0000
|
direct allocation
|
page execute read
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
6190006F8000
|
trusted library allocation
|
page read and write
|
||
4C0800274000
|
direct allocation
|
page read and write
|
||
4C6402488000
|
trusted library allocation
|
page read and write
|
||
631C00240000
|
trusted library allocation
|
page read and write
|
||
19D050E1000
|
heap
|
page read and write
|
||
4C1800730000
|
trusted library allocation
|
page read and write
|
||
4C180074C000
|
trusted library allocation
|
page read and write
|
||
4C640372C000
|
trusted library allocation
|
page read and write
|
||
4C1800A54000
|
trusted library allocation
|
page read and write
|
||
36600D02000
|
trusted library allocation
|
page read and write
|
||
4C6402EE8000
|
trusted library allocation
|
page read and write
|
||
1E7F15A0000
|
unclassified section
|
page readonly
|
||
7FF6EDFF7000
|
unkown
|
page readonly
|
||
28285FE000
|
stack
|
page read and write
|
||
4C64031D8000
|
trusted library allocation
|
page read and write
|
||
785800198000
|
trusted library allocation
|
page read and write
|
||
36600D42000
|
trusted library allocation
|
page read and write
|
||
2830DFE000
|
unkown
|
page readonly
|
||
4C0800217000
|
direct allocation
|
page read and write
|
||
268C002B4000
|
trusted library allocation
|
page read and write
|
||
6D7C00220000
|
trusted library allocation
|
page read and write
|
||
1B6800258000
|
trusted library allocation
|
page read and write
|
||
4C1800FC4000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
400040C000
|
trusted library allocation
|
page read and write
|
||
A74000DD000
|
trusted library allocation
|
page read and write
|
||
619000320000
|
trusted library allocation
|
page read and write
|
||
C0005BA000
|
direct allocation
|
page read and write
|
||
1E095D29000
|
unclassified section
|
page readonly
|
||
1E095DE4000
|
unclassified section
|
page readonly
|
||
408400044000
|
trusted library allocation
|
page read and write
|
||
4C1800F94000
|
trusted library allocation
|
page read and write
|
||
4C180078C000
|
trusted library allocation
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
408400110000
|
trusted library allocation
|
page read and write
|
||
4C1800E97000
|
trusted library allocation
|
page read and write
|
||
4C18012DC000
|
trusted library allocation
|
page read and write
|
||
36600602000
|
trusted library allocation
|
page read and write
|
||
A7400260000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
CAC00294000
|
direct allocation
|
page read and write
|
||
4C1800F54000
|
trusted library allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
4C1801698000
|
trusted library allocation
|
page read and write
|
||
4C64001BE000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4C1800F6C000
|
trusted library allocation
|
page read and write
|
||
78580012C000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
19BCC893000
|
heap
|
page read and write
|
||
235400274000
|
trusted library allocation
|
page read and write
|
||
3DD4002D4000
|
trusted library allocation
|
page read and write
|
||
40002B4000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
1E7F1A54000
|
heap
|
page read and write
|
||
408400070000
|
trusted library allocation
|
page read and write
|
||
19D0CAE0000
|
unkown
|
page readonly
|
||
78580022C000
|
trusted library allocation
|
page read and write
|
||
1E7C3310000
|
unclassified section
|
page read and write
|
||
5A6800220000
|
direct allocation
|
page read and write
|
||
4C1800614000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
36600582000
|
trusted library allocation
|
page read and write
|
||
4C18010B4000
|
trusted library allocation
|
page read and write
|
||
1E090635000
|
heap
|
page read and write
|
||
A7400260000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
A740024C000
|
trusted library allocation
|
page read and write
|
||
1E0934CE000
|
heap
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
5FF0002E8000
|
trusted library allocation
|
page read and write
|
||
2079B960000
|
remote allocation
|
page read and write
|
||
19D0512E000
|
heap
|
page read and write
|
||
5E4800404000
|
trusted library allocation
|
page read and write
|
||
400033C000
|
trusted library allocation
|
page read and write
|
||
19BF37D0000
|
direct allocation
|
page execute read
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
1C76D28B000
|
heap
|
page read and write
|
||
4C6403270000
|
trusted library allocation
|
page read and write
|
||
C00036E000
|
direct allocation
|
page read and write
|
||
19BF3980000
|
direct allocation
|
page execute read
|
||
4C180061C000
|
trusted library allocation
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
3DD400210000
|
trusted library allocation
|
page read and write
|
||
C000B18000
|
direct allocation
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
1B68002C8000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
19BF3940000
|
direct allocation
|
page execute read
|
||
1B6800220000
|
trusted library allocation
|
page read and write
|
||
19BF3A39000
|
direct allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
CAC00210000
|
direct allocation
|
page read and write
|
||
28405FE000
|
stack
|
page read and write
|
||
6D7C002D8000
|
trusted library allocation
|
page read and write
|
||
7858001C0000
|
trusted library allocation
|
page read and write
|
||
4C1801592000
|
trusted library allocation
|
page read and write
|
||
19BF3750000
|
direct allocation
|
page execute read
|
||
B6299FE000
|
unkown
|
page readonly
|
||
C000036000
|
direct allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
3DD400248000
|
trusted library allocation
|
page read and write
|
||
4C6403708000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
1E7C3BD5000
|
unclassified section
|
page read and write
|
||
4C1800A40000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C18016CB000
|
trusted library allocation
|
page read and write
|
||
4C180122C000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
268C00294000
|
trusted library allocation
|
page read and write
|
||
7FF6EA601000
|
unkown
|
page execute read
|
||
366005C2000
|
trusted library allocation
|
page read and write
|
||
706B3FF000
|
stack
|
page read and write
|
||
4C6402E90000
|
trusted library allocation
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
4C6402C70000
|
trusted library allocation
|
page read and write
|
||
19BF3880000
|
direct allocation
|
page execute read
|
||
19BF3A41000
|
direct allocation
|
page read and write
|
||
366001C2000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
4C1801052000
|
trusted library allocation
|
page read and write
|
||
37D400284000
|
direct allocation
|
page read and write
|
||
4C080031A000
|
direct allocation
|
page read and write
|
||
19BF39C0000
|
direct allocation
|
page execute read
|
||
619000698000
|
trusted library allocation
|
page read and write
|
||
19BCC894000
|
heap
|
page read and write
|
||
2AD65FE000
|
unkown
|
page readonly
|
||
619000314000
|
trusted library allocation
|
page read and write
|
||
A74002EC000
|
trusted library allocation
|
page read and write
|
||
C0005B6000
|
direct allocation
|
page read and write
|
||
4C18014D4000
|
trusted library allocation
|
page read and write
|
||
78580021C000
|
trusted library allocation
|
page read and write
|
||
4C1800B02000
|
trusted library allocation
|
page read and write
|
||
619000C8C000
|
trusted library allocation
|
page read and write
|
||
4C1801710000
|
trusted library allocation
|
page read and write
|
||
1E095DA0000
|
unclassified section
|
page readonly
|
||
1E7F1750000
|
heap
|
page readonly
|
||
284FDFE000
|
unkown
|
page readonly
|
||
19D0B962000
|
heap
|
page read and write
|
||
622FFE000
|
stack
|
page read and write
|
||
37D4002A4000
|
direct allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
19D0CA70000
|
unkown
|
page readonly
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
19BCC8CD000
|
heap
|
page read and write
|
||
19D09FB2000
|
unclassified section
|
page read and write
|
||
4C1800320000
|
trusted library allocation
|
page read and write
|
||
6227FE000
|
unkown
|
page readonly
|
||
4C6402C5C000
|
trusted library allocation
|
page read and write
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
3DD400254000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
19D07BEB000
|
unkown
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
4C1800EB4000
|
trusted library allocation
|
page read and write
|
||
619000294000
|
trusted library allocation
|
page read and write
|
||
4C18016C8000
|
trusted library allocation
|
page read and write
|
||
7858000A4000
|
trusted library allocation
|
page read and write
|
||
1E0909B7000
|
unclassified section
|
page read and write
|
||
4C0800278000
|
direct allocation
|
page read and write
|
||
1C76FBF0000
|
trusted library allocation
|
page read and write
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
36600482000
|
trusted library allocation
|
page read and write
|
||
2AD9DFD000
|
stack
|
page read and write
|
||
235400244000
|
trusted library allocation
|
page read and write
|
||
1E7C33C1000
|
unclassified section
|
page read and write
|
||
A74000D8000
|
trusted library allocation
|
page read and write
|
||
C000D88000
|
direct allocation
|
page read and write
|
||
5A6800201000
|
direct allocation
|
page read and write
|
||
3DD400230000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
1D7A202B000
|
heap
|
page read and write
|
||
4C1801064000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4C64027EC000
|
trusted library allocation
|
page read and write
|
||
4C180061C000
|
trusted library allocation
|
page read and write
|
||
2AD6DFD000
|
stack
|
page read and write
|
||
62DFFE000
|
stack
|
page read and write
|
||
199C00044000
|
trusted library allocation
|
page read and write
|
||
19D04F30000
|
heap
|
page read and write
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
C000412000
|
direct allocation
|
page read and write
|
||
2836DFE000
|
unkown
|
page readonly
|
||
366006C2000
|
trusted library allocation
|
page read and write
|
||
4C1800F54000
|
trusted library allocation
|
page read and write
|
||
4C1801064000
|
trusted library allocation
|
page read and write
|
||
1C76D286000
|
heap
|
page read and write
|
||
3660047F000
|
trusted library allocation
|
page read and write
|
||
1C76D302000
|
heap
|
page read and write
|
||
36600402000
|
trusted library allocation
|
page read and write
|
||
631C00230000
|
trusted library allocation
|
page read and write
|
||
4C6402FA8000
|
trusted library allocation
|
page read and write
|
||
4C1800F94000
|
trusted library allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
4C1800AFC000
|
trusted library allocation
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
36600382000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
4C1800408000
|
trusted library allocation
|
page read and write
|
||
4C1800EFC000
|
trusted library allocation
|
page read and write
|
||
4C18016C0000
|
trusted library allocation
|
page read and write
|
||
C0009F0000
|
direct allocation
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
2AD85FE000
|
unkown
|
page readonly
|
||
3660030E000
|
trusted library allocation
|
page read and write
|
||
4C64030C4000
|
trusted library allocation
|
page read and write
|
||
4C18012EC000
|
trusted library allocation
|
page read and write
|
||
4C18015FA000
|
trusted library allocation
|
page read and write
|
||
4C1800788000
|
trusted library allocation
|
page read and write
|
||
199C00024000
|
trusted library allocation
|
page read and write
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
1C4B5A02000
|
heap
|
page read and write
|
||
4084000C3000
|
trusted library allocation
|
page read and write
|
||
1C4B3F10000
|
heap
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
4C1800EFD000
|
trusted library allocation
|
page read and write
|
||
5FF000300000
|
trusted library allocation
|
page read and write
|
||
C000BB4000
|
direct allocation
|
page read and write
|
||
631C002E4000
|
trusted library allocation
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
631C00328000
|
trusted library allocation
|
page read and write
|
||
19D0516E000
|
heap
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
7858001A4000
|
trusted library allocation
|
page read and write
|
||
2079BA2B000
|
heap
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
6D7C002A0000
|
trusted library allocation
|
page read and write
|
||
1B6800210000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
61900094C000
|
trusted library allocation
|
page read and write
|
||
7FF6EC36F000
|
unkown
|
page write copy
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
785800090000
|
trusted library allocation
|
page read and write
|
||
1E7C3943000
|
unclassified section
|
page read and write
|
||
2079B9E2000
|
unclassified section
|
page read and write
|
||
4C1800EFC000
|
trusted library allocation
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
C000CA8000
|
direct allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
A7400260000
|
trusted library allocation
|
page read and write
|
||
1D7A2013000
|
heap
|
page read and write
|
||
36600142000
|
trusted library allocation
|
page read and write
|
||
12DA5FE000
|
stack
|
page read and write
|
||
1B607FE000
|
unkown
|
page readonly
|
||
1E7C3933000
|
unclassified section
|
page read and write
|
||
4C180178C000
|
trusted library allocation
|
page read and write
|
||
4C6402334000
|
trusted library allocation
|
page read and write
|
||
4C6402770000
|
trusted library allocation
|
page read and write
|
||
1E782BB7000
|
unclassified section
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
3F9AFFE000
|
stack
|
page read and write
|
||
619000EB0000
|
trusted library allocation
|
page read and write
|
||
4C1800F1A000
|
trusted library allocation
|
page read and write
|
||
6D7C002A0000
|
trusted library allocation
|
page read and write
|
||
4C1800DEC000
|
trusted library allocation
|
page read and write
|
||
4C08002D0000
|
direct allocation
|
page read and write
|
||
28315FC000
|
stack
|
page read and write
|
||
12DF5FE000
|
stack
|
page read and write
|
||
4C1800F94000
|
trusted library allocation
|
page read and write
|
||
A74000E9000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
19D0C604000
|
heap
|
page read and write
|
||
78580040C000
|
trusted library allocation
|
page read and write
|
||
37D400220000
|
direct allocation
|
page read and write
|
||
4C1800EE2000
|
trusted library allocation
|
page read and write
|
||
C000923000
|
direct allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C1801067000
|
trusted library allocation
|
page read and write
|
||
4C6402E44000
|
trusted library allocation
|
page read and write
|
||
4C18016C8000
|
trusted library allocation
|
page read and write
|
||
2D8400220000
|
direct allocation
|
page read and write
|
||
6217FE000
|
unkown
|
page readonly
|
||
4C1800EC4000
|
trusted library allocation
|
page read and write
|
||
366003C2000
|
trusted library allocation
|
page read and write
|
||
19D0516D000
|
heap
|
page read and write
|
||
36600542000
|
trusted library allocation
|
page read and write
|
||
706B5F6000
|
stack
|
page read and write
|
||
4C6403218000
|
trusted library allocation
|
page read and write
|
||
19BF3BF8000
|
direct allocation
|
page read and write
|
||
3DD4002B8000
|
trusted library allocation
|
page read and write
|
||
282ADFE000
|
unkown
|
page readonly
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
1E0908D0000
|
unclassified section
|
page readonly
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
1C4B4000000
|
heap
|
page read and write
|
||
C000CEA000
|
direct allocation
|
page read and write
|
||
282DDFE000
|
unkown
|
page readonly
|
||
320800238000
|
trusted library allocation
|
page read and write
|
||
6D7C00244000
|
trusted library allocation
|
page read and write
|
||
1A3C002DC000
|
trusted library allocation
|
page read and write
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
1E090570000
|
heap
|
page readonly
|
||
4C180120C000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
7858002A5000
|
trusted library allocation
|
page read and write
|
||
19D05188000
|
heap
|
page read and write
|
||
2AD75FE000
|
unkown
|
page readonly
|
||
1E831F50000
|
trusted library allocation
|
page read and write
|
||
4C1801428000
|
trusted library allocation
|
page read and write
|
||
37D400234000
|
direct allocation
|
page read and write
|
||
1D7A1E30000
|
heap
|
page read and write
|
||
4C1801258000
|
trusted library allocation
|
page read and write
|
||
1C76D2B0000
|
heap
|
page read and write
|
||
1A3C002B8000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
36600477000
|
trusted library allocation
|
page read and write
|
||
4C180078C000
|
trusted library allocation
|
page read and write
|
||
4C1800D5C000
|
trusted library allocation
|
page read and write
|
||
619000320000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
4C6402712000
|
trusted library allocation
|
page read and write
|
||
4C6402684000
|
trusted library allocation
|
page read and write
|
||
366003C2000
|
trusted library allocation
|
page read and write
|
||
4C180157A000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
4C64031EC000
|
trusted library allocation
|
page read and write
|
||
1E7F1630000
|
remote allocation
|
page read and write
|
||
C000C9C000
|
direct allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
4C1800EB4000
|
trusted library allocation
|
page read and write
|
||
785800278000
|
trusted library allocation
|
page read and write
|
||
4C1800B04000
|
trusted library allocation
|
page read and write
|
||
A74001D8000
|
trusted library allocation
|
page read and write
|
||
4C1800F74000
|
trusted library allocation
|
page read and write
|
||
19D05165000
|
heap
|
page read and write
|
||
A7400268000
|
trusted library allocation
|
page read and write
|
||
4C18015EA000
|
trusted library allocation
|
page read and write
|
||
639400280000
|
trusted library allocation
|
page read and write
|
||
4C6402B4C000
|
trusted library allocation
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
5FF0002A0000
|
trusted library allocation
|
page read and write
|
||
28295FD000
|
stack
|
page read and write
|
||
4C180032C000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
19D05175000
|
heap
|
page read and write
|
||
CAC002A4000
|
direct allocation
|
page read and write
|
||
A74000FC000
|
trusted library allocation
|
page read and write
|
||
1E7C3959000
|
unclassified section
|
page read and write
|
||
4C1800EB4000
|
trusted library allocation
|
page read and write
|
||
1D7A68B0000
|
heap
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
2D84002C4000
|
direct allocation
|
page read and write
|
||
19D05127000
|
heap
|
page read and write
|
||
4C6402BC4000
|
trusted library allocation
|
page read and write
|
||
4C6402C01000
|
trusted library allocation
|
page read and write
|
||
268C00284000
|
trusted library allocation
|
page read and write
|
||
5E4800244000
|
trusted library allocation
|
page read and write
|
||
707C002B0000
|
direct allocation
|
page read and write
|
||
32080025C000
|
trusted library allocation
|
page read and write
|
||
19BF3930000
|
direct allocation
|
page execute read
|
||
2831DFE000
|
unkown
|
page readonly
|
||
4C1800A90000
|
trusted library allocation
|
page read and write
|
||
2D8400254000
|
direct allocation
|
page read and write
|
||
6D7C00258000
|
trusted library allocation
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
19BF3BE4000
|
direct allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
C000509000
|
direct allocation
|
page read and write
|
||
4C6402460000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C1800E98000
|
trusted library allocation
|
page read and write
|
||
1D7A69D0000
|
unkown
|
page readonly
|
||
4C18016E4000
|
trusted library allocation
|
page read and write
|
||
4C18014E4000
|
trusted library allocation
|
page read and write
|
||
785800001000
|
trusted library allocation
|
page read and write
|
||
3DD400201000
|
trusted library allocation
|
page read and write
|
||
4C1801794000
|
trusted library allocation
|
page read and write
|
||
19D05166000
|
heap
|
page read and write
|
||
4C18015FA000
|
trusted library allocation
|
page read and write
|
||
1E095FE4000
|
unclassified section
|
page readonly
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
1E7C32EB000
|
unclassified section
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
4C1801648000
|
trusted library allocation
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
36600311000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
1C76D130000
|
heap
|
page readonly
|
||
19D0B802000
|
heap
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
1A3C00258000
|
trusted library allocation
|
page read and write
|
||
4C1800F7C000
|
trusted library allocation
|
page read and write
|
||
785800138000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C180105A000
|
trusted library allocation
|
page read and write
|
||
4C6402F38000
|
trusted library allocation
|
page read and write
|
||
28495FE000
|
stack
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
2D8400210000
|
direct allocation
|
page read and write
|
||
4C18007B0000
|
trusted library allocation
|
page read and write
|
||
1E095C00000
|
trusted library allocation
|
page read and write
|
||
1B6800298000
|
trusted library allocation
|
page read and write
|
||
19BF38E0000
|
direct allocation
|
page execute read
|
||
4C1800614000
|
trusted library allocation
|
page read and write
|
||
4C6402A24000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
619000EA0000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
4C6403764000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
4C1800DF0000
|
trusted library allocation
|
page read and write
|
||
4C1800F4C000
|
trusted library allocation
|
page read and write
|
||
5E4800408000
|
trusted library allocation
|
page read and write
|
||
7DF4E8DB1000
|
trusted library allocation
|
page execute read
|
||
4C18015F7000
|
trusted library allocation
|
page read and write
|
||
A7400201000
|
trusted library allocation
|
page read and write
|
||
4C6402458000
|
trusted library allocation
|
page read and write
|
||
1E7F1A09000
|
heap
|
page read and write
|
||
4C1801562000
|
trusted library allocation
|
page read and write
|
||
1C76D276000
|
heap
|
page read and write
|
||
282E5FB000
|
stack
|
page read and write
|
||
2D8400284000
|
direct allocation
|
page read and write
|
||
4C6402D74000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
1E7C3A19000
|
unclassified section
|
page read and write
|
||
19BF3614000
|
direct allocation
|
page read and write
|
||
4C6402F90000
|
trusted library allocation
|
page read and write
|
||
A7400220000
|
trusted library allocation
|
page read and write
|
||
4C6400C14000
|
trusted library allocation
|
page read and write
|
||
CAC00250000
|
direct allocation
|
page read and write
|
||
1E095CC1000
|
unclassified section
|
page readonly
|
||
2AD8DFC000
|
stack
|
page read and write
|
||
1E095CD9000
|
unclassified section
|
page readonly
|
||
36600342000
|
trusted library allocation
|
page read and write
|
||
40002F3000
|
trusted library allocation
|
page read and write
|
||
785800254000
|
trusted library allocation
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
7858003B0000
|
trusted library allocation
|
page read and write
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
283EDFE000
|
unkown
|
page readonly
|
||
199C000D0000
|
trusted library allocation
|
page read and write
|
||
4C08002D0000
|
direct allocation
|
page read and write
|
||
19D07BF3000
|
unkown
|
page read and write
|
||
4C6402AC3000
|
trusted library allocation
|
page read and write
|
||
4C6403160000
|
trusted library allocation
|
page read and write
|
||
19BF39A0000
|
direct allocation
|
page execute read
|
||
4C1801498000
|
trusted library allocation
|
page read and write
|
||
4C18014A4000
|
trusted library allocation
|
page read and write
|
||
268C00294000
|
trusted library allocation
|
page read and write
|
||
A7400160000
|
trusted library allocation
|
page read and write
|
||
36600982000
|
trusted library allocation
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
37D400254000
|
direct allocation
|
page read and write
|
||
4C64025A4000
|
trusted library allocation
|
page read and write
|
||
C000942000
|
direct allocation
|
page read and write
|
||
28445FE000
|
stack
|
page read and write
|
||
4C6403308000
|
trusted library allocation
|
page read and write
|
||
36600582000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
4C1801498000
|
trusted library allocation
|
page read and write
|
||
5FF00020C000
|
trusted library allocation
|
page read and write
|
||
1C76D2F0000
|
heap
|
page read and write
|
||
4C1800FE2000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
CAC00201000
|
direct allocation
|
page read and write
|
||
C000CBA000
|
direct allocation
|
page read and write
|
||
1E090702000
|
heap
|
page read and write
|
||
1C76D244000
|
heap
|
page read and write
|
||
4C1800EAC000
|
trusted library allocation
|
page read and write
|
||
1C4B59F0000
|
heap
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4000238000
|
trusted library allocation
|
page read and write
|
||
4C1800B09000
|
trusted library allocation
|
page read and write
|
||
1E7F1F60000
|
trusted library allocation
|
page read and write
|
||
366000C2000
|
trusted library allocation
|
page read and write
|
||
1E7C3C50000
|
unclassified section
|
page read and write
|
||
C000A4A000
|
direct allocation
|
page read and write
|
||
4C1800AF8000
|
trusted library allocation
|
page read and write
|
||
4C1800EFD000
|
trusted library allocation
|
page read and write
|
||
1A3C0025C000
|
trusted library allocation
|
page read and write
|
||
268C00284000
|
trusted library allocation
|
page read and write
|
||
A7400024000
|
trusted library allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
19D0B97B000
|
heap
|
page read and write
|
||
19D09E45000
|
unkown
|
page readonly
|
||
19BF3A75000
|
direct allocation
|
page read and write
|
||
2AD5DFE000
|
stack
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
4C18007B0000
|
trusted library allocation
|
page read and write
|
||
2823DFE000
|
unkown
|
page readonly
|
||
19D09DF7000
|
unkown
|
page readonly
|
||
4C6402F60000
|
trusted library allocation
|
page read and write
|
||
1D7A1F30000
|
heap
|
page readonly
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
A7400050000
|
trusted library allocation
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
4C1801210000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
36600D40000
|
trusted library allocation
|
page read and write
|
||
235400210000
|
trusted library allocation
|
page read and write
|
||
3660033B000
|
trusted library allocation
|
page read and write
|
||
4C1800EB0000
|
trusted library allocation
|
page read and write
|
||
4C1800FE3000
|
trusted library allocation
|
page read and write
|
||
6267FE000
|
unkown
|
page readonly
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
2079B8F0000
|
unclassified section
|
page readonly
|
||
36600602000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
19D09E80000
|
heap
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
4C18015CB000
|
trusted library allocation
|
page read and write
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
C00056B000
|
direct allocation
|
page read and write
|
||
36600302000
|
trusted library allocation
|
page read and write
|
||
19D05167000
|
heap
|
page read and write
|
||
284ADFE000
|
unkown
|
page readonly
|
||
7858001AC000
|
trusted library allocation
|
page read and write
|
||
19D05181000
|
heap
|
page read and write
|
||
366000E2000
|
trusted library allocation
|
page read and write
|
||
4C1800EF4000
|
trusted library allocation
|
page read and write
|
||
36600682000
|
trusted library allocation
|
page read and write
|
||
1B6800230000
|
trusted library allocation
|
page read and write
|
||
4C6402AC1000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
19BF3BB0000
|
direct allocation
|
page execute read
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
6190002EC000
|
trusted library allocation
|
page read and write
|
||
1E095EE5000
|
unclassified section
|
page readonly
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
4C180033C000
|
trusted library allocation
|
page read and write
|
||
C000578000
|
direct allocation
|
page read and write
|
||
5E4800358000
|
trusted library allocation
|
page read and write
|
||
4C1800620000
|
trusted library allocation
|
page read and write
|
||
1A3C002DC000
|
trusted library allocation
|
page read and write
|
||
4C180105A000
|
trusted library allocation
|
page read and write
|
||
1A3C00248000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
C000E94000
|
direct allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
4C1800834000
|
trusted library allocation
|
page read and write
|
||
1E09346B000
|
heap
|
page read and write
|
||
19BCC7B0000
|
heap
|
page read and write
|
||
A7400260000
|
trusted library allocation
|
page read and write
|
||
4C6402E84000
|
trusted library allocation
|
page read and write
|
||
4C6402274000
|
trusted library allocation
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
4C6402EF8000
|
trusted library allocation
|
page read and write
|
||
1E7F1A09000
|
heap
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C1800AD8000
|
trusted library allocation
|
page read and write
|
||
A7400148000
|
trusted library allocation
|
page read and write
|
||
36600CC2000
|
trusted library allocation
|
page read and write
|
||
A7400278000
|
trusted library allocation
|
page read and write
|
||
4C18016C1000
|
trusted library allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
1E095EB0000
|
unclassified section
|
page readonly
|
||
4C6403648000
|
trusted library allocation
|
page read and write
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
4C1801588000
|
trusted library allocation
|
page read and write
|
||
1E7F1A66000
|
heap
|
page read and write
|
||
639400230000
|
trusted library allocation
|
page read and write
|
||
A74002DC000
|
trusted library allocation
|
page read and write
|
||
5FF00040C000
|
trusted library allocation
|
page read and write
|
||
4C1801622000
|
trusted library allocation
|
page read and write
|
||
40840000C000
|
trusted library allocation
|
page read and write
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
4C1800F0A000
|
trusted library allocation
|
page read and write
|
||
4C64035EC000
|
trusted library allocation
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
4C1801498000
|
trusted library allocation
|
page read and write
|
||
4C6402A38000
|
trusted library allocation
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
4000250000
|
trusted library allocation
|
page read and write
|
||
19D06DB0000
|
trusted library section
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
4C18015E4000
|
trusted library allocation
|
page read and write
|
||
5FF0002D0000
|
trusted library allocation
|
page read and write
|
||
4C18016E4000
|
trusted library allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
6D7C00334000
|
trusted library allocation
|
page read and write
|
||
4C1800FF4000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
7FF6EA600000
|
unkown
|
page readonly
|
||
2354002D4000
|
trusted library allocation
|
page read and write
|
||
3660047F000
|
trusted library allocation
|
page read and write
|
||
629FF9000
|
stack
|
page read and write
|
||
4C1801072000
|
trusted library allocation
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
2079BE02000
|
heap
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
628FFE000
|
stack
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
C000E92000
|
direct allocation
|
page read and write
|
||
199C00134000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
4C1801258000
|
trusted library allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
19BF3660000
|
direct allocation
|
page read and write
|
||
4C18014A4000
|
trusted library allocation
|
page read and write
|
||
2829DFE000
|
unkown
|
page readonly
|
||
4C6402E1C000
|
trusted library allocation
|
page read and write
|
||
37D400230000
|
direct allocation
|
page read and write
|
||
4C1800F34000
|
trusted library allocation
|
page read and write
|
||
4C64022A0000
|
trusted library allocation
|
page read and write
|
||
1E095E13000
|
unclassified section
|
page readonly
|
||
62C7FE000
|
unkown
|
page readonly
|
||
1B5CFFC000
|
stack
|
page read and write
|
||
3F9EFFE000
|
stack
|
page read and write
|
||
C000567000
|
direct allocation
|
page read and write
|
||
4C1800EF4000
|
trusted library allocation
|
page read and write
|
||
CAC002B0000
|
direct allocation
|
page read and write
|
||
4C1800A64000
|
trusted library allocation
|
page read and write
|
||
4C180156C000
|
trusted library allocation
|
page read and write
|
||
28515FE000
|
stack
|
page read and write
|
||
199C00108000
|
trusted library allocation
|
page read and write
|
||
4C1800E98000
|
trusted library allocation
|
page read and write
|
||
785800054000
|
trusted library allocation
|
page read and write
|
||
1E095F30000
|
unclassified section
|
page readonly
|
||
5E4800274000
|
trusted library allocation
|
page read and write
|
||
4C18011C8000
|
trusted library allocation
|
page read and write
|
||
6190002B0000
|
trusted library allocation
|
page read and write
|
||
1E096024000
|
unclassified section
|
page readonly
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
284BDFE000
|
unkown
|
page readonly
|
||
1E090645000
|
heap
|
page read and write
|
||
61900033E000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
4C18016C0000
|
trusted library allocation
|
page read and write
|
||
1E7F1813000
|
heap
|
page read and write
|
||
619000338000
|
trusted library allocation
|
page read and write
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
630FFE000
|
stack
|
page read and write
|
||
4C18009F8000
|
trusted library allocation
|
page read and write
|
||
7858003E0000
|
trusted library allocation
|
page read and write
|
||
400020C000
|
trusted library allocation
|
page read and write
|
||
4C1800EF4000
|
trusted library allocation
|
page read and write
|
||
6D7C002F8000
|
trusted library allocation
|
page read and write
|
||
7FF6EF06A000
|
unkown
|
page readonly
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
785800114000
|
trusted library allocation
|
page read and write
|
||
C00048E000
|
direct allocation
|
page read and write
|
||
4C18014E4000
|
trusted library allocation
|
page read and write
|
||
4C1800F4C000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
C0008EA000
|
direct allocation
|
page read and write
|
||
707C002C4000
|
direct allocation
|
page read and write
|
||
320800230000
|
trusted library allocation
|
page read and write
|
||
1C76D28B000
|
heap
|
page read and write
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
5E4800334000
|
trusted library allocation
|
page read and write
|
||
A74000C1000
|
trusted library allocation
|
page read and write
|
||
4C080030E000
|
direct allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
A74001C4000
|
trusted library allocation
|
page read and write
|
||
28455FE000
|
stack
|
page read and write
|
||
4C1800D5C000
|
trusted library allocation
|
page read and write
|
||
5E4800354000
|
trusted library allocation
|
page read and write
|
||
CAC00230000
|
direct allocation
|
page read and write
|
||
1E7C39B8000
|
unclassified section
|
page read and write
|
||
4C64025A4000
|
trusted library allocation
|
page read and write
|
||
4C6402ABC000
|
trusted library allocation
|
page read and write
|
||
1A3C00268000
|
trusted library allocation
|
page read and write
|
||
C000CF9000
|
direct allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C18015CA000
|
trusted library allocation
|
page read and write
|
||
4C1800B0D000
|
trusted library allocation
|
page read and write
|
||
1E7C3C10000
|
unclassified section
|
page read and write
|
||
C000556000
|
direct allocation
|
page read and write
|
||
4C1801804000
|
trusted library allocation
|
page read and write
|
||
1E7C39B1000
|
unclassified section
|
page read and write
|
||
4C1800A40000
|
trusted library allocation
|
page read and write
|
||
4C180157A000
|
trusted library allocation
|
page read and write
|
||
5E48002E8000
|
trusted library allocation
|
page read and write
|
||
706A3FF000
|
stack
|
page read and write
|
||
36600902000
|
trusted library allocation
|
page read and write
|
||
19BF3668000
|
direct allocation
|
page read and write
|
||
36600D40000
|
trusted library allocation
|
page read and write
|
||
1A3C002C4000
|
trusted library allocation
|
page read and write
|
||
4C1800A74000
|
trusted library allocation
|
page read and write
|
||
3208002B8000
|
trusted library allocation
|
page read and write
|
||
4C1801538000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
1B68002BC000
|
trusted library allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
4C1801052000
|
trusted library allocation
|
page read and write
|
||
1E7C3983000
|
unclassified section
|
page read and write
|
||
4C1801064000
|
trusted library allocation
|
page read and write
|
||
4C1800E97000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
4C1800F05000
|
trusted library allocation
|
page read and write
|
||
1E093440000
|
heap
|
page read and write
|
||
4C6402AB1000
|
trusted library allocation
|
page read and write
|
||
1E7C3919000
|
unclassified section
|
page read and write
|
||
7858000C0000
|
trusted library allocation
|
page read and write
|
||
6D7C0033C000
|
trusted library allocation
|
page read and write
|
||
707C00284000
|
direct allocation
|
page read and write
|
||
19BF3721000
|
direct allocation
|
page read and write
|
||
62A7FE000
|
unkown
|
page readonly
|
||
1E0934B8000
|
heap
|
page read and write
|
||
4C180101C000
|
trusted library allocation
|
page read and write
|
||
6257FE000
|
unkown
|
page readonly
|
||
4C18010D0000
|
trusted library allocation
|
page read and write
|
||
268C002B4000
|
trusted library allocation
|
page read and write
|
||
4C1801238000
|
trusted library allocation
|
page read and write
|
||
1E7C399B000
|
unclassified section
|
page read and write
|
||
A74002DC000
|
trusted library allocation
|
page read and write
|
||
4C1801696000
|
trusted library allocation
|
page read and write
|
||
4C18015F2000
|
trusted library allocation
|
page read and write
|
||
19BCC8C8000
|
heap
|
page read and write
|
||
19BF38B0000
|
direct allocation
|
page execute read
|
||
4C18006A0000
|
trusted library allocation
|
page read and write
|
||
36600D42000
|
trusted library allocation
|
page read and write
|
||
619000274000
|
trusted library allocation
|
page read and write
|
||
235400264000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4084000A0000
|
trusted library allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
4000290000
|
trusted library allocation
|
page read and write
|
||
785800160000
|
trusted library allocation
|
page read and write
|
||
1E095D41000
|
unclassified section
|
page readonly
|
||
4C18015F2000
|
trusted library allocation
|
page read and write
|
||
4C1800DBC000
|
trusted library allocation
|
page read and write
|
||
6297FE000
|
unkown
|
page readonly
|
||
4000300000
|
trusted library allocation
|
page read and write
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
4000328000
|
trusted library allocation
|
page read and write
|
||
36600342000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
1E093443000
|
heap
|
page read and write
|
||
4C1800F2C000
|
trusted library allocation
|
page read and write
|
||
3208002DC000
|
trusted library allocation
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
785800420000
|
trusted library allocation
|
page read and write
|
||
1E7F1A60000
|
heap
|
page read and write
|
||
19D09DE1000
|
unkown
|
page readonly
|
||
28385FB000
|
stack
|
page read and write
|
||
4C6403758000
|
trusted library allocation
|
page read and write
|
||
4C640220C000
|
trusted library allocation
|
page read and write
|
||
1E090A13000
|
heap
|
page read and write
|
||
619000237000
|
trusted library allocation
|
page read and write
|
||
4C18016B8000
|
trusted library allocation
|
page read and write
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
1E095EC9000
|
unclassified section
|
page readonly
|
||
4C1801678000
|
trusted library allocation
|
page read and write
|
||
4C1801510000
|
trusted library allocation
|
page read and write
|
||
C0002FC000
|
direct allocation
|
page read and write
|
||
4C1800B09000
|
trusted library allocation
|
page read and write
|
||
4C0800210000
|
direct allocation
|
page read and write
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
4C640248C000
|
trusted library allocation
|
page read and write
|
||
1B680028C000
|
trusted library allocation
|
page read and write
|
||
4C6400801000
|
trusted library allocation
|
page read and write
|
||
4C1800F9C000
|
trusted library allocation
|
page read and write
|
||
36600302000
|
trusted library allocation
|
page read and write
|
||
4C1800EE4000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
19BF3890000
|
direct allocation
|
page execute read
|
||
1B6800264000
|
trusted library allocation
|
page read and write
|
||
1E09601A000
|
unclassified section
|
page readonly
|
||
19D0B92A000
|
heap
|
page read and write
|
||
19D0CA80000
|
unkown
|
page readonly
|
||
2844DFE000
|
unkown
|
page readonly
|
||
4C18015F7000
|
trusted library allocation
|
page read and write
|
||
4C1801014000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
5E4800248000
|
trusted library allocation
|
page read and write
|
||
1C76D2A1000
|
heap
|
page read and write
|
||
1E095DAA000
|
unclassified section
|
page readonly
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
19BF39F0000
|
direct allocation
|
page execute read
|
||
1C76D030000
|
heap
|
page read and write
|
||
7858002C4000
|
trusted library allocation
|
page read and write
|
||
1E7C3B96000
|
unclassified section
|
page read and write
|
||
3F95FFB000
|
stack
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
7FF6F04CF000
|
unkown
|
page readonly
|
||
28305FB000
|
stack
|
page read and write
|
||
4C6403124000
|
trusted library allocation
|
page read and write
|
||
1E09349D000
|
heap
|
page read and write
|
||
1A3C002B8000
|
trusted library allocation
|
page read and write
|
||
4C1800ABC000
|
trusted library allocation
|
page read and write
|
||
4C6402A01000
|
trusted library allocation
|
page read and write
|
||
B6249FE000
|
unkown
|
page readonly
|
||
4C1801024000
|
trusted library allocation
|
page read and write
|
||
4000308000
|
trusted library allocation
|
page read and write
|
||
7FF6EECFB000
|
unkown
|
page readonly
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C1800A0C000
|
trusted library allocation
|
page read and write
|
||
A740008C000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
4C180148C000
|
trusted library allocation
|
page read and write
|
||
4084000AC000
|
trusted library allocation
|
page read and write
|
||
5E480033C000
|
trusted library allocation
|
page read and write
|
||
4C1800290000
|
trusted library allocation
|
page read and write
|
||
4C640234C000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
1C76D286000
|
heap
|
page read and write
|
||
19D0C713000
|
heap
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C0800220000
|
direct allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
4C6402F18000
|
trusted library allocation
|
page read and write
|
||
284DDFE000
|
unkown
|
page readonly
|
||
A74001E9000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
19BCCB05000
|
heap
|
page read and write
|
||
4C1800B1C000
|
trusted library allocation
|
page read and write
|
||
6D7C0033C000
|
trusted library allocation
|
page read and write
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
4C640369C000
|
trusted library allocation
|
page read and write
|
||
4C1801694000
|
trusted library allocation
|
page read and write
|
||
4C1800A7C000
|
trusted library allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
36600382000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
4C64022FC000
|
trusted library allocation
|
page read and write
|
||
4C6402444000
|
trusted library allocation
|
page read and write
|
||
5FF000418000
|
trusted library allocation
|
page read and write
|
||
1C76D1A0000
|
trusted library section
|
page readonly
|
||
1A3C00201000
|
trusted library allocation
|
page read and write
|
||
19D050EC000
|
heap
|
page read and write
|
||
1E7C3A31000
|
unclassified section
|
page read and write
|
||
1E095F07000
|
unclassified section
|
page readonly
|
||
4C1800B12000
|
trusted library allocation
|
page read and write
|
||
4C1801588000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
1E7F1830000
|
heap
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
4C1801628000
|
trusted library allocation
|
page read and write
|
||
4C08002D0000
|
direct allocation
|
page read and write
|
||
4C1801572000
|
trusted library allocation
|
page read and write
|
||
C00006B000
|
direct allocation
|
page read and write
|
||
36600682000
|
trusted library allocation
|
page read and write
|
||
3F98FFB000
|
stack
|
page read and write
|
||
36600682000
|
trusted library allocation
|
page read and write
|
||
5FF000404000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
1E095C4F000
|
unclassified section
|
page readonly
|
||
4C6400FCC000
|
trusted library allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
1E093512000
|
heap
|
page read and write
|
||
A74002D4000
|
trusted library allocation
|
page read and write
|
||
283F5FF000
|
stack
|
page read and write
|
||
1E7C33E3000
|
unclassified section
|
page read and write
|
||
19D05165000
|
heap
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
408400038000
|
trusted library allocation
|
page read and write
|
||
1E20002B8000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
4C1800E9C000
|
trusted library allocation
|
page read and write
|
||
1E782BFD000
|
unclassified section
|
page read and write
|
||
6394002C0000
|
trusted library allocation
|
page read and write
|
||
C000856000
|
direct allocation
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
4C180103C000
|
trusted library allocation
|
page read and write
|
||
785800368000
|
trusted library allocation
|
page read and write
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
19BF3684000
|
direct allocation
|
page read and write
|
||
199C0008A000
|
trusted library allocation
|
page read and write
|
||
36600780000
|
trusted library allocation
|
page read and write
|
||
4C64025A4000
|
trusted library allocation
|
page read and write
|
||
4C6400882000
|
trusted library allocation
|
page read and write
|
||
3DD400288000
|
trusted library allocation
|
page read and write
|
||
707C002E8000
|
direct allocation
|
page read and write
|
||
4C6403780000
|
trusted library allocation
|
page read and write
|
||
4C1801592000
|
trusted library allocation
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
4C64023EC000
|
trusted library allocation
|
page read and write
|
||
4C1800ACC000
|
trusted library allocation
|
page read and write
|
||
4C0800264000
|
direct allocation
|
page read and write
|
||
4C640371C000
|
trusted library allocation
|
page read and write
|
||
199C00038000
|
trusted library allocation
|
page read and write
|
||
36600402000
|
trusted library allocation
|
page read and write
|
||
284EDFE000
|
unkown
|
page readonly
|
||
36600CC2000
|
trusted library allocation
|
page read and write
|
||
2AD95FE000
|
unkown
|
page readonly
|
||
4C1800794000
|
trusted library allocation
|
page read and write
|
||
4C6402318000
|
trusted library allocation
|
page read and write
|
||
6394002CC000
|
trusted library allocation
|
page read and write
|
||
7FF6EE2F6000
|
unkown
|
page readonly
|
||
19BCC8C4000
|
heap
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
4C18003E8000
|
trusted library allocation
|
page read and write
|
||
4C64036F0000
|
trusted library allocation
|
page read and write
|
||
6190003B4000
|
trusted library allocation
|
page read and write
|
||
7858002B8000
|
trusted library allocation
|
page read and write
|
||
C0004E2000
|
direct allocation
|
page read and write
|
||
6307FE000
|
unkown
|
page readonly
|
||
4C0800307000
|
direct allocation
|
page read and write
|
||
1E7C39F8000
|
unclassified section
|
page read and write
|
||
19BF39E0000
|
direct allocation
|
page execute read
|
||
C000A0E000
|
direct allocation
|
page read and write
|
||
4C1800EB0000
|
trusted library allocation
|
page read and write
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
A7400290000
|
trusted library allocation
|
page read and write
|
||
4C1801510000
|
trusted library allocation
|
page read and write
|
||
A74001C4000
|
trusted library allocation
|
page read and write
|
||
19D05179000
|
heap
|
page read and write
|
||
4C1801558000
|
trusted library allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
1E090510000
|
remote allocation
|
page read and write
|
||
4C1800F54000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
19BF37B0000
|
direct allocation
|
page execute read
|
||
619000404000
|
trusted library allocation
|
page read and write
|
||
4C1800A2C000
|
trusted library allocation
|
page read and write
|
||
19D0516C000
|
heap
|
page read and write
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
A7400044000
|
trusted library allocation
|
page read and write
|
||
36600782000
|
trusted library allocation
|
page read and write
|
||
B6241FE000
|
stack
|
page read and write
|
||
36600482000
|
trusted library allocation
|
page read and write
|
||
4C1801548000
|
trusted library allocation
|
page read and write
|
||
626FFE000
|
stack
|
page read and write
|
||
4084000BC000
|
trusted library allocation
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
4C1800F9C000
|
trusted library allocation
|
page read and write
|
||
4C1800ABC000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
2079B9C0000
|
heap
|
page read and write
|
||
4C1800ACC000
|
trusted library allocation
|
page read and write
|
||
4C080030F000
|
direct allocation
|
page read and write
|
||
4C0800288000
|
direct allocation
|
page read and write
|
||
A7400250000
|
trusted library allocation
|
page read and write
|
||
408400001000
|
trusted library allocation
|
page read and write
|
||
366001E7000
|
trusted library allocation
|
page read and write
|
||
4C1800F54000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
4C180040C000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C640362C000
|
trusted library allocation
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
4C1800E8C000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
1B6800238000
|
trusted library allocation
|
page read and write
|
||
7858003E4000
|
trusted library allocation
|
page read and write
|
||
1E7C33AA000
|
unclassified section
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
19D0B962000
|
heap
|
page read and write
|
||
4C1800B09000
|
trusted library allocation
|
page read and write
|
||
7858000CA000
|
trusted library allocation
|
page read and write
|
||
4C1800EF4000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
B6289FE000
|
unkown
|
page readonly
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
19D05113000
|
heap
|
page read and write
|
||
4C6403758000
|
trusted library allocation
|
page read and write
|
||
4C1800D60000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
631C00260000
|
trusted library allocation
|
page read and write
|
||
19BF3810000
|
heap
|
page read and write
|
||
4C080030C000
|
direct allocation
|
page read and write
|
||
A74000FC000
|
trusted library allocation
|
page read and write
|
||
4C6402DC4000
|
trusted library allocation
|
page read and write
|
||
282CDFE000
|
unkown
|
page readonly
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
1E095DFB000
|
unclassified section
|
page readonly
|
||
4C6402AB0000
|
trusted library allocation
|
page read and write
|
||
1E7C32D4000
|
unclassified section
|
page read and write
|
||
19BF3A88000
|
direct allocation
|
page read and write
|
||
1E095E1A000
|
unclassified section
|
page readonly
|
||
4C18007B0000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
1E7F1A13000
|
heap
|
page read and write
|
||
4C6403314000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
36600402000
|
trusted library allocation
|
page read and write
|
||
C000F70000
|
direct allocation
|
page read and write
|
||
2D84002E0000
|
direct allocation
|
page read and write
|
||
619000D0C000
|
trusted library allocation
|
page read and write
|
||
1E095C7B000
|
unclassified section
|
page readonly
|
||
19D0B964000
|
heap
|
page read and write
|
||
4C6403238000
|
trusted library allocation
|
page read and write
|
||
4C64036BE000
|
trusted library allocation
|
page read and write
|
||
4C18011C8000
|
trusted library allocation
|
page read and write
|
||
4C6402F60000
|
trusted library allocation
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
4C64031D8000
|
trusted library allocation
|
page read and write
|
||
19BF5900000
|
heap
|
page read and write
|
||
19BCCAF0000
|
direct allocation
|
page read and write
|
||
4C1800B0E000
|
trusted library allocation
|
page read and write
|
||
4C6403164000
|
trusted library allocation
|
page read and write
|
||
619000E9C000
|
trusted library allocation
|
page read and write
|
||
320800210000
|
trusted library allocation
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
4C1801728000
|
trusted library allocation
|
page read and write
|
||
2079BA1C000
|
heap
|
page read and write
|
||
1E095F5E000
|
unclassified section
|
page readonly
|
||
3F91FFD000
|
stack
|
page read and write
|
||
4C1800E94000
|
trusted library allocation
|
page read and write
|
||
4C64024C0000
|
trusted library allocation
|
page read and write
|
||
C000F00000
|
direct allocation
|
page read and write
|
||
7858000F4000
|
trusted library allocation
|
page read and write
|
||
4C6402F9C000
|
trusted library allocation
|
page read and write
|
||
283D5FE000
|
unkown
|
page readonly
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
7858001A8000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
36600C82000
|
trusted library allocation
|
page read and write
|
||
619000344000
|
trusted library allocation
|
page read and write
|
||
19D0C600000
|
heap
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
619000314000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C1800F7C000
|
trusted library allocation
|
page read and write
|
||
19BCC8BE000
|
heap
|
page read and write
|
||
2079EDF0000
|
unclassified section
|
page readonly
|
||
4C1800318000
|
trusted library allocation
|
page read and write
|
||
4C6403308000
|
trusted library allocation
|
page read and write
|
||
1E095F47000
|
unclassified section
|
page readonly
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
61900094C000
|
trusted library allocation
|
page read and write
|
||
C000DF0000
|
direct allocation
|
page read and write
|
||
4C1800A54000
|
trusted library allocation
|
page read and write
|
||
4C1800824000
|
trusted library allocation
|
page read and write
|
||
19D05098000
|
heap
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
36600D40000
|
trusted library allocation
|
page read and write
|
||
A740007C000
|
trusted library allocation
|
page read and write
|
||
4C18009F9000
|
trusted library allocation
|
page read and write
|
||
2079F030000
|
unclassified section
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
284A5FA000
|
stack
|
page read and write
|
||
4C1801572000
|
trusted library allocation
|
page read and write
|
||
1E090980000
|
trusted library allocation
|
page read and write
|
||
19D050E8000
|
heap
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
5E48002A0000
|
trusted library allocation
|
page read and write
|
||
4C1801572000
|
trusted library allocation
|
page read and write
|
||
639400244000
|
trusted library allocation
|
page read and write
|
||
3660047F000
|
trusted library allocation
|
page read and write
|
||
1B680020C000
|
trusted library allocation
|
page read and write
|
||
19BF3CC0000
|
heap
|
page read and write
|
||
19D05165000
|
heap
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
1B59FFE000
|
stack
|
page read and write
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C6402201000
|
trusted library allocation
|
page read and write
|
||
1C76D265000
|
heap
|
page read and write
|
||
4C180156E000
|
trusted library allocation
|
page read and write
|
||
36600477000
|
trusted library allocation
|
page read and write
|
||
4C1801210000
|
trusted library allocation
|
page read and write
|
||
4C1800824000
|
trusted library allocation
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C1801648000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
C000308000
|
direct allocation
|
page read and write
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
1B60FFE000
|
stack
|
page read and write
|
||
78580038C000
|
trusted library allocation
|
page read and write
|
||
1E20002AC000
|
trusted library allocation
|
page read and write
|
||
4C0800320000
|
direct allocation
|
page read and write
|
||
4C0800364000
|
direct allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
19BF3A50000
|
direct allocation
|
page read and write
|
||
B62D9FE000
|
unkown
|
page readonly
|
||
19BF3C30000
|
heap
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
199C0010C000
|
trusted library allocation
|
page read and write
|
||
619000698000
|
trusted library allocation
|
page read and write
|
||
28475FE000
|
stack
|
page read and write
|
||
4C1801639000
|
trusted library allocation
|
page read and write
|
||
61FFFE000
|
stack
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
4C1800EE3000
|
trusted library allocation
|
page read and write
|
||
4C64032FD000
|
trusted library allocation
|
page read and write
|
||
1E200024C000
|
trusted library allocation
|
page read and write
|
||
1E2000268000
|
trusted library allocation
|
page read and write
|
||
4C64036E4000
|
trusted library allocation
|
page read and write
|
||
2354002C4000
|
trusted library allocation
|
page read and write
|
||
CAC002A0000
|
direct allocation
|
page read and write
|
||
282F5FC000
|
stack
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
19BF38C0000
|
direct allocation
|
page execute read
|
||
4C1800FEC000
|
trusted library allocation
|
page read and write
|
||
4C180154B000
|
trusted library allocation
|
page read and write
|
||
C000E4C000
|
direct allocation
|
page read and write
|
||
5A68002C8000
|
direct allocation
|
page read and write
|
||
19D050C7000
|
heap
|
page read and write
|
||
19BF3A60000
|
direct allocation
|
page read and write
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
4000424000
|
trusted library allocation
|
page read and write
|
||
19BF3BB2000
|
heap
|
page read and write
|
||
4C1800730000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
4C6402AE0000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
B6259FE000
|
unkown
|
page readonly
|
||
4C6402F9C000
|
trusted library allocation
|
page read and write
|
||
6190002A8000
|
trusted library allocation
|
page read and write
|
||
619000EA4000
|
trusted library allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
61900032C000
|
trusted library allocation
|
page read and write
|
||
1E7C3949000
|
unclassified section
|
page read and write
|
||
1E7C392B000
|
unclassified section
|
page read and write
|
||
366008AC000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C18016A8000
|
trusted library allocation
|
page read and write
|
||
4C6402C70000
|
trusted library allocation
|
page read and write
|
||
1B5FFFE000
|
stack
|
page read and write
|
||
4C1800654000
|
trusted library allocation
|
page read and write
|
||
19D05165000
|
heap
|
page read and write
|
||
36600542000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
19D05165000
|
heap
|
page read and write
|
||
78580019A000
|
trusted library allocation
|
page read and write
|
||
19BF36A3000
|
direct allocation
|
page read and write
|
||
4C1800F94000
|
trusted library allocation
|
page read and write
|
||
4C6402394000
|
trusted library allocation
|
page read and write
|
||
4000380000
|
trusted library allocation
|
page read and write
|
||
C00045E000
|
direct allocation
|
page read and write
|
||
1C4B4230000
|
trusted library allocation
|
page read and write
|
||
C000A34000
|
direct allocation
|
page read and write
|
||
19BF3920000
|
direct allocation
|
page execute read
|
||
36600142000
|
trusted library allocation
|
page read and write
|
||
19D050DD000
|
heap
|
page read and write
|
||
4C1800F05000
|
trusted library allocation
|
page read and write
|
||
5A6800234000
|
direct allocation
|
page read and write
|
||
19D0B932000
|
heap
|
page read and write
|
||
6190002C0000
|
trusted library allocation
|
page read and write
|
||
4C1800AE0000
|
trusted library allocation
|
page read and write
|
||
4C1800ABC000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
1E7C3A03000
|
unclassified section
|
page read and write
|
||
1E2000294000
|
trusted library allocation
|
page read and write
|
||
1E7C3BAD000
|
unclassified section
|
page read and write
|
||
5A680025C000
|
direct allocation
|
page read and write
|
||
6D7C002C8000
|
trusted library allocation
|
page read and write
|
||
78580011C000
|
trusted library allocation
|
page read and write
|
||
19BF3830000
|
direct allocation
|
page execute read
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
36600442000
|
trusted library allocation
|
page read and write
|
||
785800288000
|
trusted library allocation
|
page read and write
|
||
4C64030D4000
|
trusted library allocation
|
page read and write
|
||
1B680027C000
|
trusted library allocation
|
page read and write
|
||
4C6403320000
|
trusted library allocation
|
page read and write
|
||
1E09061C000
|
heap
|
page read and write
|
||
4C6403758000
|
trusted library allocation
|
page read and write
|
||
19D0C614000
|
heap
|
page read and write
|
||
6D7C00201000
|
trusted library allocation
|
page read and write
|
||
19D0A440000
|
trusted library section
|
page read and write
|
||
C000B8A000
|
direct allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
631C002D4000
|
trusted library allocation
|
page read and write
|
||
4C6402D54000
|
trusted library allocation
|
page read and write
|
||
631C002D8000
|
trusted library allocation
|
page read and write
|
||
4C64031F8000
|
trusted library allocation
|
page read and write
|
||
7858000E8000
|
trusted library allocation
|
page read and write
|
||
C000CD2000
|
direct allocation
|
page read and write
|
||
366008C2000
|
trusted library allocation
|
page read and write
|
||
1B6800248000
|
trusted library allocation
|
page read and write
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
19BF3689000
|
direct allocation
|
page read and write
|
||
C000E8E000
|
direct allocation
|
page read and write
|
||
4C1800EB4000
|
trusted library allocation
|
page read and write
|
||
5A680024C000
|
direct allocation
|
page read and write
|
||
4C6402BB4000
|
trusted library allocation
|
page read and write
|
||
19D050B8000
|
heap
|
page read and write
|
||
4C6403130000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
1A3C002E0000
|
trusted library allocation
|
page read and write
|
||
4C0800201000
|
direct allocation
|
page read and write
|
||
3DD4002B8000
|
trusted library allocation
|
page read and write
|
||
4C6402E38000
|
trusted library allocation
|
page read and write
|
||
4C6402DC9000
|
trusted library allocation
|
page read and write
|
||
19BCCAD0000
|
direct allocation
|
page read and write
|
||
3F987FE000
|
unkown
|
page readonly
|
||
1E7F1802000
|
heap
|
page read and write
|
||
19BF36E3000
|
heap
|
page read and write
|
||
C000A16000
|
direct allocation
|
page read and write
|
||
3DD4002B8000
|
trusted library allocation
|
page read and write
|
||
5FF000230000
|
trusted library allocation
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
3DD400238000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
C000F80000
|
direct allocation
|
page read and write
|
||
4C180107C000
|
trusted library allocation
|
page read and write
|
||
7069DFE000
|
stack
|
page read and write
|
||
4C1801582000
|
trusted library allocation
|
page read and write
|
||
1E090599000
|
unclassified section
|
page read and write
|
||
268C00284000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
36600040000
|
trusted library allocation
|
page readonly
|
||
19D0CA10000
|
unkown
|
page readonly
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
CAC00234000
|
direct allocation
|
page read and write
|
||
4C1801648000
|
trusted library allocation
|
page read and write
|
||
A7400124000
|
trusted library allocation
|
page read and write
|
||
1E09066C000
|
heap
|
page read and write
|
||
619000EAC000
|
trusted library allocation
|
page read and write
|
||
4C1800E9C000
|
trusted library allocation
|
page read and write
|
||
631C00418000
|
trusted library allocation
|
page read and write
|
||
4C1801618000
|
trusted library allocation
|
page read and write
|
||
A740000C000
|
trusted library allocation
|
page read and write
|
||
7858002AA000
|
trusted library allocation
|
page read and write
|
||
1E7F1A25000
|
heap
|
page read and write
|
||
1E7C3A49000
|
unclassified section
|
page read and write
|
||
1E782BC0000
|
unclassified section
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
1E093462000
|
heap
|
page read and write
|
||
4C180173C000
|
trusted library allocation
|
page read and write
|
||
1E093498000
|
heap
|
page read and write
|
||
706B9FE000
|
stack
|
page read and write
|
||
4C1800EEC000
|
trusted library allocation
|
page read and write
|
||
1B680028C000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
1A3C002A4000
|
trusted library allocation
|
page read and write
|
||
19D04F50000
|
heap
|
page read and write
|
||
70699FF000
|
stack
|
page read and write
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
4000288000
|
trusted library allocation
|
page read and write
|
||
199C00098000
|
trusted library allocation
|
page read and write
|
||
C000978000
|
direct allocation
|
page read and write
|
||
4C180074C000
|
trusted library allocation
|
page read and write
|
||
5E4800230000
|
trusted library allocation
|
page read and write
|
||
4C1800FE2000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C6402CCC000
|
trusted library allocation
|
page read and write
|
||
2AD3DFB000
|
stack
|
page read and write
|
||
3660078D000
|
trusted library allocation
|
page read and write
|
||
A74001DC000
|
trusted library allocation
|
page read and write
|
||
4C6403094000
|
trusted library allocation
|
page read and write
|
||
2AD7DFE000
|
stack
|
page read and write
|
||
284C5FB000
|
stack
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
36600A02000
|
trusted library allocation
|
page read and write
|
||
4C6403758000
|
trusted library allocation
|
page read and write
|
||
7FF6ECAF4000
|
unkown
|
page readonly
|
||
19BCC834000
|
heap
|
page read and write
|
||
5E480040C000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
19D05171000
|
heap
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
4C18010B0000
|
trusted library allocation
|
page read and write
|
||
4C1800FE2000
|
trusted library allocation
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
1E0934C3000
|
heap
|
page read and write
|
||
4C1800EFC000
|
trusted library allocation
|
page read and write
|
||
4C1801548000
|
trusted library allocation
|
page read and write
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
4C1801544000
|
trusted library allocation
|
page read and write
|
||
4C1801710000
|
trusted library allocation
|
page read and write
|
||
A74002BA000
|
trusted library allocation
|
page read and write
|
||
4C6403254000
|
trusted library allocation
|
page read and write
|
||
B6279FE000
|
unkown
|
page readonly
|
||
C000CA6000
|
direct allocation
|
page read and write
|
||
4C18011C8000
|
trusted library allocation
|
page read and write
|
||
4C6402D9C000
|
trusted library allocation
|
page read and write
|
||
199C00114000
|
trusted library allocation
|
page read and write
|
||
4C1800AF8000
|
trusted library allocation
|
page read and write
|
||
61900032C000
|
trusted library allocation
|
page read and write
|
||
62CFFE000
|
stack
|
page read and write
|
||
4C1801568000
|
trusted library allocation
|
page read and write
|
||
C0004F6000
|
direct allocation
|
page read and write
|
||
36600202000
|
trusted library allocation
|
page read and write
|
||
19D050A3000
|
heap
|
page read and write
|
||
4000278000
|
trusted library allocation
|
page read and write
|
||
19D05186000
|
heap
|
page read and write
|
||
2835DFE000
|
unkown
|
page readonly
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
631C002C4000
|
trusted library allocation
|
page read and write
|
||
36600D40000
|
trusted library allocation
|
page read and write
|
||
19BF3970000
|
direct allocation
|
page execute read
|
||
4C0800315000
|
direct allocation
|
page read and write
|
||
631C00304000
|
trusted library allocation
|
page read and write
|
||
4C1800C0C000
|
trusted library allocation
|
page read and write
|
||
61900032C000
|
trusted library allocation
|
page read and write
|
||
4C18010B0000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
4C180173C000
|
trusted library allocation
|
page read and write
|
||
4C1800EB0000
|
trusted library allocation
|
page read and write
|
||
36600D02000
|
trusted library allocation
|
page read and write
|
||
1B68002C8000
|
trusted library allocation
|
page read and write
|
||
4C18010B6000
|
trusted library allocation
|
page read and write
|
||
1D7A2102000
|
heap
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
284E5FC000
|
stack
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
619000230000
|
trusted library allocation
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C18010BC000
|
trusted library allocation
|
page read and write
|
||
4C64027EC000
|
trusted library allocation
|
page read and write
|
||
7858003E0000
|
trusted library allocation
|
page read and write
|
||
6190002CC000
|
trusted library allocation
|
page read and write
|
||
4C6402FDC000
|
trusted library allocation
|
page read and write
|
||
4C1800F9C000
|
trusted library allocation
|
page read and write
|
||
785800398000
|
trusted library allocation
|
page read and write
|
||
3660083B000
|
trusted library allocation
|
page read and write
|
||
4C64023B4000
|
trusted library allocation
|
page read and write
|
||
706BBFE000
|
stack
|
page read and write
|
||
4C1801542000
|
trusted library allocation
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
6247FE000
|
unkown
|
page readonly
|
||
7FF6F0477000
|
unkown
|
page readonly
|
||
2354002A8000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
4C1801558000
|
trusted library allocation
|
page read and write
|
||
785800154000
|
trusted library allocation
|
page read and write
|
||
5FF0002D0000
|
trusted library allocation
|
page read and write
|
||
4C1801582000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
235400201000
|
trusted library allocation
|
page read and write
|
||
B62C9FE000
|
unkown
|
page readonly
|
||
36600742000
|
trusted library allocation
|
page read and write
|
||
4C1800634000
|
trusted library allocation
|
page read and write
|
||
3F997FE000
|
unkown
|
page readonly
|
||
C000226000
|
direct allocation
|
page read and write
|
||
A7400240000
|
trusted library allocation
|
page read and write
|
||
7FF6ECAC4000
|
unkown
|
page write copy
|
||
4C1800818000
|
trusted library allocation
|
page read and write
|
||
4C6402A0C000
|
trusted library allocation
|
page read and write
|
||
5E4800288000
|
trusted library allocation
|
page read and write
|
||
C000E80000
|
direct allocation
|
page read and write
|
||
1E095D59000
|
unclassified section
|
page readonly
|
||
1E095EA6000
|
unclassified section
|
page readonly
|
||
366007A0000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C1800F0A000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
36600842000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
400031C000
|
trusted library allocation
|
page read and write
|
||
6190003B4000
|
trusted library allocation
|
page read and write
|
||
4C18006AC000
|
trusted library allocation
|
page read and write
|
||
268C002B8000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
4C1801228000
|
trusted library allocation
|
page read and write
|
||
1E095C99000
|
unclassified section
|
page readonly
|
||
785800288000
|
trusted library allocation
|
page read and write
|
||
1E7F1A25000
|
heap
|
page read and write
|
||
4C18014E4000
|
trusted library allocation
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
C00006D000
|
direct allocation
|
page read and write
|
||
4C6403178000
|
trusted library allocation
|
page read and write
|
||
4C180106C000
|
trusted library allocation
|
page read and write
|
||
12DBDFB000
|
stack
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
A74002D7000
|
trusted library allocation
|
page read and write
|
||
366004C2000
|
trusted library allocation
|
page read and write
|
||
19BF3D41000
|
heap
|
page read and write
|
||
19BF3644000
|
direct allocation
|
page read and write
|
||
4C1800F7C000
|
trusted library allocation
|
page read and write
|
||
4C1800684000
|
trusted library allocation
|
page read and write
|
||
4C18003E8000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
4C1800F94000
|
trusted library allocation
|
page read and write
|
||
19BCC7E9000
|
direct allocation
|
page read and write
|
||
4C6403768000
|
trusted library allocation
|
page read and write
|
||
36600142000
|
trusted library allocation
|
page read and write
|
||
4C64032DC000
|
trusted library allocation
|
page read and write
|
||
4C180027C000
|
trusted library allocation
|
page read and write
|
||
4C1800788000
|
trusted library allocation
|
page read and write
|
||
4C1800ACC000
|
trusted library allocation
|
page read and write
|
||
4C1800718000
|
trusted library allocation
|
page read and write
|
||
235400278000
|
trusted library allocation
|
page read and write
|
||
7858001B4000
|
trusted library allocation
|
page read and write
|
||
36600602000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C1800EDC000
|
trusted library allocation
|
page read and write
|
||
4C6402B2C000
|
trusted library allocation
|
page read and write
|
||
4000201000
|
trusted library allocation
|
page read and write
|
||
37D400210000
|
direct allocation
|
page read and write
|
||
4C1800684000
|
trusted library allocation
|
page read and write
|
||
4C0800284000
|
direct allocation
|
page read and write
|
||
36600582000
|
trusted library allocation
|
page read and write
|
||
4C6402794000
|
trusted library allocation
|
page read and write
|
||
36600000000
|
trusted library allocation
|
page readonly
|
||
1C772802000
|
heap
|
page read and write
|
||
4C1800FDC000
|
trusted library allocation
|
page read and write
|
||
36600880000
|
trusted library allocation
|
page read and write
|
||
4C6403201000
|
trusted library allocation
|
page read and write
|
||
62E7FE000
|
unkown
|
page readonly
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
4C6402CE4000
|
trusted library allocation
|
page read and write
|
||
19BCCA80000
|
direct allocation
|
page read and write
|
||
A7400278000
|
trusted library allocation
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
4C640244A000
|
trusted library allocation
|
page read and write
|
||
4C08002C4000
|
direct allocation
|
page read and write
|
||
37D4002D4000
|
direct allocation
|
page read and write
|
||
4C640080A000
|
trusted library allocation
|
page read and write
|
||
5E48002CC000
|
trusted library allocation
|
page read and write
|
||
4C6402718000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
4C1801698000
|
trusted library allocation
|
page read and write
|
||
36600A42000
|
trusted library allocation
|
page read and write
|
||
19D05167000
|
heap
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
4C1800F04000
|
trusted library allocation
|
page read and write
|
||
1E7F1840000
|
heap
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
4C080031C000
|
direct allocation
|
page read and write
|
||
A7400090000
|
trusted library allocation
|
page read and write
|
||
619000C01000
|
trusted library allocation
|
page read and write
|
||
1C76D231000
|
heap
|
page read and write
|
||
4C1800F54000
|
trusted library allocation
|
page read and write
|
||
4C1800FE4000
|
trusted library allocation
|
page read and write
|
||
19BF3AA0000
|
direct allocation
|
page execute read
|
||
1E7C3BB9000
|
unclassified section
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
36600882000
|
trusted library allocation
|
page read and write
|
||
4C1800F1C000
|
trusted library allocation
|
page read and write
|
||
4C1800F06000
|
trusted library allocation
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
4C1800730000
|
trusted library allocation
|
page read and write
|
||
36600B42000
|
trusted library allocation
|
page read and write
|
||
7FF6F0492000
|
unkown
|
page readonly
|
||
4C180133C000
|
trusted library allocation
|
page read and write
|
||
1E090657000
|
heap
|
page read and write
|
||
235400248000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
1C76D213000
|
heap
|
page read and write
|
||
785800388000
|
trusted library allocation
|
page read and write
|
||
7FF6EEFBD000
|
unkown
|
page readonly
|
||
2D84002D0000
|
direct allocation
|
page read and write
|
||
B62A1FB000
|
stack
|
page read and write
|
||
6D7C00404000
|
trusted library allocation
|
page read and write
|
||
C000914000
|
direct allocation
|
page read and write
|
||
3DD4002C4000
|
trusted library allocation
|
page read and write
|
||
4C18012EC000
|
trusted library allocation
|
page read and write
|
||
2AD55FE000
|
unkown
|
page readonly
|
||
36600AC2000
|
trusted library allocation
|
page read and write
|
||
4C1801424000
|
trusted library allocation
|
page read and write
|
||
4C64023C0000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
4C1801634000
|
trusted library allocation
|
page read and write
|
||
78580038C000
|
trusted library allocation
|
page read and write
|
||
36600B02000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
1E095D53000
|
unclassified section
|
page readonly
|
||
1E7C39DA000
|
unclassified section
|
page read and write
|
||
283E5FE000
|
stack
|
page read and write
|
||
19BCC883000
|
heap
|
page read and write
|
||
4000310000
|
trusted library allocation
|
page read and write
|
||
4C18009F0000
|
trusted library allocation
|
page read and write
|
||
4C6403401000
|
trusted library allocation
|
page read and write
|
||
36600182000
|
trusted library allocation
|
page read and write
|
||
19BF3990000
|
direct allocation
|
page execute read
|
||
6394002A4000
|
trusted library allocation
|
page read and write
|
||
4C64023DC000
|
trusted library allocation
|
page read and write
|
||
3F94FF5000
|
stack
|
page read and write
|
||
619000284000
|
trusted library allocation
|
page read and write
|
||
36600D42000
|
trusted library allocation
|
page read and write
|
||
4C64005EE000
|
trusted library allocation
|
page read and write
|
||
631C00404000
|
trusted library allocation
|
page read and write
|
||
19BCC820000
|
heap
|
page read and write
|
||
619000E8C000
|
trusted library allocation
|
page read and write
|
||
4C0800298000
|
direct allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
37D4002A8000
|
direct allocation
|
page read and write
|
||
A740005C000
|
trusted library allocation
|
page read and write
|
||
1E7F1A24000
|
heap
|
page read and write
|
||
4C1800AF8000
|
trusted library allocation
|
page read and write
|
||
4C1800614000
|
trusted library allocation
|
page read and write
|
||
4C1800A5C000
|
trusted library allocation
|
page read and write
|
||
4C6402F38000
|
trusted library allocation
|
page read and write
|
||
7FF6ED5F2000
|
unkown
|
page readonly
|
||
A740014D000
|
trusted library allocation
|
page read and write
|
||
366003C2000
|
trusted library allocation
|
page read and write
|
||
4C1800E90000
|
trusted library allocation
|
page read and write
|
||
C00090C000
|
direct allocation
|
page read and write
|
||
A7400284000
|
trusted library allocation
|
page read and write
|
||
4C1800EFC000
|
trusted library allocation
|
page read and write
|
||
1E7F1A0B000
|
heap
|
page read and write
|
||
619000C8C000
|
trusted library allocation
|
page read and write
|
||
1C4B402E000
|
heap
|
page read and write
|
||
C0009D2000
|
direct allocation
|
page read and write
|
||
785800268000
|
trusted library allocation
|
page read and write
|
||
4C180142A000
|
trusted library allocation
|
page read and write
|
||
19D05013000
|
heap
|
page read and write
|
||
639400238000
|
trusted library allocation
|
page read and write
|
||
4C18015BC000
|
trusted library allocation
|
page read and write
|
||
4C1800F54000
|
trusted library allocation
|
page read and write
|
||
19BCC8C8000
|
heap
|
page read and write
|
||
37D4002C0000
|
direct allocation
|
page read and write
|
||
283CDFE000
|
stack
|
page read and write
|
||
4084000F0000
|
trusted library allocation
|
page read and write
|
||
19BF3713000
|
direct allocation
|
page read and write
|
||
1E095C69000
|
unclassified section
|
page readonly
|
||
37D400274000
|
direct allocation
|
page read and write
|
||
1E7F182A000
|
heap
|
page read and write
|
||
4C1800AE8000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
3DD400264000
|
trusted library allocation
|
page read and write
|
||
4C64027EC000
|
trusted library allocation
|
page read and write
|
||
4C1800AD0000
|
trusted library allocation
|
page read and write
|
||
4C6402450000
|
trusted library allocation
|
page read and write
|
||
4C6401001000
|
trusted library allocation
|
page read and write
|
||
4C6402445000
|
trusted library allocation
|
page read and write
|
||
37D400250000
|
direct allocation
|
page read and write
|
||
1E093492000
|
heap
|
page read and write
|
||
36600802000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
4C1800E8C000
|
trusted library allocation
|
page read and write
|
||
36600B82000
|
trusted library allocation
|
page read and write
|
||
366007C2000
|
trusted library allocation
|
page read and write
|
||
4C18003DC000
|
trusted library allocation
|
page read and write
|
||
4C6403218000
|
trusted library allocation
|
page read and write
|
||
4C6402BB4000
|
trusted library allocation
|
page read and write
|
||
A7400244000
|
trusted library allocation
|
page read and write
|
||
19D0B960000
|
heap
|
page read and write
|
||
36600C42000
|
trusted library allocation
|
page read and write
|
||
199C00028000
|
trusted library allocation
|
page read and write
|
||
1D7A206A000
|
heap
|
page read and write
|
||
C000CBE000
|
direct allocation
|
page read and write
|
||
1E0934A5000
|
heap
|
page read and write
|
||
5FF000248000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
A740017C000
|
trusted library allocation
|
page read and write
|
||
3DD400274000
|
trusted library allocation
|
page read and write
|
||
4C1800F8C000
|
trusted library allocation
|
page read and write
|
||
6D7C00230000
|
trusted library allocation
|
page read and write
|
||
785800024000
|
trusted library allocation
|
page read and write
|
||
2079B9A0000
|
unclassified section
|
page readonly
|
||
1C76D28B000
|
heap
|
page read and write
|
||
19BF3840000
|
direct allocation
|
page execute read
|
||
1C76D271000
|
heap
|
page read and write
|
||
A74002AC000
|
trusted library allocation
|
page read and write
|
||
19D06E02000
|
heap
|
page read and write
|
||
4C6402C50000
|
trusted library allocation
|
page read and write
|
||
199C00001000
|
trusted library allocation
|
page read and write
|
||
1D7A201C000
|
heap
|
page read and write
|
||
1E7F1A2B000
|
heap
|
page read and write
|
||
4C18016BB000
|
trusted library allocation
|
page read and write
|
||
4C6402A5C000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
78580017C000
|
trusted library allocation
|
page read and write
|
||
283ADFE000
|
unkown
|
page readonly
|
||
7858003B0000
|
trusted library allocation
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
3DD400278000
|
trusted library allocation
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
4C1800ECC000
|
trusted library allocation
|
page read and write
|
||
7FF6EEFB5000
|
unkown
|
page readonly
|
||
4C18015F4000
|
trusted library allocation
|
page read and write
|
||
1E7C3326000
|
unclassified section
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
CAC00254000
|
direct allocation
|
page read and write
|
||
4C6402AF4000
|
trusted library allocation
|
page read and write
|
||
4C1801688000
|
trusted library allocation
|
page read and write
|
||
1E093485000
|
heap
|
page read and write
|
||
4C180074C000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
4C6402F28000
|
trusted library allocation
|
page read and write
|
||
4000210000
|
trusted library allocation
|
page read and write
|
||
4C180105A000
|
trusted library allocation
|
page read and write
|
||
C0004E8000
|
direct allocation
|
page read and write
|
||
5FF00024C000
|
trusted library allocation
|
page read and write
|
||
268C002B4000
|
trusted library allocation
|
page read and write
|
||
400033C000
|
trusted library allocation
|
page read and write
|
||
1E093502000
|
heap
|
page read and write
|
||
36600C02000
|
trusted library allocation
|
page read and write
|
||
1E095F82000
|
unclassified section
|
page readonly
|
||
4C18014B8000
|
trusted library allocation
|
page read and write
|
||
7FF6EE2FB000
|
unkown
|
page readonly
|
||
6190008CC000
|
trusted library allocation
|
page read and write
|
||
36600702000
|
trusted library allocation
|
page read and write
|
||
4000298000
|
trusted library allocation
|
page read and write
|
||
619000EA8000
|
trusted library allocation
|
page read and write
|
||
36600CC2000
|
trusted library allocation
|
page read and write
|
||
4C1800FDD000
|
trusted library allocation
|
page read and write
|
||
36600942000
|
trusted library allocation
|
page read and write
|
||
4C18003E8000
|
trusted library allocation
|
page read and write
|
||
37D400408000
|
direct allocation
|
page read and write
|
||
4C1800E93000
|
trusted library allocation
|
page read and write
|
||
1E090669000
|
heap
|
page read and write
|
||
199C00084000
|
trusted library allocation
|
page read and write
|
||
4C1801054000
|
trusted library allocation
|
page read and write
|
||
268C00284000
|
trusted library allocation
|
page read and write
|
||
6D7C00344000
|
trusted library allocation
|
page read and write
|
||
4C180105C000
|
trusted library allocation
|
page read and write
|
||
4C1801728000
|
trusted library allocation
|
page read and write
|
||
1E7C2C37000
|
unclassified section
|
page read and write
|
||
12DDDFF000
|
stack
|
page read and write
|
||
4C1801574000
|
trusted library allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
12DC5FF000
|
stack
|
page read and write
|
||
A7400228000
|
trusted library allocation
|
page read and write
|
||
619000368000
|
trusted library allocation
|
page read and write
|
||
4C18009E7000
|
trusted library allocation
|
page read and write
|
||
19D0B962000
|
heap
|
page read and write
|
||
4C180155F000
|
trusted library allocation
|
page read and write
|
||
4000230000
|
trusted library allocation
|
page read and write
|
||
36600A82000
|
trusted library allocation
|
page read and write
|
||
2833DFE000
|
unkown
|
page readonly
|
||
4C6402FD0000
|
trusted library allocation
|
page read and write
|
||
4C64031C8000
|
trusted library allocation
|
page read and write
|
||
3680000C000
|
trusted library allocation
|
page read and write
|
||
4C640245A000
|
trusted library allocation
|
page read and write
|
||
4C1800EB0000
|
trusted library allocation
|
page read and write
|
||
A740013C000
|
trusted library allocation
|
page read and write
|
||
A740029E000
|
trusted library allocation
|
page read and write
|
||
19D04F10000
|
heap
|
page readonly
|
||
4C1800F14000
|
trusted library allocation
|
page read and write
|
||
3DD4002A0000
|
trusted library allocation
|
page read and write
|
||
36600BC2000
|
trusted library allocation
|
page read and write
|
||
A74002C8000
|
trusted library allocation
|
page read and write
|
||
4C18009E0000
|
trusted library allocation
|
page read and write
|
||
268C00284000
|
trusted library allocation
|
page read and write
|
||
4C1800A2C000
|
trusted library allocation
|
page read and write
|
||
4C1800B1C000
|
trusted library allocation
|
page read and write
|
||
1E096053000
|
unclassified section
|
page readonly
|
||
4C0800240000
|
direct allocation
|
page read and write
|
||
320800280000
|
trusted library allocation
|
page read and write
|
||
1D7A1FA0000
|
trusted library section
|
page readonly
|
||
4C180104C000
|
trusted library allocation
|
page read and write
|
||
366005C2000
|
trusted library allocation
|
page read and write
|
||
4C1800ACC000
|
trusted library allocation
|
page read and write
|
||
4C1801581000
|
trusted library allocation
|
page read and write
|
||
4C640225E000
|
trusted library allocation
|
page read and write
|
||
62B7FE000
|
unkown
|
page readonly
|
||
C000071000
|
direct allocation
|
page read and write
|
||
19D0B90C000
|
heap
|
page read and write
|
||
4C640321C000
|
trusted library allocation
|
page read and write
|
||
4C1800CDC000
|
trusted library allocation
|
page read and write
|
||
366009C2000
|
trusted library allocation
|
page read and write
|
||
19BF366C000
|
direct allocation
|
page read and write
|
||
631C00280000
|
trusted library allocation
|
page read and write
|
||
4C640321C000
|
trusted library allocation
|
page read and write
|
||
70695C8000
|
stack
|
page read and write
|
||
1D7A2055000
|
heap
|
page read and write
|
||
A7400254000
|
trusted library allocation
|
page read and write
|
||
6D7C002CC000
|
trusted library allocation
|
page read and write
|
There are 4036 hidden memdumps, click here to show them.